N7K Architecture
N7K Architecture
N7K Architecture
BRKARC-3470
Session Goal
To provide you with a thorough understanding of the Cisco Nexus 7000 switching architecture, supervisor, fabric, and I/O module design, packet flows, and key forwarding engine functions This session will not examine Unified I/O, DCB, FCoE, NXOS software architecture, or other Nexus platforms Related sessions:
BRKARC-3471: Cisco NXOS Software Architecture
Presentation_ID
Cisco Public
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
Front-toback airflow
Air exhaust
Front
N7K-C7010Cisco Public
Rear
25RU
Power supplies
Front
Rear
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
Supervisor Engine
Performs control plane and management functions Dual-core 1.66GHz Intel Xeon processor with 4GB DRAM 2MB NVRAM, 2GB internal bootdisk, compact flash slots Out-of-band 10/100/1000 management interface Always-on Connectivity Management Processor (CMP) for lights-out management Console and auxiliary serial ports USB ports for file transfer N7K-SUP1
CMP Ethernet
Reset Button
7
Management Interfaces
Management Ethernet
10/100/1000 interface used exclusively for system management Belongs to dedicated management VRF
Prevents data plane traffic from entering/exiting from mgmt0 interface Cannot move mgmt0 interface to another VRF Cannot assign other system ports to management VRF
Provides lights out remote management and disaster recovery via 10/100/1000 interface
Removes need for terminal servers
Presentation_ID
Cisco Public
Fabric ASIC
Arbitration Path
Arbitration Path
Switched EOBC
1GE EOBC
VOQs
1GE Inband
Central Arbiter
128MB
16MB
DRAM
Flash
System Controller
4GB
CMP
Security Processor
266MHz
Link Encryption
2GB
DRAM
2MB
PHY
Internal CF
Main CPU
10/100/1000
1.66GHz Dual-Core
PHY
10/100/1000
Console
AUX
Mgmt Enet
log-flash:
CMP Enet
Presentation_ID
Cisco Public
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
10
8-port 10G with X2 transceivers 80G full-duplex fabric connectivity Two integrated forwarding engines (120Mpps)
Support for XL forwarding tables (licensed feature)
Presentation_ID
Cisco Public
11
Fabric ASIC
LC CPU
VOQs
Forwarding Engine
Replication Engine
Forwarding Engine
Replication Engine
VOQs
Replication Engine 10G MAC Linksec 1 10G MAC Linksec 2 10G MAC Linksec 3 10G MAC Linksec 4 10G MAC Linksec 5 10G MAC Linksec 6
12
32-port 10G with SFP+ transceivers 80G full-duplex fabric connectivity Integrated 60Mpps forwarding engine Oversubscription option for higher density (up to 4:1) 8 ports wire-rate L3 multicast replication 802.1AE LinkSec
N7K-M132XP-12
Presentation_ID
2010 Cisco and/or its affiliates. All Public reserved. Cisco rights
Cisco Public
13
Shared mode
Four interfaces in port group share 10G bandwidth Port groupgroup of contiguous even or odd ports that share 10G of bandwidth (e.g., ports 1,3,5,7)
Dedicated mode
9 11 13 15 First interface in port group gets 10G bandwidth Other three interfaces in port group disabled
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
14
Fabric ASIC
LC CPU
VOQs
Forwarding Engine
VOQs
Replication Engine Replication Engine 10G MAC 4:1 Mux + Linksec 1 3 5 7 10G MAC 4:1 Mux + Linksec 9 11 13 15 10G MAC 4:1 Mux + Linksec 17 19 21 23 10G MAC 4:1 Mux + Linksec 25 27 29 31 10G MAC 4:1 Mux + Linksec 2 4 6 8
Replication Engine Replication Engine 10G MAC 4:1 Mux + Linksec 10G MAC 4:1 Mux + Linksec 10G MAC 4:1 Mux + Linksec
10 12 14 16 18 20 22 24 26 28 30 32
15
