Professional Documents
Culture Documents
BRKDCT 3101 PDF
BRKDCT 3101 PDF
Architecture And
Troubleshooting
Shridhar V. Dhodapkar –Technical Leader (Services)
CCIE 6367 (Routing & Switching)
BRKDCT-3101
Session Abstract
The session will also cover how to monitor the health of the system.
3
Session Goal
• To provide an overall understanding of the Nexus 9000 switching
architecture, supervisor, fabric, and I/O module design, packet flows, and
key forwarding engine functions
• This session will not examine NX-OS software architecture or other Nexus
platform architectures
4
Related Sessions
5
Agenda
• Introduction
• Architecture
• System Health check Telemetry
• Troubleshooting Toolkit
• Nexus 9000 Troubleshooting
• Common Link Layer Issues-L1
• Fabric Connectivity and
• In band
• L2/L3 Packet Forwarding
• vPC
• Nexus9000 Specific Limitation and Goodies
6
Introduction
7
Introduction-What is Nexus9000 Family ?
8
Architecture
9
9500 Field Upgradeable Units (FRU)
• 9500 has the following modular components which can upgraded or
replaced in the field Nexus® 9508 Front View Nexus® 9508 Rear View
• Supervisor
• Fabric Module
• Line Card
• System Controller
• Fan Tray
• Power Supply
10
Nexus 9500 Platform FRU
Supervisor Module-What it is Role
• Redundant Half-width supervisor engine
• Common for 4-, 8-, and 16- slot chassis
• External Clock Input (PTP)
• Responsible for control-plane functions
ASIC Name 0
MF Port
3 6- 9- 0
MF Port
9-
-Donner
5 0
T2 2
e 9
2
4
N9K-X9564PQ 5
T2 2
4
12
Nexus 9500 Fabric Module
Fabrics Modules
• Interconnect Line Card slots
• Installed at the rear of the chassis
• Leverages Broadcom Trident II ASICs
• Max 1.92 Tbps per line card slot (6 Fabric Cards)
• 960 Gbps per line card slot (3 Fabric Cards)
• All Fabric Cards are active and carry traffic
• Fan Tray requires Fabric Card to be present in even slot
Trident II Trident II
ASIC-NFE ASIC-NFE
32 x 40G 32 x 40G
Hi-Gig2 Hi-Gig2
13
Nexus 9500 Fabric Module
Data Plane Scaling for 8-Slot Chassis
• An 8-Slot chassis fabric module can provide up to 320Gbps to each Line Card slot
• With 6 fabric modules, each Line Card slot can have up to 1.92Tbps duplex
forwarding bandwidth
Fabric 1 Fabric 2 Fabric 3 Fabric 4 Fabric 5 Fabric 6
T2 T2 T2 T2 T2 T2 T2 T2 T2 T2 T2 T2
320 Gbps 320 Gbps 320 Gbps 320 Gbps 320 Gbps 320 Gbps
(8x 40Gbps) (8x 40Gbps) (8x 40Gbps) (8x 40Gbps) (8x 40Gbps) (8x 40Gbps)
320 Gbps
640 Gbps Line Card Slot
960 Gbps
1.28 Tbps
1.60 Tbps
1.92 Tbps
14
Distributed Data Plane of Nexus 9500 Series Switches
N = 1 for N9504
N = 2 for N9508
15
Nexus9500 Series Line Card Summary
Information X9600 Series Line X9500 Series Line X9400 Series
Cards Cards
ASIC Technology Merchant only Merchant+ Merchant only
N9K-X9636PQ N9K-X9564PX •N9K-X9432PQ
N9K-X9564TX •N9K-X9464PX
N9K-X9536PQ •N9K-X9464TX
16
High Level Block Diagram-N9500
17
N9K-C9300 Series
• Fixed Chassis
• 1 RU or 2RU or 3RU
18
Nexus 9300 Series Switch Summary
N9396TX/PX N93128TX N9372TX N9372TX N9372PX
NFE (BCM T2) 1 1 2 1 1
ALE ( NorthStar)/GEM GEM-1 NS GEM-1 NS No GEM-1 No GEM -1 No GEM- 1
Donner Donner Donner
Oversubscribed No 1.5:1 No No No
Line Rate Yes Yes (packets > Yes Yes
194-Bytes)
QoS Classes 8 4 8 4 4
Buffer (MB) 36 (12*3) 104 (12*2+40*2) 24 (12*2) 104 (12*2+40*2) 104 (12*2+40*2)
19
High Level Block Diagram-N9300
GEM 4x 40GE QSFP+ Uplinks
NorthStar
16GB Total
DIMM2
PCIe
DDR3
Northstar ASIC 1 CPU
2C 1.5GHz
Egress Ingress
• The last 2/3 numbers stand for
12 x 40G
(12+12)x12 (12+12)x12
Hi-Gig2 total bandwidth in Gigabits
1000BaseT • 93128 – 128G (96 x 10G + 8 x 40G)
Trident II Mgmt Port
ASIC • 9396 – 96G (48 x 10G + 12 x 40G)
2 USB
BRCM Trident2 Ports • 9372 – 72G ( 48 x 10G + 8 x 40 G)
12 x 40G
48 10G
Ethernet x 12 40G eUSB
Boot Flash
Network Interfaces 12C
20
Nexus9500 Unicast Packet Flow
Fabric Module
Fabric Module
Performs L3 LPM
L3 LPM Lookup & Forwarding
lookup and resolves
Egress port and
Ingress Line Card Egress Line Card
next-hop
ALE-NS EoQ ALE-NS EoQ
Additional buffer is
Classify traffic T2-NFE OOBFC T2-NFE OOBFC available for
Ingress Signaling Ingress
based on 802.1q Signaling extended out put
Accounting & Accounting &
COS, IP Pres, Output Q Ques EoQ
Policing Policing Output Q
DSCP &ACL & Shaping
Remark if needed Traffic Traffic & Shaping
Classification Classification
E-ACL
& Remarking & Remarking E-ACL Class-based output
L2/L3 Lookup in queues. Support 6
I-ACL I-ACL classes including
MAC Table and IP Packet Packet
Host Table L2/L3 Modification L2/L3 Modification control traffic class
Lookup & Lookup &
forwarding forwarding
Parse the first 128 Egress Line card
Byte and extract Parser sends packet to
Parser
header info egress port based
on DMOD/DPORT
Network Interface Network Interface
21
N9K-C9300 High Level Block Diagram
HiGiG2 Interface on T2
MACF ports on the GEM and to MACN ports
22
Main Features of Trident2 1280Gbps Switch ASIC
Features Information
DCB Engine
Maximum IO and Core bandwidth 1280G
L2/L3
Content aware Engine Multicast MAC(L2) Entries 32K min -288K max
128 SERDES@10Gbps
OR
32 SERDES@40Gbps
23
North Star
Features Information
Support Mixed Speed but in Fixed Network Interface:12 Ports Fabric
configuration. Interface: 12 40 Gig
24
Broadcom Unified Forwarding Table
T2 has the following Unified Forwarding Table:
SUPPORTED COMBINATIONS
Mode L2 L3 Host LPM
25
Routing Mode for Nexus9300
LPM Routing Mode Broadcom T2 CLI Command
Mode
Default system routing mode 3
ALPM Routing mode 4 System routing max-mode l3
26
Routing Mode for Nexus9500
LPM Routing Mode Broadcom T2 Mode Cli Command
Default System routing mode 3 (For Line card)
4 (For Fabric Module)
Max-host routing mode 2--Line Card- V6 in LPM System routing max-mode host
3--For Fabric Module
Nonhierarchical routing mode 3--For Line Card System routing non-hierarchical
4--With max-l3-mode option Option [max-l3-mode]
For Line card
No Routes on Fabric Module
64-bit ALPM routing mode Sub mode of mod 4 for System routing mode hierarchical
Fabric modules 64b-alpm
• MAC-ACL IPv6 & any QOS needs double-width entries, which means needs at least 2 banks
29
TCAM Carving for Nexus 9000
TCAM Region-N9500 Size Per Region
Ingress TCAM Region-N9300 Size Per Region Ingress
IPV4 RACL 1536 IPv4 PACL 512 512
3X512
IPV4 VACL 512 512
IPv4 L3 QOS 256
256
IPV4 RACL 512 512
Ingress System 256
256 IPv4 Port QOS 256 256
SPAN 256 256 Ingress System 256 256
Ingress CoPP 256
256 SPAN 256 256
Redirect 256 Ingress CoPP 256 256
256
Redirect 256 256
vPC Convergence 512
512 512
vPC Convergence 512
Egress IPv4 768 Egress Egress IPv4 RACL 256 Egress
RACL 256
3X256 Egress IPv4 VACL 512 512
Egress System 256 Egress System 256
256 256
30
ACL TCAM Default Region and Carving
• TCAM Banks will first get assigned to Feature which has largest region.
• Next TCAM Bank will get assigned to Feature which need double Width.
31
Buffer And Queuing-T2
• T2 has 12 Mbytes of
Buffer shared by all
ports for all Traffic
• Shared buffer divided Into Control
Control and default service
pool if module is T2 only Control
Shared Shared OOBFC
• Shared buffer divided Buffer Buffer
into Control, default and 12 MB Default 12 MB
Default
OOBFC service Pool if
Module is T2 and NS
based
Module with T2 only Module with T2 And NS
32
Buffer And Queuing-North Star
• North Star has 40 Mbytes of Buffe
GEM 4x 40GE QSFP+ Uplinks
10 MB
Buffer
NorthStar
20 MB
Buffer • Divided in to Three Pool
ASIC 1
10 MB
Buffer • Control , SPAN , Default
12 x 40G
Hi-Gig2
Control
Trident II SPAN
ASIC Shared
Buffer
12 x 40G Default
Ethernet
33
Buffer Boost Function with T2 and NS
Fabric Module
• Buffer boost is function which allow T2 to use extra
buffer of NS
ALE-NS
10 MB 20 MB • When Buffer boost is enabled on a port , T2 Local switch
Buffer 10 MB Buffer
Buffer traffic is Sent to NS for extra buffer space-
• When Buffer boost is disabled on a port, T2 local traffic
NFE 12 MB Buffer Shared by all to this port remains local on this NFE
T2 ports
• Buffer Boost is enabled by default and can be disabled
on a per port basis
Network Interface
34
System Health check Telemetry
35
Most Common System Health Check
• What is the Best Recommended NX-OS Release
• CPU & Memory usage
• Inter Process Messaging usage-MTS
• Traffic Stats/Drop To CPU
• CoPP/Hardware Rate Limiter Drops
• Ethernet Out of Band Drops/Error • Interface Errors for STP/Error disable
• Instant Buffer usage Stats • Inter ASIC Utilization
• FATAL System Errors • Hardware Capacity Check
• Consistency Checkers –Various Tables
• GOLD Diagnostic Checks
• Sev1/2 Syslog
36
General Recommendation for New and Existing
Deployments
• Software Recommendation
Platform Series Recommended Release
Cisco Nexus 9500 6.1(2)I3(5), 7.0(3)I1(3), or 7.0(3)I2(2a)*
Cisco Nexus 9300 6.1(2)I3(5), 7.0(3)I1(3), or 7.0(3)I2(2a)*
Cisco NX-OS 7.0(3)I2(x) is the long-lived release train for the Cisco Nexus 9000 Series
switches.
