© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-1 Cisco Catalyst 6500 Series Switches: Carlos Nivon.

110
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-1 Cisco Catalyst 6500 Series Switches: Carlos Nivon

Transcript of © 2006, Cisco Systems, Inc. CAT6KS v2.0—2-1 Cisco Catalyst 6500 Series Switches: Carlos Nivon.

© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-1

Cisco Catalyst 6500 Series Switches:

Carlos Nivon

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-2

Comunidad de Sopórte de Cisco – Webcast en vivo

Carlos Nivón

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-3

La presentación incluirá algunas preguntas a la audiencia.

Le invitamos cordialmente a participar activamente en las preguntas que le haremos durante la sesión

Gracias por su asistencia el día de hoy

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-4

Copia de la presentación

Si desea bajar una copia de la presentación de hoy, vaya a la liga indicada en el chat o use ésta dirección

https://supportforums.cisco.com/docs/DOC-28341

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-5

Chassis Overview

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-6

Cat 6500 slot Orientation

Vertically Aligned Slots

Horizontally Aligned Slots

6503

6506

6509

6509-NEBS(EOS)

65136509-NEBS-A

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-7

Supervisors, Line cards and

other Modules

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-8

Supervisor Engine 32

Supervisor 32

Access Layer

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-9

Supervisor Engine 720

Switch Fabric

Supervisor 720 with Integrated Switch Fabric

Core Layer

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-10

Ethernet and WAN Line Cards

10/100 TX and 100 Fiber 10/100/1000 TX GE SFP

GE GBIC 10GE Inline Power

OSM FlexWAN SIP

Ethernet Line Cards

WAN Line Cards

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-11

Advanced Services Modules

Firewall ModuleIPSec VPN Shared Port

AdapterIntrusion Detection SSL

CSM CSM-S

Security

Application Networking Services

ACE

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-12

CSG

Advanced Services Modules (Cont.)

IP Telephony

Wireless ServicesWLSM MWAM

CMM T1/E1 Services Modules

CMM

NAM and NAM2 TAD

Network Monitoring

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-13

Catalyst 6500 Backplane Architecture

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-14

Classic 32-Gbps Shared-Bus Backplane

32-Gbps Shared Switching Bus

Multilayer Forwarding

Table

Line Card

PFC Switching System

Multilayer Switch Feature

Card

Fabric Arbitration

Network MGMTNMP/MCP

Supervisor Engine

BusASIC

PortASIC

Local Buffer

Port or BusASIC

Local Buffer

10/100 Ethernet Gigabit Ethernet

Control BusResults Bus

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-15

Crossbar Switch Fabric

Multilayer Forwarding

Table

PFC Switching System

Multilayer Switch Feature

Card

Fabric Arbitration

Network MGMTNMP/MCP

Supervisor Engine 720

CROSSBAR

FabricASIC

1 x 20 Gbps

1 x 20 Gbps

1 x 8 Gbps

1 x 8 Gbps

1 x 8 Gbps

Port ASIC

Port ASIC

Port ASIC

Port ASIC

Fabric ASIC

Fabric ASIC

Fabric ASIC

Fabric ASIC

Port ASIC

CEF256

dCEF256

CEF720

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-16

Crossbar Switch Fabric Layout Nine-Slot Chassis

Slot1 Slot2 Slot3 Slot4

Slot7 Slot8 Slot9

Slot 5

Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC

Fabric ASIC Fabric ASIC Fabric ASIC

Slo

t5

Fa

bric

AS

IC

Slo

t6

Fa

bric

AS

IC

Slot 6

= Fabric (SFM/Sup)

= Line Card

Type of card in slot:

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-17

Crossbar Switch Fabric 13-Slot Chassis

Slo

t7

Fa

bric

AS

IC

Slo

t8

Fa

bric

AS

IC

Slot2 Slot3 Slot4 Slot5 Slot6Slot1Fabric ASIC

Slot9 Slot10 Slot11 Slot12 Slot13

Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC

Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC

Slot 7

Slot 8

= Fabric (SFM/Sup)

= Line Card

Type of card in slot:

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-18

Introducing the Shared Bus and Switch Fabric Architectures

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-19

CEF Forwarding Architectures

dCEF

• Hardware-based distributed forwarding• dCEF engine has a copy of the entire

forwarding table at the line card• All traffic is switched at a sustained 48

Mpps (for DFC3 on CEF720)

CEF

• Hardware-based centralized forwarding• PFC on supervisor makes all forwarding

decisions• Handles centralized forwarding up to 30

Mpps

Features of CEF forwarding architectures include the following:

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-20

Supervisor Engine 720 Switch-Fabric Connectivity

Supervisor Engine 720

Classic Series

20

20

z

CEF720 Series

OptionalDFC3

88

8

30 to 400 Mpps Forwarding Performance

dCEF720 Series

IntegratedDFC3

IntegratedDFC3

dCEF256 Series

20

Integrated Switch Fabric

Routing TableMSFC3

PFC3

20

20

Hardware Fwd Tables

32-Gbps Switching Bus

CEF256 Series

OptionalDFC3

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-21

Supervisor Engine 32

Supervisor Engine 32 with Eight GE Uplinks

WS-SUP32-GE-3BSupervisor Engine 32 with Two

10-GE Uplinks

WS-SUP32-10GE-3B

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-22

Supervisor Engine 32: Front Panel

RS-232Console Port

Compact FlashSlot

8 x SFP based GE Uplink Ports

1 x 10/100/1000 GEUplink Port

2 x USB Ports

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-23

Integrated PFC3

Supervisor Engine 32

PFC3B

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-24

Integrated MSFC2a

Supervisor Engine 32

MSFC2a

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-25

Supervisor Engine 32 Line Card Compatibility

Architecture Supported?

