ACI 轉發網絡工程師藍圖.pdf

編號:138894 PDF 144頁 7.04MB 下載積分:VIP專享
下載報告請您先登錄!

ACI 轉發網絡工程師藍圖.pdf

1、#CiscoLive#CiscoLiveJoe Young,ACI Technical Leader,Customer ExperienceBRKDCN-3900A Network Engineers Blueprint for ACI Forwarding 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveEnter your personal notes hereCisco Webex App Questions?Use Cisco Webex App to chat with the sp

2、eaker after the sessionFind this session in the Cisco Live Mobile AppClick“Join the Discussion”Install the Webex App or go directly to the Webex spaceEnter messages/questions in the Webex spaceHowWebex spaces will be moderated by the speaker until June 9,2023.12343https:/ 2023 Cisco and/or its affil

3、iates.All rights reserved.Cisco PublicBRKDCN-39003Agenda 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicWhats Different About ACI Forwarding?(iVXLAN,contracts,endpoint learning)Proxy ForwardingACI Forwarding TablesEndpoint tables,routing tables,hardware lookupsUnderstanding the Con

4、figuration OptionsThe Anatomy of an ACI SwitchBRKDCN-39004Agenda 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicUnderstanding the ToolsUI ToolsElamFtriageSpan/ERSPANFlow Telemetry/netflowDebugging and Walking Through ACI Flows(Routed,Bridged,BUM,Proxied)BRKDCN-39005 2023 Cisco and/

5、or its affiliates.All rights reserved.Cisco Public#CiscoLiveGlossary of AcronymnsAcronymsAcronymsDefinitionsDefinitionsACIApplication Centric InfrastructureAPICApplication Policy Infrastructure ControllerEPEndpointEPGEndpoint GroupBDBridge DomainVRFVirtual Routing and ForwardingCOOPCouncil of Oracle

6、 ProtocolVxLANVirtual eXtensible LANAcronymsAcronymsDefinitionsDefinitionsdXXXoOuter Destination XXX(dIPo=Outer Destination IP)sXXXoOuter Source XXX(sIPo=Outer Source IP)dXXXiInner Destination XXX(dIPi=Inner Destination IP)sXXXiInner Source XXX(sIPi=Inner Source IP)GIPoOuter Multicast Group IPVNIDVi

7、rtual Network IdentifierVxLAN packet acronymsBRKDCN-39006Whats Different About ACI Forwarding?2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is“Application Centric”?Traditional networks use ACLs to classify trafficUsually based on L3 or L2 addresses Makes security de

8、cisions(permit,deny,log,etc)Makes forwarding decisions(policy based routing)ACI can classify traffic based on its EPGTraffic inherits the forwarding and security policy of the EPGHost1Host1EPG1EPG1Host2Host2EPG2EPG2Host3Host3EPG3EPG3AppAppEPG4EPG4BRKDCN-39008 2023 Cisco and/or its affiliates.All rig

9、hts reserved.Cisco Public#CiscoLiveHow is“Application Centric”Achieved?Sources and Destinations Must be Classified into EPGsEndpointsPolicy-PrefixesUsed by App EPGsRepresents the network identity of an end deviceLearned dynamically or configured staticallyUsed by External EPGsClassifies destination

10、by longest prefix matchAlso used for shared-servicesConfiguredPcTagsThe security ID of an EPGUsed in contracts.Ex:Permit PcTag 1000 to PcTag 2000Sclass/dclass imply PcTag directionContractsDefines security and sometimes forwarding(pbr)policy between epgsEssentially an ACL between PcTagsConsumer/Prov

11、ider rather than src/destBRKDCN-39009 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveVlan TypesInternal ID on LEAF(not shared across LEAFs)For forwarding(global value for entire fabric)VLAN ID for external devices(user configured value)VRF1BD1EPG1vlanvlan-5 51919171712661

12、12661166132591661325925231362523136vxlanvxlan-838860883886082020Access Access EncapEncap VLANVLANPIPI-VLANVLANVxLANVxLAN IDID(VNID)(VNID)83886088388608EPEPvlanvlan-5 530303131Access Access EncapEncap VLANVLANPIPI-VLANVLANEPLEAF 1LEAF 1EPVRF1BD1EPG1LEAF 2LEAF 2vxlanvxlan-838860883886083333For BD SVIF

13、or BD SVI PIPI-VLAN:Platform Independent VLANVLAN:Platform Independent VLANBRKDCN-390010 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is an Endpoint?An Endpoint joins both forwarding and security policyleaf103#show system internal epm end ip 192.168.200.11show syst

14、em internal epm end ip 192.168.200.11MAC:0000.1111.2222:Num IPs:1IP#0:192.168.200.11:IP#0 flags:l3-sw-hit:NoVlan id:2:Vlan vnid:1266112661:VRF name:CL2022:vrf1BD vnid:1661325916613259:VRF vnid:25231362523136Phy If:0 x40018000:Tunnel If:0Interface:Ethernet1/25/1Ethernet1/25/1Flags:0 x80005c04:sclass:

15、32771 sclass:32771:Ref count:5EP Create Timestamp:11/01/2021 14:06:25.769904EP Update Timestamp:11/04/2021 18:51:54.387104EP Flags:local|IP|MAC|host-tracked|sclass|timer|leaf103#show system internal epm endpoint ip 192.168.100.10show system internal epm endpoint ip 192.168.100.10MAC:0000.0000.0000:N

