BRKDCT-3313 Fabricpath
BRKDCT-3313 Fabricpath
BRKDCT-3313 Fabricpath
Troubleshooting
Reference Slide
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
• FabricPath Overview
Benefits, Restrictions, and Configuration
• Key Concepts
Encapsulation, Trees, Topologies, STP
• Data Plane
Forwarding, Load-Balancing, MAC Learning
• vPC+
Challenges and Operation
• Troubleshooting
Verification steps, tools, and examples
FabricPath Benefits
Single path between 2 points in L2 network
Existing • Stability/Resilience at scale
• Disruptive convergence
Layer2
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Fabricpath Overview
Unicast: Known Destination MAC
Ingress SSID comes DSID comes from Intermediate TTL Egress
FabricPath from S10’s MAC address switches forward decremented at FabricPath
(Edge) Switch own switchID table for MAC B based on DSID every FP switch (Edge) Switch
DSID 20
SSID 10 DMAC B
DMAC B SMAC A
SMAC A Payload
DMAC B
Payload
SMAC A
Payload
MAC A MAC B
CE FabricPath CE
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
FabricPath Overview
Multidestination (broadcast, multicast, unicast flood)
Ingress FP SSID comes MAC B is
Root switch Root switch
Switch selects from S10’s unknown DSID
for Tree 1 for Tree 2
Tree (FTAG) own switchID = FloodSID → FabricPath interface
DMAC B → CE interface
DMAC B SSID
SSID FTAG 1 → Tree 1
FTAG 1 DMAC B
DMAC B SMAC A DMAC B → Tree 2
SMAC A Payload SMAC A
DMAC B
Payload Payload
SMAC A
Payload
MAC A MAC B
CE FabricPath CE
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
FabricPath support & configuration
• N7K with N7K-F1 linecard as of 5.1.1
N7K(config)# install feature-set fabricpath
• N7K with N7K-F2 linecard as of 6.0.1
N7K(config)# feature-set fabricpath
• N7K + FEX as of 6.1.1 (with N7K-F2) for CE N7K(config)# interface Ethernet4/1
ports N7K(config-if)# switchport mode fabricpath
• F2E as of 6.1.2 ...
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
FabricPath & CE Vlans
FabricPath
• Two types of vlans
CE (Classic Ethernet, default) Classic Ethernet
FabricPath (FP)
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Agenda
• FabricPath Overview
Benefits, Restrictions, and Configuration
• Key Concepts
Encapsulation, Trees, Topologies, STP
• Data Plane
Forwarding, Load-Balancing, MAC Learning
• vPC+
Challenges and Operation
• Troubleshooting
Verification steps, tools, and examples
Outer Outer FP
CRC
Encapsulation DA
(48)
SA
(48)
Tag
(32)
DMAC SMAC 802.1Q Etype Payload
(new)
47 0
Endnode Endnode R O SubSwitch
U/L I/G S O Switch ID
ID ID
V O ID Local ID
[ 5:0] [ 7:6] D
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
FabricPath Switch IDs, System IDs … and DRAP
• Each FP switch is identified by unique number (ID), dynamically assigned or static
• Dynamic Resource Allocation Protocol (DRAP) is responsible for allocating switch IDs and resolving
duplicate-ID conflicts. Conflicts are resolved by renumbering switches with higher systemID
(DRAP can only auto resolve non-static switch ID)
N7K# show fabricpath switch-id 1 23
FABRICPATH SWITCH-ID TABLE
=========================================================================
SWITCH-ID SYSTEM-ID FLAGS STATE STATIC EMULATED
+
----------+----------------+------------+-----------+--------------------
*3
30
c062.6bac.e343
547f.ee02.ce3c
Primary
Primary
Confirmed
Confirmed
Yes
Yes
No
No 3 4 5
40 547f.ee04.5cfc Primary Confirmed Yes No
• When partitioned FP network is merged (or new switch joins the fabric) connecting interface is not =
enabled for data before all conflicts are resolved
N7K# show fabricpath conflict all
1 23
Port State
N7K(config-if-range)# no shut ---------------+------------------------
Ethernet3/31 Suspended due to conflicts
6 4 5
%FABRICPATH-2-
FABRICPATH_LINK_BRINGUP_STALLED_STATIC: Link ==============================================
bringup stalled due to conflicts Fabricpath Conflicts
SYSTEM-ID SWITCH-ID STATIC
---------------+--------------+---------------
c062.6bac.e343 3 Yes
c062.6bac.e342 3 Yes
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Network Merges / Conflict resolution
• Goal is to connect two networks with conflicting switch IDs
without incurring packet loss N7k# show fabricpath switch-id
1) Allocate new switch-id as secondary – tentative Legend: '*' - this system
• Wait allocate delay time SWITCH-ID SYSTEM-ID FLAGS STATE STATIC EMULATED
2) Make new switch-id as secondary - confirmed ----------+----------------+------------+-----------+--------------------
• Wait transition delay time *332 b414.89e3.a042 Primary Confirmed Yes No
3) Swap primary and secondary switch-ids
N7k# show fabricpath isis switch-id
• Wait transition delay time
Legend: C - Confirmed, T - tentative, W - swap
4) Delete old switch-id (now a secondary switch-id) S - sticky, E - Emulated Switch
'*' - this system
More About Graceful Merge System-ID Primary Secondary Reachable Bcast-Priority
MT-0
b414.89e3.a042* 332 [C] 0[C] Yes 222 [S]
Graceful merge changes the switch-id of a switch to
resolve switch-id collisions N7k# show fabricpath timers
Allocate Delay Timer : 10
The switch-id to change is based on the system-id Transition Delay Timer : 10
being higher value, or being dynamic Link-up Delay Timer : 10
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
FabricPath Trees → FabricPath interface
• Known unicast traffic is load-balanced across equal-cost → Tree 1
routes → Tree 2
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Root Election / Tree construction
S101# show fabricpath isis database detail
• Every switch advertises its system ID Fabricpath IS-IS domain: default LSP database
LSPID Seq Number Checksum Lifetime A/P/O/T
& Priority S1.00-00 0x000000E2 0x0FBB 1054 0/0/0/1
• Once all nodes have spoken Instance : 0x000000DD
Area Address : 00