48 10/100/1000 RJ-45 ports (N7K-M148GT-11) 48 1G SFP ports (N7K-M148GS-11) 48 1G SFP ports with XL forwarding engine (N7K-M148GS-11L)
N7K-M148GT-11 Release 4.0(1) and later
16
Fabric ASIC
LC CPU
VOQs
Replication Engine
Forwarding Engine
Replication Engine
1-12
17
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
18
RACL/VACL/PACLs Policy-based routing (PBR) Unicast RPF check and IP source guard QoS remarking and policing policies Ingress and egress NetFlow (full and sampled)
M1-XL Modules without License 128K 64K 128K 512K
Cisco Public
Lic Status Expiry Date Comments Count ------------------------------------------------------------------------SCALABLE_SERVICES_PKG Yes In use Never LAN_ADVANCED_SERVICES_PKG Yes In use Never LAN_ENTERPRISE_SERVICES_PKG Yes In use Never ------------------------------------------------------------------------N7K#
Ins
Presentation_ID
Cisco Public
20
Layer 3 Engine
IPv4/IPv6 Layer 3 lookups ACL, QoS, NetFlow and other processing Linear, pipelined architectureevery packet subjected to both ingress and egress pipeline Enabling features does not affect forwarding engine performance
Presentation_ID
Cisco Public
21
Ingress Pipeline Ingress NetFlow collection Ingress ACL and QoS classification lookups Egress Pipeline Layer 3 Engine Egress policing
FIB TCAM and adjacency table lookups for Layer 3 forwarding ECMP hashing Multicast RPF check Ingress policing
Unicast RPF check Ingress MAC table lookups IGMP snooping lookups IGMP snooping redirection
Egress ACL and QoS classification lookups Layer 2 Engine Egress MAC lookups IGMP snooping lookups
Final lookup result to I/O Module Replication Engine
Cisco Public
22
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
23
N7K-C7010-FAB-1
N7K-C7018-FAB-1
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
24
Fabric Modules
Crossbar Fabric ASICs
46Gbps/slot
46Gbps/slot
46Gbps/slot
Nexus 7018
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
25
Fabric Modules
Crossbar Fabric ASICs
46Gbps/slot
46Gbps/slot
46Gbps/slot
10G modules
Require 2 fabrics for full bandwidth Require 3 fabrics for N+1 redundancy
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
46Gbps/slot
26
Bandwidth capacity on egress modules represented by Virtual Output Queues (VOQs) at ingress to fabric
I/O modules interface with arbiter to gain access to VOQs
Presentation_ID
Cisco Public
27
VOQ is virtual because it represents EGRESS capacity but resides on INGRESS modules
It is still PHYSICAL buffer where packets are stored
Presentation_ID
Cisco Public
28
Ensures fair access to bandwidth for multiple ingress ports transmitting to one egress port
Central arbiter ensures all traffic sources get appropriate access to fabric bandwidth, even with traffic sources on different modules
Prevents congested egress ports from blocking ingress traffic destined to other ports
Mitigates head-of-line blocking by providing independent queues for individual destinations across the fabric
In future, will provide lossless service for FCoE traffic across the fabric
Can provide strict priority and backpressure (blocking instead of dropping) for certain traffic classes, such as SAN traffic
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
29
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
31
Layer 2 Forwarding
MAC table is 128K entries (115K effective) Hardware MAC learning
CPU not directly involved in learning
Spanning tree (PVRST or MST) or Virtual Port Channel (VPC) ensures loop-free Layer 2 topology