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/recommended_releaseb_Minimum_and_Recommended_
Cisco_NXOS_Releases_for_Cisco_Nexus_9000_Series_Switches.html
• Verified Scale limits for different features and protocol for each release
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-
x/scalability/guide_34/b_Cisco_Nexus_9000_Series_NXOS_Verified_Scalability_Guide_612I34/b_Cisco_Nexus_9000_Series_NXO
S_Verified_Scalability_Guide_612I34_chapter_01.html
37
CPU & Memory Usage
N9K#show system resources
Load average: 1 minute: 0.00 5 minutes: 0.03 15 minutes: 0.05
Processes : 432 total, 1 running D
CPU states : 2.76% user, 0.75% kernel, 96.48% idle R
CPU0 states : 0.00% user, 0.00% kernel, 100.00% idle CPU
A
M
CPU1 states : 0.00% user, 1.01% kernel, 98.98% idle
CPU2 states : 0.00% user, 2.94% kernel, 97.05% idle
CPU3 states : 10.89% user, 1.98% kernel, 87.12% idle
Memory usage: 16402328K total,3443588K used, 12958740K free
Current memory status: OK
D
R
N9K#show system internal memory-usage-per-module in-KB A
Slot 01:Used:1647420 Kbytes,Free:425680 Kbytes,Total:2073100 Kbytes M
Slot 02:Used:1627524 Kbytes,Free:445576 Kbytes,Total:2073100 Kbytes
Slot 04:Used:1647560 Kbytes,Free:425540 Kbytes,Total:2073100 Kbytes
38
CPU & Memory Usage
39
Top Command-display top CPU processes
“top” provides an ongoing look at processor activity in real time
Rate statistics
Rx packet rate (current/peak) 717 / 80695 pps
Tx packet rate (current/peak) 360 / 1338 pps
42
Traffic Stats/Drops to CPU— (Cont’d)
N9K# show system internal frame traffic | in drops
Global input drops: bad-interface 0, bad-encap 0, failed-decap 0,
Global output drops: Drops From PKTmgr
eth_output_err 0, gre_err 0 otv_err 0 span_drop_en: 0 span_drops: 0
Crossbar down drops : 0 Flood_to_core LTL: Hits: 0 Misses: 0
43
Instant Buffer Utilization For CPU Port
44
Ethernet Out Of Band Drops/Errors
N9K#show hardware internal eobc stats | inc dropped
RX packets:248308217 errors:0 dropped:0 overruns:0 frame:0
TX packets:71554006 errors:0 dropped:0 overruns:0 carrier:0
45
Instant Buffer Usage Stats
Buffer polling interval for 7.0
N9K#show hardware internal buffer info pkt-stats mod 1 Release is 500msecs
INSTANCE: 0
---------------------------------------------------------- • Instant Buffer utilization per queue
per port
Output Shared Service Pool Buffer Utilization (in cells)
• One cell represents 208 bytes
SP-0 SP-1 SP-2 SP-3
----------------------------------------------------------- Show hardware internal buffer info pkt-
stats input mod 1
Total Instant Usage 4474 0 89 2939
Remaining Instant • SP-3-Dedicted resource for Control
Usage 25466 0 14255 3405 Traffic
Peak/Max Cells Used 4821 0 327 3060 • SP-0-Resource for Locally Switched
Switch Cell Count 29940 0 14344 6344 Unicast ,Multicast and SPAN
---------------------------------------------------------- • SP-2 Extended Output queue for
show hardware internal ns buffer info pkt-stats Unicast using buffers from North
Star
46
Instant Buffer Usage Stats - With Buffer Usage
N9K#show hardware internal buffer info pkt-stats mod 1
INSTANCE: 0
Output Shared Service Pool Buffer Utilization (in cells)
SP-0 SP-1 SP-2 SP-3
-------------------------------------------------------------------------
Total Instant Usage 4474 0 89 2939 • SP-3 Started filling
Remaining Instant Usage 25466 0 14255 3405 the Queue
-------------------------------------------------------------------------
ASIC Port Q3 Q2 Q1 Q0 CPU SPAN
[13] Port 13 onwards are Front Panel Port Only printed if there is congestion
UC(OOBFC)->0 0 0 0
UC-> 0 0 0 1249 332 0 • CPU buffer filling
MC-> 0 0 0 3247 1996 0 up
47
CoPP Drops
N9K# show policy-map interface control-plane mod 1 | in dropped
dropped 0 packets;
dropped 0 packets;
dropped 0 packets;
dropped 0 packets;
dropped 7800 packets; Drops Seen for Default-Class at minimal rate is normal
We recommend that you use the strict default CoPP policy initially and then later modify the CoPP
policies based on the data center and application requirements.
Parameters Default
Default policy Strict
48
CoPP Drops-Exception drops
class-map copp-system-p-class-l3uc-data (match-any)
match exception glean
class-map copp-system-p-class-redirect (match-any)
match access-group name copp-system-p-acl-ptp
class-map copp-system-p-class-exception (match-any)
match exception ip option Goal is to Classify all Traffic Using CoPP
match exception ip icmp unreachable
match exception ipv6 option
match exception ipv6 icmp unreachable
class-map copp-system-p-class-exception-diag (match-any)
match exception ttl-failure
match exception mtu-failure
49
Hardware Rate Limiter
N9K# show hardware rate-limiter mod 1
Units for Config: packets per second
Allowed, Dropped & Total: aggregated since last clear counters
Module: 1
R-L Class Config Allowed Dropped Total
+----------+-----+------------+------------+-------------+
L3 glean 100 0 0 0
L3 mcast loc-grp 3000 0 0 0
access-list-log 100 0 0 0
bfd 10000 1352890 0 1352890
fex 3000 0 0 0
span 50 0 0 0
50
FATAL System Errors
N9K#show logging onboard mod 1 exception-log | incl FATAL prev 15
------------------------------------------------------------------------
Date (mm/dd/yy)=01/15/15 Time (hs:mn:sec): 00:16:58
OBFL Exception log data for THIS SUP Module:0
********* Exception info for module 0 ********
exception information --- exception instance 1 ----
Device Name : System Manager
Device Errorcode : 0x0000023a
ErrNum (devInfo) : 58 (0x3a)
System Errorcode : 0x401e0089 Service in VDC has had a hap-reset
Error Type : FATAL error
51
Common Interface Error counters and Status
N9K# show interface counters errors mod 4
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
--------------------------------------------------------------------------
Eth4/1 0 100 0 581 0 0
N9K# show interface status err-disabled
Port Name Status Reason
--------------------------------------------------------------------------
Eth4/1 err-disable link-flap
52
Interface Queuing Stats
N9K#show queuing interface 4/18
Egress Queuing for Ethernet4/18 [System]
QoS-Group# Bandwidth% PrioLevel Shape Qlimit
Min Max Units
3 1 - - - 6(D)
-------------------------SNIP--------------------------
0 100 - - 6(D)
----------------------------------------------------
QOS GROUP 0
Unicast | OOBFC Unicast | Multicast
Dropped Pkts | 0| 0| 0|
------------------------------------------------------------
QOS GROUP 7
Unicast | OOBFC Unicast | Multicast
Dropped Pkts | 0| 0| 0|
53
Inter ASIC Utilization-HG Ports
T2 #0 T2 #1
HG00 HG00
Fabric Module
T2 #0 T2 #1 T2 #2
N9K#show system internal interface counters mod 1 Line Card
54
Verify Consistency Between Software and Hardware
Table
Table CLI
Physical Interface show consistency-checker link-state
55
Consistency Checkers-Link and STP state
N9K#show consistency-checker link-state mod 1
Link State Checks: Link state only
Consistency Check: PASSED
No inconsistencies found for:
Ethernet1/1
2015 Mar 24 03:23:27 N9508a-SJ %$ VDC-1 %$ vshd: CC_LINK_STATE: Consistency
Check: PASSED
56
Consistency Checkers-Port Channel-Vlan Membership
N9K#show consistency-checker membership port-channels
Checks: Trunk group and trunk membership table.
Consistency Check: Failed
Inconsistency found for port-channel1:
Module:1, Unit: ['Ethernet3/49', 'Ethernet2/49']
Module:26, Unit: ['Ethernet3/49', 'Ethernet2/49’]
N9K# show consistency-checker membership vlan 18
Checks: Port membership of Vlan in vlan and egr_vlan table
Ports configured as "switchport monitor” will be skipped
Consistency Check: PASSED
Vlan:18, Hardware state consistent for:
Ethernet2/49
2015 Mar 24 03:28:31 N95a%$ VDC-1 %$ vshd: CC_VLAN_MEMBERSHIP: Consistency
Check: PASSED
57
Consistency Checkers-Mac address Table
N9K# show consistency-checker l2 module 1
Consistency check: PASSED
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen, + - primary entry using vPC Peer-Link,
(T) - True, (F) - False
Missing entries in the HW MAC Table
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
Extra and Discrepant entries in the HW MAC Table
VLAN MAC Address Type age Secure NTFY Ports
---------+-----------------+--------+---------+------+----+------------------
58
Consistency Checkers-L3 Interface
59
Consistency Checker –Unicast Forwarding
N9K#test consistency-checker forwarding
Consistency check started.