Broadcast Root is elected (Highest NLPID : 0xC0
priority then Highest Mac address Hostname : S1 Length : 2
Extended IS : S202.00 Metric : 40
wins) Extended IS : S101.00 Metric : 40
• Broadcast root system will Elect & Extended IS : S102.00 Metric : 40
Extended IS : S2.00 Metric : 40
Advertise Roots for additional Extended IS : S201.00 Metric : 40
multicast Trees (currently only 2 trees) Capability : Device Id: 1 Base Topology
Base Topo Ftag :
• Each node will independently run SPF Graph 1: Root: S1 Primary: 1, Secondary: 0 Nickname 1
with Tree Root and create 2 Trees Graph 2: Root: S2 Primary: 2, Secondary: 0 Nickname 2
Base Topo Trees :
• Since Multicast roots are advertised Trees desired: 2 Trees computed: 2 Trees usable: 2
by Broadcast Root system (Tree 1), in Base Topo Roots :
case of failure of the latter both Tree 1 Graph 1: Root Nickname: 1
Graph 2: Root Nickname: 2
and Tree 2 will re-converge Version :
Version: 1 Flags: 0
Nickname :
Priority: 0 Nickname: 1 BcastPriority: 255
Nickname Migration :
Swid: 1 Sec. Swid: 0
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Outer Outer FP
CRC
Encapsulation DA
(48)
SA
(48)
Tag
(32)
DMAC SMAC 802.1Q Etype Payload
(new)
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
root
1 2 Accept packets from 1,4
• RPF: check where the source switch of the packet is Accept packets from 4,1,2
and only accept packets from the interface we would
have used if we were to send packet to that source
4 3
• At each FP hop RPF check is performed for multidestination traffic against
source switchID + FTAG May also use
N7K# show l2 multicast trees show fabricpath isis trees
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Topologies + Vlans
• Flood/Multicast/Broadcast trees are per-vlan, made by pruning Topology Tree
• If vlan is not present on the switch, that switch will not be part of per-vlan tree
• This may lead to connectivity issues when not all transit switches in topology have all vlans
• similar to connectivity issues caused by liberal pruning vlans off trunks with MST
VL10
VL10
VL20
VL20
VL30
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Topologies Default Topology allowed
• Routing table & Trees (FTAGs) are per topology on all FP links
FabricPath IS-IS
•FabricPath IS-IS routing protocol process that forms the core of the FabricPath
control plane U2RIB L2FM
Hardware Drivers
•U2RIB Unicast Layer 2 RIB, containing the “best” unicast Layer 2 routing
information
Switch Table Other HW MAC Table
•L2FM Layer 2 forwarding manager, controls MAC address table I/O Module
on the Linecards:
•U2FIB – Unicast Layer 2 FIB, managing the hardware unicast routing table
•MTM – MAC Table Manager, managing the hardware MAC address table
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Fabric Path Control Plane initialization flow
S101# show processes cpu | egrep "2rib|drap|fab|l2fm|PID"
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process Processes start
9169 750 16723 0 0.00% 0.00% 0.00% - l2fm (isis, u2rib, m2rib, drap)
9215 1050 7843 0 0.00% 0.00% 0.00% - m2rib
9555 1050 36161 0 0.00% 0.00% 0.00% - u2rib System ID obtained
9556 14740 163944 0 0.00% 0.00% 0.00% - isis_fabricpath from backplane MAC
9557 820 31339 0 0.00% 0.00% 0.00% - drap
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Fabric Path Control Plane initialization flow
S101# show fabricpath isis interface
Fabricpath IS-IS domain: default
Interface: port-channel1 Processes start
Status: protocol-up/link-up/admin-up (isis, u2rib, m2rib, drap)
…
LSP interval: 33 ms, MTU: 1500 System ID obtained
P2P Adjs: 1, AdjsUp: 1, Priority 64 from backplane MAC
Hello Interval: 10, Multi: 3, Next IIH: 00:00:03
Level Adjs AdjsUp Metric CSNP Next CSNP Last LSP ID
1 1 1 40 60 Inactive ffff.ffff.ffff.ff-ff Switch ID is obtained from DRAP
Topologies enabled:
Level Topology Metric MetricConfig Forwarding
0 0 4000 no UP As FP interfaces links come up,
1 0 40 no UP ------------------------------------------- hellos sent and adjacencies formed
---------------------------------
S101# show fabricpath isis adjacency Switch ID conflicts (if any) resolved
Fabricpath IS-IS domain: default Fabricpath IS-IS adjacency database:
System ID SNPA Level State Hold Time Interface
S102 N/A 1 UP 00:00:25 port-channel1 FP Interfaces allowed to forward
S1 N/A 1 UP 00:00:28 Ethernet6/27 data
S2 N/A 1 UP 00:00:27 Ethernet6/28
----------------------------------------------------------------------------
S101# show fabricpath isis spf-log Unicast SPF is calculated
Fabricpath IS-IS domain: default SPF information
SPF log for Topology 0
Total number of SPF calculations: 55 Routes installed to U2RIB
Log entry (current/max): 20/20
Ago Level Reason Count Total
1d09h 1 New LSP S201.00-00 3 0.001141
1d09h 1 Updated LSP S2.00-00 2 0.000965
… BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Fabric Path Control Plane initialization flow
S101# show fabricpath isis route
Processes start
Fabricpath IS-IS domain: default MT-0 (isis, u2rib, m2rib, drap)
Topology 0, Tree 0, Swid routing table
1, L1
via Ethernet6/27, metric 40 System ID obtained
2, L1 from backplane MAC
via Ethernet6/28, metric 40
200, L1 Switch ID is obtained from DRAP
via Ethernet6/27, metric 80
via Ethernet6/28, metric 80 How to read
... To reach switch 200 in topology 1 As FP interfaces links come up,
send packets to either Eth6/27 or hellos sent and adjacencies formed
----------------------------------------------------------------------------
Eth6/28
S101# show fabricpath route
FabricPath Unicast Route Table Switch ID conflicts (if any) resolved
'a/b/c' denotes ftag/switch-id/subswitch-id
'[x/y]' denotes [admin distance/metric] FP Interfaces allowed to forward
ftag 0 is local ftag data
FabricPath Unicast Route Table for Topology-Default
...
