Professional Documents
Culture Documents
BRKCRS-1930
to this
or, logically
Cisco Public
Goals
Understand general
concepts of VPC on Nexus
7000 and VSS on Catalyst
6500
Study the impact of VPC and
VSS on bridging and routing
Learn how to troubleshoot
VPC and VSS
BRKCRS-1930
Cisco Public
BRKCRS-1930
Cisco Public
VSS
BRKCRS-1930
Cisco Public
VSS Agenda
Initialization
Internal redundancy considerations
Spanning Tree
Multicast considerations
BRKCRS-1930
Cisco Public
VSS
1 active redundant control plane
single config
single point of management
VSS domain
Active
Standby
Active
Control Plane
Standby
VSL
Control Plane
Active
Active
Data Plane
Data Plane
Dual-Active
detection link
MEC
Cisco Public
VSS initialization
Before the Virtual Switch domain can become active, the Virtual Switch Link
(VSL) must be brought online to determine Active and Standby roles. The
initialization process essentially consists of 3 steps:
1
Link Management Protocol (LMP) used to track and reject Unidirectional Links,
Exchange Chassis ID and other information between the 2 switches
LMP
LMP
RRP
RRP
BRKCRS-1930
Cisco Public
Virtual Switch
111
1
Virtual Switch Active
2
In VSS mode?
Domain# unique for each VSS?
Role of this switch
Peer-switch visible?
VSL is up?
Link used to carry control plane
messages (ICC, IPC, SCP)
VSL member-links state
Redundancy mode SSO?
Cisco Public
Troubleshooting VSL:
counters
InOctets
3084500343
523470151
2814244020
InUcastPkts
31059
139662
11346
InMcastPkts
7382085
1323349
6883221
InBcastPkts
1046088
1045940
258
Port
Po10
Te1/6/4
Te1/6/5
...
OutOctets
1457635126
363835687
1214900160
OutUcastPkts
1467466
264788
1202788
OutMcastPkts
9890548
2732502
8103037
OutBcastPkts
0
0
0
Port
Po10
Te1/6/4
Te1/6/5
Port
Po10
Te1/6/4
Te1/6/5
Port
Po10
Te1/6/4
Te1/6/5
BRKCRS-1930
Align-Err
0
0
0
Single-Col
0
0
0
SQETest-Err
0
0
0
2011 Cisco and/or its affiliates. All rights reserved.
FCS-Err
0
0
0
Multi-Col
0
0
0
Deferred-Tx
0
0
0
Cisco Public
Xmit-Err
0
0
0
Late-Col
0
0
0
IntMacTx-Err
0
0
0
...
...
...
...
...
...
...
...
...
...
...
...
10
*1
0004.9bbe.ac00
...
LMP hello timer
...
LMP FSM info
Te1/6/4
Te1/6/4, Te1/6/5
11
Configured: 2
Operational: 2
Peer Peer
Peer
Peer
Timer(s)running
Interface Flag State
Flag MAC
Switch Interface (Time remaining)
-------------------------------------------------------------------------------Te1/6/4
vfsp operational vfsp 0004.9bbe.ac00 2
Te2/6/4
T4(756ms)
T5(29.98s)
Te1/6/5
vfsp operational vfsp 0004.9bbe.ac00 2
Te2/6/5
T4(756ms)
T5(29.92s)
Flags:
T5 - Hello Rx Timer
LMP Status
Last operational
Current packet
Last Diag
Time since
Interface Failure state
State
Result
Last Diag
------------------------------------------------------------------------------Te1/6/4
Link down
Hello bidir
Never ran
-Te1/6/5
Link down
Hello bidir
Never ran
-LMP hello timer
Hello Tx (T4) ms
Hello Rx (T5*) ms
Interface
State
Cfg
Cur
Rem
Cfg
Cur
Rem
------------------------------------------------------------------------Te1/6/4
operational 1000
756
30000
29896
Te1/6/5
operational 1000
756
30000
29228
BRKCRS-1930
Cisco Public
12
Troubleshooting VSL:
RRP
BRKCRS-1930
Cisco Public
13
Troubleshooting VSL
BRKCRS-1930
Cisco Public
14
Troubleshooting VSL:
what information to collect
Note: with VSS many commands use switch <#> module <#>
notation instead of just module <#>
In case of issues with VSL or VSS bring up, collect the following
information
sh tech
(if VSS is split, collect from both sides)
remote command switch sh monitor event vslp all detail