16、um IPs:1IP#0:192.168.100.10:IP#0 flags:l3-sw-hit:NoVlan id:0:Vlan vnid:0:VRF name:CL2022:vrf1BD vnid:0:VRF vnid:25231362523136Phy If:0:Tunnel If:0 x18010001Interface:Tunnel1Tunnel1Flags:0 x80004400:sclass:49154 sclass:49154:Ref count:3EP Create Timestamp:11/04/2021 16:38:13.570615EP Update Timestamp

17、:11/04/2021 18:51:54.386595EP Flags:IP|sclass|timer|Local LearnRemote LearnPcTagPcTagInterface/TEPInterface/TEPVNIDVNIDBRKDCN-390011 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is a TEP?(Tunnel Endpoint)IP addresses allocated for overlay communicationVXLAN Traffic

18、 is sent to the TEP+VNID of destinationTEP TypeWhat is it?What is it for?Physical TEP(PTEP)Unique Overlay IP Address for each individual Leaf/SpineNon-vpc dataplane,l3out communication,apic-leaf comm,etcVPC TEP(VTEP)Unique Overlay IP Address for each VPC PairTraffic destined to endpoints that are co

19、nnected behind VPCProxy TEPSpine Anycast IPs used for proxy trafficLeafs send to these TEPs when doing proxy forwardingMost Common TEP TypesMost Common TEP Typesa-leaf101#show ip interface loopback0IP Interface Status for VRF overlay-1lo0,Interface status:protocol-up/link-up/admin-up,iod:4,mode:ptep

20、BRKDCN-390012 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat are Tunnels?Leafs/Spines Install Tunnel Interface to each known TEP.Used for VXLAN Dataplaneleaf#moquery-c tunnelIf-f tunnel.If.id=tunnel1id :tunnel1dest:10.0.72.67idRequestorDn:sys/*/db-dtep/dtep-10.0.72.6

21、7leaf#moquery-c tunnelIf-f tunnel.If.id=tunnel1id :tunnel1dest:10.0.72.64idRequestorDn:sys/bgp/*/db-dtep/dtep-10.0.72.64leaf#moquery-c tunnelIf-f tunnel.If.id=tunnel1#tunnel.Ifid :tunnel1dest:10.0.152.64idRequestorDn:sys/isis/*/lvl-l1/db-dtep/dtep-10.0.152.64Dataplane LearnsThrough BGP(l3out routes)

22、Local POD ISIS DatabaseHow are Tunnels Learned?How are Tunnels Learned?BRKDCN-390013 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is an Endpoint Learned?LeafLeafLeafLeafSpineSpineSpineSpineEP2EP210.1.1.2/2410.1.1.2/244444.5555.66664444.5555.6666EP1EP110.1.1.1/2410.1

23、.1.1/240000.1111.22220000.1111.2222Ingress leaf classifies smac and sIP Ingress leaf classifies smac and sIP(if IP learning enabled)into EPG(if IP learning enabled)into EPG based on some info such as vlan.based on some info such as vlan.Endpoint entry installedEndpoint entry installedLeafLeafLeaf Up

24、dates COOP Leaf Updates COOP Database on spinesDatabase on spinesSource sends some Source sends some type of traffictype of trafficLeaf Installs Remote Leaf Installs Remote Endpoint learn from Endpoint learn from dataplanedataplaneHow does the Egress leaf classify traffic into the correct EPG?4312BR

25、KDCN-390014 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOverlay iVXLAN ACI uses VXLAN with some additional bitsLeafLeafLeafLeafSpineSpineSpineSpineEP2EP210.1.1.2/2410.1.1.2/244444.5555.66664444.5555.6666EP1EP110.1.1.1/2410.1.1.1/240000.1111.22220000.1111.2222LeafLeafSI

26、PDIPDSCPDMACSMAC802.1QVXLANSIPDIPProtoL4/PayloadDMACSMAC802.1QPcTag/Sclass(2 bytes)VNID(3 bytes)Bit pos 4 Source Policy AppliedBit pos 5 Destination Policy AppliedBit pos 7 Dont learnFlags(1 byte)Dataplane VXLAN contains all information needed for endpoint classificationBRKDCN-390015 2023 Cisco and/

27、or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is an Endpoint Learned?EP1EP110.1.1.1/2410.1.1.1/240000.1111.22220000.1111.2222LeafLeafEncap Vlan 100leaf103#show vlan encapshow vlan encap-id 100id 100VLAN Name Status Ports-2 CL2022:ap1:epg2CL2022:ap1:epg2active Eth1/25/3leaf103#show

28、system internal epm vlan 2 detailshow system internal epm vlan 2 detailVLAN 2VLAN 2VLAN type:FD vlanhw id:34:sclass:3277132771access enc:(802.1Q,100100)fabric enc:(VXLAN,1266112661)Object store EP db version:4BD vlan id:1:BD vnid:1661325916613259:VRF vnid:25231362523136Valid:Yes:Incomplete:No :Learn