1/102/0, number of next-hops: 1 Unicast SPF is calculated
via Po1, [115/40], 1 day/s 10:01:12, isis_fabricpath-default
1/200/0, number of next-hops: 2
via Eth6/27, [115/80], 1 day/s 10:02:32, isis_fabricpath-default Routes installed to U2RIB
via Eth6/28, [115/80], 0 day/s 10:20:17, isis_fabricpath-default
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
FabricPath IP Multicast
• Control plane:
• IGMP snooping operates as usual in FabricPath edge switches
• FabricPath IS-IS learns multicast group membership from IGMP snooping on edge
switch
• FabricPath edge switch announces group interest by using GM-LSPs, creating “pruned
trees” for each group on each multidestination tree
• Data plane:
• Hardware selects which multidestination tree to use for each flow based on hash
function
• Once tree is selected, traffic constrained to pruned tree (FTAG) for that IP multicast
group, based on MAC table lookup
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Key FabricPath Multicast Processes
on the Supervisor Engine: DRAP
Supervisor
Engine
• FabricPath IS-IS routing protocol that forms the core of the FabricPath
control plane FabricPath IS-IS IGMP
• DRAP Dynamic Resource Allocation Protocol, extension to FabricPath IS- M2RIB L2FM
IS that ensures network-wide unique and consistent Switch IDs and
FTAGs MFDM
• IGMP Provides IGMP snooping support for building multicast forwarding
database
• M2RIB Multicast Layer 2 RIB, contains the multicast Layer 2 routing M2FIB MTM
information
Hardware Drivers
• L2FM Layer 2 forwarding manager, controls the MAC address table
• MFDM Multicast forwarding distribution manager, connects platform- Switch Table Other HW MAC Table
independent control-plane processes and platform-specific processes on I/O Module
I/O modules
on the Linecards:
• M2FIB – Multicast Layer 2 FIB, manages the hardware multicast routing
table
• MTM – MAC table manager, manages the hardware MAC address table
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
S1 S2
FabricPath Multicast Control Plane
• IGMP/IGMP snooping tracks connected hosts/routers interest in S10 S30
receiving multicast
• ISIS distributes information from igmp snooping to other FP nodes S20
Receiver Receiver
using GM-LSPs. Intermediate nodes flood GM-LSPs 239.1.2.3 239.1.2.3
• A pruned subtree is created for each group (+flood, OMF) per vlan per FTAG Source
239.1.2.3
Vlan FTAG MAC Switches Interfaces Vlan FTAG MAC Switches Interfaces
1 1 0100.5e01.0203 S10,S30 E1/10,E1/30 1 1 0100.5e01.0203 S10,S30 E1/1
1 2 0100.5e01.0203 S10,S30 E1/2 1 2 0100.5e01.0203 S10,S30 E1/10,E1/30
Root S1 S2 S1 S2 Root
Tree1 E1/2 E1/1 Tree2
E1/10 E1/30 E1/10 E1/30
S10 S30 S30
S10
S20 S20
MAC A E1/1 MAC B MAC A E1/2 MAC B
Vlan FTAG MAC Switches Interfaces Vlan FTAG MAC Switches Interfaces
1 1 0100.5e01.0203 S10,S30 E1/1 1 2 0100.5e01.0203 S10,S30 E1/2
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
STP & FabricPath
• No STP inside FP network
• BPDUs do not traverse FP network
(dropped at FP edge, with the exception of TCNs, see next slide)
• FP network pretends to be 1 switch from STP point of view: all FP edge
switches send BPDUs with the same Bridge ID c84c.75fa.60xx (xx is domain ID FabricPath
in hex, default 00)
• Before FP ports are up, switch will use its own Bridge ID
(like STP without FP would do)
• Ports inside FP cannot be blocked, FP edge switches will always want to have
STP designated role, if superior BPDU is received such port will be blocked as
L2GW inconsistent
N7K# show spanning-tree interface e3/1 detail
Port 385 (Ethernet3/1) of VLAN2000 is broken (L2 Gateway Backbone Port Inconsistent)
Designated root has priority 34768, address c84c.75fa.6000
…
N7K(config)# spanning-tree vlan 2000 priority 8192
22:27:28 %STP-2-L2GW_BACKBONE_UNBLOCK:
L2 Gateway Backbone port inconsistency cleared unblocking port Ethernet3/1 on VLAN2000.
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
STP, FabricPath & TCNs
Flush MACs learned from
• When CE STP domains are connected to multiple FP switches STP S4,S5
TCN handling might be needed to maintain accuracy of MAC address
tables inside CE
• Example if link CE1-CE2 goes down, link CE2-CE3 will become forwarding.
Now to reach MAC B, switches inside FP need to send traffic to S5 instead
of S4… S1 STP Domain 1 S2
C
N
T
C
• Each FP switch will flush all remote MAC addresses learned from switches T
MAC A
N
in the same STP domain as domain originating the TCN C T
S4 T CS5
• In addition, if FP switch is also part of the same STP domain, it will STP Domain 2 N
propagate TCN to the CE domain X
• TCNs are not propagated to CE in domain 0 (default domain) CE1 CE2 CE3
MAC B
N7K# conf t
N7K(config)# spanning-tree domain ?
<1-1023> Domain Identifier
N7K# sh spanning-tree summary Flush MACs learned on CE
Switch is in rapid-pvst mode
L2 Gateway Domain ID: 100
...