(if VSS is split, collect from both sides)
BRKCRS-1930
Cisco Public
15
VSS Agenda
Initialization
Internal redundancy considerations
Spanning Tree
Multicast considerations
BRKCRS-1930
Cisco Public
16
High Availability
Redundancy Mechanisms
The default redundancy mechanism between the 2 VSS chassis and their associated
supervisors is NSF/SSO, allowing state information and configuration to be
synchronized. Additionally, only in NSF/SSO mode does the Standby supervisor PFC,
Switch Fabric, modules and their associated DFCs become active
Switch 2
SSO Standby
Switch 1
Active
VSL
Should a mismatch of information occur between the Active and Standby Chassis, the
Standby Chassis will revert to RPR mode, where only configuration is synchronized, but
PFC, Switch Fabric and modules will not be brought up
Switch 2
12.2(33)SXH2
RPR Standby
Switch 1
12.2(33)SXI3
Active
VSL
BRKCRS-1930
Cisco Public
17
Troubleshooting redundancy:
why standby is not in SSO mode
In case of certain mismatches standby will only boot to RPR mode
(fabric, PFC & modules will be down)
vss# show switch virtual redundancy
My Switch Id = 1
Peer Switch Id = 2
Last switchover reason = none
Configured Redundancy Mode = sso
Operating Redundancy Mode = rpr
...
vss# show switch virtual redundancy mismatch
Startup Config Mismatch:
Mismatch in config file between local Switch 1 and peer Switch 2:
ACTIVE : Interface TenGigabitEthernet1/6/5 shutdown
STANDBY : Interface TenGigabitEthernet1/6/5 not shut
Other possibilities
IOS version mismatch
Other VSL-related config mismatch
Non-SSO redundancy mode is configured
Forwarding engine (PFC) mismatch
BRKCRS-1930
Cisco Public
18
Pre-12.2(33)SXI4
VSL
As of 12.2(33)SXI4 in-chassis
redundant supervisors function as
a linecard ports are useable
Active
SSO
rommon>
rommon>
Si
Si
VSL
Active
SSO
RPR-warm
RPR-warm
Si
Si
BRKCRS-1930
Cisco Public
19
What is Dual-Active?
If VSL goes down standby needs
to know if it was just VSL or the
active switch that failed
Si
Layer3-MEC
Standby
Active
Active
Si
VSL
Si
Layer2-MEC
Cisco Public
20
Switch 1
Active
Switch 2
Hot Standby
Switch 1
Active
Switch 2
VSLP
VSLP
IP-BFD
Switch 1
Switch 2
BFD
Hot Standby
BFD
Active
Software-12.2(33)SXI
Software -12.2(33)SXH1
Hot Standby
Software -12.2(33)SXH1
BRKCRS-1930
Cisco Public
21
OLD
ACTIVE
New
ACTIVE
Switch 1
Reboot and
Comes Up in
STAND_BY
Mode
Switch 2 in
ACTIVE
Mode
Switch 1
All
Interfaces
Down
VSS Restoration
Cisco Public
22
Dual-active recovery,
If configuration was changed but has not been saved the would-bestandby switch will not be reloaded following VSL recovery
Save the config & reload standby
19:54:59: %VSLP-SW2_SP-5-RRP_MSG: Role change from Active to Standby and hence need
to reload
19:54:59: %VSLP-SW2_SP-5-RRP_UNSAVED_CONFIG: Ignoring system reload since there are
unsaved configurations. Please save the relevant configurations
19:54:59: %VSLP-SW2_SP-5-RRP_MSG: Use 'redundancy reload shelf' to bring this switch
to its preferred STANDBY role
BRKCRS-1930
Cisco Public
23
Si
Si
ePAgP
Redundant
VSL Fiber
VSLP Fast-Hello
or BFD
ePAgP
BRKCRS-1930
Cisco Public
24
VSS Agenda
Initialization
Internal redundancy considerations
Spanning Tree
Multicast considerations
BRKCRS-1930
Cisco Public
25
Logical
Standby
4
1
STP process
BRKCRS-1930
26
Troubleshooting STP
vss#sh spanning-tree interface po201 detail
Port 5767 (Port-channel201) of VLAN0001 is designated forwarding
Port path cost 3, Port priority 128, Port Identifier 128.5767.