29、 Enable:YesPIPI-VLANVLANSpineSpineEP Sends EP Sends some trafficsome trafficBRKDCN-390016 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveChecking EndpointsReference commands can be run from leafs or apics#Check object model for Mac Address Endpoint#Check object model for

30、Mac Address Endpointmoquery-c epmMacEp-f epm.MacEp.addr=00:00:AA:AA:BB:BB#Check object model for IP Address Endpoint#Check object model for IP Address Endpointmoquery-c epmIpEp-f epm.IpEp.addr=192.168.200.11Reference commands can be run from leafs only#Check endpoint manager process directly#Check e

31、ndpoint manager process directlyshow system internal epm endpoint mac 0000.aaaa.bbbbshow system internal epm endpoint ip 192.168.200.11#Check hardware level endpoint process directly#Check hardware level endpoint process directlyvsh_lc-c show system internal epmc endpoint mac 0000.aaaa.bbbbvsh_lc-c

32、show system internal epmc endpoint ip 192.168.200.11BRKDCN-390017 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is an Endpoint Learned?EP1EP110.1.1.1/2410.1.1.1/240000.1111.22220000.1111.2222LeafLeafspine1005#show coop internal info ipshow coop internal info ip-db|gr

33、ep db|grep-B 1 B 1-A 15 A 15 192.168.200.11192.168.200.11-IP address:192.168.200.11Vrf:25231362523136Flags:0EP bd vnid:1661325916613259EP mac:00:00:AA:AA:BB:BBPublisher Id:10.0.64.70Record timestamp:11 05 2021 17:02:56 217794556Publish timestamp:11 05 2021 17:02:56 220584642Seq No:0Remote publish ti

34、mestamp:01 01 1970 00:00:00 0URIB Tunnel InfoNum tunnels:1Tunnel address:10.0.64.7010.0.64.70Tunnel ref count:1SpineSpineUpdate Update COOPCOOPThe Leaf Updates COOP on SpinesVNID info should match the info on leafLeaf TEP that owns this EP:#From APICmoquery moquery-c ipv4Addr c ipv4Addr-f ipv4.Addr.

35、addr=10.0.64.70f ipv4.Addr.addr=10.0.64.70BRKDCN-390018 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveChecking COOPReference commands can be run from spines or apicsQuery COOP for l2 entry:Query COOP for l2 entry:moquery-c coopEpRec-f coop.EpRec.mac=00:00:AA:AA:BB:BBQuer

36、y COOP for l3 entry and get parent l2 entry:Query COOP for l3 entry and get parent l2 entry:moquery-c coopEpRec-x rsp-subtree=children rsp-subtree-filter=eq(coopIpv4Rec.addr,1.1.1.1)rsp-subtree-include=requiredQuery COOP for l3 only entry(such as an SVI IP):Query COOP for l3 only entry(such as an SV

37、I IP):moquery-c coopIpOnlyRec-f coop.IpOnlyRec.addr=192.168.100.10Query COOP for l3 ep:Query COOP for l3 ep:moquery-c coopIpv4Rec-f coop.Ipv4Rec.addr=192.168.100.10BRKDCN-390019 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is Traffic Classified with no EP Learn?In m

38、ost of these cases,the pcTag is based on a policy-prefix lookupThere will be no endpoint learn in several casesSource/dest is behind an l3outSource/dest is in another vrfEndpoint learning is disabled by some optionIf ingress leaf doesnt apply policy,egress leaf should(indicated via policy-applied bi

39、ts in ivxlan header)BRKDCN-390020 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is Traffic Classified with no EP Learn?Destination Behind L3outleaf101#vsh_lc vsh_lc-c show forwarding route 10.99.99.100 platform vrf CL2022:vrf1c show forwarding route 10.99.99.100 plat

40、form vrf CL2022:vrf1!Policy Prefix 10.99.99.0/24Policy Prefix 10.99.99.0/24!vrf:16(0 x10),routed_if:0 x0 epc_class:3277232772(0 x8004)Classification based on longest l3out policy prefixBRKDCN-390021 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow is Traffic Classified

41、with no EP Learn?Destination is unknown and is proxiedleaf101#show show ipip route 192.168.200.20 route 192.168.200.20 vrfvrf CL2022:vrf1CL2022:vrf1192.168.200.0/24,ubest/mbest:1/0,attached,direct,pervasivepervasive*via 10.0.176.66%overlay-1,1/0,4d05h,static,tag 4294967294recursive next hop:10.0.176

42、.66/32%overlay-1leaf101#vsh_lcvsh_lc-c show forwarding route 192.168.200.20 platform c show forwarding route 192.168.200.20 platform vrfvrf CL2022:vrf1CL2022:vrf1!Policy Prefix 0.0.0.0/0!Vrf:16(0 x10),routed_if:0 x0 epc_classepc_class:1(0 x1):1(0 x1)-pcTag of 1 indicates the fabric owns the subnet,d

43、ont apply policy-policy applied flags not set in ivxlan header“Pervasive”indicates this is a BD or EPG subnet(fvSubnet).Send to spine proxy-addrleaf101#show isis dtep vrf overlayshow isis dtep vrf overlay-1|egrep Type|PROXY1|egrep Type|PROXYDTEP-Address Role Encapsulation Type10.0.176.66 SPINE N/A P