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Control Plane Protection
• Both N7K, N6K, and N5K recognize and protect FP ISIS traffic at COPP level
• COPP needs to be updated when deploying FabricPath; standard profiles are FP-aware as of 5.2(1)
N7K# show policy-map interface control-plane N5K# show policy-map interface control-plane class
Control Plane 7K copp-system-class-isis
service-policy input: copp-policy-strict
class-map copp-class-critical (match-any) Control Plane
… service-policy input: copp-system-policy-default
match access-group name class-map copp-system-class-isis (match-any)
copp-acl-mac-fabricpath-isis match protocol isis_dce
police cir 1024 kbps , bc 4800000 bytes 5K
…
set cos 7 conformed 751957 bytes; action: transmit
police cir 39600 kbps , bc 250 ms violated 0 bytes; 6K
module 1 :
conformed 5136527710 bytes; action: transmit
violated 0 bytes; action: drop
• In case of complex CE-side STP topologies (with blocking ports), usual STP safeguards are recommended
(Bridge Assurance & Dispute / UDLD)
• On N7K-F1 cards: rate-limiters allow up to 4500 PPS worth of control plane FabricPath packets
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Agenda
• FabricPath Overview
Benefits, Restrictions, and Configuration
• Key Concepts
Encapsulation, Trees, Topologies, STP
• Data Plane
Forwarding, Load-Balancing, MAC Learning
• vPC+
Challenges and Operation
• Troubleshooting
Verification steps, tools, and examples
FabricPath: Forwarding Tables
Supervisor
• FabricPath uses 3 tables to forward frames DRAP
Engine
FabricPath IS-IS
• MAC address table
U2RIB L2FM
VLAN, MAC Address, Port (local or remote),
FTAG (for non-unicast)
U2FIB MTM
• Switch-ID table Hardware Drivers
remote switch-ID, local next-hop interfaces (up to 16)
Switch Table Other HW MAC Table
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Forwarding: unicast CEFP This is meant to illustrate key decisions
in forwarding, some details are
abstracted away
unicast
Unknown unicast
DA N ODA = MC1 (Flood2BD)
Known
DA = Destination Address
Y
SA = Source Address
Unknown source Flood to update MACs
SA ODA = Outer Destination Address
ODA = MC2 (FF)
Known
N OSA = Outer Source Address
MC1 = 010F.FFC1.01C0
Y
ODA = L2_lookup (DA) MC2 = 010F.FFC1.02C0
Ftag = Vlan2Ftag(Vlan)
Choose FTAG
FTAG for unicast Ftag = F(Vlan,SA/DA,…)
is topology ID
TTL = 32
OSA.SW/SubSW = local
OSA.LID=LID(ingress_port)
Forward
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Forwarding: broadcast/multicast CEFP
BC || MC
ODA = DA
OSA.SW/SubSW = local
OSA.LID=LID(ingress_port)
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Forwarding: FP->FP or FP->CE
MIM packet
RPF is checked against
Decrement(TTL)
OSA.SwID + FTAG
Y TTL<1 N ODA is
N Fail
unicast RPF
Multicast lookups are done using VLAN,
Y Pass FTAG, and ODA
(each multicast mac appears twice)
Destination = N ODA.SwID Destination =
Sw_Table(FTAG, ODA.SwID) is local L2_Table(Vlan, FTAG, ODA) SubSwitchID lookups are omitted here
Drop
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Load-balancing
• N7K: Unicast and Multicast load-balancing are separate
• N5K/N6K: Unified load-balancing mechanism for unicast and multicast
N7K# show fabricpath load-balance • Symmetric: idea is to make ab and ba
ECMP load-balancing configuration: flows take same path by sorting addresses,
L3/L4 Preference: Mixed before feeding them to hash
Hash Control: Symmetric
Rotate amount: 6 bytes • Rotate: polarization avoidance; hash result is
Use VLAN: TRUE
rotated by specified number of bytes.
Ftag load-balancing configuration: Number is derived from unique system MAC
Hash Control: Symmetric
Rotate amount: 6 bytes
Use VLAN: TRUE
N7K# show fabricpath load-balance unicast forwarding ftag 1 switchid 30 flow l2 src-mac 001c.57ad.ecc3
dst-mac 547f.ee02.ce3c ether-type 0x800 vlan 2000 module 3
128b Hash Key generated : 1ffb80b38f02000019000715eb7b30d5
This flow selects interface Eth3/25
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Reducing impact of forwarding loops
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
MAC Address Learning
Conversational learning is
disabled on L3 edge
• Learning MAC addresses is not required in FabricPath Core as switches (when SVI is up
switching is based on Switch ID on FP VLAN)
• FP Edge switches learn local MAC addresses (behind edge ports) This does not apply to a
conventionally case where F-series is
connected to M-series in
• FP Edge devices learn remote addresses (behind Core-facing ports)
different VDC by external
using conversational learning
cable
• For packets arriving from FP, source MAC (not outer SA!) is learned when
destination MAC of the frame is already known on any Edge port of this
When M and F are in the
switch
same VDC, special
• No learning from broadcasts (though existing entries will be updated) handling is needed to
forward packets from
• Normal Learning from multicasts (example: HSRP address) MFP core – this is
orchestrated by MCM
(mixed chassis manager)
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Conversational MAC Address Learning
S1 S2 S3
A B
MAC Port MAC Port MAC Port
A B
MAC Port MAC Port MAC Port
A 1
A B
MAC Port MAC Port MAC Port
A 1 B 1
B S3.0.1
A B
MAC Port MAC Port MAC Port
A 1 B 1
B S3.0.1 A S1.0.1
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
FabricPath Scale Nexus5500 Nexus6000 N7K-F1 N7K-F2 N7K-F3 N7K-M
series
32K MACs 128K MACs* 16K MACs 16K MACs 64K MACs 128K MACs
per SoC per SoC per SoC
Potential bottleneck if
F1/F2 used in L3 Spine
L3
Spine
L2
Spine
L3 Spine
Leaf Leaf
VLAN 100 VLAN 200 VLAN 100 VLAN 200 VLAN 100 VLAN 200 VLAN 100 VLAN 200
Leaf Layer Optimized conversational learning Leaf Layer Optimized conversational learning
Spine No MAC learning (forwarding based on SWID) Spine Learns all MAC addresses in order to
route between VLANs
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
FabricPath Proxy L2 Learn
• Goal: Increase MAC table size in FabricPath for F1/F2E modules
• Solution: Offload MAC learning to M-series module at L2/L3 boundary
• Prerequisites: 6.2(2) on N7K (Spine and Leaf) , M1/M2 + F2E or M1/M2 + F1
Configuration
Learn All ! From default VDC (Prevents F2E/F1 from learning on multicast frames)
M1/M2
Remote MACs no hardware fabricpath mac-learning module <x> [port-group <y>]
L3
L2 ! From fabricpath VDC (prevents F2E/F1 from learning remote MACs)
Spine no mac address-table fabricpath remote-learning
No MAC
SoC Learning
Leaf
! If you are using F2 for Leaf core ports to prevent learning from
broadcast/multicast
no hardware fabricpath mac-learning module <x> [port-group <y>]
VLAN 100 VLAN 200 VLAN 100 VLAN 200
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
FabricPath MAC Learning Changes: Why?
VLAN MAC Index
200 A gpc1 • M-Series MAC tables contain VLAN, MAC, and port index
(no concept of SWID, SSWID, LID in M-Series MAC table)
M sends
S1 M1/M2 frame to gpc1
• For FP MACs, the destination SWID is mapped to an
L3
GPC SWID internal gateway port-channel (GPC) index which is
L2 programmed in the M-series MAC table
gpc1 S201
FP F translates
SoC
• FP SoC will translate GPC to SWID before sending out FP
frame to
SWID 201, LID port.
FP FP FFFFMAC miss,
SoC SoC causes flood to • Challenge: No way for FP SoC to determine LID for packet
local CE ports
S101 S201
from M-Series module if MAC is not present in local MAC
table. Therefore, packet from M-Series sent out FP with
CE CE flood LID.