Designated root has priority 0, address 001e.4963.7b94
Designated bridge has priority 32768, address 0008.e3ff.fdbd
Designated port id is 128.5767, designated path cost 16
Timers: message age 0, forward delay 0, hold 0
...
Cisco Public
27
UDLD
Bridge
Assurance
(BA)
Dispute
Loop
Guard
Condition
Detects if link becomes
unidirectional
I.e. link cannot carry BPDUs
both ways causes loops
Expects to receive a BPDU
every hello_time from the
peer.
I.e. cases of dead control
plane on the remote side,
also BPDU loss
Checks the remote port role
in the received BPDU, role
should not be designated in
BPDU received on
designated port
Cases of unidirectional
communication
Doesnt allow port to take
designated role if it stopped
receiving BPDUs
Unidirectional
communication, control plane
issues on remote
BRKCRS-1930
Works on
Effect
Note
Physical
port
Error-disables
unidirectional
links
Useful on port-channels to
take out broken links,
alternative fast-timers
PAGP/LACP
Blocks port at
STP level
(BAinconsistent
state)
Logical
port
Blocks port at
STP level
(Disputed
state)
Complements BA, on by
default. Somewhat overlaps
with UDLD, but not as
effective on port-channels.
Only works with RSTP/MST
BPDUs
Logical
port
Blocks port at
STP level
(Loopinconsistent)
Superseded by BA + Dispute,
use with PVST+ or when BA
is not supported
Logical
port
Cisco Public
28
BRKCRS-1930
Cisco Public
29
VSS Agenda
Initialization
BRKCRS-1930
Cisco Public
30
Asymmetric Routing
Alternating HSRP Active between
distribution switches can be used
for upstream load balancing,
however downstream traffic hits
both distribution block switches
This can cause a problem
with unicast flooding
ARP entries age in 4 hours while
L2 entries age in 5 minutes
ARP entry with no matching L2
entry unicast flooding
In many cases when the HSRP
standby needs to forward a frame
it will have to unicast flood the
frame since its CAM table is
empty
Switch 1: Active
HSRP and Root
Bridge VLAN 3
CAM Table
Empty for
VLAN 2
Switch 2: Active
HSRP and Root
Bridge VLAN 2
Si
CAM Table
Empty for
VLAN 3
Si
VLAN 3
VLAN 2
VLAN 3
VLAN 2
Cisco Public
31
PC B
Router MAC
0001.0002.0003
Router MAC
0001.0002.0003
PC A
Cisco Public
32
VSS mac-address
By default VSS will use Router mac-address from active switch backplane
Router mac-address is maintained across switchovers no 1st hop redundancy
protocol is needed
If entire VSS system is brought down and then up again and switch 2 ends up
being active router mac-address might change (this will only have impact on
devices that ignore gratuitous ARPs)
To avoid such change, use mac-address use-virtual with this command VSS will
use special mac-address reserved for VSS
vss(config)#switch virtual domain 111
vss(config-vs-domain)#mac-address use-virtual
Configured Router mac address is different from operational value. Change will take
effect after config is saved and the entire Virtual Switching System (Active and
Standby) is reloaded.
Cisco Public
33
Troubleshooting Router-MAC
When VSS receives a packet destined to Router-MAC it will try to L3 switch
(route in hardware) the packet, else the packet will be bridged
vss# sh interface vlan 226
What is router MAC for given
Vlan226 is up, line protocol is up
Hardware is EtherSVI, address is 0008.e3ff.fdbc (bia 0008.e3ff.fdbc) interface
Internet address is 192.168.222.18/30
It should be pointing to the Router
...