N9K# show consistency-checker forwarding ipv4 unicast module 1
IPV4 Consistency check (in progress): table_id(0x1) slot(1)
Elapsed time : 8257 ms
N9K# show consistency-checker forwarding ipv4 unicast module 1
IPV4 Consistency check : table_id(0x1) slot(1)
Execution time : 13244 ms ()
No inconsistent adjacencies.
No inconsistent routes.
Consistency-Checker: PASS for 1
60
Gold Diagnostic Checks
N9K# show diagnostic result mod 2
On Demand Diagnostic can be executed
Module 2: 48x1/10G-T 4x40G Ethernet Module
Test results:(.=Pass, F=Fail,I=Incomplete,U=Untested,A=Abort,E=Error disabled)
1) ASICRegisterCheck------------> .
2) PrimaryBootROM---------------> .
3) SecondaryBootROM-------------> .
4) OBFL-------------------------> .
6) BootFlash--------------------> . RewriteEngineLoopback
7) AsicMemory-------------------> .
8) FpgaRegTest---------------- -> .
9) PortLoopback:--------------- > .
Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
-----------------------------------------------------
U U U . U U U U . . U U U . U U
61
Sev1/2 Syslog
show logging logfile | incl -1-|-2-
2015 Feb 25 10:30:17 N9508a-SJ %PLATFORM-2-MOD_PWRUP: Module 26 powered up
(Serial number SAL1738D37W)
2015 Feb 25 10:32:37 N9508a-SJ %XBAR-2-XBAR_HGLINK_NOT_UP: fabric link 1 on
module 2 unit 0 connected to fabric module 26 unit:0 is not up during module
bring up
2015 Feb 25 10:32:39 N9508a-SJ %MODULE-2-MOD_FAIL: Initialization of module 26
(Serial number: SAL1738D37W) failed
2015 Feb 25 10:32:39 N9508a-SJ %PLATFORM-2-MOD_PWRDN: Module 26 powered down
(Serial number SAL1738D37W)
62
Troubleshooting Toolkit
63
Troubleshooting Toolkit
• Ethanalyzer
• TCP Dump
• ELAM
• Packet Tracer
• Flex Counter
• ERSPAN
• Consistency Checkers
64
Ethanalyzer-When To Use it
Note: Ethanalyzer does not allow capturing of hardware switched traffic between data
ports of the switch
65
Ethanalyzer-CLI
N9K# ethanalyzer local interface inband capture-filter "pim” detail
Capturing on inband
Frame 1 (60 bytes on wire, 60 bytes captured)
Arrival Time: Mar 24, 2015 10:01:10.018889000
-------Snip------------------
[Protocols in frame: eth:ip:pim]
67
Tcpdump -syntax
68
Tcpdump-Examples-
bash-4.2# tcpdump -c 100 -w tcpdump.pcap -vvvv -i ps-inb Capturing 100 packets And
tcpdump: WARNING: ps-inb: no IPv4 address assigned writing to file
tcpdump: listening on ps-inb, link-type EN10MB (Ethernet), capture size 65535
bytes
100 packets captured
102 packets received by filter
bash-4.2#cd /bootflash
bash-4.2# tcpdump -tttt -r tcpdump.pcap | more
reading from file tcpdump.pcap, link-type EN10MB (Ethernet) Reading captured file
2015-04-26 03:21:31.309350 00:0e:ee:01:1b:01 (oui Unknown) > 00:00:00:ff:ff:01
(oui Ethernet), ethertype Unknown (0x8833), length 160:
0x0000: 0000 fc08 0b00 0000 0000 0800 0000 0ffd ...............
-------------------------------------more---------------------------------
69
tshark
bash-4.2$ tshark -i ps-inb
Capturing on inband
0.000000 00:0e:ee:01:1b:01 -> 00:00:00:ff:ff:01 0x8833 Ethernet II
12.328377 00:0e:ee:01:1b:01 -> 00:00:00:ff:ff:01 0x8833 Ethernet II
^C2 packets captured
bash-4.2$
70
Elam-Embedded Logic Analyzer Module-NS
• Elam Allows to capture single packet based on Trigger
• Triggers are configured using Packet information
• Only Supported on North Star Based(ALE) Line Cards and GEMs
• Use with TAC Supervision
• Help to Answer following Questions
• Was the Packet indeed Received by device on given Line card?
• How did the Packet Look like?
• How was the packet rewritten based on forwarding Decision made by T2?
• Was the Packet correctly forwarded or Dropped?
71
ELAM Configuration
• Init – Initialize the ELAM – select the Asic instance, pipeline and
1. Init select lines
module-1# debug platform internal ns elam asic
module-1(NS-elam)# trigger init ingress in-select 3 out-select 5
2. Config • Config – Configure the trigger based on different fields in the packet
module-1(NS-elam-insel3)# set outer ipv4 src_ip 13.13.13.10
73
Elam Ingress & Egress Direction-EOR
• Traffic entering from Fabric Module in to NS of
Line Card is Egress Pipeline Fabric 3
Fabric 1
N N
Ex. trigger init egress in-select 3 out-select 5 Egress FE FE
Ingress
set outer ipv4 dst_ip 13.13.13.10 Line Card
13.13.13.10
74
ELAM Sample Configuration & Key Info
Nexus9508 with N9K-X9564TX
13.13.13.10/30
13.13.13.1/30
Eth5/1 Eth6/52
75
Important ELAM Fields
76
Packet Tracer-T2
FM Mod
• Helps to Trace the packet inside Switch.
77
Packet Tracer Configuration
test packet-tracer dst-ip 13.13.13.10 detail-fp
Configure Filter
test packet-tracer dst-ip 13.13.13.10 detail-hg
13.13.13.10/30
78
Sample Configuration & Identify Front Port-LC
N9K#test packet-tracer dst-ip 13.13.13.10 src-ip 13.13.13.1 detail-fp
Eth6/1 Eth6/52
13.13.13.1/30 13.13.13.10/30
79
Packet Tracer Sample Configuration & Key Info
Packet-tracer stats
Eth6/1 Eth6/52
Module 6:
Filter1 installed: src-ip 13.13.13.1 dst-ip 13.13.13.1/30
13.13.13.10 detail-fp 13.13.13.10/30
ASIC instance 0:
Entry 1: id = 7426, count = 5, active, fp, port 13
80
Sample Configuration Identify Fabric Port LC From FM
81
Flex Counters –Adjacency Statistics
• Flex counters used to count Next hop Adjacency stats
82
How To Configure Flex Counters
Nexus9508 with N9K-X9564TX
13.13.13.10/30
Eth6/1 Eth6/52
13.13.13.1/30 13.13.13.10/30
83
Sample Configuration
N9K# test hardware internal adjacency statistics nexthop ipv4 13.13.13.6
interface ethernet 6/52 show
13.13.13.10/30
Module:21 Unit:0
------------------
Adjacency counters for nhip 13.13.13.6 if Ethernet6/52:
Ucast: Packets 738 Bytes 90036 Nexus9508 with N9K-X9564TX
Module:22 Unit:1
------------------ 13.13.13.1/30 13.13.13.10/30
Adjacency counters for nhip 13.13.13.6 if Ethernet6/52:
Ucast: Packets 946 Bytes 115412
Mcast: Packets 0 Bytes 0
84
SPAN & ERSPAN
• Switch Port Analyzer”
• Provides efficient, high-performance traffic monitoring service
• Duplicates network traffic to one or more monitor interfaces
• Types Of SPAN
• Local SPAN
• Encapsulated Remote SPAN(ERSPAN)
• Applications:
• Troubleshooting connectivity issues
• Base lining network utilization/performance
• Detecting anomalous traffic flows
• On Nexus9000 Span Traffic uses dedicated queue
• Queue carrying SPAN traffic has low Priority over other queue’s
during congestion
85
SPAN QOS Queue
N9K# show queuing interface ethernet 4/18 | begin SPAN
| SPAN QOS GROUP |
+-----------------------------------------------------------------+
| | Unicast | OOBFC Unicast | Multicast |
+------------------------------------------------------------------+
| Tx Pkts | 0| 0| 0|
| Tx Byts | 0| 0| 0|
| Dropped Pkts | 0| 0| 0|
| Dropped Byts | 0| 0| 0|
| Q Depth Byts | 0| 0| 0|
86
SPAN Configuration
Sup-eth Local
N9K(config)# monitor session 1
N9K(config-monitor)# source interface sup-eth 0 both
N9K(config-monitor)# source interface ethernet 6/1 e6/1 e6/2
N9K(config-monitor)# destination interface ethernet 6/2 Local SPAN
N9K(config-monitor)# No Shut
N9K(config)#int et 6/2
N9K(config-monitor)# show monitor
N9K(config-if)# switchport monitor
Session State Reason Description
--- ----- ------------ --------------------
1 up The session is up Local SPAN Session
87
ERSPAN Configuration
Only Supports Source ERSPAN
N9K(config)# monitor erspan origin ip-address 13.13.13.2
global Type-3 Header 32-bit Timestamp
N9K(config)# monitor session 1 type erspan-source Supports on Nexus9300 only
N9K(config-erspan-src)# header-type 3
N9K(config-erspan-src)# source interface ethernet 6/1 Layer 3
N9K(config-erspan-src)# erspan-id 1 L3
N9K(config-erspan-src)# ip ttl 16
N9K(config-erspan-src)# vrf default e6/1 e6/2
N9K(config-erspan-src)# destination ip 9.1.1.2
ERSPAN
N9K(config-erspan-src)# marker-packet-2
Marker packet carry original UTC time
N9K(config-erspan-src)# no shut
stamp to over come 32-bit wrapper
issue
88
Consistency Checkers-Summary
• Show consistency-checker stp-state vlan
• Show consistency-checker link-state
• Show consistency-checker membership vlan
• Show consistency-checker membership port-channels
• Show consistency-checker membership port-channels
• Show consistency-checker l2
• Show consistency-checker l3
• Show consistency-checker forwarding ipv4 unicast
89
Nexus 9000
Troubleshooting
90
Understanding T2 interfaces-Xe0/hg
N9K# bcm-shell mod 1 "show unit"
Unit 0 chip BCM56852_A2 (current)
Unit 1 chip BCM56852_A2
hg0 hg11 hg0 hg11
Hg=Internal Ports
Xe=Front Panel Port
91
Layer -1 Issues- Transceiver Not Recognized
92
Interface MTU/Speed/Flow Control Verification
N9K# show interface Ethernet 4/18
Ethernet4/18 is up
admin state is up, Dedicated Interface Belongs to Po10
Hardware: 10000/40000 Ethernet, address: 7c69.f66e.d860 (bia 7c69.f66e.d860)
MTU 9216 bytes, BW 40000000 Kbit, DLY 10 usec
N9K# bcm-shell module 4 ” 1: ps Xe17"
ena/ speed/ link auto STP lrn inter max loop
port link duplex scan neg? state pause discrd ops face frame back
xe17 up 40G FD HW No Disable None FA SR4 9298
93
Interface Flow Control Check
N9K#Show interface ethernet 1/1 flowcontrol
Port Send FlowControl Receive FlowControl RxPause TxPause
admin oper admin oper
-----------------------------------------------------------------------------
Eth1/1 off off off off
0 0
N9K#bcm-shell module 1 "ps" Wrong programming
ena/ speed/ link auto TP lrn inter max loop
port link duplex scan neg? state pause discrd ops face frame back
xe0 up 10G FD HW No Disable TX RX None FA SFI 9298
94
Interface Input Drops
Ethernet1/30 is up
Hardware: 1000/10000 Ethernet, address: 7426.acea.ceb9 (bia 7426.acea.ceb9)
EtherType is 0x8100
0 input with dribble 1316 input discard
N9K#bcm-shell mod1 “ cstat xe29”
+------------------Programmable Statistics Counters[Port xe29]------+
| Type | No. | Value | Enabled For |
+----------------------------------------------------------------- -+
| RX | 0(R)| 19163028| RIPD4 RIPD6 RDISC RPORTD |
| | | | PDISC VLANDR |
| | 1(R)| 28744286| IMBP |
| | 4 | 993820| RPORTD FcmPortClass3RxDiscards |
| | 6 | 19163407| RFILDR FcmPortClass2RxDiscards |
| | 7 | 19163048| RDROP |
| | 8 | 18169208| VLANDR | | gre VLANDR
bcm-shell mod 6 "cstat info"
+-------------------------------------------------------------------+
| | 3(R)| 14704| TPKTD VLANDR Rx VLAN drops
|
| | 4(R)| 968303| TGIP4 TGIP6 FcmPortClass3TxFrames|
| | 6 | 968303| TGIP4 FcmPortClass3TxFrames |
+-------------------------------------------------------------------+
95
Fabric Connectivity and Troubleshooting
T2 T2 T2
T2
T2 T2 T2
96
Full-Rate Mode(FRM) V/S Oversubscribed Mode(OSM)
• Each T2 have 32 40Gigport with total capacity of 1.2Tbps with “2” switching
mode
OSM(Default) - Uses all 32 40 Gig ports Line Rate achieved for packets > 200 Bytes
FRM - Uses only 24 40 Gig ports Line rate achieved for > 64 Bytes
Configuration Knob to Change the mode.