Presentation_ID
Cisco Public
32
33
Presentation_ID
Cisco Public
34
HDR
= Packet Headers
DATA
= Packet Data
CTRL
= Internal Signaling
Return credit to pool
L2 Packet Flow
Fabric Module 1
Fabric ASIC
Transmit to fabric VOQ arbitration and queuing
Supervisor Engine
Central Arbiter
12
Fabric Module 2
Fabric ASIC
Fabric Module 3
Fabric ASIC
Receive from fabric Return buffer credit
10
ACL/QoS/ NetFlow lookups
11
8
Fabric ASIC
6 14
VOQs
Submit packet headers for lookup
Fabric ASIC
13
1
e1/1
Presentation_ID
Module 1
2010 Cisco and/or its affiliates. All rights reserved.
15 Module 2
Transmit packet on Cisco Public wire
Linksec
LinkSec encryption
16
35
17
e2/1
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
36
IP Forwarding
Nexus 7000 decouples control plane and data plane Forwarding tables built on control plane using routing protocols or static configuration
OSPF, EIGRP, IS-IS, RIP, BGP for dynamic routing
Presentation_ID
Cisco Public
37
IP Forwarding Architecture
Routing protocol processes learn routing information from neighbors IPv4 and IPv6 unicast RIBs calculate routing/next-hop information Unicast Forwarding Distribution Manager (UFDM) interfaces between URIBs on supervisor and IP FIB on I/O modules IP FIB process programs forwarding engine hardware on I/O modules
FIB TCAM contains IP prefixes Adjacency table contains next-hop information
URIB/U6RIB UFDM
IP FIB Hardware
cpu | egrep ospf|PID Invoked uSecs 1Sec 33386880 0 0 cpu | egrep u.?rib 44722390 0 0 34200830 0 0 cpu | egrep ufdm 743933460 0 0
I/O Module
module-9# sh processes cpu | egrep fib 1534 80042 330725 242 0.0 module-9#
Presentation_ID
Cisco Public
38
Presentation_ID
Cisco Public
39
Forwarding Engine
Next-hop 1 (IF, MAC) Next-hop 2 (IF, MAC)
Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops Index, # next-hops
Hit in FIB Index, returns result# in FIB DRAM
Load-Sharing Hash
Offset
Next-hop 4 (IF, MAC) # nexthops Adj Index Next-hop 5 (IF, MAC) Next-hop 6 (IF, MAC) Next-hop 7 (IF, MAC) Result
next-hops
FIB DRAM
2010 Cisco and/or its affiliates. All rights reserved.
Adjacency Table
41
Presentation_ID
Cisco Public
42
Presentation_ID
Cisco Public
43
n7010# show forwarding adjacency 10.1.2.2 module 9 IPv4 adjacency information, adjacency count 1 next-hop --------------Presentation_ID
44
10.10.0.0/16
45
------------------+------------------+---------------------
46
Hash for VRF "default" Hashing to path *10.1.2.2 (hash: 0x29), for route:
10.200.0.0/16, 2 ucast next-hops, 0 mcast next-hops *via 10.1.1.2, Ethernet9/1, [110/5], 00:14:18, ospf-1, inter *via 10.1.2.2, Ethernet9/2, [110/5], 00:10:58, ospf-1, inter n7010#
47
HDR
= Packet Headers
DATA
= Packet Data
CTRL
= Internal Signaling
Return credit to pool
L3 Packet Flow
Fabric Module 1
Fabric ASIC
Transmit to fabric VOQ arbitration and queuing
Supervisor Engine 9
Central Arbiter
12
Fabric Module 2
Fabric ASIC
Fabric Module 3
Fabric ASIC
Receive from fabric Return buffer credit
10 6
L3 FIB/ADJ lookup Ingress and egress ACL/QoS/ NetFlow lookups L2-only SMAC/DMAC lookup L2 ingress and egress SMAC/ DMAC lookups Return result