vss# sh mac-address-table address 0008.e3ff.fdbc vlan 226 all
Legend: * - primary entry
age - seconds since last seen
n/a - not available
vlan
mac address
type
learn
age
ports
------+----------------+--------+-----+----------+-------------------------Supervisor switch 1 Module 6
* 226 0008.e3ff.fdbc
static No
Router
Supervisor switch 2 Module 6
* 226 0008.e3ff.fdbc
static No
Router
vss# sh mac-address-table address 0008.e3ff.fdbc vlan 226 detail switch 2 module 6
MAC Table shown in details
========================================
PI_E RM RMA Type Alw-Lrn Trap Modified Notify Capture Flood
Mac Address Age Pvlan SWbits Index XTag
----+---+---+----+-------+----+--------+------+-------+------+--------------+----+------+------+------+---Supervisor switch 2 Module 6
Yes No
No ST
No
No
No
No
No
No
0008.e3ff.fdbc 0xE8 226
0
0x380 1
BRKCRS-1930
Cisco Public
34
PC B
PC A
BRKCRS-1930
Cisco Public
35
Cisco Public
36
VSS Agenda
Initialization
Internal redundancy considerations
Spanning Tree
Multicast considerations
BRKCRS-1930
Cisco Public
37
DFC
Ingress
Fabric
DFC
Egress
Traffic flow
BRKCRS-1930
Cisco Public
38
Traffic locality
Main concept for traffic forwarding is locality
Only local ports are used to send traffic out
except when there are no local ports, this is when traffic will cross
VSL/Peer-link
BRKCRS-1930
Cisco Public
39
Si
Si
Te1/2/1
Te1/2/2
SW1
Four ECMP
Entries
Cisco Public
Two FIB
Entries
40
Identify the physical path for flow from host 2 host 1 (out of Port-channel 2)
vss# show etherchannel load-balance hash-result interface Port-channel 2 switch 1
ip 9.0.1.2 vlan 705 8.0.1.1
Packet coming in on switch 1, needing to go
Computed RBH: 0x6
out on Po2 will select Gi1/6/2
Would select Gi1/6/2 of Po2
vss# show etherchannel load-balance hash-result interface Port-channel 2 switch 2
ip 9.0.1.2 vlan 705 8.0.1.1
Computed RBH: 0x6
Packet coming in on switch id 2, needing to
Would select Gi2/9/15 of Po2
go out on Po2 will select Gi2/9/15
BRKCRS-1930
Cisco Public
41
Looking at the HW table shows next hop directly attached to local switch
is preferred
vss# show mls cef lookup 9.0.1.0 switch 1 mod 3
BRKCRS-1930
Cisco Public
42
1/1/33
Will the
packet cross
VSL link?
1/1/15
Po4
2/4/33
Po3
VSS
2/6/3
0005.9a3b.6c80
address
What are physical ports of portchannel
BRKCRS-1930
Cisco Public
43
1/1/33
Will the
packet cross
VSL link?
1/1/15
Po4
2/4/33
Po3
VSS
2/6/3
0005.9a3b.6c80
BRKCRS-1930
44
BRKCRS-1930
Cisco Public
45
MAC_B
3
1
MAC_A
BRKCRS-1930
Cisco Public
46
Member 2
New member
joins
Member 1
Member 2
Member 3
With adaptive hash option, only buckets that must move are reprogrammed
Member 1
Member 2
BRKCRS-1930
New member
joins
Cisco Public
Member 1
Member 2
Member 3
47
If the network consists of several adjacent VSS systems, adaptive hash was enhanced
to avoid traffic polarization (as of 12.2(33)SXI)
Configured per port-channel
vss(config)#int port-channel200
vss(config-if)#port-channel port hash-distribution adaptive
With adaptive hash less flows should be impacted when ports join or leave portchannels
This is mostly evident when control-plane is busy (i.e. when many changes are
happening at the same time during failovers etc)
BRKCRS-1930
Cisco Public
48
SPAN
When SPANed traffic is crossing VSL it is transmitted
over single link this might cause oversubscription of
VSL link if amount of SPANed traffic is significant
Use MEC as SPAN destination to prevent SPANed
traffic from crossing VSL
If one side of the MEC goes down SPANed traffic will
cross VSL
Provision enough bandwidth on VSL
Use port-channel min-links LACP feature on SPAN
destination MEC to bring down MEC if link is down on one
side
Use EEM script to shut down MEC or SPAN session when
one side of SPAN destination MEC goes down
BRKCRS-1930
Cisco Public
49
VSS Agenda
Initialization
Internal redundancy considerations
Spanning Tree
Multicast considerations
BRKCRS-1930
Cisco Public
50
Multicast forwarding