N9K(config)# system fabric-mode full-rate
Configuration effective after Reboot
N9K#show system fabric-mode
Applied System Fabric Mode:Full rate mode
Use FRM mode to achieve line rate for 64 byte packets on 9636PQ , 9564PQ ,
9564TX cards
All other 94xx line cards will not be powered up in this mode
97
RTAG7 and DLB
• Two Packet Hashing algorithm available from LC to FM
• RTAG7-To Select HG Port use Packet Header.
• For a flow same HG Link is used FM1 FM-2
FM6
• Multiple Higig links failures for a Single LC going to Multiple FM - Bring down
the LC module.
• Multiple Higig links failures on LC to one of the FM - Bring down the LC module
99
4/8 slot Chassis – Fabric Connectivity
• 9500/9600 Series Line Card’s T2
T T T T T T T T T T T T
have connectivity to all 6 Fabric 2 2 2 2 2 2 2 2 2 2 2 2
Module’s T2
100
16 slot Chassis – Fabric Connectivity
N9K-C9516-FM
T T T T T T T T T T T T
• 9500 Series Line Card’s T2 will have connection 2 2 2 2 2 2 2 2 2 2 2 2
to all 6 Fabric Module but to only 2 T2’s from T T T T T T
T T T T T T
each Fabric Module 2 2 2 2 2 2 2 2 2 2 2
2
• Traffic between 9500 Series Line Card and 9400 40 Gig Link
will use subset Hi gig links.
101
16 slot Chassis – Fabric Connectivity
• With 3 FM configuration All 4 T2 units in
T T T T T T T T T T T T
each FM are connected to 9500 series LC 2 2 2 2 2 2 2 2 2 2 2 2
modules' T2 units
T2 T2
N9K-X9536PQ
102
Line Cards With Mux to FM
HG HG HG HG HG HG
MUX1 MUX4 MUX2 MUX5 MUX3 MUX6
Line Card
HiGIG Link-info Fabriccard slot:5 With FM from Slot 25 Down FM-25 FM-26
T2-0 T2-1 T2-0 T2-1
LC-Slot LC-Unit LC-HGLink MUX FM-Slot FM-Unit FM-HGLink HG012 HG012 HG014
5 0 HG02 1A 26 0 HG14 B A HG014
HG02 HG03
5 0 HG03 1A 26 1 HG14 MUX
LC
T2-0 T2-1
104
FM Connectivity For N9K-X9564PX –With MUX
show system internal fabric connectivity mod 5 | in B
FM-25 FM-26
HiGIG Link-info Linecard slot:5 T2-0 T2-1 T2-0 T2-1
HG012 HG012 HG014 HG014
LC-Slot LC-Unit LC-HGLink MUX FM-Slot FM-Unit FM-HGLink A
B
HG02 HG03
5 0 HG02 1B 25 0 HG12
MUX
LC
5 0 HG03 1B 25 1 HG12
T2-0 T2-1
show system internal fabric connectivity mod 5
HiGIG Link-info Fabriccard slot:5 With FM from Slot 25 Down FM-25 FM-26
LC-Slot LC-Unit LC-HGLink MUX FM-Slot FM-Unit FM-HGLink T2-0 T2-1 T2-0 T2-1
HG012 HG012 HG014 HG014
5 0 HG02 1A 26 0 HG14 B A
HG02 HG03
5 0 HG03 1A 26 1 HG14
MUX
LC
T2-0 T2-1
105
Fabric Troubleshooting commands
Fabric Module Slot-21
show system internal fabric connectivity mod 1
HiGIG Link-info Linecard slot:1 T2 T2
LC-Slot LC-Unit LC-HGLink MUX FM-Slot FM-Unit FM-HGLink #0 #1
HG00
HG00
1 0 HG00 - 21 0 HG00
1 0 HG01 - 21 1 HG00
show system internal fabric connectivity mod 21
HiGIG Link-info Fabriccard slot:21
T2 T2 T2
FM-Slot FM-Unit FM-HGLink LC-Slot LC-Unit LC-HGLink MUX
#0 #1 #2
21 0 HG00 1 0 HG00
21 1 HG00 1 0 HG01
Line Card Slot-1
106
Fabric Port Drops and Link Status
N9K# show hardware internal fabric interface asic counters mod 21
Counters for Fabric Ports:
FabricInterface Forward Forward Error Pkt Error Pkt QOS Rx QOS Tx
RxDrops TxDrops RxDrops TxDrops Drops Drops
0 / 1 / HG0 0 0 0 0 0 0
1 / 1 / HG0 0 0 1 0 0 0 0
107
Fabric Port STP State HW point of View
108
Path of the Packet -Inband
CPU
• Traffic from all ingress Line Card
to Supervisor will hash to one
Netstack
Fabric module
• Traffic from Supervisor Card to
NIC-Eth2 NIC-Eth3 Egress Line cad will hash on one
FM. May not be same
Mod29 System Controller-SC1 • CoPP is operational on all LC.
However aggregate CoPP is on
FM
Fabric Module
Fabric Module
Fabric Module
Mod26
Mod21 Mod23
Eth6/1
Line Card OSPF Hello
109
Line Card
North Star ASIC
Check for Drops/Errors-Line Card Trident II
ASIC
Network Interfaces
N9K#show hardware internal interface ethernet 6/1 asic counters
Important Counters/Drops
--------------- --------- --------- --------- --------- --------- ---------
Interface Name Forward Forward Error Pkt Error Pkt QOS Rx QOS Tx
RxDrops TxDrops RxDrops TxDrops Drops Drops
--------------- --------- --------- --------- --------- --------- ---------
Ethernet6/1 870 0 100 0 0 0
--------------- --------- --------- --------- --------- --------- ---------
Forward Rx Drops = [ RDBGC0 RDBGC4 RDBGC6 RDBGC7 RDBGC8 ]
Forward Tx Drops = [ TDBGC1 TDBGC3 TDBGC5 (excludes expected Multicast drops)]
ErrorPkt Rx Drops= [ IUNHGI IUNKOPC RFCS RALN RFLR RERPKT RJBR RSCHCRC RUND RMTUE]
ErrorPkt Tx Drops= [ TJBR TFCS TRPKT RMTUE TUFL TPCE ]
QOS Rx Drops = [ RDISC DROP_PKT_ING DROP_PKT_IMTR DROP_PKT_YEL DROP_PKT_RED ]
QOS Tx Drops = [ MCQ_DROP_PKT(0) MCQ_DROP_PKT(1) MCQ_DROP_PKT(2)
Use slot <#> show hardware internal interface indiscard-stats instance <#> RDBGC0
N9K#bcm-shell mod 6 "listreg RALN"| grep Description
Description: Receive Alignment Error Frame Counter
110
Instant Buffer Usage Stats-With Buffer Usage
N9K#show hardware internal buffer info pkt-stats mod 6
INSTANCE: 0
------------------------------------------------------------------------
ASIC Port Q3 Q2 Q1 Q0 CPU SPAN
[13]
Only printed if there is congestion
UC(OOBFC)-> 0 0 0 0
UC-> 0 0 0 1249 332 0 • CPU buffer filling
MC-> 0 0 0 3247 1996 0 up
111
CoPP Drops on Line Card
Line Card
North Star ASIC
Trident II
ASIC
Network Interfaces
112
Identify FM -Check CoPP Drops
113
Check for Drops/Errors-Fabric Module
N9K# show system internal fabric connectivity mod 6 | grep 21 Identify HG Port on LC and FM
LC-Slot LC-Unit LC-HGLink MUX FM-Slot FM-Unit FM-HGLink
6 0 HG10 3B 21 0 HG15
N9K# sh hardware internal fabric interface asic counters module 6 instance 0 asic-port 11
114
Verify Drops Between FM and SC System Controller
MVDXN-SW
Port Descr Enable Status ANeg Speed Mode InByte OutByte InPkts OutPkts
7 FM1EPCswitch Yes UP No 2 6 746159513 60543666 620863 269592
115
Drops/Errors On Supervisor
N9K#show hardware internal cpu-mac inband counters in eth|ps-
inb|dro Netstack
eth2 Link encap:Ethernet HWaddr 00:00:00:01:1b:01
Pseudo Inband
RX packets:2922013 errors:0 dropped:0 overruns:2 frame:0
116
Drops/Errors On Supervisor-Cont.