Classic YES

CEF256 YES

dCEF256 NO

CEF720 NO

dCEF720 NO

SFM/SFM2 NO

Services Modules

YES

Any DFC NO

OSM* YES

SIP YES

FlexWAN YES

*OSM: Original Storage Manufacturer

Supervisor Engine 32

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-26

Supervisor Engine 720 Overview

Removable Storage Slots

Console Port Uplink Ports

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-27

Supervisor Engine 720 Options

Supervisor Engine 720-3B Supervisor Engine 720-3BXL

Incorporates new PFC3B to provide the same features as the XL version but not

as high a capacity for routes and flow information

Incorporates new PFC3BXL, extending

hardware features and system capacity for routes

and flow information

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-28

Catalyst 6500 Supervisor Engine 720 PFC Options

Name PFC3A PFC3B PFC3B-XL

Routes 256,000 256,000 1 million

Number of ACLs 512 4000 4000

NetFlow Entries 128,000 (64,000) 128,000 (115,000) 256,000 (230,000)

ACE Counters No Yes Yes

MPLS No Yes Yes

Default MemorySP 512 MB + RP 512

MBSP 512 MB + RP 512

MBSP 1 GB + RP 1

GB

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-29

Supervisor Engine 720 Switch Fabric

Switch Fabric

• Integrated 720-Gbps switch fabric.

• CEF256 and dCEF256 connect in at 8 Gbps per fabric channel.

• CEF720 and dCEF720 connect in at 20 Gbps per fabric channel.

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-30

Supervisor Engine 720 Hardware Features

IPv6 Hardware Features128,000 FIB entriesIPv6 load sharing up to 16 pathsEtherChannel hash across 48 bitsIPv6 policing/NetFlow/classificationSTD and EXT V6 ACLsIPv6 QoS lookupsIPv6 multicastIPv6-to-IPv4 TunnelingIPv6 edge over MPLS (6PE)

IPv6 Software Features

IPv6 addressingICMP for IPv6DNS for IPv6V6 MTU path discoverySSH for IPv6IPv6 TelnetIPv6 traceroutedCEF for IPv6RIP for IPv6IS-IS for IPv6OSPF v3 for IPv6BGP for IPv6

IPv6 function locatedon PFC3

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-31

MPLS Hardware Features

MPLS HARDWARE FEATURES

Up to 1000 MPLS VPNsMPLS VPN (RFC 2457) on any Ethernet portMPLS multicast VPNMPLS label switch router (LSR)MPLS label edge router (LER)MPLS Traffic Engineering (TE)MPLS Ethernet over MPLS (EoMPLS) on PFC3BDSCP-to-EXP mapping

MPLS function locatedon PFC3

MPLS applies to any Ethernet port on the following line cards:

Classic Ethernet Line Cards

CEF256 Ethernet Line Cards

dCEF256 Ethernet Line Cards

CEF720 Ethernet Line Cards

dCEF720 Ethernet Line Cards

© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-32

Catalyst 6500 Architecture Overview

Catalyst 6500 Line Cards

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-33

Catalyst 6500 Line Cards

10/100BASE-TX and100BASE-FX

10/100/1000BASE-TX Gigabit Ethernet SFP

GE GBIC 10GE WAN

Optical Services Modules In-line Power SIP

CATALYST

6500

LINE

CARDS

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-34

Classic and Crossbar Switch Fabric Line Cards

Classic CEF256

Shared Bus Connector

Crossbar Connector

Shared Bus Connector

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-35

Line Card Types

32-Gbps Shared Bus

Switch Fabric Crossbar

Supervisor

ClassicLine Cards

CEF256Line Cards

8

8 8

dCEF720Line Cards

20 20

20 20

CEF720Line Cards

dCEF256Line Cards

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-36

Classic Line Card Architecture

Classic line cards support a connection to the 32- Gbps shared bus only.

Buffer Buffer Buffer

10/100 ASIC

Buffer

Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48

10/100 ASIC10/100 ASIC10/100 ASIC

32-Gbps Shared Bus

Gigabit Ethernet ASIC

48-Port 10- and 100-MBps Line Card

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-37

CEF256 Line Card ArchitectureCrossbar

32-Gbps Shared Bus

8

Optional DFCDaughter Card

Port ASIC

FabricASIC

512-KB Buffer

Port ASIC

512-KB Buffer

Port ASIC

512-KB Buffer

Port ASIC

512-KB Buffer

32 Gbps Local Switching Bus

Ports 1–4 Ports 5–8 Ports 9–12 Ports 13–16

CEF256 line cards support a connection to the 32-Gbps shared bus and an 8-Gbps connection to the switch fabric.

16-Port Gigabit Ethernet Line Card

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-38

dCEF256 Line Card Architecture

8

Port ASIC

Fabric ASIC

512-KB Buffer

Port ASIC

512-KB Buffer

Port ASIC

512-KB Buffer

Port ASIC

512-KB Buffer

32-Gbps Local Bus

8

Fabric ASIC Integrated DFC and DFC3

32-Gbps Local Bus

Ports 1–4 Ports 5–8 Ports 9–12 Ports 13–16

16-Port Gigabit Ethernet Line Card

dCEF256 line cards support two 8-Gbps connections to the switch fabric only.