Layer 2 access has two multicast routers on the access subnet, RPF
checks and split roles between high and low IP address routers
VSS has a single multicast router which simplifies multicast topology
The multicast forwarder is selected based on which member of VSS
link receives multicast traffic
IGMP Querier
(Low IP address)
Si
Non-DR Has to
Drop All
Non-RPF Traffic
BRKCRS-1930
Si
Designated
Router
(High IP Address)
Cisco Public
51
Cisco Public
52
Multicast fast-redirect
When a member of egress
Layer2 port-channel (MEC or
DEC) is unbundled/bundled On
VSS replicating multicast traffic in
egress mode it might take
noticeable time to reprogram
hardware to send traffic via
remaining links (local or across
VSL)
Sources
MEC
Si
Si
MEC
Receivers
vss(config)#interface port-channel 40
vss(config-if)#mls ip multicast egress fast-redirect
BRKCRS-1930
Cisco Public
53
VSS: summary
1 active redundant control plane
single config
single point of management
VSS domain
Active
Standby
Active
Control Plane
Standby
VSL
Control Plane
Active
Active
Data Plane
Data Plane
Dual-Active
detection link
MEC
Cisco Public
54
V PC
BRKCRS-1930
Cisco Public
BRKCRS-1930
Cisco Public
56
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
57
VPC domain
Primary
Secondary
Active
Control Plane
Active
Peer-Link
Control Plane
Active
Active
Data Plane
Data Plane
Peer
Keepalive link
VPC
Cisco Public
58
VPC initialization
VPC init is largely independent of NXOS boot each
switch boots on its own
VPC feature starts
BRKCRS-1930
Cisco Public
59
CFS messaging
Uses
Configuration validation
Cisco Public
60
Cisco Public
61
enabled
vpc1# sh vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
: 1
Peer status
: peer is alive
vPC role
: primary
: 1
Peer Gateway
: Disabled
: -
Port
--
----
------ --------------------------------------------------
Po100
up
1,101
vPC status
---------------------------------------------------------------------id
Port
Active vlans
--
----
------------
Po1
up
101
BRKCRS-1930
success
success
Cisco Public
62
In case process does not go beyond certain stage, one should look at
communication between the peers (CFS)
BRKCRS-1930
Cisco Public
63
Domain id MUST be
different
(cant be 100 on both
Pair)
VPC
BRKCRS-1930
200
Cisco Public
64
Cisco Public
More information
sh tech
(collect for offline analysis, takes ~5 min when redirected to file)
sh tech vpc
(collect when there is no time for big sh tech)
debug vpc peer
(peer events, useful for indepth vpc troubleshooting)
debug vpc peer-link
(peer-link events, for indepth vpc bringup troubleshooting)
debug cfs event ethernet
(cfs event peer communication)
BRKCRS-1930
Cisco Public
66
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
67
Switch 1
HA-policy will trigger
supervisor switchover
in response to
excessive process
crashing, software,
hardware or
diagnostic failure
BRKCRS-1930
Active
Switch 2
Process 1
Process 1
Active
Process 2
Process 2
Process X
Process X
Standby(SSO)
Standby(SSO)
68
I am primary
Primary is gone
Receiving
Keepalives*
2ndary
no
Become primary
yes
primary
Done
VPC peers do not require reload following
peer-link failure or recovery
BRKCRS-1930
Cisco Public
69
Keepalive link
Peer Keepalives
peer-keepalive
vpc: received new OOB packet, version(0) flags(0) my_context(0)
my_epoch(604049) your_epoch(604104) my_ip(1.1.1.2)
vpc: your_ip(1.1.1.1) domainId(1)
vpc: received new OOB packet, version(0) flags(0) my_context(0)
my_epoch(604050) your_epoch(604105) my_ip(1.1.1.2)
vpc: your_ip(1.1.1.1) domainId(1)
vpc: received new OOB packet, version(0) flags(0) my_context(0)
my_epoch(604051) your_epoch(604106) my_ip(1.1.1.2)
vpc: your_ip(1.1.1.1) domainId(1)
2011 Cisco and/or its affiliates. All rights reserved.
Cisco Public
70
:
:
:
:
:
:
:
:
peer is alive
Success
2009.06.19 00:41:15 589 ms
Eth2/35
Success
2009.06.19 00:41:14 580 ms
Eth2/35
(1) seconds, (9) msec
Cisco Public
71
Cisco Public
73
BRKCRS-1930
Cisco Public
74
ARP synchronization
PC B
ARP
Ip B ???
Needs to be
Resolved ?