N9K#show hardware internal cpu-mac inband stats | in errors|rate|Queue
Queue Idx Packet Count Bytes Drops Csum Errors Allocation Failure
117
L2 Mac And Vlan Table Verification
N9K# sh mac address-table dynamic vlan 100
Legend: * - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC Eth6/1
age - seconds since last seen,+ - primary entry using vPC Peer-Link, (T) -
True, (F) - False Mac=547f:ee1c.06fc
VLAN MAC Address Type age Secure NTFY Ports interface Ethernet6/1
switchport
* 100 547f.ee1c.06fc dynamic 0 F F Eth6/1
switchport access vlan 100
N9K# bcm-shell mod 6 " l2 show" | in Hit
no shutdown
mac=54:7f:ee:1c:06:fc vlan=100 GPORT=0x800800d modid=16 port=13/xe0 Hit
118
Spanning Tree Verification
N9K# sh spanning-tree interface ethernet 6/1
Vlan Role Sts Cost Prio.Nbr Type
interface Ethernet6/1
VLAN0100 Desg FWD 4 128.1537 P2p switchport
N9K# bcm-shell mod 6 "dump vlan 100” switchport access vlan 100
no shutdown
VLAN.ipipe0[100]: <VP_GROUP_BITMAP=0x00000……STG=0X67
FID_ID=0x64
N9K# Dec 0x67=103
N9K# Dec 0x64=100
STG= STP Group ID Eth6/1
FID_ID=Vlan ID.
Mac=547f:ee1c.06fc
N9K# bcm-shell mod 6 "stg stp 103”
STG 103:
Block: xe1-xe47
Forward: xe0,hg
119
Unicast L3 Forwarding
• T2 has combination of dedicated TCAM table space and shared hash table
memory known as Unified Forwarding Table (UFT)
• The UFT is partitioned into three forwarding tables
• MAC Address Table
• IP Host Table
• Longest Prefix Match-LPM Table
• To maximize the system-wide forwarding scalability UFT tables on line
cards and fabric modules for different forwarding lookup functions
Feature Scale
FM Feature Scale
L3 LPM Table 128K
L3 Host Table 120K
LC And L2/L3
Multicast
L2 Mac Table 96K
120
Unicast L3 Forwarding- Component Information
Software/Hardware Programming
• OSPF communicates with uRIB to build the uRIB
routing table
• AM builds the next-hop adjacency entry
• uFDM distributes the information to the line uFDM
cards Supervisor
• IP FIB (running on the line cards) programs the Hardware-T2
ASIC components with the forwarding and
adjacency information. FIB Manager
121
L3 Unicast Troubleshooting Flow
Next-Hop
Check the routing table Show ip route [ipv4] [<prefix>]
ARP/MAC
Show ip arp [ipv4]
show ip adjacency (Ipv4]
Check the ARP Table
show forwarding adjacency platform [ipv4] module
<mod>
Checking Route on
RIB And FIB.
Check Forwarding Route show forwarding [ipv4] route module <mod>
HW Programming
On LC/FM
bcm-shell mod 22 "l3 defip show"
Use BCM commands
122
Unicast L3 Forwarding- Two Possible Scenarios
Case 1: If incoming packet hit /32 host route on LC, forwarding decision is made on LC
Case 2: If incoming packet miss /32 host route on LC. Now for Longest Prefix
match (LPM) the packet get forwarded to FM
• Install a default route 0.0.0.0/0 on Line Cards using the virtual MOD ID for Fabric Module
as the DMOD to force Line Cards to forward LPM packets to Fabric Modules
• Fabric Modules perform LPM lookup and forward packets to the resolved Destination
MOD/Destination PORT
123
Network Diagram-Problem Definition
13.13.13.12/30
.13 .14
13.13.13.0/30 13.13.13.8/30
.1 .2 .17 .18 .9 .10 N9508d-SJ#
Nexus3064Q-ESC# 13.13.13.16/30
N9K# N9508c-SJ#
Nexus3064Q-ESC# ping 13.13.13.10
PING 13.13.13.10 (13.13.13.10): 56 data bytes
Request 0 timed out
124
Router MAC Programming Check
• Router Mac address must be programmed in Hardware
N9K1#show interface ethernet 6/1 | grep address
Hardware: 100/1000/10000 Ethernet, address: 003a.99fc.dd7f
N9K1# bcm-shell mod 6 "0:d chg my_station_tcam" | grep dd7f
MY_STATION_TCAM.ipipe0[0]: <VALID=1,------snip----
MAC_ADDR=0x003a99fcdd7f,
125
Verify /32 Host Route on Line card-Case 1
N9K1#show ip route 13.13.13.14
13.13.13.14/32, ubest/mbest: 1/0, attached /32 Host Entry
*via 13.13.13.14, Eth6/33, [250/0], 00:37:24, am
N9K1#bcm-shell mod 6 "0:l3 l3table show" | grep 13.13.13.14
Entry VRF IP address Mac Address INTF MOD PORT CLASS HIT
10 1 13.13.13.14 00:00:00:00:00:00 100010 0 0 0 y
N9K1#show system internal ethpm info interface ethernet 6/33 | grep -i STATIC
IF_STATIC_INFO: port_name=Ethernet6/33,if_index:0x1a284000,ltl=40875,slot=5,
nxos_port=32,dmod=16,dpid=45,
126
Next Hop Reached via L3-Port Channel
N9K1#show ip route 10.164.112.22
10.164.112.22/32, ubest/mbest: 1/0 /32 Host Entry
*via 13.13.13.14, Po200, [110/3], 00:09:33, ospf-10, intra
N9K1#bcm-shell mod 6 "0:l3 l3table show" | grep 10.164.112.22
Entry VRF IP address Mac Address INTF MOD PORT CLASS HIT
175660 1 10.164.112.22 00:00:00:00:00:00 100012 0 0 0 y
N9K1#show system internal ethpm info interface port-channel 200 |grep –I STATIC
IF_STATIC_INFO: port_name=port-channel200,if_index:0x160000c7,ltl=2597,slot=0,
nxos_port=02,dmod=0,dpid=3,
127
Verify HW-Programming on LC or FM ? Case 2
N9K# show ip route 13.13.13.10
This is not /32 host Route.
IP Route Table for VRF "default” Packet forwarding decision
responsibility is of the Fabric
13.13.13.8/30, ubest/mbest: 1/0 Module
*via 13.13.13.6, Eth6/52, [110/41],
00:22:29, ospf-10, intra ALL FM will be programmed
N9K# show forwarding route 13.13.13.10 module 21 with this Route
128
Line Card Punting Packets to Fabric For LPM ?