SoC SoC If FP SoC on destination switch has not learned MAC, then
packet will be flooded out local CE ports
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
FabricPath MAC Learning Changes
• To support L2 proxy learning, MACs learned on CE ports will be synced to all SoCs
A, B, C
A, B, C
CE
CE
SoC
SoC
Learns MAC
A,B,C
FP Learn all MACs on CE
FP Learn all MACs on CE SoC
SoC Sync local CE ports. Learn remote
No MACs ports. Learn remote
MACs to FP SoC MACs via
Learned MACs via FP
FP conversational learning
conversational learning SoC
SoC Learns MAC
X,Y,Z
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Agenda
• FabricPath Overview
Benefits, Restrictions, and Configuration
• Key Concepts
Encapsulation, Trees, Topologies, STP
• Data Plane
Forwarding, Load-Balancing, MAC Learning
• vPC+
Challenges and Operation
• Troubleshooting
Verification steps, tools, and examples
VPC+: Why, What and How (1) MAC B
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
VPC VPC+ Fabric Path
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
HSRP (and VRRP) in VPC+
• HSRP when enabled on VPC+ peers uses Emulated Switch ID as a source switch and
thus benefits from VPC+ multipathing
• Control-plane-wise one peer will be active and other will be standby, but data-plane-wise
both peers will be forwarding traffic (same as in VPC) S3
• FabricPath devices will have ECMP route to Emulated Switch
S3# show mac address-table vlan 100 address 0000.0c9f.f064 Fabric Path
VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
100 0000.0c9f.f064 dynamic 0 F F 100.0.65535
s3# show fabricpath route switchid 100
1/100/0, number of next-hops: 2 S1 S2
via e1/1, [115/20], 1 day/s 05:56:40, isis_fabricpath-default
via e1/2, [115/20], 1 day/s 05:56:38, isis_fabricpath-default
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
VPC+: Why, What and How (2) MAC B
• Solution: S1 and S2 advertise to S3 (via ISIS TLV) an affinity to single FTAG RPF RPF
FTAG1,S100 FTAG2,S100
each, S3 will program RPF according to affinity. Multidestination traffic coming
from VPC+ will be set to use FTAG 1 for VPC leg on S1 and FTAG 2 for VPC 1/1 1/2
leg on S2
S3# show fabricpath route switchid 100 Affinity Affinity
FabricPath Unicast Route Table
1/100/0, number of next-hops: 2 FTAG1 FTAG2
via Eth1/1, [115/40], 11 day/s 00:59:35, isis_fabricpath-default
via Eth1/2, [115/40], 11 day/s 01:03:27, isis_fabricpath-default
S1 S2
S3# show fabricpath isis database detail | i Affinity|Host|Numg
Hostname : S1 Length : 2
Affinity :
Nickname: 100 Numgraphs: 1 Graph-id: 1 Use FTAG1 Use FTAG2
Hostname : S2 Length : 2
Affinity :
Nickname: 100 Numgraphs: 1 Graph-id: 2
S100
S3# show l2 multicast trees
(ftag/2, topo/0, Switch-id 100), uptime: 1d01h, isis
Outgoing interface list: (count: 1, '*' is the preferred interface)
* Interface Ethernet1/2, [admin distance/115] uptime: 1d01h, isis
MAC A
(ftag/1, topo/0, Switch-id 100), uptime: 6d00h, isis
Outgoing interface list: (count: 1, '*' is the preferred interface)
* Interface Ethernet1/1, [admin distance/115] uptime: 6d00h, isis
47 BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
VPC+: Why, What and How (3) MAC B
vPC status
-------------------------------------------------------------------------
id Port Status Consistency Reason Active vlans vPC+ Attrib MAC A
-- ---------- ------ ----------- ------ ------------ ----------- vpc domain 100
101 Po101 up success success 10 DF: Partial
fabricpath multicast load-balance
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
VPC+: Prevention of Duplicate Packets
• How is packet received from VPC+ and flooded on S1 prevented from being
flooded on S2 to same VPC+ again?
• N7K-F1 linecards:
Each VPC+ will have its own sub-switch ID. Mac addresses will be learned behind
<es_id>.<subsw_id>.<lid>, for example 100.11.65535
Fabric Path
(emulated switch 100, sub-switch 11, LID 65535). S2 will recognize ES + SubSwitch tuple as
its own port and will not flood the frame back to VPC
X
FTAG1, but S2 will only flood FTAG2 packets out of the VPC
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
VPC Failover
• VPC+ member link goes down
• Traffic diverted over Peer-Link
• Peer-Link goes down (but Peer-Keepalive up)
• Primary: No action S3
• Secondary: Bring down VPC+ channels
• Stop advertising reachability to Emulated Switch Fabric Path
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Anycast HSRP
• Goal: provide N-gateway solution to increase redundancy and bandwidth
• Alternatives:
1. vPC/vPC+ provides 2 active gateways. Failure of a single gateway reduces available inter-vlan traffic by
half
2. GLBP allows more than 2 active gateways. Drawbacks:
• No ECMP load-balancing since a single virtual MAC is assigned to a single SwitchID
• Non-deterministic distribution of virtual MAC addresses (hard to troubleshoot)
• Solution: Anycast HSRP
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Anycast HSRP
• The HSRP virtual MAC is bond to an Anycast SwitchID (ASID)
• ASID uses similar concept to vPC+ ES, where each Anycast gateway advertises the ASID via
new Anycast HSRP Sub-TLV
• Each Anycast gateway will actively route traffic for the HSRP virtual MAC
feature interface-vlan
Configure HSRP under the feature hsrp
interface - HSRP version2
Code Requirement
required interface Vlan100 N7K
ASID
ip address 10.1.100.1/24 • 6.2(6)
hsrp version 2 N5K/N6K
hsrp 100 •6.0(2)N2(1) (SubTLV only)
ip 10.1.100.254
L3 S1 S2 S3 S4 •7.0(0)N1(1)
interface Vlan101
L2
ip address 10.1.101.1/24
hsrp version 2
hsrp 101
ip 10.1.101.254
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Agenda
• FabricPath Overview
Benefits, Restrictions, and Configuration
• Key Concepts
Encapsulation, Trees, Topologies, STP
• Data Plane
Forwarding, Load-Balancing, MAC Learning
• vPC+
Challenges and Operation
• Troubleshooting
Verification steps, tools, and examples
S1 S2 FP Vlans 100-199
FabricPath: Configuration
install feature-set fabricpath
feature-set fabricpath S101 S102 S201 S202
vlan 100-199
mode fabricpath Best practice to manually
fabricpath switch-id 101 configure switch-id A ES S100 B C ES S200 D
vpc domain 100
fabricpath switch-id 100
fabricpath multicast load-balance
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
S1 S2 FP Vlans 100-199
A ES S100 B C ES S200 D
S101# show system internal sysmgr service all | i 2rib|drap|fabric|PID