ARP
Ip B Mac B
PC A
BRKCRS-1930
Cisco Public
75
More information
sh log last <x>
(review sequence of events)
show file logflash://sup-standby/log/messages
(in case other supervisor was active when everything started)
sh process log
(which processes have crashed when)
sh redundancy status
(status of supervisor redundancy & last switchover data)
sh system reset-reason
(last reset/switchover reason per module)
sh logging onboard internal reset-reason
(reset reason from different components point of view useful
for complex cases)
sh tech /from main VDC/
(collects most of the above for offline analysis)
BRKCRS-1930
Cisco Public
76
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
77
Primary
Secondary
STP process
STP process
BRKCRS-1930
Cisco Public
78
STP troubleshooting
Left-Root# sh spanning vlan 35
VLAN0035
Spanning tree enabled protocol rstp
Root ID
Priority
24611
Address
001b.54c2.4241
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority
24611 (priority 24576 sys-id-ext 35)
Address
001b.54c2.4241
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------Po1
Desg FWD 1
128.4096 (vPC) P2p
Po100
Desg FWD 2
128.4195 (vPC peer-link) Network P2p
Cisco Public
79
STP troubleshooting
Looking at BPDUs
Left-Root# debug spanning-tree bpdu_tx tree 101
14:20:37.556707 stp: RSTP(101): transmitting RSTP BPDU
14:20:37.556750 stp: vb_vlan_shim_send_bpdu(1933): VDC
channel100 enc_type 1 len 42
14:20:37.556834 stp: RSTP(101): transmitting RSTP BPDU
14:20:37.556863 stp: vb_vlan_shim_send_bpdu(1933): VDC
enc_type 2 len 36
on port-channel1
4 Vlan 101 port port-channel1
Cisco Public
80
STP inconsistencies
When STP detects certain abnormal situations it may
mark ports as inconsistent and block them to prevent
forwarding loops
Root Root Guard feature detected inconsistency
(unwanted bridge tries to become root)
Loop Loop Guard feature detected inconsistency
(port becomes designated because no BPDUs are being
received)
Bridge Assurance (BA)
(no BPDUs are received from remote side)
VPC Peer-link
(any of above inconsistencies happened on VPC peer-link)
%STP-2-VPC_PEER_LINK_INCONSIST_BLOCK: vPC peer-link detected BPDU receive timeout
blocking port-channel11 VLAN0121.
BRKCRS-1930
Cisco Public
81
Primary
BRKCRS-1930
inconsistency
1
Secondary
Cisco Public
82
inconsistency
Primary
inconsistency
2Secondary 1
1
2
BRKCRS-1930
Cisco Public
83
BRKCRS-1930
Cisco Public
85
Primary
ROOT
OP-Primary
Secondary
Backup
ROOT
ROOT
BRKCRS-1930
Cisco Public
86
OP-Secondary
ROOT
2
SYNC
OP-Primary
Secondary
Backup
ROOT
ROOT
BRKCRS-1930
Cisco Public
87
Secondary
ROOT
ROOT
BRKCRS-1930
Cisco Public
88
Secondary
ROOT
ROOT
VLAN0101
Spanning tree enabled protocol rstp
Root ID
Priority
8293
Address
0023.04ee.be01
This bridge is the root
...
Bridge ID
Priority
Address
8293
(priority 8192)
0023.04ee.be01
...
Interface
---------------Po1
Po100
Role
---Desg
Root
Sts
--FWD
FWD
Cost
--------1
2
Prio.Nbr
-------128.4096
128.4195
Type
--------------(vPC) P2p
(vPC peer-link)
: 00:23:04:ee:be:01
: 00:1b:54:c2:42:43
BRKCRS-1930
Priority
Address
...