N9K# show hardware internal forwarding adjacency statistics default-route mod 6
Module:6 Unit:0
Traffic matched adjacency for default route (destined to FM):
Unicast: Packets 148 Bytes 13382
N9K# bcm-shell mod 6 "l3 egress show" | inc 149149 Mod 100 is assign to Fabric Module
Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop
149149 00:12:12:12:12:12 4095 8189 1 100 -1 no no
129
Longest Prefix Match on Fabric Module
N9K# bcm-shell mod 22 "l3 defip show" | grep 13.13.13.8
# VRF Net addr Next Hop Mac INTF MODID PORT PRIO CLASS HIT VLAN
196620 1 13.13.13.8/30 00:00:00:00:00:00 100008 0 0 0 0 n
N9K# bcm-shell mod 22 "l3 egress show" | grep 100008
Entry Mac Vlan INTF PORT MOD MPLS_LABEL ToCpu Drop
100008 88:f0:31:bf:ad:17 4095 4520 10 17 -1 no no
130
ECMP Route Validation
N9K#show ip route 10.164.112.22
10.164.112.22/32, ubest/mbest: 2/0
Multi-Path
*via 13.13.13.14, Eth6/33, [110/5], 01:11:55, ospf-10, intra
*via 13.13.13.18, Eth6/34, [110/5], 01:11:55, ospf-10, intra
N9K#sh routing hash 13.13.13.2 10.164.112.22 mod 6 N9K#bcm-shell mod 6 "l3
multipath show"
Hashing to path *13.13.13.18
Multipath Egress Object 200256
Out Interface: Eth6/34
Interfaces: 100008 100010
N9K#bcm-shell mod 6 "0:l3 l3table show" | grep 10.164.112.22
Entry VRF IP address Mac Address INTF MOD PORT CLASS HIT
17 1 10.164.112.22 00:00:00:00:00:00 200256 0 0 0 n (ECMP)
Follow same steps demonstrated for /32 Host entry to learn about Interface in multipath show cli
131
Use Tools From Toolkit
• ELAM- IF Line Card has North Star
module-6# debug platform internal ns elam asic 1
module-6(NS-elam)# trigger init egress in-select 3 out-select 5
module-6(NS-elam-insel3)# set outer ipv4 dst_ip 13.13.13.10
133
Case:1 All vPC Leg UP
Scenario: Traffic of a Host in Vlan 10 connected to Switch-A hash to N9K1 to reach Host in Vlan 20
connected to Switch-B
N9k1 N9k2 vPC Peer Link =Eth1/1,4/1
Keep Alive
PC1-PeerLink
SVI10
SVI10
10.10.10.1/24 MCT-1/1, 4/1 10.10.10.2/24
SVI-Mac 78da.6e71.9a3f Eth6/20 Eth4/18
SVI-mac 003a.99fc.dd7f
Standby 10.10.10.3 Eth4/18 Eth6/20
Standby 10.10.10.3
HSRP-Mac 0000.0c07.ac0a
HSRP-Mac 0000.0c07.ac0a
SVI20
vPC10 vPC20 SVI20
SVI-mac 78da.6e71.9a3f
SVI-mac 003a.99fc.dd7f
10.10.20.1/24
Switch-A Switch-B 10.10.20.2/24
Standby 10.10.20.3
Standby 10.10.20.3
HSRP-Mac 0000.0c07.ac14
HOST-A Vlan-10 HOST-B Vlan-20 HSRP-Mac 0000.0c07.ac14
10.10.10.x/24 20.20.20.x/24
134
vPC-Router MAC Programming Check
• Both Active and Standby Peer responsible for L3 switching
• Virtual Mac address must be programmed in Hardware on Both peers
Interface Grp Prio P State Active addr Standby addr Group addr
Vlan10 10 100 Active 10.10.10.2 local 10.10.10.3
N9K1# bcm-shell mod 4 "0:d chg my_station_tcam" | grep
VLAN_ID=0xa
VLAN_ID=0xa,VALID=1, MAC_ADDR=0xc07ac0a,
Interface Grp Prio P State Active addr Standby addr Group addr
Vlan10 10 100 Standby 10.10.10.2 local 10.10.10.3
N9K2# bcm-shell mod 4 "0:d chg my_station_tcam" | grep
VLAN_ID=0xa
VLAN_ID=0xa,VALID=1, MAC_ADDR=0xc07ac0a,
135
vPC Peer Gateway Programming Check
• Are N9K’s Configured with Peer-Gateway
N9K1-SJ# show mac address-table vlan 10 | in G
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
G 10 0000.0c07.ac0a static - F F vPC Peer-Link(R)
G 10 003a.99fc.dd7f static - F F sup-eth1(R) N9K2 SVI MAC
G 10 78da.6e71.9a3f static - F F vPC Peer-Link®
136
vPC Check For Traffic Ingressing Peer Link
Egress Block Mask
• vPC Check-Traffic from Peer Link should Not L2/L3 Switch with local and remote
Legs up
N9K1# show vpc brief | grep Po
id Port Status Active vlans N9k1 N9k2
1 Po1 up 10-20 Keep Alive
137
vPC Check for Traffic Ingressing Peer Link (Cont’d)
vPC10 vPC20
N9K1# show system internal vpcm info mask
module 6 Switch-A Switch-B
Masked ports for Module 6, Unit 0:
[Src Port None]: Eth6/20 Traffic Ingressing on Eth1/1 and
[Src Port Eth1/1]: Eth6/20
[Src Port Eth4/1]: Eth6/20 Eth4/1 will not exit Eth 6/20
Masked ports for Module 6, Unit 1:
138
ACL redirect logic for routed packets-vPC Leg Down
• Redirect ACL installed to redirect routed packets for the
vPC for which local interface goes down N9k1 N9k2
Keep Alive
• Mac address learned from vPC points virtual port PC1-PeerLink
MCT-1/1, 4/1
N9K1# show hardware access-list tcam region | grep vpc Eth6/20 Eth4/18
VPC Convergence [vpc-convergence] size = 512 Eth4/18 Eth6/20
139
ACL redirect logic for routed packets-vPC Leg Down
• On N9K1 traffic entering Eth6/20 after L3 switch
N9k1 N9k2
should egress Peer Link Keep Alive
PC1-PeerLink
• N9K2 Should not drop traffic entering Peer link and
forward traffic out to Eth 4/8 MCT-1/1, 4/1
Eth6/20 Eth4/18
Eth4/18 Eth6/20
N9K# bcm-shell module 6 "fp show group 57”
InPorts->L3Routable Ln Down vPC10 vPC20
DstTrunk
Switch-A Switch-B
Offset: 213 Width: 16
DATA=0x00008003 Trunk-id of “3” Down vPC
action={act=RedirectTrunk, param0=1(0x1) Trunk-id of vPC Peerlink
140
ACL redirect logic for routed packets-Verify TrunkID
N9Ka# show system internal ethpm info int port-channel1 | grep dpid
IF_STATIC_INFO: port_name=port-channel1,if_index:0x16000000,ltl=2595,slot=95
dpid=1,unit=0,queue=0,xbar_unitbmp=0x0 ns_pid=0
N9508a-SJ# show system internal ethpm info int port-channel10 | grep dpid
IF_STATIC_INFO: port_name=port-channel10,if_index:0x16000000,ltl=2595,slot=95
dpid=3,unit=0,queue=0,xbar_unitbmp=0x0 ns_pid=0
141
ACL redirect logic for routed packets-Verify TrunkID
NX-OS -7.0(3)I1(2)
N9508a-SJ# show system internal access-list vpc-convergence mod 6
------------------------------------------------------------
VPC Convergence Entries
------------------------------------------------------------
Instance: 0
========== Trunk-id of “3” Down vPC
Ingress:
Trunk-id of vPC Peerlink
----------
Entry-ID DstTrunk-GID RedirectTrunk-GID Packet-Count
------------------------------------------------------------------------
1539 3 1 6082015
142
Nexus9000 Specific
Limitation and Goodies
143
Email from Nexus9000 To Cisco SR
• Commands output directly sent to email address
• Information from Nexus9000 Can be directly attached to Service Request.
• Information is sent as body to email- not as attachment
N9K(config)# email
N9K(config-email)# smtp
N9K(config-email)# smtp-host 173.37.37.37
N9K(config-email)# from N9508a-sj@cisco.com
N9K(config-email)# smtp-port 25
show run | email subject <SR-number> attach@cisco.com
144
Bash Support !!!!
• Goes beyond what standard CLI can provide
• Customers demand more capabilities/freedom Creativity
• Feature: bash-shell
• User Role: dev-ops or network-admin or vdc-admin*
• Strongly recommended: Some experience with shell/Linux-
Use with extreme care
145
Broadcom ASIC shell access on the Nexus 9000 !!!
• The Nexus 9000 is based largely on the Broadcom Trident II ASIC-Known as T2
• The modular unit Fabric Modules (FM) and Line Cards (LC) each contain multiple
instances of the T2 ASIC, as well as the TOR (top of rack) units
• Role based access control (RBAC) can be used to limit user access
146
BCM Access some Examples hg0 hg11 hg0 hg11
T2 T2
Instance 0 Instance 1
147
BCM Access some Examples (Cont’d)
N9K# bcm-shell mod 21 "config show l3"
l3_alpm_enable=2
l3_max_ecmp_mode=1
l3_mem_entries=16384
N9K# bcm-shell mod 4 "config show l2 ”
l2xmsg_hostbuf_size=16384
l2_mem_entries=98304
148
Python !!!!
• Python is - Established, Modern and Powerful, Clean, lots of libraries, liberal
license
• Perl is available in gdb images only – not available in final images
• Tcl is there but no one uses it in NX-OS
• The license that Python has (GPL-Like with very few restrictions on modification,
distribution and commercial use) make it very attractive to embed and distribute
149
Python-Continued
• There are two Python environments on the N9000
• One executed from VSH
• One executed from Bash
150
Python-Example
N9K# python
switching between VSH and Python
Python 2.7.5 (default, Oct 8 2013, 23:59:43)
[GCC 4.6.3] on linux2
Type "help", "copyright", "credits" or
"license" for more information.
>>> switch between VSH and the
N9K# run bash python Interpreter (Bash 1)
Python 2.7.5 (default, Oct 8 2013, 23:59:43)
[GCC 4.6.3] on linux2
Type "help", "copyright", "credits" or
"license" for more information.
>>>
151
Python Script Example
152
Why Patching?
Many customers spend extensive time and effort to test and qualify software prior to deployment. In today’s
environments, if a defect is found, effectively root-caused, and integrated, since it is rolled out through a
maintenance release, customers would need to restart their qualification cycle, wasting time, and pushing out
deployment dates…
6 Months
153
10 Months
NX-OS Image Patching
The Nexus9000 Standalone platforms introduces new patching capabilities that allows specific defects to be
rolled out in an independent package that can be applied to existing base software binaries. This will help
reduce customer code certification times, leading to greater customer satisfaction.
6 Months
7 Months
154
Patching Overview
• NXOS platforms release major versions when introducing new features and engineering
special builds to provide bug fixes.
• The new goal will be to allow customers to deploy patches for specific fixes only without
affecting the data plane of the device.
• The patching architecture comes from IOS XR (SMU – Software Maintenance Upgrade)
used to deliver Quick, Effective and Focused patches for specific sections of code.
• Both binaries and libraries can be patched.
• Supervisors and Line Card services can be patched.
• Software patching will leverage process restart/reload or ISSU
155
Patch Uninstall Workflow - Detailed
• User invokes “install deactivate <patch_name>”
• System manager gracefully shuts down each impacted process
• Softlinks are changed from active SMU to one in backup folder (if present).
• Relevant SMU is removed from the /var/installer/activated/SMU directory.
• System Manager triggers restart of impacted processes
• (Optional) “install remove” deletes the patch from the local repository
156
CLI Commands – Patch Install
Command Syntax Function Notes
Install add install add <uri> [activate] Download patch from URI and add Only one patch can be added at
patch to repository. a time. Optionally can activate
patch in this step.
Install remove install remove [<package> | User can remove only non- Confirmation y/n will be prompted
inactive] activated patches
Install activate install activate <package> [test] Installs a patch from the local Only one patch can be activated
repository. If not present, an error at a time. No show commands
will be returned. permitted during operation.