11
8
Fabric ASIC
14 5
Fabric ASIC
VOQs
Submit packet headers for lookup
4 3
13
1
e1/1
Module 1
2010 Cisco and/or its affiliates. All rights reserved.
15 Module 2
Transmit packet on Cisco Public wire
Linksec
16
48
Presentation_ID
17
e2/1
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
49
IP Multicast Forwarding
Forwarding tables built on control plane using multicast protocols
PIM-SM, PIM-SSM, PIM-Bidir, IGMP, MLD
Presentation_ID
Cisco Public
50
Supervisor Engine PIM IGMP PIM6 ICMP6 BGP MSDP MRIB/M6RIB MFDM
module-9# sh processes cpu | egrep fib 1534 80153 330725 242 0.0 module-9#
Presentation_ID
Cisco Public
51
Hardware Programming
IP FIB process on I/O modules programs hardware:
FIB TCAM
Part of Layer 3 Engine ASIC on forwarding engine Consists of (S,G) and (*,G) entries as well as RPF interface
Presentation_ID
Cisco Public
52
Forwarding Engine
RPF, ADJ Index RPF, ADJ Index RPF, ADJ Index RPF, ADJ Index RPF, ADJ Index FIB DRAM Adj Index
MET Index MET Index MET Index MET Index MET Index
Adjacency Table
Identifies multicast adjacency entry Return lookup result
10.6.6.10, 239.44.2.1
FIB TCAM
Hit in FIB returns result in FIB DRAM
Result
Replication Engine
Replication for each OIF in MET block
Replicate
Presentation_ID
show forwarding [ipv4|ipv6] multicast route [source <ip>] [group <ip>] [vrf <vrf>] module <mod>
Displays hardware multicast forwarding (FIB) information on per-module basis
Presentation_ID
Cisco Public
55
oifs 2 2 2 2
56
n7010# sh forwarding ipv4 multicast route group 239.1.1.1 source 10.1.1.2 module 9
(10.1.1.2/32, 239.1.1.1/32), RPF Interface: Ethernet9/1, flags: Received Packets: 10677845 Bytes: 1366764160 Number of Outgoing Interfaces: 2 Outgoing Interface List Index: 15 Ethernet9/2 Outgoing Packets:432490865 Bytes:55358830720 Ethernet9/17 Outgoing Packets:419538767 Bytes:53700962176 n7010#
Presentation_ID
Cisco Public
57
Egress Replication
IIF
Distributes multicast replication load among replication engines of all I/O modules with OIFs Input packets get lookup on ingress forwarding engine For OIFs on ingress module, ingress replication engine performs the replication For OIFs on other modules, ingress replication engine replicates a single copy of packet over fabric to those egress modules Each egress forwarding engine performs lookup to drive replication Replication engine on egress module performs replication for local OIFs
Local OIFs
Cisco Public
Local OIF
Module 1
Replication MET Engine
Fabric ASIC
Fabric Copy
Fabric Module
Fabric ASIC
Fabric ASIC
Fabric ASIC
Fabric ASIC
Local OIFs
Local OIFs
58
Presentation_ID
HDR
= Packet Headers
DATA
= Packet Data
Fabric Module 2
Fabric ASIC
Fabric Module 3
Fabric ASIC
Dequeue multicast distribution copy from fabric
11 6
L3 multicast FIB lookup Ingress ACL/QoS/ NetFlow lookups Egress ACL/QoS/ NetFlow lookups L2 ingress snooping lookup Return MET result
12
VOQ queuing
10
Transmit multicast fabric distribution packet Submit packet headers for lookup
Fabric ASIC
Layer 3 Engine
Fabric ASIC
Replicate for local OIF delivery
15
Layer 2 Engine
13
4 3
1
e1/1
8 Module 1
Forwarding Engine
14
LinkSec encryption
16 2
17 Module 2
Transmit packet on wire
Linksec
18
e2/1
19
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Public
59
Multicast traffic
Locally arbitrated Load balanced over available fabric channels using hash