Interface
---------------Po1
Po100
Cisco Public
Role
---Desg
Desg
8293
(priority 8192)
0023.04ee.be01
Sts
--FWD
FWD
Cost
--------1
2
Prio.Nbr
-------128.4096
128.4195
Type
--------------(vPC) P2p
(vPC peer-link)
89
More information
show spanning-tree internal event-history all
(allows to look back at past STP events, not included in sh tech)
sh tech stp
(from both sides of VPC)
sh tech
(from both sides of VPC, this will include in it sh tech stp, in case
VPC is is non-default VDC collect also sh tech from VDC 1)
BRKCRS-1930
Cisco Public
90
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
91
PC B
PC A ends a packet to PC B
PC A
5
Frames received on Peer-Link may not be flooded
out of VPCs
BRKCRS-1930
Cisco Public
92
2
PC A
Cisco Public
93
BRKCRS-1930
X
Cisco Public
94
Layer 2 topology
Layer 3 topology
7k vPC
7k1
7k1
7k2
7k2
R
R
BRKCRS-1930
Cisco Public
95
Switch
Po2
Po2
7k1
7k2
Po1
L3 ECMP
P
P
BRKCRS-1930
Router
Router
2011 Cisco and/or its affiliates. All rights reserved.
Cisco Public
96
BRKCRS-1930
Cisco Public
97
PC B
2
1
A
A
PC A
BRKCRS-1930
Cisco Public
99
PC B
1
2
A
CFS message
PC A
BRKCRS-1930
Cisco Public
100
Po50
Vlan 50
Troubleshooting
Layer 2
Po22
Vlan 20
VPC
91.0.0.10
0013.1908.e246
20.1.2.3
Cisco Public
102
Po50
Vlan 50
Troubleshooting
Layer 3
Po22
Vlan 20
VPC
91.0.0.10
0013.1908.e246
20.1.2.3
Interface
Vlan20
Is there route to
destination
Is the next hop resolved
Looking at module 2
because this is where
packets in question
should be received
Is adjacency consistent
with ARP
Router MAC must have
Gateway flag in order for
packet to be L3 switched
0023.ac66.1a42
Cisco Public
105
Load-balancing is configurable
under ip load-sharing address in
default VDC and affects all VDCs
For port-channels
nexus# sh port-channel load-balance forwarding-path interface port-channel 22 dst-ip
20.1.2.3 src-ip 91.0.0.10 vlan 20 module 2
Load-balancing is configurable
Missing params will be substituted by 0's.
under port-channel load-balance
Module 2: Load-balance Algorithm: source-dest-ip-vlan
RBH: 0 Outgoing port id: Ethernet1/14
in default VDC and affects all VDCs
BRKCRS-1930
Cisco Public
106
|------------------------------------------------------------------------|
Instance:0
3629 Egress Port-1 VSL Dropped Packet Count
0000000853635833
5 3630 Egress Port-2 VSL Dropped Packet Count
0000000857893046
3 ...
|------------------------------------------------------------------------|
| Device:Naxos
Role:MAC SECURITY
|
|------------------------------------------------------------------------|
Instance:0
ID
Name
Value
Ports
------------106 m1_fab_p25_txq_tc0_drop_count
00000000000012af
2 ...
|------------------------------------------------------------------------|
| Device:Metropolis
Role:REWR
|
|------------------------------------------------------------------------|
Instance:1
ID
Name
Value
Ports
------------70
Krypton input controller zero portsel cnt
0000000000000038
18,20,22,24,26,28,30,32
|------------------------------------------------------------------------|
| Device:Lamira
Role:L3
|
|------------------------------------------------------------------------|
Instance:0
ID
Name
Value
Ports
------------93
CL2 Invalid Pkt count
00000008759cb9cb
1-32 I1
...