44、HYSICAL,PROXYPROXY-ACASTACAST-V4V410.0.176.65 SPINE N/A PHYSICAL,PROXYPROXY-ACASTACAST-MACMAC10.0.176.64 SPINE N/A PHYSICAL,PROXYPROXY-ACASTACAST-V6V6Dont apply policy,Forward to proxy Anycast!BRKDCN-390022 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveleaf#show show ipi

45、p route 192.168.255.10 route 192.168.255.10 vrfvrf CL2022:vrf1CL2022:vrf1192.168.255.0/24,ubest/mbest:1/0,attached,direct,pervasivepervasive*via 10.0.176.66%overlay-1,1/0,static,tag!,rwVnidrwVnid:vxlan:vxlan-24576012457601recursive next hop:10.0.176.66/32%overlay-1leaf#vsh_lcvsh_lc-c show forwarding

46、 route 192.168.255.10 plat c show forwarding route 192.168.255.10 plat vrfvrf CL2022:vrf1CL2022:vrf1Prefix:192.168.255.0/24,Update_time:Fri Nov 5 20:57:00 2021!Policy Prefix 0.0.0.0/0!Flags:IN-HW,SHRDSHRD-SVCSVC,vrf:16(0 x10),routed_if:0 x0 epc_classepc_class:36(0 x24):36(0 x24)leaf#show show ipip r

47、oute 192.168.100.10 route 192.168.100.10 vrfvrf CL2022:vrf2CL2022:vrf2192.168.100.0/24,ubest/mbest:1/0,attached,direct,pervasivepervasive*via 10.0.176.66%overlay-1,1/0,static,rwVnidrwVnid:vxlan:vxlan-25231362523136recursive next hop:10.0.176.66/32%overlay-1leaf#vsh_lcvsh_lc-c show forwarding route 1

48、92.168.100.10 plat c show forwarding route 192.168.100.10 plat vrfvrf CL2022:vrf2CL2022:vrf2Prefix:192.168.100.0/24,Update_time:Tue Nov 9 14:34:05 2021!Policy Prefix 0.0.0.0/0!Flags:IN-HW,SHRDSHRD-SVC,SVC,vrf:10(0 xa),routed_if:0 x0 epc_classepc_class:14(0 xe):14(0 xe)How is Traffic Classified with

49、no EP Learn?Destination is in shared services providerprovider EPG(different vrf)Destination is in shared services consumerconsumer EPG(different vrf)PcTag of provider epgPcTag of provider epgReserved tag for shared Reserved tag for shared services consumer.Policy services consumer.Policy applied in

50、 consumer vrfapplied in consumer vrfShared Services ClassificationBRKDCN-390023 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveleaf#show zoning-rule scope 2523136 src-epg 200+-+-+-+-+-+|Rule ID|SrcEPG|DstEPG|FilterID|Action|+-+-+-+-+-+|4159|200|100|532|permit|+-+-+-+-+-+C

51、ontracts and ForwardingIngressDestDestEPG1EPG1PcTag 100 PcTag 100 SourceSourceEPG2EPG2PcTag 200PcTag 200LeafLeafLeafLeafContract Found?Set policy-applied bits in ivxlan.Permit,deny,redir,logIf LPM is BD/EPG subnet,forward and dont set policy-applied bits in ivxlan.Otherwise,drop!YesNoPolicy-Applied

52、Bits set?Dont do contract lookup.Forward.Do contract lookup.Permit,deny,redir,logYesNoEgressCheck hidden slide for impact of“Policy Control Enforcement Direction”settingBRKDCN-390024 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLivePolicy enforcement tableWhere is policy en

53、forced?Flow DirectionFlow DirectionINGRESSINGRESSEGRESSEGRESSEPG to unknown EPGApplied EgressUnchangedEPG to known EPGApplied IngressUnchangedEPG to L3outApplied Ingress/non-BLApplied Egress/BLL3out to unknown EPGApplied Egress/non-BLApplied EgressL3out to known EPGApplied Egress/non-BLApplied Ingre

54、ss/BLL3out to L3outApplied IngressApplied EgressPolicy enforcement affects only traffic to or from the L3Out.There are no behavior changes in EPG-to-EPG.VRF Enforcement SettingBRKDCN-390025 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat About Flooded Traffic?The foll

55、owing traffic may be flooded:Flooded traffic is sent to the BD GiPo(l2 flood)or VRF GiPo(l3 flood)The GiPo is an overlay multicast address allocated to a BD or VRFFlooding is done on a loop-free tree called an FTAGSecurity policy NOT appliedBroadcastMulticastUnknown UnicastControl Plane maintenance(

56、EP announce,fabric ARP,etc)How does ACI flood?GiPoBRKDCN-390026 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat are FTAGs?FTAGs are loop-free trees within the overlay used by flooded trafficFTAGs are picked per flow from values 0 0 xcOne spine is root for each treeOut

57、going interfaces calculated by ISISLeafLeafLeafLeafSpineSpineSpineSpineEP1EP110.1.1.1/2410.1.1.1/240000.1111.22220000.1111.2222LeafLeafWho has 10.1.1.100?Who has 10.1.1.100?Please tell 10.1.1.1Please tell 10.1.1.1ARPARPSelect ftag 0,forward Select ftag 0,forward out root port*out root port*Root for