Name UUID PID SAP state Start count Tag Plugin ID
isis_fabricpath 0x41000243 6475 436 s0009 1 N/A 1
FabricPath plugin in good drap 0x0000024E 6476 448 s0009 1 N/A 1
state m2rib 0x00000250 6435 449 s0009 1 N/A 1
u2rib 0x00000254 6474 452 s0009 1 N/A 1
Services running for URIB,
MRIB, DRAP, ISIS S101# show processes cpu | i 2rib|drap|fabric|PID
CPU levels are reasonable PID
6435
Runtime(ms) Invoked
410 335
uSecs 5Sec
1 0.00%
1Min
0.00%
5Min
0.00%
TTY
-
Process
m2rib
Memory below limits 6474 170 735 0 0.00% 0.00% 0.00% - u2rib
6475 690 3764 0 0.00% 0.00% 0.00% - isis_fabricpath
6476 200 725 0 0.00% 0.00% 0.00% - drap
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
S1 S2 FP Vlans 100-199
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
FabricPath: what comes from where
I/O Module
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
S1 S2 FP Vlans 100-199
Vlan Group Address Ver Type Port list S101 S102 S201 S202
100 */* - RF Eth1/7
RF Eth1/8 vPC30 vPC40
100 239.1.1.1 v2 D Po40
A ES S100 B C ES S200 D
S101# show fabricpath isis database mgroup detail | egrep "LSPID|Group|00-01" Multicast Multicast
LSPID Seq Number Checksum Lifetime A/P/O/T Sender Receiver
S201.00-01 0x00000093 0xEA2C 1092 0/0/0/1
Group-Address : IP Multicast : Vlan : 100 Groups : 1 *,G from local IGMP snooping
Group : 239.1.1.1 Sources : 0
S202.00-01 0x00000090 0xBD66 709 0/0/0/1 Local IGMP/snooping entries are
Group-Address : IP Multicast : Vlan : 100 Groups : 1 redistributed into FP
Group : 239.1.1.1 Sources : 0
L2 multicast prune subtrees built
on each FP switch
S101# show fabricpath mroute vlan 100 S101 hashes multicast to FTAG 1
(vlan/100, 0.0.0.0, 239.1.1.1), uptime: 20:35:57, isis (remember vPC+ affinity)
Outgoing interface list: (count: 2)
Switch-id 201, uptime: 20:35:57, isis S101# show fabricpath mroute vlan 100 ftag 1
Switch-id 202, uptime: 20:35:57, isis
(ftag/1, vlan/100, 0.0.0.0, 239.1.1.1), uptime: 20:47:34, isis
Outgoing interface list: (count: 2)
Interface Ethernet6/27, Switch-id 201, uptime: 22:26:18, isis
Interface BRKDCT-3313
Ethernet6/27, Switch-id 202, uptime: 22:26:18,67isis
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public
S1 S2 FP Vlans 100-199
FabricPath: IP Multicast
QUIZ
Both S201 and S202 receive multicast S101 S102 S201 S202
A ES S100 B C ES S200 D
S202# show vpc 40
vPC status Multicast Multicast
--------------------------------------------------------------------------- Sender Receiver
id Port Status Consistency Reason Active vlans vPC+ Attrib
-- ---------- ------ ----------- ------ ------------ -----------
40 Po40 up success success 100-199 DF: Partial,
FP MAC:
200.0.0
vPC+ in partial status which
means multidestination traffic is
S201# show fabricpath isis database detail S201.00-00 | sec Affinity
Affinity :
load-balanced between vPC peers
Nickname: 200 Numgraphs: 1 Graph-id: 1 S201 has affinity for FTAG 1
S201# show fabricpath isis database detail S202.00-00 | sec Affinity S202 has affinity for FTAG 2
Affinity :
Nickname: 200 Numgraphs: 1 Graph-id: 2 S201 will forward this frame
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
FabricPath: Hardware Multicast MAC
• Multicast MACs are stored differently from usual 0100.5exx.xxxx
F1
module-4# show hardware mac address-table vlan <vlan> vdc <vdc> fe <fe>
FE | Valid| PI| BD | MAC | Index|...| PV | RD| NN| UC|PI_E8| SWID| SSWID| LID
| | | | | |...| | | | | | | |
---+------+---+------+---------------+-------|...|----|---|---|---|-----|-----|------|-------
4 1 0 52 0100.ef01.0203 0x07ffb ... 0x00 0 0 0 0 0x000 0x000 0x07ffb
4 1 0 52 0100.ef04.0506 0x07ffb ... 0x00 0 0 0 0 0x000 0x000 0x07ffb
4 1 0 52 0100.ef01.0203 0x07ffb ... 0x00 0 0 0 0 0x000 0x000 0x07ffb
4 1 0 52 0100.ef04.0506 0x07ffb ... 0x00 0 0 0 0 0x000 0x000 0x07ffb
• Each mac appears twice: once per FTAG, use ‘show hard internal forwarding … table mac’ to find which
is which
F2 module-6# show hardware mac address-table vlan <vlan> vdc <vdc> fe <fe>
FE | Valid| PI| BD | MAC | Index| Stat| SW | Modi| Age| ... | SWID| SSWID| LID
| | | | | | ic | | fied|Byte| ... | | |
---+------+---+------+---------------+-------+-----+-----+-----+----+ ... |-----|------|-------
7 1 1 245 0000.0000.000a 0x00408 0 0x009 1 199 ... 0x064 0x00b 0x00408
7 1 0 245 0000.0000.000d 0x00000 0 0x009 1 199 ... 0x0c8 0x000 0x00000
7 1 0 245 4180.0f01.0101 0x07fd8 1 0x000 0 0 ... 0x000 0x000 0x07fd8
7 1 0 245 4180.0f01.0101 0x07fda 1 0x000 0 0 ... 0x000 0x000 0x07fda
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Looking back in time
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Tools
Troubleshooting Tools: Pong
• Pong can be equated to L2Ping + L2TraceRoute
• Depends on IEEE 1588v2 HW support F-series, N5500, and N6000 all support PTP, but
N5K/N6K at present doesn’t support pong
• Works by sending 2 types of packets: 1 packet to store timestamps at each hop and 2nd
to collect stored timestamps
S101# pong destination-swid 2 destination-mac 8478.ac5b.2b42 vlan 100 details
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
S1 S2 FP Vlans 100-199
Troubleshooting Tools: FPOAM
• OAM Profiles can be used to replicate
data plane packet and follow the S101 S102 S201 S202
forwarding path
202# traceroute fabricpath switch-id 100 profile 2 A ES S100 B C ES S200 D
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
S1 S2 FP Vlans 100-199
Troubleshooting Tools: Counters
S202(config)# ip access-list test-stats
S202(config-acl)# statistics per-entry
S202(config-acl)# permit ip host 10.1.100.101 host 10.1.100.201 S101 S102 S201 S202
S202(config-acl)# permit ip any any
S202(config-acl)# interface ethernet 1/7
S202(config-if)# ip port access-group test-stats in vPC30 vPC40
S202(config-if)# end
A ES S100 B C ES S200 D
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Troubleshooting Tools: Counters Find ingress interface & attach to
respective linecard
S1# attach module 6
Find Ingress FE instance
module-6# show hardware internal dev-port-map Configure statistics (use FE+1)
-------------------------------------------------------------- Print statistics
CARD_TYPE: 48 port 10G
FP port | PHYS | MAC_0 | L2LKP | L3LKP | QUEUE |SWICHF Run traffic
... Print statistics again – note statistics
19 4 4 4 4 4 0
20 4 4 4 4 4 0 are in HEX
21 5 5 5 5 5 0 Compare
22 5 5 5 5 5 0
...