Crossbar

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-39

CEF720 Line Card Architecture

20

Port ASIC Port ASIC Port ASIC Port ASIC

20

Crossbar

Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48

FabricASIC

FabricASIC

32-Gbps Shared Bus

48-Port Gigabit Ethernet Line Card

Optional DFC3Daughter Card

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-40

dCEF720 Line Card Architecture

20

Port ASIC Port ASIC Port ASIC Port ASIC

20

Crossbar

IntegratedDFC

Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48

FabricASIC

FabricASIC

48-Port Gigabit Ethernet Line Card

dCEF720 line cards support two 20-Gbps connections to the switch fabric only.

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-41

Line Card Packet Flow

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-42

Classic-to-Classic Centralized Forwarding

SupervisorEngine 720

PFC3

Layer 3 and Layer 4Engine

DBUSRBUS

ClassicModule A

PortASIC

ClassicModule B

Layer 2 Engine

PortASIC

SBlue

D

PortASIC

Red

PortASIC

1

2 3

4

Source

Destination

Blue VLAN

Red VLAN

Entire Packet

Packet Header

D

S

720-Gbps SwitchFabric

XX

X

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-43

CEF256-to-CEF256 Centralized Forwarding

SupervisorEngine 720

PFC3

Layers 3 and4 Engine

DBUSRBUS

CEF256Module A

8Gbps

LCDBUSLCRBUS

PortASIC

PortASIC

LCRBUS

LCDBUS

CEF256Module B

FabricInterface

8Gbps

L2 Engine

PortASIC

FabricInterface

720-Gbps SwitchFabric

SBlue

D

PortASIC

2

3

5

6

Source

Destination

Blue VLAN

Red VLAN

Entire packet

Packet header

D

S

1

4

XXNote: Packet flow for a CEF256-to-CEF720 is similar.

The main differences are the CEF720 module architecture and the speed of the fabric channel to the CEF720 module.

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-44

CEF720 and DFC3-to-CEF720 and DEFC3 Distributed Forwarding

DFC3 Layers 3 and 4

Engine

CEF720Module B

and DFC3

PortASIC

Supervisor Engine 720

PFC3

CEF720Module A

and DFC3

Layers 3 and4 Engine

DFC3

Layer 2Engine

Layer 2Engine

Fabric Interface and Replication

Engine

720-Gbps SwitchFabric

20Gbps

20

Gb

ps

S

DRed

Blue

Fabric Interface and Replication

Engine

PortASIC

1

2

3

4

5

PortASIC

PortASIC

Source

Destination

Blue VLAN

Red VLAN

Entire Packet

Packet Header

D

S

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-45

Catalyst 6500 Line Card Options

CEF720

dCEF256

CEF256

Classic

Interface Type

10/100BASE-TX

100BASE-FX

10/100/1000BASE-TX

1000BASE GBIC

1000BASE SFP

10GE XENPAK

10BASE-FL

Services Modules

FlexWAN

OSMs*

SIP

* OSM: Optical Services Module

© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-46

Troubleshooting the Catalyst 6500

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-47

Basic Performance check

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-48

show Commands

The switch supports two slots for the supervisor engines. A CLI command is provided to allow the administrator to inspect which of the SFMs is active:

6500# show fabric activeActive fabric card in slot 5No backup fabric card in the system

The mode of operation in use by the SFM can also be inspected by issuing the following command:

6500# show fabric switching-mode Fabric module is not required for system to operateModules are allowed to operate in bus modeTruncated mode is not allowed unless threshold is metThreshold for truncated mode operation is 2 SFM-capable cards

Module Slot Switching Mode 1 Crossbar 2 Crossbar 3 Crossbar 5 DCEF

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-49

The status of the SFM can be inspected by using the following command:

6500# show fabric status slot channel speed module fabric status status 1 0 8G OK OK 2 0 8G OK OK 3 0 8G OK OK 5 0 20G OK OK

6500# show fabric utilization slot channel speed Ingress % Egress % 1 0 8G 28 0 2 0 8G 0 0 3 0 8G 0 25 5 0 20G 0 0

The utilization of the SFM can be inspected by using the following command:

show Commands (Cont.)

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-50

During troubleshooting, the SFM can be inspected for transmission errors:6500# show fabric errorsModule errors: slot channel crc hbeat sync DDR sync 1 0 0 0 0 0 2 0 0 0 0 0 3 0 0 0 0 0 5 0 0 0 0 0

Fabric errors: slot channel sync buffer timeout 1 0 0 0 0 2 0 0 0 0 3 0 0 0 0 5 0 0 0 0

6500#

show Commands (Cont.)

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-51

System Capacity Planning

• New CLI command that provides a dashboard view of system hardware capacity, as well as the current utilization of the system.

C6500# show platform hardware capacity ? acl Show QoS/Security ACL capacity cpu Show CPU resources capacity eobc Show EOBC resources capacity fabric Show Switch Fabric resources capacity flash Show Flash/NVRAM resources capacity forwarding Show forwarding engine capacity interface Show Interface resources capacity monitor Show SPAN resources capacity multicast Show L3 Multicast resources capacity netflow Show Netflow capacity pfc Show PFC resources capacity power Show Power resources capacity qos Show QoS resources capacity rate-limit Show CPU Rate Limiters capacity system Show System resources capacity vlan Show VLAN resources capacity

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-52

Oversubscription

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-53

Simplified Campus Example

2x = 16 GbWS-X6548-GE-TX (CEF256)48 ports and 8-Gb4:1 oversubscription

WS-X6548-GE-TX (CEF256)48 ports, 8-Gbps backplane8:1 oversubscription

1x = 2 Gb

8:1

WS-X6724-SFP (CEF720)24 ports and 20-Gb backplane1.2:1 oversubscription

Supervisor Engine 7202x 1-Gb uplinks

1.2:1

• Total core-edge oversubscription ≈ 58:1

• Traffic flows vertically, bidirectional

• Low overall bandwidth requirements

Access

Aggregation

6:1

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-54

High CPU

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-55

High CPU Utilization

At what percentage level at should I start troubleshooting ?