58、Root for Ftag 0Ftag 0Forward out all Outgoing Forward out all Outgoing InterfacesInterfaces*Note,the ingress leaf communicates the selected ftag to the rest of the fabric by adding it to the destination gipo.If the gipo is 225.0.0.0 and the ftag is 0 x9,the destination address would be 225.0.0.9321B

59、RKDCN-390027 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveChecking FTAGsFind the outgoing interfaces for a treeleaf101#show isis internal mcast routes ftagshow isis internal mcast routes ftagFTAG Routes=FTAG ID:0 Enabled Cost:(1/7/0)-Root port:Ethernet1/54.6 Root port:E

60、thernet1/54.6 OIF List:Ethernet1/53.5!ommitted rest of ftagsspine1005#show isis internal mcast routes ftagshow isis internal mcast routes ftagFTAG Routes=FTAG ID:0 Root Root Enabled Cost:(0/0/0)-Root port:-OIF List:Ethernet1/1.20Ethernet1/1.20Ethernet1/2.21Ethernet1/2.21Ethernet1/3.19Ethernet1/3.19!

61、ommitted rest of ftagsThis spine is the root for ftag 0Forward out all of these interfacesLeaf forwards to root port and any additional OIFsCheck FTAG tree on ingress leafCheck FTAG tree on root spineBRKDCN-390028Proxy Forwarding 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Cisc

62、oLiveWhat is Proxy Forwarding?Why?Scaling out Endpoint LearningLeaf 1Leaf 1SpineSpineEndpoint 1Endpoint 1I am connected to Endpoint 1Send trafficdestined to EP 1 to Leaf 1Leaf 2Leaf 2Leaf 3Leaf 3Leaf 4Leaf 4Send traffic destined to an Unknown EP to any SpineOnly Leaf 1 and Spines have to program End

63、point 1 in hardwareSpines own separate anycast TEPs for mac,ipv4,and ipv6 proxy lookupsBRKDCN-390030 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHow to check the Spine-Proxy TEPleaf1#show isis dteps vrf overlay-1|grep PROXY10.0.16.65 SPINE N/A PHYSICAL,PROXY-ACAST-MAC1

64、0.0.16.64 SPINE N/A PHYSICAL,PROXY-ACAST-V410.0.16.67 SPINE N/A PHYSICAL,PROXY-ACAST-V6leaf1#show ip route vrf CL2022:vrf1192.168.0.0/24,ubest/mbest:1/0,attached,direct,pervasive*via 10.0.16.64%overlay-1,1/0,00:21:39,staticBD Subnet(Pervasive Route)next-hop should beSPINE-PROXY next-hop of Pervasive

65、 Route is IPv4 Spine Proxy TEPThree types of Spine Proxy TEP Proxy-Acast-MAC Spine-Proxy for L2 traffic(L2 Unknown Unicast mode“Hardware Proxy”)Proxy-Acast-V4 Spine-Proxy for IPv4 traffic(includes ARP Request with ARP Flooding mode“OFF”)Proxy-Acast-V6 Spine-Proxy for IPv6 trafficBRKDCN-390031 2023 C

66、isco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat is COOP?COOP is the proxy-database of ACICouncil of Oracles Protocol A TCP protocol for citizens(Leafs)to publish records to oracles(Spines).Used for announcing endpoints,fabric owned IPs,multicast information,and moreSynced a

67、cross Pods/Sites with BGP EVPNEach Endpoint Record contains all information to forward(VNID,leaf TEP,mac,etc)COOP records pushed into hardware on spinesFor modular spines,scale is achieved by pushing each EP onto only two Fabric ModulesBRKDCN-390032 2023 Cisco and/or its affiliates.All rights reserv

68、ed.Cisco Public#CiscoLiveWhat if the Endpoint isnt in COOP?(ARP Glean)VRF overlay-1TEP1TEP2TEP3AnycastTEPWhat if Spines COOP DB doesnt know the destination when proxyed?X L2 Traffic:Drop L3 Traffic:ARP GleanUnicast IP1Hit Pervasive Route2Spine Proxy3No COOP entry4Encap original packet with special e

69、thertype5Flood this“Glean”to reserved multicast group6LEAFs check its BD subnets7LEAF generates ARP Request8LEAF ignores Request from Spine8If BD subnet for the unknown IP doesnt presentIf BD subnet for the unknown IP presents on LEAFBRKDCN-390033 2023 Cisco and/or its affiliates.All rights reserved

70、.Cisco Public#CiscoLiveSpine Proxy SummaryPacket coming in to LeafLEAF knowsDst MAC?Is Dst MAC onLocal Leaf?L2 or L3?LEAF has BD Subnetsfor Dst IP?LEAF knows Dst IPas EndPoint?What is BD config?FloodHardware ProxyFlood within BDSpine ProxyForward to local portForward to remote leafYesNoYesNoL2Is Dst

71、 IP onLocal Leaf?YesNoL3Forward to local portForward to remote leafYesNoSpine ProxyDst IP is L3OUT Routes?Forward to Border LeafDropYesNoIf ARP Flooding is OFF,ARPtarget-IP is used for this L3 flowBRKDCN-390034 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCapturing a Gl