module-6# test fabricpath unicast configure route-stats vdc 2 ftag 1 switchid 200 fe 5 table [mp | sw] commit
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Troubleshooting Tools: Error/Drop Counters
• Usual datapath troubleshooting apply on N7K show hardware internal errors
7k# show hardware internal errors module 6 | diff
often produces lengthy outputs, use
... send 2000 transit packets using ping with timeout 0 ... diff to just see what has changed
7k# show hardware internal errors module 6 | diff
< 1008 Self-forwarding check OSA drop 0000000287061579 3 –
between 2 timed samples
> 1008 Self-forwarding check OSA drop 0000000287063630 3 - (with some test traffic in the middle)
< 2514 Ingress packets marked with drop_oth sent to IB 0000000002127119 4 –
> 2514 Ingress packets marked with drop_oth sent to IB 0000000002127173 4 -
< 50 smallcnt DSWID/DSSWID miss and DCE frame, def-gw disabled 0000000000000563 5-6 –
> 50 smallcnt DSWID/DSSWID miss and DCE frame, def-gw disabled 0000000000002563 5-6 -
• And on N5K/N6K
N5K# sh platform fwm info pif e1/5 | i stats|cdce PIF (physical interface) maintains RX/TX
Eth1/5 pd: tx stats: bytes 304069130 frames 913992 discard 0 drop 0 and drop counters
Eth1/5 pd: rx stats: bytes 9647836468 frames 8319249 discard 0 drop 1650
Eth1/5 pd cdce_addr: switchid 30 sub-switchid 0, endnodeid 0 Check if drops are non-zero & growing
Eth1/5 pd cdce_addr: Mcast 0, locally-adm 1, OutOfOrder/don't learn 0 (also check the ASIC number)
Eth1/5 pd cdce_addr: localid 5, pbp_idx 0
Use ASIC-errors command to get a
N5K# sh platform fwm info asic-errors 0 breakdown of drop reasons (and see if any
Printing non zero Carmel error registers:
DROP_SRC_VLAN_MBR: res0 = 495188 res1 = 0 [12]
are growing in with test/ping traffic)
DROP_CDCE_SW_TBL_RPF_MISS: res0 = 4 res1 = 0 [30]
DROP_SRC_FTAG_BITMAP_MBR: res0 = 5 res1 = 0 [31]
DROP_SRC_MASK_TO_NULL: res0 = 332912 res1 = 0 [44]
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Troubleshooting Tools: ELAM
• When the going gets tough…
• Embedded Logic Analyzer Module (ELAM) is an engineering tool that is used to look
inside Cisco ASICs.
• ELAM is architecture specific and therefore will have different capabilities and different
CLI syntax across different forwarding engines (FE).
• It is possible to use ELAM as a capturing tool to validate:
1. Was the packet received
ELAM is NOT a supported feature.
2. On which interface/VLAN did the packet arrive It is a diagnostic tool designed for
3. What did the packet look like internal use. Anything and
everything about it may change from
4. How was the packet altered and where was it sent
version to version without any notice
• It is not intrusive
• It can be used at a very granular level to troubleshoot a single traffic flow which can be
an invaluable tool to network administrators.
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Troubleshooting Tool: ELAM Workflow
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Troubleshooting Tools: ELAM
• Basics to know before performing an ELAM
• Data Bus (DBUS) and Result Bus (RBUS)
The DBUS contains several platform specific internal fields along with the header
information from a frame required to make the forwarding decision. We use the DBUS
information to validate where the frame was received and basic data about the frame.
The RBUS will contain information about the forwarding decision to help determine if the
frame was altered and where it was sent.
• Local Target Logic (LTL)
The LTL is an index used to represent a port or group of ports. The source LTL index and
the destination LTL index tell us which port the frame was received and where it was sent.
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
S1 S2 FP Vlans 100-199
Troubleshooting Tools: ELAM Example
• Packet from host 10.1.100.101 <-> 10.1.100.201, expected ingress
interface Eth6/19 on N7K-F2 linecard of S1
S101 S102 S201 S202
S1# attach module 6
Attaching to module 6 ... vPC30 vPC40
module-6# show hardware internal dev-port-map
+-----------------------------------------------------------------------+
A ES S100 B C ES S200 D
+----------------+++FRONT PANEL PORT TO ASIC INSTANCE MAP+++------------+
+-----------------------------------------------------------------------+
FP port | PHYS | MAC_0 | L2LKP | L3LKP | QUEUE |SWICHF
...
19 4 4 4 4 4 0 Linecard L2/L3 ASIC name
...