Install deactivate install deactivate <package> Uninstall patch and move it to non- Only one patch can be
activated repository deactivated at a time. **Patches
must have no other patch
dependencies
Install commit install commit Preserves all activated patches Activated patches are committed
across reloads. to a list kept in the patch
repository
157
CLI Commands – Show Commands
Command Function Sample
show install request Shows current install operation along Fri May 10 09:06:55.921 UTC
Install operation 13 '(admin) ‘install activate n9000-dk.6.0.2.U1.1.CSCuf08219.bin’
with time stamp, package name, Started by user 'cisco' via CLI at 09:06:48 UTC Fri May 10 2013
The operation is 10% complete
initiating user and % complete.
show install log [id | detail Shows user information on previous Install operation 1 by user ‘admin’ at Tue Sep 28 01:37:02 2004:
install commit
| from | last | reverse] installation operations. Optional [detail] Operation completed successfully
command for verbose information. Install operation 2 by user ‘admin’ at Mon Oct 18 17:26:36 2004:
install add tftp://10.52.241.252/bcarter/n3000-uk9.6.0.2.U1.1.CSCuf08219.bin
Operation completed successfully
Install operation 7 by user ‘lab’ at Mon Oct 18 17:31:13 2004:
install activate n3000-uk9.6.0.2.U1.1.CSCuf08219’
Operation failed because service failed to come up.
show install active [on- Displays boot images and active or switch# show install active
Boot Images:
reload] committed patches Kickstart Image: bootflash:/n9000-dk.6.1.234.gbin
System Image: package:/isanboot/bin/images/sys
Active Packages:
n9000-dk.6.1.1.CSCui56298.bin
158
CLI Commands – Show Commands (Cont’d)
Command Function Sample
show install inactive [on- Shows patches in the repository not switch# show install inactive
Boot Images:
reload] yet activated Image: bootflash:/inseor.6.1.1.234.gbin
System Image: package:/isanboot/bin/images/sys
Inactive Packages:
switch#
show install pkg-info Shows details of a specific patch. switch# show install pkg-info n9000-dk.6.1.1.CSCui56298.bin
<package> Requires that patch has been added Contents of Package file 'n9000-dk.6.1.1.CSCui56298.bin':
using ‘install add’ first. Expiry date : Jan 19, 2015 02:55:56 UTC
Uncompressed size : 17892613
Vendor : Cisco Systems
Desc : Bug Fix for CDET: CSCui56298
Build : Built on Wed May 10 08:04:58 UTC 2013
Source : By n9k-infra-bld
Platform: Nexus-9000.
Supersedes: n9000-uk9.6.1.1.U1.1.CSCuf09119, n9000-uk9.6.1.1.U1.1.CSCuf02229
Pre-requisite: n9000-uk9.6.1.1.U1.1.CSCuf09219
Restart information: BGP process restart.
159
Sample Patch Install – Copy Patch to Switch
N9K# copy
scp://sdn@172.18.217.42/home/sdn/n9k/inseor_CSCuxP1fix.6.1.2.I1.2.CSCab00001.gbin
bootflash:
Enter vrf (If no input, current vrf 'default' is considered): management
sdn@172.18.217.42's password:
inseor_CSCuxP1fix.6.1.2.I1.2.CSCab00001.gbin 100% 233KB
232.7KB/s 00:01
Copy complete, now saving to disk (please wait)...
N9508#
160
Sample Patch Install – Add patch to repository & verify
N9K# install add bootflash:inseor_CSCuxP1fix.6.1.2.I1.2.CSCab00001.gbin
Install operation 19 completed successfully at Wed Jan 15 10:55:14 2014
N9508#
Inactive Packages:
inseor_CSCuxP1fix.6.1.2.I1.2.CSCab00001.gbin
N9K#
161
Important Limitations
• For every Feature please review Guidelines and Limitations
• Cisco Nexus 9000 Series NX-OS Verified Scalability Guide
• http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-
x/scalability/guide_703I21/b_Cisco_Nexus_9000_Series_NX-OS_Verified_Scalability_Guide_703I21.html
• User Configured MAC address for SVI- Packets will not be flooded if Layer 2 Adjacency is missing
• ASIC Memory-NS test is applicable only for the N9K-X9564PX and N9K-X9564TX line cards.
• Priority flow control (PFC) is supported on Cisco Nexus 9500 Series switches with the N9K-X9636PQ line card.
• Cisco Nexus 9500 Series Switch can run in 8-queue mode only if all of its line cards are capable of running 8-queue
mode.
162
Recap
• Introduction
• Architecture
• System Health check Telemetry
• Troubleshooting Toolkit
• Nexus 9000 Troubleshooting
• Common Link Layer Issues-L1
• Fabric Connectivity and
• In band
• L2/L3 Packet Forwarding
• vPC
• Nexus9000 Specific Limitation and Goodies
163
Core Message
• Technical
Services Helps to solve
complex networking issues
164
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Table Topics
• Meet the Engineer 1:1 meetings
• Related sessions
165
Complete Your Online Session Evaluation
• Please complete your online session
evaluations after each session.
Complete 4 session evaluations
& the Overall Conference Evaluation
(available from Thursday)
to receive your Cisco Live T-shirt.
167
Backup Slides
169
Fabric Module
NFE
NFE NFE
170
Nexus 9500 Platform FRU- Line Card
Connect to Fabric Modules
12 x 42 Gbps
12 x 42
Gbps
1 x 42 1 x 42 NFE 1
Gbps Gbps
18x 40
Gbps
Ethernet
Network
Interfaces
NFE NFE NFE
18x 40Gbps
12 x 40 Gbps 12 x 40 Gbps 12 x 40 Gbps
Connect to Hosts or
Network
171
N9K-X9636PQ
T2 T2 T2
Instance 0 Instance 1 Instance 2
172
N9K-X9464PX
MUX1-2 MUX3-4
HG Ports HG Ports
T2
173
N9K-X9464TX
MUX1-2 MUX3-4
HG Ports HG Ports
T2
174
N9K-X9432PQ
HG Ports HG Ports
T2 T2
Instance 0 Instance 2
175
N9K-X9564PQ
FM6 FM5 FM4 FM3 FM2 FM1
40G QSFP
176
N9K-X9564TX
FM6 FM5 FM4 FM3 FM2 FM1
T2 T2
40G QSFP
100/1000/10000 T Ports
10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G
PHY PHY PHY PHY PHY PHY PHY PHY PHY PHY PHY PHY
FP FP FP FP
49 50 51 52
FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP FP
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
177
Multicast L3 Forwarding
• Before hardware can forward any Multicast packets,
forwarding information has to propagate from Sup to the LC Supervisor
• Several layers are to be verified: PIM IGMP MSDP
MRIB (control-plane is created here)
MRIB
MFDM PI /PD (platform independent & forwarding MF DM
information)
IP FIB
• MFIB-IPFIB
• IP FIB process programs hardware:
FIB Table contains (*,G) and (S,G) forwarding entries and RPF T2 Line Card
information
GROUP table contains forwarding and pointers replication FIB Table MC VLAN Table
information (pointers to MC VLAN) IPMC_GR
MC VLAN tables contain replication information (~OIF lists)
Hardware (packets are forwarded here) & SDK
178
L2/L3 Multicast Packet Walk Lookup to resolve egr.
modules;
Sends one copy to each
Fabric Module egr. module;
Trident II
Lkup in Host Table
& L2 Table
179
Multicast L3 Forwarding-MRIB
180
Multicast L3 Forwarding-mFDM PI-Supervisor
N9K# show forwarding distribution ip multicast route group 239.10.10.10 source
13.13.13.14 | in 13|Index
(13.13.13.14/32, 239.10.10.10/32), RPF Interface: Ethernet6/1, flags:
Outgoing Interface List Index: 1
181
Multicast L3 Forwarding IPFIB-Line card
N9K# show forwarding ip multicast route group 239.10.10.10 source
13.13.13.14 mod 6 | inc 239|Eth
(13.13.13.14/32, 239.10.10.10/32), RPF Interface: Ethernet6/1, flags:
Outgoing Interface List Index: 1 T2 Line Card
Outgoing Interface List Index: 0x1 FIB Table MC VLAN Table
IPMC_GR
Ethernet6/52
Mod 6 is N9K-X9564TX
To reach Ethernet 6/52 which is on NS from front port of T2,Packets
need to cross Fabric module
182
Multicast L3 Forwarding Entries on LC –BCM Shell
N9K# bcm-shell mod 6 "ipmc table show"
SRC IP ADDRESS MC IP ADDRESS MC GROUP VID VRF COS HWIDX CLASS HIT
13.13.13.14 239.10.10.10 0x2000007 0 1 0 75680 1 no
0.0.0.0 239.10.10.10 0x2000007 0 1 0 86578 2 no
N9K#bcm-shell module 6 "mc show group=0x2000007" T2 Line Card
FIB Table MC VLAN
Group 0x2000007 (L3)
Table IPMC_GR
port hg0, encap id -1
-------snip------------
port hg11, encap id -1 Traffic spared to Hig towards Fabric
183
Multicast L3 Forwarding Entries on LC –BCM Shell
N9K# bcm-shell mod 6 " search l3_entry_ipv4_multicast group_ip_addr=0xef0a0a0a
source_ip_addr=0x0d0d0d0e”
L3_ENTRY_IPV4_MULTICAST.ipipe0[75680]:
SOURCE_IP_ADDR=0xd0d0d0e, T2 Line Card
GROUP_IP_ADDR=0xef0a0a0a, FIB Table MC VLAN Table
IPMC_GR
L3MC_INDEX=7
N9K# bcm-shell mod 6 " dum chg l3_entry_ipv4_multicast 75680”
show tech-support multicast`
IPV4MC:EXPECTED_L3_IIF=0x112e,
show tech-support forwarding multicast
N9K# show system internal eltm info interface ethernet 6/1 | in LIF
cr_flags = INTF LIF , LIF = 4398 (0x112e), LTL = 40959 (0x9fff) (S 0x0, P 0x0)
184
IGM Snooping
Forwarding programming in vPC Scenario
• IGMP Process Provides both Layer 3 IGMP Processing , and Layer 2 IGMP snooping functionality
• Receivers use IGMP (Internet Group Management Protocol) to report their multicast group
Membership to router
• Layer 2 IGMP Snooping functions of IGMP process include processing snooped multicast router
Packets Including IGMP reports and leaves sent by receiver
• Once the group membership is learned , the Supervisor Engine informs I/O modules , which
program Hardware
• This will Constrain data-plane multicast packets to only those ports with multicast routeror interested
receivers in HW
185
IGMP Snooping continued…
• BCM on FM are in Mode 4. This will have L2 Table size of 32K & L3 Host Table 16K
• L3 Host table will be used to program (*,G) /(S,G) entry. This will will accommodate
maximum of 8K entry.
• MFDM sends two OIF List information to MFIB. One for LC (S,G) OIF List and other for
FM ( Mac, Group) OIF List in PIM disable Vlan.
• MFIB will use (S,G) OIF list to program LC and Mac Group to Program FM in 32K L2 Table.
• If PIM is enable FM can accommodate 8K(VRF, S,G) and will program Hardware.