72、ean with TcpdumpACI Leafs and Spines contain pseudo interfaces for traffic to and from the CPU1stGen LeafCPUkpm_inbPhysPortASICknet0knet1 EX(or Later)LeafCPUkpm_inbPhysPortASICTahoe0 For traffic going to the cpucheck knet0 and kpm_inb For traffic coming from the cpu check knet1 and kpm_inb*Note,not

73、all traffic will show up on the kpm_inb interface.However,all traffic shows on the pseudo interface*Gen1 and 2 Modular spines use psdev0,psdev1,and psdev2 interfaces.Gen 2 fixed spines use tahoe0.Gen 1 fixed spines use knet0-3 For traffic to and from the cpu check Tahoe0 and kpm_inbTraffic on the on

74、 the knet or tahoe pseudo interface will have a special ieth header.It must be decoded.Starting in 3.2 the knet_parser.py script is available on the switch cli to decodeBRKDCN-390035 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCapturing a Glean with TcpdumpGen2 or Late

75、r Leaf36BRKDCN-3900tcpdumptcpdump-xxxveixxxvei tahoe0 tahoe0-w/w/bootflashbootflash/tahoe0.pcap/tahoe0.pcapknet_parser.py knet_parser.py-file/file/bootflashbootflash/tahoe0.pcap/tahoe0.pcap-pcappcap-decoder decoder tahoetahoeFrame 111Time:2019-05-16T16:56:33.059831+00:00Header:ieth_extn CPU ReceiveC

76、PU Receivesup_qnum:0 x14,sup_code:0 x21,istack:ISTACK_SUP_CODE_SPINE_GLEAN(0 x21)Header:iethsup_tx:0,ttl_bypass:0,opcode:0 x6,bd:0 x120e,outer_bd:0 x27,dl:0,span:0,traceroute:0,tclass:0src_idx:0 x3a,src_chip:0 x0,src_port:0 x19,src_is_tunnel:1,src_is_peer:1dst_idx:0 x0,dst_chip:0 x0,dst_port:0 x0,ds

77、t_is_tunnel:0Len:148Eth:000d.0d0d.0d0d 0100.5e7f.fff1,len/ethertype:0 x8100(802.1q)802.1q:vlan:2,cos:5,len/ethertype:0 x800(ipv4)ipv4:10.0.116.64 239.255.255.241,len:130,ttl:249,id:0 x0,df:0,mf:0,offset:0 x0,dscp:32,prot:17(udp)udp:(ivxlan)0 48879,len:110ivxlan:n:1,l:1,i:1,vnid:0 x2b0000lb:0,dl:1,ex

78、ception:0,src_policy:0,dst_policy:0,src_class:0 x5c0mcast(routed:0,ingress_encap:0/802.1q),ac_bank:0,src_port:0 x0Eth:000c.0c0c.0c0c ffff.ffff.ffff,len/ethertype:0 xfff2(0 xfff2(aciaci-glean)glean)ipv4ipv4:172.16.1.1 172.16.2.2,:172.16.1.1 172.16.2.2,len:84,ttl:63,id:0 x71f9,df:1,mf:0,offset:0 x0,ds

79、cp:0,prot:1(len:84,ttl:63,id:0 x71f9,df:1,mf:0,offset:0 x0,dscp:0,prot:1(icmpicmp)icmp:echo request id:0 x9092,seq:0 x1980Traffic that Traffic that triggered Gleantriggered GleanSwitch recognizes Switch recognizes this as a Gleanthis as a GleanRX sup traffic RX sup traffic rather than TXrather than

80、TXDecode type Decode type should be should be tahoetahoe for for tahoetahoe interfaceinterfaceEgress Leaf Verification 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCapturing a Glean with TcpdumpGen1 Leaf Exampletcpdump-xxxvei knet0-w/bootflash/knet0.pcapknet_parser.py-f

81、ile/bootflash/knet0.pcap-pcap-decoder knettcpdump-xxxvei knet1-w/bootflash/knet1.pcapknet_parser.py-file/bootflash/knet1.pcap-pcap-decoder knettcpdumptcpdump-xxxveixxxvei kpm_inbkpm_inb ether proto 0 xfff2ether proto 0 xfff2a-leaf102#tcpdump-xxxvei kpm_inb ether proto 0 xfff2tcpdump:listening on kpm

82、_inb,link-type EN10MB(Ethernet),capture size 65535 bytes15:27:37.663580 00:0c:0c:0c:0c:0c(oui Unknown)Broadcast,ethertype Unknown(0 xfff2),length 94:0 x0000:ffff ffff ffff 000c 0c0c 0c0c fff2 45000 x0010:0054 aa4b 4000 3f01 825d 0404 0464 03030 x0020:0396 0800 0dc6 2384 38db 5275 dd5c 00000 x0030:00

83、00 9e35 0100 0000 0000 1011 1213 14150 x0040:1617 1819 1a1b 1c1d 1e1f 2021 2223 24250 x0050:2627 2829 2a2b 2c2d 2e2f 3031 3233knet0 would show Rx traffic(similar output as Tahoe0)knet1 would show Tx trafficNo decode necessary for kpm_inb(cpu)interfaceGleans arent easily readableEgress Leaf Verificat