It depends on the nature and level of the traffic. It is very essential to find a baseline CPU usage during normal working conditions, and start troubleshooting when it goes above specific threshold.

E.g., Baseline RP CPU usage 25%. Start troubleshooting when the RP CPU usage is consistently at 40% or above.

Why should I be concerned about high CPU usage ?

It is very important to protect the control-plane for network stability, as resources (CPU, Memory and buffer) are shared by control-plane and data-plane traffic

What are the usual symptoms of high CPU usage ?

• Control-plane instability e.g., OSPF flap

• Traffic loss

• Reduced switching/forwarding performance

• Slow response to Telnet / SSH

• SNMP poll miss

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-56

High CPU Utilization

Commands used to set baseline

FlashFlash

DRAMDRAM

FlashFlash

DRAMDRAM1 GbpsInband

SPCPUSP

CPU

1 GbpsInband

RPCPURP

CPU Port ASIC

MSFC 3

SP: show process cpu

SP: show msfc netint

RP: show ibc

RP: show process cpu

Sup720

RP: show ip trafficRP: show interfaces

C

C

RP: show msfc netint

SP: show ibc

C = ControllerMonitor the CPU usage in DFCs also using “remote

command module <mod#> show process cpu”

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-57

High CPU Utilization

CPU utilization is due to: Process (e.g., due to recurring events, control-plane

process) Interrupts (e.g., due to inappropriate switching path)

• Investigate CPU utilization via “show proc cpu” and find if the usage is due to process or interrupts

DUT#show proc cpu

CPU utilization for five seconds: 99%/90%; one minute: 9%; five minutes: 8%

PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process

2 720 88 8181 9.12% 1.11% 0.23% 18 Virtual Exec

Total CPU usage (Process + Interrupt)

CPU usage due to Interrupt

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-58

High CPU utilization – Process

Caused by ARP flooding.

Static route configured with interface instead of next-hop IP address. This will generate ARP request for every packet that is not reachable via more specific routes.

ip route 0.0.0.0 0.0.0.0 GigabitEthernet 2/5

DUT#show ip traffic | begin ARP

ARP statistics:

Rcvd: 6512 requests, 2092 replies, 0 reverse, 0 other

Sent: 258 requests, 707 replies (0 proxy), 0 reverse

Drop due to input queue full: 20

<snip>

DUT#show interfaces | include line protocol|rate

Vlan501 is up, line protocol is up

5 minute input rate 23013521 bits/sec, 2535 packets/sec

5 minute output rate 0 bits/sec, 0 packets/sec

Process: ARP Input

Incrementing at very high rate

Look for abnormal input rate

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-59

Configure Optimized ACL Logging (OAL) in

PFC3 onwards

High CPU utilization – Process

Caused by traffic that needs to process-switched or destined to the CPU

Common Reasons:

- Traffic with IP-options enabled

- Fragmentation (due to MTU mismatch)

- Broadcast storm

- Traffic that needs further CPU processing e.g., ACL Logging

- Traffic to which ICMP Redirect or Unreachable required e.g., TTL=1, ACL Deny etc.

Process: IP Input

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-62

High CPU utilization – Traffic to RP CPUDUT#show ip traffic

IP statistics:

Rcvd: 81676 total, 20945 local destination

0 format errors, 0 checksum errors, 41031 bad hop count

0 unknown protocol, 19609 not a gateway

0 security failures, 0 bad options, 120 with options

Frags: 0 reassembled, 0 timeouts, 0 couldn't reassemble

0 fragmented, 0 couldn't fragment

Bcast: 417 received, 0 sent

Mcast: 11423 received, 52655 sent

Sent: 61340 generated, 0 forwarded

Drop: 0 encapsulation failed, 0 unresolved, 0 no adjacency

0 no route, 0 unicast RPF, 0 forced drop

0 options denied, 0 source IP address zero

ICMP statistics:

Rcvd: 0 format errors, 0 checksum errors, 17 redirects, 112 unreachable

812 echo, 812 echo reply, 0 mask requests, 0 mask replies, 0 quench

0 parameter, 0 timestamp, 0 info request, 0 other

0 irdp solicitations, 0 irdp advertisements

0 time exceeded, 0 timestamp replies, 0 info replies

ARP statistics:

Rcvd: 3518120 requests, 3636408 replies, 0 reverse, 0 other

• TTL<2• IP options• Fragmentation• Broadcasts• ARP not resolved• Ping Request• Punts to generate ICMP redirect• ARPs

It also displays stats for : BGP, EIGRP, TCP, UDP,

PIM, IGMP and OSPF

Do this command few times to find the fastest

growing counter

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-63

High CPU utilization – Traffic to RP CPU

Find the traffic. Please remember that the traffic seen may be normal control-plane traffic, expected to be sent to

RP CPU

Commands to see packets getting punted

DUT#show buffers assignedHeader DataArea Pool Rcnt Size Link Enc Flags Input Output46FDBC14 8029784 Small 1 77 36 1 200 Vl100 None46FE0010 802CBC4 Small 1 77 36 1 200 Vl100 None. . .