BRKCRS-1930
Cisco Public
109
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
112
PC B
HSRP
Router MAC2
0005.0006.0007
Virtual MAC
0000.0c07.ac00
PC A
MAC_A vMAC
IP A IP B
BRKCRS-1930
Cisco Public
113
active
Interface Vlan1
ip address 1.1.1.253/24
hsrp 1
ip 1.1.1.254
HSRP
Active addr
1.1.1.253
Active addr
local
Cisco Public
114
Server B
Router MAC1 MAC_B
IP A IP B
IP B IP A
4
2
Router MAC1
0001.0002.0003
Virtual MAC
0000.0c07.ac00
Router MAC2
0005.0006.0007
Virtual MAC
0000.0c07.ac00
5
PC A
MAC_A vMAC
IP A IP B
BRKCRS-1930
1
2011 Cisco and/or its affiliates. All rights reserved.
115
Server B
MAC_B Router MAC1
IP B IP A
2
Router MAC1
0001.0002.0003
Virtual MAC
Router
MAC2
0000.0c07.ac00
0005.0006.0007
Virtual MAC
0000.0c07.ac00
Router MAC2
0005.0006.0007
Virtual MAC
Router
MAC1
0000.0c07.ac00
0001.0002.0003
Virtual MAC
0000.0c07.ac00
PC A
BRKCRS-1930
Cisco Public
116
Router MAC2
0005.0006.0007
Router MAC1
0001.0002.0003
Virtual MAC
0000.0c07.ac00
Cisco Public
117
More information
sh mac address-table <address>
(L2 entry for given MAC )
BRKCRS-1930
Cisco Public
118
VPC Agenda
Initialization
Redundancy considerations
Spanning Tree
Traffic forwarding
1st hop redundancy
Multicast considerations
BRKCRS-1930
Cisco Public
119
Source S1
(*,G)VPC
(*,G)VPC
Primary
2ndary
CFS:IGMP
(S1,G)VPC
DR
(S1,G)null
Proxy-DR
Receiver
Forwarder will send a copy of frame to the peerlink for receivers single-connected to other peer
IGMP join
Goal is to allow peer that 1st sees source traffic to forward it to receivers behind VPC
BRKCRS-1930
Cisco Public
120
Source S1
(*,G)VPC
(*,G)VPC
Primary
(S1,G)VPC
2ndary
(S1,G)null
DR
Receiver
BRKCRS-1930
Cisco Public
121
RP
(*,G)VPC2
Primary
2ndary
(S1,G)VPC2
(S1,G)VPC2
Source S1
BRKCRS-1930
VPC1
VPC2
Receiver
Cisco Public
122
For sources behind VPC both peers will forward as they have no control on which
one will get the traffic
VPC1# sh ip pim internal vpc rpf
Source: 1.1.1.1
Pref/Metric: 0/0
Source role: primary
Forwarding state: Win-force (forwarding)
BRKCRS-1930
Cisco Public
123
Group Address
*/*
239.1.2.3
Ver
v2
Type
R
D
Port list
Vlan37
Eth2/8
number
number
number
number
count:
of
of
of
of
1,
routes: 3
(*,G) routes: 1
(S,G) routes: 1
(*,G-prefix) routes: 1
rough average sources per group: 1.0
aps
0
pps
0
bit-rate
0.000
bps
49
200
80.053
Cisco Public
oifs
2
kbps 2
125
slot 2
=======
BRKCRS-1930
Cisco Public
126
VPC
Nexus# show forwarding multicast route group 239.1.1.1 source 1.0.1.2 | i Received|slot
slot 1
Received Packets: 0 Bytes: 0
slot 2
Received Packets: 727203 Bytes: 487290999
BRKCRS-1930
Cisco Public
127
Type: OIF
dest idx: 0x0
elif: 0x80046
Vlan37
smac: 001b.54c2.4241
Type: MDT
elif: 0xc0002
dest idx: 0x7fe7
recirc-dti: 0xe20000
Type: OIF
elif: 0x84029
Ethernet2/43
dest idx: 0x44c
smac: 001b.54c2.4241
Cisco Public
128
Always take several snapshots and look for drops that grow coherently with
[suspected] multicast traffic drops
There are always some drops shown by above command this doesnt always
mean the actual network packets are dropped. Some of these are diag packets,
some are packets that are dropped on blocked ports, extra floods etc
BRKCRS-1930
Cisco Public
129
Wrapping UP
BRKCRS-1930
Cisco Public
VSS
Control Plane
SSO
HSRP/VRRP
Distributed
InTRAchassis (w/2 sups)
2 routers, each forwards
traffic
Traffic locality
Failover time
Configuration
synchronization
Yes
Subsecond
Separate configs, key
parameters checked via
CFS
via the Peer-Keepalive link via L2 hellos and
PAgP+
Dual active
detection
BRKCRS-1930
Cisco Public
Redundant Centralized
InTERchassis
Inherent 1st hop
redundnancy, no need
for HSRP
Yes
Subsecond
Using IOS redundancy
framework
132
VPC/VSS: summary
Remember about the implications of 2 control planes
and 2 data planes active at the same time
Cisco Public
133
BRKCRS-1930
Recommended Reading
BRKCRS-1930
Cisco Public
134
All surveys can be found on our onsite portal and mobile website:
www.ciscoliveeurope.com/connect/mobi/login.ww
2. Login
3. Complete and Submit the evaluation
BRKCRS-1930
Cisco Public
135