84、ionBRKDCN-390037 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveLayer 3 Unicast Glean ScenarioVerify ARP on Remote Leafa-leaf205#show show ipip arparp internal eventinternal event-history event|grep history event|grep-F F-B B 1 172.16.2.21 172.16.2.273)Event:E_DEBUG_DSF,l

85、ength:127,at 316928 usecs after Wed May 1 08:31:53 2019Updating Updating epmepm ifidxifidx:1a01e000 vlan:105 ip:172.16.2.2172.16.2.2,ifMode:128 mac:0000.1111.22220000.1111.222275)Event:E_DEBUG_DSF,length:152,at 316420 usecs after Wed May 1 08:31:53 2019log_collect_arp_pkt;sip=172.16.2.2172.16.2.2;di

86、p=172.16.2.254172.16.2.254;interface=Vlan104;info=Garp Check adj:(nil)77)Event:E_DEBUG_DSF,length:142,at 131918 usecs after Wed May 1 08:28:36 2019log_collect_arp_pkt;dip=172.16.2.2172.16.2.2;interface=Vlan104;iod=138;Info=Internal Request DoneInternal Request Done78)Event:E_DEBUG_DSF,length:136,at

87、131757 usecs after Wed May 1 08:28:36 2019log_collect_arp_glean;dip=172.16.2.2172.16.2.2;interface=Vlan104;info=Received pkt FabricReceived pkt Fabric-Glean:1Glean:179)Event:E_DEBUG_DSF,length:174,at 131748 usecs after Wed May 1 08:28:36 2019log_collect_arp_glean;dip=172.16.2.2172.16.2.2;interface=V

88、lan104;vrf=CiscoLive2020:vrf1;info=Address in PSVI subnet or special VIPAddress in PSVI subnet or special VIPGlean Group Range Glean Group Range included as included as BidirBidir on IPNon IPNGlean Received,Glean Received,DstDst IP IP is in BD Subnetis in BD SubnetARP Request is ARP Request is gener

89、ated by leafgenerated by leafResponse Response ReceivedReceivedEndpoint Endpoint Learn InstalledLearn InstalledEgress Leaf VerificationBRKDCN-390038How ACI Builds Forwarding Tables 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveACI BehaviorLegacy BehaviorBuilding Adjacenc

90、y TablesACI combines ARP and MAC Tables into the Endpoint TableARP/ND tables map Layer 3 to Layer 2ARP/ND tables are updated by control-plane messagesMAC Address Table used for switching decisionsMac Address Table updated by dataplaneEndpoint table contains endpoints,which are Layer 2 addresses OR L

91、ayer 3 addresses OR a combination of Layer 2 and Layer 3 addressesBy default,both Layer 2 and Layer 3 information is updated by dataplaneUsed for security and forwarding policyBRKDCN-390040 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBuilding Endpoint TablesResourceEPM

92、 Endpoint ManagerSup process for managing endpoints.EPMC Endpoint Manager ClientLine card process that sits between hardware layer(HAL)and EPMHAL Hardware Abstraction LayerView of what is programmed into the ASIC.SupervisorLine CardAsicshow system internal epm endpoint mac show system internal epm e

93、ndpoint mac show system internal epm endpoint ip show system internal epm endpoint ip vsh_lc vsh_lc c“show system internal epmc endpoint mac c“show system internal epmc endpoint mac”vsh_lc vsh_lc c“show system internal epmc endpoint ip”c“show system internal epmc endpoint ip”vsh_lc vsh_lc-c show pla

94、t internal hal ep l2 mac c show plat internal hal ep l2 mac vsh_lc vsh_lc-c show plat internal hal ep l3 ip“c show plat internal hal ep l3 ip“!L3 Endpoints are put into HW Routing Tablevsh_lc vsh_lc-c show plat internal hal l3 routes|grep EPc show plat internal hal l3 routes|grep EPTable InfoCommand

95、s to VerifyEndpoints can be Endpoints can be programmed via software programmed via software process or by hardware process or by hardware dataplane learns(HAL)dataplane learns(HAL)BRKDCN-390041 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat about ARP?ARP Tables are

96、still used in ACI forL3outsOverlay adjacencies VXLAN Endpoints(AVE,K8s,Openstack,etc)APIC/Fabric node adjacenciesResourceAdjacency Manager.Programmed by ARP process.UFIBHAL Hardware Abstraction LayerView of what is programmed into the ASIC.SupervisorLine CardAsicshow ip arp vrf show ip arp vrf vsh_l

97、c vsh_lc c“show forwarding c“show forwarding adjacency”adjacency”vsh_lc vsh_lc-c show plat internal c show plat internal hal l3 routes”hal l3 routes”Table InfoCommands to VerifyBRKDCN-390042 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBuilding Routing TablesResourceURI

98、B/MRIB the unicast and multicast routing tables.Programmed by route protocolUFIB/MFIB the unicast and multicast forwarding tables on the Line CardHAL Hardware Abstraction LayerView of what is programmed into the ASIC.SupervisorLine CardAsicshow ip route x.x.x.x/y vrf show ip route x.x.x.x/y vrf show

99、 ip mroute x.x.x.x/y vrf show ip mroute x.x.x.x/y vrf vsh_lc vsh_lc-c show forwarding route vrf“c show forwarding route vrf“vsh_lc vsh_lc-c show forwarding multicast route vrf c show forwarding multicast route vrf vsh_lc vsh_lc-c show platform internal hal l3 routes vrf”c show platform internal hal