DUT#show buffers input-interface vlan 100 dump

Buffer information for RxQ3 buffer at 0x378B3BC data_area 0x7C05EF0, refcount 1, next 0x0, flags 0x200 linktype 7 (IP), enctype 1 (ARPA), encsize 14, rxtype 1 if_input 0x46C7C68 (Vlan100), if_output 0x0 (None) inputtime 2d03h (elapsed 00:00:01.024) outputtime 00:00:00.000 (elapsed never), oqnumber 65535 datagramstart 0x7C05F36, datagramsize 62, maximum size 2196 mac_start 0x7C05F36, addr_start 0x7C05F36, info_start 0x0 network_start 0x7C05F44, transport_start 0x7C05F58, caller_pc 0x6C1564

source: 137.34.219.3, destination: 224.0.0.2, id: 0x0000, ttl: 1, TOS: 192 prot: 17, source port 1985, destination port 1985

0: AFACEFAD 00000000 00000000 /,o-........ 12: 00000000 00000000 00000000 00000000 ................ 28: 00000000 00000000 00000000 00000000 ................ 44: 00000000 0000CC43 C00C0002 000200A0 ......LC@...... 60: 00420000 12FF74D5 00000000 00000100 .B....tU........ 76: 5E000002 18A90518 00850800 45C00030 ^....)[email protected] 92: 00000000 011174D5 8922DB03 E0000002 ......tU."[.`... 108: 07C107C1 001CECB4 00001001 04640100 .A.A..l4.....d.. 124: 63697363 6F000000 8922DB01 41920450 cisco...."[.A..P . . .

Packet details

Remember, this command shows only the process-switched traffic

Find the interface that's holding most of the buffers

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-64

High CPU utilization – Interrupt

DUT#show proc cpu

CPU utilization for five seconds: 99%/90%; one minute: 9%; five minutes: 8%

Most of the times, packets punted to CPU has common factors.

Packets received on the same vlan / interface or interfaces in the same module or same VRF etc.

Packet have specific destination or destination prefixes learnt from a specific neighbor

Packet have same L4 source or destination ports

Anything else common ?

How to troubleshoot high CPU due to interrupts ?

Details on all supported Packet Capture Tools

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-65

High CPU utilization – Interrupt

Verify CEF is enabled globally and on all interfacesDUT#show cef state

CEF Status:

RP instance

common CEF enabled

IPv4 CEF Status:

CEF enabled/running

dCEF enabled/running

CEF switching enabled/running

DUT#show ip interfaces | include line pro|CEF switching

Vlan2 is up, line protocol is up

IP CEF switching is enabled

Vlan3 is up, line protocol is up

IP CEF switching is enabled

Verify if CEF is enabled globally and per interface

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-66

High CPU utilization – InterruptSwitching path statistics – per interface basis

DUT#show interface gig7/4 stats

GigabitEthernet7/4

Switching path Pkts In Chars In Pkts Out Chars Out

Processor 4406750 353281375 32881 12422509

Route cache 74026 4589612 0 0

Distributed cache 0 0 0 0

Total 4480776 357870987 32881 12422509

DUT#show interface switching

GigabitEthernet2/2

Protocol Path Pkts In Chars In Pkts Out Chars Out

IP Process 11594 717908 16 1838

Cache misses 0

Fast 0 0 0 0

Auton/SSE 0 0 0 0

ARP Process 94 5640 5 560

Cache misses 0

Fast 0 0 0 0

Auton/SSE 0 0 0 0

. . . .

Process switched

SW CEF switched

Hw-switched

Process name

Process switched

Distributed switched packets

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-69

NetDriver (Netdr) Debug

DUT#debug netdr capture ?

acl (11) Capture packets matching an acl

and-filter (3) Apply filters in an and function: all must match

continuous (1) Capture packets continuously: cyclic overwrite

destination-ip-address (10) Capture all packets matching ip dst address

dstindex (7) Capture all packets matching destination index

ethertype (8) Capture all packets matching ethertype

interface (4) Capture packets related to this interface

or-filter (3) Apply filters in an or function: only one must match

rx (2) Capture incoming packets only

source-ip-address (9) Capture all packets matching ip src address

srcindex (6) Capture all packets matching source index

tx (2) Capture outgoing packets only

vlan (5) Capture packets matching this vlan number

<cr>

Be as specific as possible; on SP, remote login switch, then same set of commands)

This debug should not be service-impacting

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-70

Does the CPU Inband Driver See the Packet?

DUT#show netdr captured-packets

A total of 289 packets have been captured

The capture buffer wrapped 0 times

Total capture capacity: 4096 packets

------- dump of incoming inband packet -------

interface Vl1000, routine mistral_process_rx_packet_inlin

dbus info: src_vlan 0x3E8(1000), src_indx 0x45(69), len 0x40(64)

bpdu 0, index_dir 0, flood 1, dont_lrn 0, dest_indx 0x43E8(17384)

80000401 03E80400 00450000 40800000 E0000000 00000000 00000008 43E80000

mistral hdr: req_token 0x0(0), src_index 0x45(69), rx_offset 0x76(118)

requeue 0, obl_pkt 0, vlan 0x3E8(1000)

destmac FF.FF.FF.FF.FF.FF, srcmac 00.A0.CC.21.94.C4, protocol 0806

layer 3 data: 00010800 06040001 00A0CC21 94C40500 01660000 00000000

05000102 00000000 00000000 00000000 00000000 000001FE

00000006 00000000 000003E8

...