• Address aliasing is possible because on FM we use L2 table to program Mac Group information
186
IGMP Snooping (Cont’d)
• With vPC IGMP will have knowledge of multi chassis Ether Channel trunk (MCT) interface.
• When one of the vPC peer receives IGMP join , it will sync up this with peer over MCT link
using cFS-Cisco Fabric Services over Ethernet .
• For Source in Layer 3 Cloud , Unicast best metric determines active forwarder
• VPC Operational Primary in case of tie. CFS used to negotiate active Forwarder role
187
Configuration-IGMP Snooping enable by default
Nexus9508-13# sh ip igm snooping vlan 103
IGMP Snooping information for vlan 103
IGMP snooping enabled
Lookup mode: IP
Optimised Multicast Flood (OMF) enabled
IGMP querier present, address: 10.10.103.5, version: 2, i/f Po30
Nexus9508-13# sh ip igm snooping vlan 100
IGMP Snooping information for vlan 100
IGMP snooping enabled
Lookup mode: IP
Optimised Multicast Flood (OMF) enabled
IGMP querier present, address: 192.168.100.2, version: 2, i/f Vlan100
Querier interval: 125 secs
Querier last member query interval: 1 secs
188
Reference Topology for Troubleshooting
vPC Keep Alive
vPC30 vPC 35
Eth1/48
Eth 1/48
189
IGMP Snooping Troubleshooting
• Stream will enter one of the VPC-Peer , Which will get forwarded across Peer link to other VPC Peer
• Both boxes will have (S ,G)
• Upon Creation of (S,G) , VPC Peers negotiate best metric
• Both realize source is VPC-Connected
• Install Entry as Win-Force
• If either peer gets a PIM/IGMP Join for the given source , they both add Interface to OIF
Nexus9508-12(config)# sh ip pim internal vpc rpf-source Nexus9508-13# sh ip pim internal vpc rpf-source
PIM vPC RPF-Source Cache for Context "default" - Chassis PIM vPC RPF-Source Cache for Context "default" - Chassis
Role Primary Role Secondary
Source: 192.168.100.10 Source: 192.168.100.10
Pref/Metric: 0/0 Pref/Metric: 0/0
Source role: primary Source role: secondary
Forwarding state: Win-force (forwarding) Forwarding state: Win-force (forwarding)
MRIB Forwarding state: forwarding MRIB Forwarding state: forwarding
190
vPC Peer receiving Join
• IGMP Join from one of the receiver enter one of the VPC Pee.
• This Peer encapsulates IGMP in CFS , sends to other Peer
• Both Peer have identical State
• Both Peer install OIF
• Data traffic flows down to Receiver, also forwarded to other Peer on Peer Link
• Other Peer drop the packet either by PORT BLOCK MASK blocking or no OIF
Nexus9508-ESC-12# sh ip mroute 239.10.10.10 192.168.100.10 Nexus9508-ESC-13# sh ip mroute 239.10.10.10 192.168.100.10
IP Multicast Routing Table for VRF "default" IP Multicast Routing Table for VRF "default"
(192.168.100.10/32, 239.10.10.10/32), uptime: 01:00:09, ip pim (192.168.100.10/32, 239.10.10.10/32), uptime: 04:25:36, ip pim
mrib mrib
Incoming interface: Vlan100, RPF nbr: 192.168.100.10, uptime: Incoming interface: Vlan100, RPF nbr: 192.168.100.10, uptime:
01:00:09, internal 04:25:36
Outgoing interface list: (count: 1) Outgoing interface list: (count: 1)
Vlan101, uptime: 00:59:40, mrib Vlan101, uptime: 02:04:41, mrib
Nexus9508-ESC-12# Nexus9508-ESC-13#
191
Step to verify PI On Supervisor. Verify on Both Peers
Nexus9508-ESC-12# sh ip igmp groups 239.10.10.10
IGMP Connected Group Membership for VRF "default" - matching Group "239.10.10.10"
Type: S - Static, D - Dynamic, L - Local, T - SSM Translated
Group Address Type Interface Uptime Expires Last Reporter
239.10.10.10 D Vlan101 00:01:23 00:02:56 192.168.101.13
Nexus9508-ESC-12#
Nexus9508-ESC-13# sh ip igmp groups 239.10.10.10
IGMP Connected Group Membership for VRF "default" - matching Group "239.10.10.1
0"
Type: S - Static, D - Dynamic, L - Local, T - SSM Translated
Group Address Type Interface Uptime Expires Last Reporter
239.10.10.10 D Vlan101 00:01:18 00:03:01 192.168.101.13
Nexus9508-ESC-13#
192
CFS Provide info
Nexus9508-ESC-12# sh ip igmp snooping groups vlan 101 detail
IGMP Snooping group membership for vlan 101
Group addr: 239.10.10.10
Nexus9508-ESC-13# sh ip igm snooping groups vlan
Group ver: v2 [old-host-timer: not running] 101 det
Last reporter: 192.168.101.10 IGMP Snooping group membership for vlan 101
IGMPv2 member ports: Group addr: 239.10.10.10
IGMPv1/v2 memb ports: Group ver: v2 [old-host-timer: not running]
Po35 [1 GQ missed], cfs:false, native:true Last reporter: 192.168.101.10
vPC grp peer-link flag: exclude IGMPv2 member ports:
M2RIB vPC grp peer-link flag: exclude IGMPv1/v2 memb ports:
Nexus9508-ESC-12# Po35 [0 GQ missed], cfs:true, native:false
vPC grp peer-link flag: exclude
M2RIB vPC grp peer-link flag: exclude
Nexus9508-ESC-13#
193
Verifying Multicast forwarding Distribution Module
Platform Independent On Supervisor
Nexus9508-ESC-12# sh forwarding distribution multicast route group 239.10.10.10
source 192.168.100.10
194
Verifying Multicast forwarding Distribution Module
Platform Independent On Supervisor-(Cont’d)
Nexus9508-12# sh forwarding multicast route group 239.10.10.10 source 192.168.100.10 mod 1
(192.168.100.10/32, 239.10.10.10/32), RPF Interface: Vlan100, flags:
Received Packets: 1111 Bytes: 72215
Outgoing Interface List Index: 9
Number of next hops: 2
Outgoing Interface List Index: 9
Vlan: 101
port-channel35
bridged Vlan
port-channel10
Hardware Outgoing Interface List Index: 33554443
195
Verifying Multicast forwarding Distribution Module
Platform Independent On Supervisor-IGMP-Snooping
Nexus9508-12# sh forwarding distribution ip igmp snooping vlan 101 group 239.10.10.10 det
Vlan: 101, Group: 239.10.10.10, Source: 0.0.0.0
Outgoing Interface List Index: 4
Reference Count: 1 Nexus9508-13# sh forwarding distribution ip igmp snooping vlan 101 group
Platform Index: 0xa00004 239.10.10.10 det
Vpc peer link exclude flag set Vlan: 101, Group: 239.10.10.10, Source: 0.0.0.0
Number of Outgoing Interfaces: 2 Outgoing Interface List Index: 5
port-channel10 Reference Count: 1
port-channel35 Platform Index: 0xa00005
Vpc peer link exclude flag set
Number of Outgoing Interfaces: 2
port-channel10
port-channel35
196
Verifying Multicast Forwarding Distribution Module
Platform Independent On Supervisor-Snooping Group.
Nexus9508-12# sh forwarding distribution l2 multicast mac-based vlan
101
Vlan: 101, Group: 0100.5e0a.0a0a, Source: 0000.0000.0000
Outgoing Interface List Index: 3
Reference Count: 1
Platform Index: 0xa00003 Nexus9508-13# sh forwarding distribution l2 multicast mac-based vlan 101
Vpc peer link exclude flag set Vlan: 101, Group: 0100.5e0a.0a0a, Source: 0000.0000.0000
Number of Outgoing Interfaces: 2 Outgoing Interface List Index: 8
port-channel10 Reference Count: 1
port-channel35 Platform Index: 0xa00008
Vpc peer link exclude flag set
Number of Outgoing Interfaces: 2
port-channel10
port-channel35
197
IPFIB on LC for IGMP Snooping programming.
Nexus9508--12# sh forwarding multicast route group 239.10.10.10 source 192.168.100.10 mod 1
198
Verifying Hardware Programming
Nexus9508--12# bcm-shell mod 1 "mc show group=33554441" If we see encap id a positive #
Executing mc show group=33554441 on bcm shell on module 1 then it is LIF
Group 0x2000009 (L3)
port hg0, encap id 400005 If we see encap id = -1 then it is
port hg1, encap id 400005 L2 bridge copy.
port xe10, encap id 21
port xe11, encap id 21
Nexus9508-12# bcm-shell mod 3 "mc show group=33554441"
Executing mc show group=33554441 on bcm shell on module 3
Group 0x2000009 (L3)
port hg0, encap id 400005 Nexus9508-12# sh system internal eltm info interface vlan 101 | in LIF
port xe0, encap id -1 cr_flags = INTF VLAN , LIF = 21 (0x15), LTL = -1 (0xffffffff) (S 0x0, P 0x0)
199
From BCM to check what is HW index for given Group
• Static entry of Mcast group
• Hit Bit indicate flow is present
• Mcast Index is where the traffic need to bridge
Nexus9508-12# bcm-shell module 1 "l2 show" | in MCast
mac=01:00:5e:0a:0a:0a vlan=101 GPORT=0x0 modid=0 port=0 Static Hit MCast=33554435
mac=01:00:5e:0a:0a:14 vlan=100 GPORT=0x0 modid=0 port=0 Static MCast=33554435
Nexus9508-12# sh ip igmp gr vlan 100
200
Expert Suggestions on Creating Slides
• Make sure every slide is assigned to a layout from the new template.
• Reset slides to the correct layout using Home/Layout (both PC and Mac).
• Reset a slide back to the correct formatting use:
• Home/Reset (PC)
• Home/Layout/Reset Layout to Default Settings (Mac)
• Resetting a slide to the proper layout can resolve issues like disappearing
titles or misplaced bullets.
• If page numbers are not formatting correctly after the slides have been moved to
the new template and connected to the correct layout, then turn the slide
numbers off and then back on.
• Home/Replace (PC) Format/Replace Fonts (Mac) allows you to replace
fonts globally.
201
Thank you
202