Eth6/19 is on FE instance 4
module-6# elam asic clipper instance 4 (code name clipper) M-series Eureka/Lamira
module-6(clipper-elam)# layer2
module-6(clipper-l2-elam)# trigger dbus ipv4 ingress if source-ipv4- F1 Orion
address 10.1.100.101 destination-ipv4-address 10.1.100.201 F2 Clipper
module-6(clipper-l2-elam)# trigger rbus ingress if trig
module-6(clipper-l2-elam)# start Configure a trigger specific to
F3 Flanker
module-6(clipper-l2-elam)# status this source/destination IP
L2 DBUS Triggered
L2 RBUS Triggered
Start the ELAM, send the
traffic and wait for it to trigger
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
S1 S2 FP Vlans 100-199
Troubleshooting Tools: ELAM Example
module-6(clipper-l2-elam)# show dbus
<snip>
port-id : 0x2 last-ethertype : 0x800 S101 S102 S201 S202
vlan : 0x64 destination-index : 0x0
source-index : 0x62 bundle-port : 0x0
status-is-1q : 0x1 trill-encap : 0x0 vPC30 vPC40
mac-in-mac-valid : 0x1 dtag-ttl : 0x20
recirc-acos : 0x0 dtag-ftag : 0x1 A B C D
ES S100 ES S200
source-ipv4-address: 10.1.100.101
destination-ipv4-address: 10.1.100.201
mim-destination-mac-address: 0200.c800.0000
mim-source-mac-address: 0200.640b.ffff
destination-mac-address 0000.0000.000d
Frame received on VLAN 100 (0x64) from a
source-mac-address: 0000.0000.000a
ODA (0c8.00.0000) = 200.0.0 source-index of 0x62 (next slide)
OSA (064.0b.ffff) = 100.11.65535 mac-in-mac valid (this is a FP frame)
module-6(clipper-l2-elam)# show rbus
<snip> dtag-TTL: fabricpath TTL of 32 (0x20)
di-ltl-index : 0x65 l3-multicast-di : 0x0
source-index : 0x62 vlan-id : 0x64
dtag=ftag : 0x1 dtag-ttl : 0x1f
mim-destination-mac-address: 0200.c800.0000 Frame transmitted on vlan 100 (0x64) to a destination
mim-source-mac-address: 0200.640b.ffff
index of 0x65 (next slide)
dtag-TTL: fabricpath TTL decremented to 31 (0xf1)
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
S1 S2 FP Vlans 100-199
Troubleshooting Tools: ELAM Example
S1# show system internal pixm info ltl 0x62 Get mapping of
source index to S101 S102 S201 S202
Member info
------------------ physical port
Type LTL vPC30 vPC40
---------------------------------
PHY_PORT Eth6/19 A ES S100 B C D
ES S200
S1# show system internal pixm info ltl 0x65 Get mapping of
Member info
destination index to
------------------ physical port
Type LTL
---------------------------------
PHY_PORT Eth6/22
• ELAM confirms that frame was received on Eth6/19, VLAN 100 with an OSA of 100.11.65535 and ODA
of 200.0.0.
• ELAM also confirms that frame was forwarded out Eth6/22 on VLAN 100 with a decremented FP TTL
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Troubleshooting Tools: show tech
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Troubleshooting Example: Broken HSRP
S1 S2
• Problem statement: HSRP active & standby do not ‘see’ each other in
certain vlans. For example in vlan 1317 standby (S2) ‘sees’ the active (S1),
but on active standby is unknown. A number of vlans are affected. This is
new deployment. S3 S4
• Initial assessment: possible reason for HSRP router not ‘seeing’ other
router is HSRP hello packets not being received. In our case it is likely
active router, not receiving hello packets from standby
• Quick debug on S1 confirms it only sends hellos in vlan 1317
S1# debug hsrp engine packet hello interface vlan 1317
10:03:30 hsrp: Vlan1317[17/V4]: Hello out Active pri 100 ip 10.13.17.254
10:03:31 hsrp: Vlan1317[17/V4]: Hello out Active pri 100 ip 10.13.17.254
10:03:32 hsrp: Vlan1317[17/V4]: Hello out Active pri 100 ip 10.13.17.254
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Troubleshooting Example: Broken HSRP
S1 S2
• Are the HSRP frames from S2 to S1 getting lost?
E1/1
S1# sh fabricpath load-balance multicast ftag-selected flow-type l2 dst-mac E1/1
0100.5e00.0002 src-mac 0000.0c07.ac11 ether-type 800 vlan 1317 module 1
... S3 S4
FTAG SELECTED IS : 1
S4# show hardware internal errors module 1 CBL drops grow at about the rate of Root cause: Vlan missing from transit switch
... HSRP hellos. CBL stands for Color All FP vlans must be defined on all FP
Blocking logic (or Vlan Blocking
|------------------------------------------------------------------------| switches, otherwise there might be issues
| Device:Orion Fwding Driver Role:L2 Mod: 1 |
Logic). Essentially, hardware logic similar to this for flooded traffic. ISIS will
| Last cleared @ Thu Apr 11 11:11:11 2011
| Device Statistics Category :: ERROR defining whether given port/vlan is prune off unnecessary flood traffic towards
blocking or forwarding packets.
|------------------------------------------------------------------------| tree branches that do not have ports behind
Instance:0 them.
ID Name Value Ports
-- ---- ----- -----
29 smallcnt Pkt dropped due to CBL 0000000000001227 1-2 - S4# show fabricpath mroute vlan 1317
2014 Ingress packets marked with drop_oth sent to IB 0000000000001227 1 – ERROR: Vlan 1317 does not exist
S4# show hardware internal errors module 1 | diff S4# show vlan id 1317
...wait some seconds... VLAN 1317 not found in current VLAN database
S4# show hardware internal errors module 1 | diff
< 29 smallcnt Pkt dropped due to CBL 0000000000001229 1-2 –
> 29 smallcnt Pkt dropped due to CBL 0000000000001235 1-2 -
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Troubleshooting: Common Pitfalls
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
CLI cheatsheet
• Interfaces in FP mode
show fabricpath isis interface [brief]
• ISIS adjacencies
show fabricpath isis adjacency [detail]
• Affinity to Ftags
show fabricpath isis database detail
show system internal m2rib ftag
• Pong
pong destination-swid <sw#> destination-mac <mac-address> vlan <vlan> count <#> … [detail]
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Summary
• Core Concepts
Known Unicast Best path with ECMP, Rest Tree-balanced
• Control Plane
ISIS in the core, STP / IGMP snooping at CE
• Data Plane
MAC address table, SwitchID table, Tree table (RPF)
• Troubleshooting
Understand what should be happening, verify what is happening,
find a deviation, zoom in and repeat
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 90 90
Complete Your Online Session Evaluation
• Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner will
receive a $750 Amazon gift card.
• Complete your session surveys
through the Cisco Live mobile
app or from the Session Catalog
on CiscoLive.com/us.
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Table Topics
• Meet the Engineer 1:1 meetings
• Related sessions
BRKDCT-3313 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Thank you