DUT#undebug netdr

DUT#debug netdr clear-capture

Example of inbound packet on interface VLAN 1000

Make sure to turn it off afterwards

Make sure to clear memory used up by captured packets

ARP packet

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-71

Enhanced crashinfo

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-72

Crashes

Crashes will require TAC involvement

Open a TAC service request and collect the following info:

• Crashinfo file

• Core file (if configured so)

• Show tech-support

• What you were doing that made it crash!!

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-73

Example of Process Crash Output

00:05:29: %DUMPER-3-PROCINFO: pid = 16427: (sbin/tcp.proc), terminated due to signal SIGTRAP, trace trap (not reset when caught) (Signal from user)00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: zero at v0 v1 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R0 00000000 00000000 00000004 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: a0 a1 a2 a3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R4 7BC22298 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t0 t1 t2 t3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R8 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t4 t5 t6 t7 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R12 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: s0 s1 s2 s3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R16 00FDDFA0 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: s4 s5 s6 s7 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R20 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t8 t9 k0 k1 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R24 00000000 722B3F4C 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: gp sp s8 ra 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R28 7828FF90 00FDDF60 00000000 72297450 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: sr lo hi bad 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R32 1001FC73 00000000 00000000 78288970 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: cause pc epc 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R36 00800020 722B3F5C 00000000 00:05:29: %DUMPER-3-TRACE_BACK_INFO: 16427: (libc.so+0x2EF5C) (libc.so+0x12450) (s72033_rp-adventerprisek9_wan-58-dso-p.so+0x17C00) (libc.so+0x127AC) 00:05:30: %DUMPER-3-CRASHINFO_FILE_NAME: 16427: Crashinfo for process sbin/tcp.proc at bootflash:/crashinfo_tcp.proc-20050910-01284100:05:30: %DUMPER-3-CORE_FILE_NAME: 16427: Core for process sbin/tcp.proc at disk0:/tcp.proc.012842.dmp.Z00:05:31: %DUMPER-5-DUMP_SUCCESS: 16427: Core dump success00:05:31: %SYSMGR-3-ABNORMTERM: tcp.proc:1 (jid 91) abnormally terminated, restarted scheduled

Crashing process nameCrashing process ID

Crashinfo filename and location

Core filename and location

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-74

Example of What Files to Collect After Crash

For previous slide tcp.proc process crash you need to collect the following files:

Crashinfo filename and location

Both filenames encode the process that crashed

Cat6K#dir bootflash:Directory of bootflash:/

4 -rw- 139528 Sep 9 2008 19:28:42 -06:00 crashinfo_tcp.proc-20050910-012841

65536000 bytes total (64979832 bytes free)

Cat6K#dir disk0:Directory of disk0:/

1 -rw- 111923344 Sep 1 2008 10:26:54 -06:00 s72033-adventerprisek9_wan_dbg-vz.PP_R31_INTEG_050829 2 -rw- 112078968 Sep 9 2008 14:50:54 -06:00 s72033-adventerprisek9_wan_dbg-vz.pikespeak_r31_0908_1 3 -rw- 107608208 Sep 9 2008 18:50:04 -06:00 s72033-adventerprisek9_wan-vz.122-99.SX1010 4 -rw- 131517 Sep 9 2008 19:28:42 -06:00 tcp.proc.012842.dmp.Z

512040960 bytes total (180281344 bytes free)

© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-75

Best Practices

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-76

Overview of Reliability in the Cisco Catalyst 6500 Series Switch

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-77

Resiliency (Layer 2 or Layer 3): SSO, NSF

Protection Schemes: HSRP/GLBP/VRRP, EtherChannel, 802.1s/w, PVST+

OperationsOIR of Line Cards

OIR of Sup

OIR of PSU, Modules

TDR

NAIS

RedundancySupervisor

Switch Fabric

Service Modules

Clock

Fans

Power Supplies

Cisco 6500 System Reliability

Fault DetectionGOLD

Soft HANetworkElement

Redundancy

Network Resilience

Operational

Processes

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-78

Using Route Processor Redundancy and RPR+

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-79

RPR and RPR+

The Catalyst 6500 supports failover between two supervisors installed in the switch. Two fault tolerant modes can be configured; Route Processor Redundancy (RPR) and Route Processor Redundancy Plus (RPR+).

Sup720-A

Sup720-B

RPR

RPR+

RPR+ provides failover

generally within 30-60 seconds

RPR provides failover

generally within 2 to 4 minutes

PSU PSU

Catalyst 6500

RPR+ requires both supervisors to be the same, and both must

run the same IOS image.

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-80

Configuration of RPR and RPR+ is achieved by entering redundancy configuration mode, then choosing the mode you wish to run.

6500# conf tEnter configuration commands, one per line. End with CNTL/Z.6500(config)# redundancy6500(config-red)# mode ? rpr Route Processor Redundancy rpr-plus Route Processor Redundancy Plus

RPR RPR+6500(config-red)# mode rpr 6500(config-red)# mode rpr-plus

Configuring RPR and RPR+

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-81

The redundant configuration status of the switch can be viewed using the following command:

6500# show redundancy states my state = 13 -ACTIVE peer state = 1 -DISABLED Mode = Simplex Unit = Primary Unit ID = 5

Redundancy Mode (Operational) = Route Processor Redundancy PlusRedundancy Mode (Configured) = Route Processor Redundancy Plus Split Mode = Disabled Manual Swact = Disabled Reason: Simplex mode Communications = Down Reason: Simplex mode

client count = 11 client_notification_TMR = 30000 milliseconds keep_alive TMR = 9000 milliseconds keep_alive count = 0 keep_alive threshold = 18 RF debug mask = 0x0

Redundant State Configured

Confirming RPR, RPR+ Status

© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-82

Catalyst 6500 Supervisor Redundancy

Using SSO and NSF

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-83

SSO Overview

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-84

SSO Overview

• Active and standby supervisors run in synchronized mode.