Presentation_ID
Cisco Public
60
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
61
Security ACLs
Enforce security policies based on Layer 2, Layer 3, and Layer 4 information Classification TCAM (CL TCAM) provides ACL lookups in forwarding engine
64K hardware entries
Router ACL (RACL)Enforced for all traffic crossing a Layer 3 interface in a specified direction
IPv4, ARP RACLs supported
62
ACL Architecture
ACL manager receives policy via configuration ACL manager distributes policies to ACL/QoS Clients on I/O modules Clients perform ACL merge and program ACEs in Classification (CL) TCAM in forwarding engines
n7010# sh processes cpu | egrep aclmgr|PID PID Runtime(ms) Invoked uSecs 1Sec Process 3589 1662 516430000 0 0 aclmgr module-9# sh processes cpu | egrep aclqos 1532 9885 671437 14 0.0 module-9# aclqos
ACL Manager
Hardware CL TCAM
Presentation_ID
Cisco Public
63
Security ACL ip access-list example permit ip any host 10.1.2.100 deny ip any host 10.1.68.44 deny ip any host 10.33.2.25 permit tcp any any eq 22 deny tcp any any eq 23 deny udp any any eq 514 permit tcp any any eq 80 permit udp any any eq 161
Forwarding Engine
Permit Deny Deny Permit Deny Deny Permit Permit CL SRAM
Return lookup result 64
xxxxxxx | 10.2.2.2 | xx | xxx | xxx xxxxxxx | 10.1.2.100 |xx | xxx | xxx xxxxxxx | 10.1.68.44 | xx | xxx | xxx xxxxxxx | 10.33.2.25 | xx | xxx | xxx
X=Mask
xxxxxxx | xxxxxxx | |06 | |xxx | 0050 xxxxxxx xxxxxxx 06 xxx | 0016 xxxxxxx | xxxxxxx | 06 | xxx | 0017 xxxxxxx | xxxxxxx | 11 | xxx | 0202 HIT! xxxxxxx | xxxxxxx | 06 | xxx | 0050 xxxxxxx | xxxxxxx | 11 | xxx | 00A1 CL TCAM
Hit in CL TCAM returns result in CL SRAM
Cisco Public
Result
Presentation_ID
65
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
68
Quality of Service
Comprehensive LAN QoS feature set Ingress and egress queuing and scheduling
Applied in I/O module port ASICs
Presentation_ID
Cisco Public
69
QoS Architecture
QoS manager receives policy via configuration QoS manager distributes policies to ACL/QoS Clients on I/O modules Clients perform ACL merge and program hardware:
ACEs in Classification (CL) TCAM in forwarding engines Queuing policies in I/O module port ASICs
n7010# sh processes cpu | egrep qos|PID PID Runtime(ms) Invoked uSecs 1Sec 3849 1074 66946870 0 0 module-9# sh processes cpu | egrep aclqos 1532 9885 671437 14 0.0 module-9# Process ipqosmgr aclqos
QoS Manager
Presentation_ID
Cisco Public
70
Queue Structure
8q2t ingress 1p7q4t egress
Presentation_ID
Cisco Public
71
Ingress
Replication Engine
12345678
8q2t
Port 1 96MB
Port 1 80MB
12345678
Port ASIC 1
1p7q4t
Egress
Presentation_ID
Cisco Public
72
Egress
Dedicated mode: 80MB per port Shared mode: 80MB per port-group
Queue Structure
8q2t + 2q1t ingress 1p7q4t egress
Presentation_ID
Cisco Public
73
Ingress
(Fixed)
12
2q1t
12345678
Port ASIC
Port 3 1MB
1p7q4t
12345678
Port 1 1MB
8q2t
Port 5 1MB
Port 7 1MB
4:1 Mux
1,3,5,7
Port Group
Egress
Presentation_ID
Cisco Public
74
Ingress
(Fixed)
12
2q1t
Port 1 65MB
Port 1 80MB
12345678
Port ASIC
1p7q4t
12345678
Port 1 1MB
8q2t
4:1 Mux
1,3,5,7
Port Group
Egress
Presentation_ID
Cisco Public
75
Queue Structure
2q4t ingress 1p3q4t egress
Presentation_ID
Cisco Public
76
Ingress
Replication Engine