• Redundant MSFC is in hot-standby mode.

• Switch processors synchronize STP, port and VTP states.

• PFCs synchronize Layer 2 and Layer 3 FIB, Netflow and ACL tables.

• DFCs are not repopulated with Layer 2 and Layer 3 FIB, Netflow and ACL tables.

• Very fast failover (0 to 3 seconds) between supervisors but still need to rebuild routes on external routers.

Standby Supervisor

Sup MSFC PFC

Line Card

Sup MSFC PFC

Active Supervisor

Line Card

Line Card

DFCDFCDFC

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-85

SRM with SSO Overview

Active Standby

STP, Port, VTP States

Layer 2 and Layer 3 FIB, Netflow, ACL Tables

Layer 2 and Layer 3 FIB, Netflow, ACL Tables

RPNew RP builds table andreestablishes neighbor relationships.

Layer 3 traffic forwardson lastknown FIB in hardware.

DFCs not affected by supervisor failover

ActiveStandby

STP, Port, VTP States

Layer 2 and Layer 3 FIB, Netflow, ACL Tables

Layer 2 and Layer 3 FIB, Netflow, ACL Tables

RP RP

SP

PFCx

SP

PFCx

SP

RP

PFCx PFCx

SP

DFCx DFCx

Before Failover After Failover

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-86

NSF Overview

• NSF-aware neighbors do not reconverge.

• NSF-aware neighbors help the NSF-capable router restart.

• NSF-aware neighbors continue forwarding traffic to the restarting router.

NSF-capable router

NSF-aware neighbor

Failover time: 0 to 3 seconds

• NSF-capable router rebuilds Layer 3 routing protocol database from neighbor.

• Data is forwarded in hardware based on preswitchover CEF information while routing protocols reconverge.

• Predictable traffic path • No route flap

NSF-aware neighbor

PSU1

Linecard 1

Catalyst 6500

Linecard 3

Linecard 3

Linecard 4

Primary Supervisor 720

Redundant Supervisor 720

Linecard 7

Linecard 8

Linecard 9

PSU2

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-87

NSF Configuration

To configure SSO to use NSF:6500(config)# redundancy

6500(config-red)# mode sso

To verify the configuration:6500# show redundancy states

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-88

BGP NSF Configuration

To configure BGP NSF:6500(config)# router bgp as-number

6500(config-router)# bgp graceful-restart

To verify the configuration:6500# show ip bgp neighbors x.x.x.x

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-89

OSPF NSF Configuration

To configure OSPF NSF:6500(config)# router ospf processID

6500(config-router)# nsf

To verify the configuration:6500# show ip ospf

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-90

ISIS NSF Configuration

To configure ISIS NSF:6500(config)# router isis tag

6500(config-router)# nsf [cisco | ietf]

To verify the configuration:6500# show running-config

6500# show isis nsf

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-91

EIGRP NSF Configuration

To configure EIGRP NSF:6500(config)# router eigrp as-number

6500(config-router)# nsf

To verify the configuration:6500# show running-config

6500# show ip routing

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-92

Redundancy Modes

RPR 2-4 minutes All releases

RPR+ 30-60 seconds All releases

SRM with SSO 0-3 seconds

Layer 2

12.2(17b)SXA

12.2(17d)SXB

NSF with SSO 0-3 seconds

layers 2-4

12.2(18)SXD

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-93

Reasons to Use Storm Control

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-94

DoS Protection: Control Plane Protection

High rates of link level broadcast traffic impact switch CPU and the stability of the network:

• Storm control limits the rate of broadcast traffic received by the distribution switch.

• Broadcast traffic within the local switch remains unrestrained.

• Local subnet devices may still be affected, but the network remains alive.

CONST_DIAG-SP-6-HM_MESSAGE: High traffic/CPU util seen on Module 5 [SP=40%,RP=99%,Traffic=0%]

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-95

DoS Protection: Storm Control

Storm control is also known as broadcast suppression:• limits the volume of

broadcast, multicast and/or unicast traffic

• protects the network from intentional and unintentional flood attacks and STP loops

• limits the combined rate of broadcast and multicast traffic to normal peak loads

Threshold

Dropped Packets

0 1 2 3Time

Seconds

Quantity

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-96

0

10

20

30

40

50

60

70

80

90

0.1 0.05 1 1.5 2 2.5 3

Percentage of Broadcast Traffice

Per

cen

tag

e o

f C

PU

Uti

lizai

ton

Protecting the Distribution Layer

Configure storm control on distribution downlinks. Limit broadcast and multicast to 1.0% of a GigE link to ensure distribution CPU remains in the safe zone.

! Enable storm control

storm-control broadcast level 1.0storm-control multicast level 1.0Conservative Max

Sup720 CPU Load

Broadcast Traffic CPU Impact

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-97

Configuring Storm Control

Storm control suppression is configured in interface configuration mode as follows:

6500(config-if)# storm-control ? broadcast Broadcast address storm control multicast Multicast address storm control unicast Unicast address storm control

6500(config-if)# storm-control broadcast ? level Set storm suppression level on this interface

6500(config-if)# storm-control broadcast level ? <0 - 100> Enter Integer part of storm suppression level

6500(config-if)# storm-control multicast level ? <0 - 100> Enter Integer part of storm suppression level

6500(config-if)# storm-control unicast level ? <0 - 100> Enter Integer part of storm suppression level

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-98

Configuring Storm Control (Cont.)

6500# show interface g1/9 counters broadcast

Port TotalSuppDiscardsGi1/9 1033

6500# show interface g1/9 counters multicast

Port TotalSuppDiscardsGi1/9 12

6500# show interface g1/9 counters unicast

Port TotalSuppDiscardsGi1/9 2046500#

Statistics for storm control suppression can be displayed as follows:

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-99

Fault Management

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-100

Fault Management on the Catalyst 6500

Misconfigured system

Memory corruption

Software inconsistency

Hardware faults

Fault Management

DetectionIsolation

Correction

Enhanced System Stability

Enhanced Network Stability

Improving resiliency in redundant and nonredundant deployments:

• Software enhancements for better fault detection

• Mechanisms to detect and correct soft failures in the system

• Proactive fault detection and isolation

• Routines to detect failures that the runtime software may not be able to detect

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-101

Detects and correct soft failures

Soft High Availability

Detects system problems proactively

GOLD Troubleshooting

Provides intelligent troubleshooting and debugging mechanisms

EEM

Automates actions based on events that have occurred; TCL-based configurable

fault policy

Reports Faults and Takes Action

Call Home, Syslogs, SNMP

Fault Management Framework

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-102

Generic Online Diagnostics

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-103

Generic Online Diagnostics

GOLD implements a number of health checks both at system startup and while the system is running. GOLD complements existing HA features like NSF/SSO running in the background, and alerting HA features when disruption occurs.

Bootup Diagnostics

Check operational status of components

Run Time Diagnostics

On-demand diagnostics statically triggered by an administrator

Scheduled diagnostics to run at a specific time

Non-disruptive health diagnostics running in the background

SYSLOG Message

%DIAG-SP-3-MAJOR: Module 2: Online Diagnostics detected a

Major Error. Please use diagnostic Module 2' to see test

results.

Diagnostic Results

Diagnostic Action

Invoke action to resolve issue i.e. reset component, invoke HA

action, CallHome, etc

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-104

GOLD

Boot Up Diagnostics

Health Monitoring Diagnostics

Proactive diagnostics serve as high availability triggers and take faulty hardware out of service.

• Quick go and no-go tests• Disruptive and nondisruptive tests

• Periodic background tests • Nondisruptive tests

On-demand Diagnostics and Schedule Diagnostics

Reactive diagnostics for troubleshooting

• Can run all the tests • Include disruptive tests used

in manufacturing

Fault Detection Framework for high availability :

Troubleshooting Tools:

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-105

Bootup Diagnostics:• EARL learning tests (Sup & DFC)

• L2 tests (channel, BPDU, capture)

• L3 tests (IPv4, IPv6, MPLS)

• Span and multicast tests

• CAM lookup tests (FIB, NetFlow, QoS CAM)

• Port loopback test (all cards)

• Fabric snake tests

Health Monitoring Diagnostics:• SP-RP inband ping test (Sup’s SP/RP,

EARL(L2&L3), RW engine)

• Fabric channel health test (fabric enabled line cards)

• MacNotification test (DFC line cards)

• Non-disruptive loopback test

• Scratch registers test (PLD & ASICs)

GOLD Test Suite

On-demand Diagnostics:• Exhaustive memory test

• Exhaustive TCAM search test

• Stress Testing

• All bootup and health monitoring tests can be run on-demand

Scheduled Diagnostics:• All bootup and health monitoring tests

can be scheduled

• Scheduled switch-over

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-106

Q & A

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-107

Trivia

¿Qué tienen en común la Copa Confederaciones FIFA con los Catalyst Switches de Cisco?

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-108

Sesión de Preguntas y Respuestas

El experto responderá verbalmente algunas de las preguntas que hayan realizado. Use el panel de preguntas y respuestas (Q&A) para preguntar a los expertos ahora

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-109

Nos interesa su opinión!!!Habrá un sorteo con los que llenen el questionario de evaluación

Tres asistentes recibirán un

Regalo sorpresa

Para llenar la evaluación haga click en el link que está en el chat. También saldrá automáticamente al cerrar el browser de la sesión.

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-110

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-111

Próximo Webcast en portugués

Martes 6 de diciembre

7:00 a.m. Ciudad de México

8:30 a.m. Caracas

10:00 a.m Bs.As.

2:00 p.m. Madrid

Michelle Jardim

http://tools.cisco.com/gems/cust/customerSite.do?METHOD=E&LANGUAGE_ID=P&SEMINAR_CODE=S17480&PRIORITY_CODE=

Tema: Resolución de problemas en el Session Initiation Protocol (SIP)

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-112

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-113

Respuesta a la Trivia

En 1999, Cisco lanzó la familia de switches inteligentes multi-gigabit Cisco Catalyst 6000. Ese mismo año México se convierte en la primera nación que gana la copa confederaciones FIFA en casa.

¿Qué tienen en común la Copa Confederaciones FIFA con los Catalyst Switches de Cisco?

© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-114

Muchas gracias por su

asistencia

Por favor complete la encuesta de evaluación de este evento y gane premios