Port 10 7.6MB Port 7 4 Port 7.6MB 7.6MB Port 1 Port 11 7.6MB 7.6MB Port 8 5 Port 7.6MB 7.6MB Port 2 Port 12 7.6MB 7.6MB Port 9 6 Port 7.6MB 7.6MB Port 3 7.6MB Port 10 6.2MB Port 7 4 Port 6.2MB 6.2MB Port 1 Port 11 6.2MB 6.2MB Port 8 5 Port 6.2MB 6.2MB Port 2 Port 12 6.2MB 6.2MB Port 9 6 Port 6.2MB 6.2MB Port 3 6.2MB
12
1234
2q4t
1p3q4t
Egress
Presentation_ID
Cisco Public
77
Presentation_ID
Cisco Public
78
ip access-list police permit ip any 10.3.3.0/24 permit ip any 10.4.12.0/24 ip access-list remark-dscp-32 permit udp 10.1.1.0/24 any ip access-list remark-dscp-40 permit tcp 10.1.1.0/24 any
Forwarding Engine
10.1.1.1 | 10.2.2.2 | 06 | 84C8 | 0050 Policer ID 1 Policer ID 1 Remark DSCP 32 Remark DSCP 40 Remark IP Prec 3
Hit in CL TCAM returns result in CL SRAM
xxxxxxx | 10.2.2.xx | xx | xxx | xxx 10.3.3.xx xxxxxxx | 10.4.24.xx | xx | xxx | xxx 10.1.1.xx | xxxxxxx | 11 || xxx | xxx 06 xxx| xxx HIT! 10.1.1.xx | xxxxxxx | 06 | xxx | xxx xxxxxxx | 10.5.5.xx| 06 | xxx | 0017 CL TCAM
Result
CL SRAM
Presentation_ID
Cisco Public
79
enabled
mark enabled
udp-mcast (match-all)
udp (match-all)
80
Agenda
Chassis Architecture Supervisor Engine Architecture I/O Module Architecture Forwarding Engine Architecture Fabric Architecture Layer 2 Forwarding IP Forwarding IP Multicast Forwarding ACLs QoS NetFlow
Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public
81
NetFlow
NetFlow table is 512K entries (490K effective), shared between ingress/egress NetFlow Hardware NetFlow entry creation
CPU not involved in NetFlow entry creation/update
All modules have independent NetFlow table Full and sampled NetFlow supported by hardware
Presentation_ID
Cisco Public
82
NetFlow Architecture
NetFlow manager receives configuration via CLI/XML NetFlow manager distributes configuration to NetFlow-Clients on I/O modules NetFlow-Clients apply policy to hardware
n7010# sh processes cpu | egrep nfm|PID PID Runtime(ms) Invoked uSecs 1Sec Process 24016 1463 735183570 0 0 nfm module-9# sh processes cpu | egrep nfp 1538 68842 424290 162 0.0 module-9# nfp
NetFlow Manager
Hardware NF Table
83
Each interface can collect full or sampled flow data Full NetFlow: Accounts for every packet of every flow on interface, up to capacity of NetFlow table Sampled NetFlow: Accounts for M in N packets on interface, up to capacity of NetFlow table
Presentation_ID
Cisco Public
86
-+-----+---------------+---------------+---------------+----------+----------010.001.001.002 010.001.002.002 006:01024:01024 0001403880 A . . . S . 010.001.001.003 010.001.002.003 006:01024:01024 0001403880 A . . . S . 010.001.001.004 010.001.002.004 006:01024:01024 0001403880 . . . . S .
0000218460416 000 N
Presentation_ID
89
I/O Module
Fabric ASIC via Inband VOQs
Supervisor Engine
LC CPU
NetFlow Table
Aged Flows
Main CPU
Switched EOBC
Aged Flows
via mgmt0
Mgmt Enet
To NetFlow Collector
Aged Flows
Forwarding Engine
Presentation_ID
Cisco Public
90
Conclusion
You should now have a thorough understanding of the Nexus 7000 switching architecture, I/O module design, packet flows, and key forwarding engine functions Any questions?
Presentation_ID
Cisco Public
92
Q and A
Presentation_ID
Cisco Public
94
Dont forget to activate your Cisco Live Virtual account for access to all session material, communities, and on-demand and live activities throughout the year. Activate your account at the Cisco booth in the World of Solutions or visit www.ciscolive.com.
Cisco Public
Presentation_ID
95