100、l3 routes vrf”vsh_lc vsh_lc-c show platform internal hal l3 mcast routes vrf”c show platform internal hal l3 mcast routes vrf”vsh_lc vsh_lc-c show plat internal hal l3 routes vrf|grep MCc show plat internal hal l3 routes vrf|grep MCTable InfoCommands to VerifyBRKDCN-390043 2023 Cisco and/or its affi

101、liates.All rights reserved.Cisco Public#CiscoLiveWhen Troubleshooting Layer 3 Flows AlwaysTroubleshooting TIP1)Check if there is an Endpoint LearnIf not then2)Check if there is a BD(pervasive)static routeIf not then3)Check if there is an External Routeshow endpoint ip show endpoint ip show system in

102、ternal epm endpoint ip show system internal epm endpoint ip show ip route x.x.x.x/y vrf show ip route x.x.x.x/y vrf Check Endpoint Table before Routing TableBRKDCN-390044 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProgramming ContractsResourcePolicy Manager.Programmed

103、 by leaf policy-element processACLQOSHAL Hardware Abstraction LayerView of what is programmed into the ASIC.SupervisorLine CardAsicshow zoningshow zoning-rulesrulesvsh_lc vsh_lc-c“show system internal aclqos zoningc“show system internal aclqos zoning-rules”rules”vsh_lc vsh_lc-c“show plat internal ha

104、l objects policy zoningrule”c“show plat internal hal objects policy zoningrule”Table InfoCommands to VerifyBRKDCN-390045 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHAL Hardware Abstraction LayerWouldnt it be great if there was a single point to validate forwarding and

105、 security classification?TRIEDLEFTTCAMPolicy TCAMOverflow TCAMHardware Forwarding TablesHardware Policy TablesASICvsh_lc vsh_lc-c show platform internal hal l3 routes”c show platform internal hal l3 routes”HALApplicable to EX and Later HardwareBRKDCN-390046 2023 Cisco and/or its affiliates.All right

106、s reserved.Cisco Public#CiscoLiveHAL Hardware Abstraction LayerL3 Lookup of Hardware Tablesmodule-1#show plat internal hal l3 routes vrf CL2022:vrf1-!-|LID|!|VRF|Prefix/Len|RT|Type|!|CLSS|Flags|-|-|-|-|!|-|-|-|-|-|-|!|-|-|4626|192.168.100.10/32|EP|TRIE|!|c002|le,bne,sne,dl|4626|10.99.99.0/24|UC|TCAM

107、|!|8004|sc,spi,dpi|4626|192.168.255.0/24|UC|TCAM|!|24|sc,spi,dpi,dr|4626|192.168.200.11/32|EP|TRIE|!|8003|sc,le,sne|-!-|Applicable to EX and Later HardwareConsolidated view of routes Consolidated view of routes for Endpoints,Shared for Endpoints,Shared Services,and External routesServices,and Extern

108、al routesPcTag from destination PcTag from destination EPGused for contract lookupEPGused for contract lookupMuch more info available in full output!BRKDCN-390047 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveHAL Hardware Abstraction LayerL2 Lookup of Hardware Tablesmodu

109、le-1#show platform internal hal ep l2 all=BD EP L2 L2 S BdId Name T Mac IfId Ifname Class=b BD-11 Pl 00:00:11:11:22:22 1a010000 Eth1/17 c0031a BD-26 Xr 00:00:22:22:33:33 18010004 Tunnel4 400f21 BD-33 Pl 00:00:22:22:33:33 16000002 Po3 4002Applicable to EX and Later HardwareConsolidated view of all Co

110、nsolidated view of all learned Mac Addresseslearned Mac AddressesPcTag from destination PcTag from destination EPGused for contract lookupEPGused for contract lookupMuch more info available in full output!BRKDCN-390048Understanding the Configuration Options 2023 Cisco and/or its affiliates.All right

111、s reserved.Cisco Public#CiscoLiveVRF Level Forwarding OptionsFeatureWhat Does it Do?Policy Control Enforcement PreferenceIf disabled,policy is never applied between EPGs.If enabled,contracts are enforced.IP Dataplane LearningIf Disabled,ACI uses legacy behavior for learning endpoints.Layer 3 endpoin

112、ts are learned by ARP/GARP/ND and Layer 2 endpoints are learned by dataplane.Policy Control Enforcement DirectionIf set to Ingress,contract enforcement for l3out flows is done on service leaf.Egress enables enforcement on Border Leaf(requires remote learning to be enabled)SLeafSLeafBLeafBLeafL3outIn

113、gress leaf sets policy applied bitsEgress leaf does not set policy applied bitsIngress EnforcementSLeafSLeafBLeafBLeafL3outIngress leaf does not set policy applied bitsEgress leaf sets policy applied bitsEgress EnforcementBRKDCN-390050 2023 Cisco and/or its affiliates.All rights reserved.Cisco Publi

114、c#CiscoLiveBridge-Domain Level Forwarding OptionsFeatureWhat Does it Do?L3 Unknown Multicast FloodingFor non-link-local L3 multicast traffic in a PIM-disabled BD,should a leaf with no snooping entries flood in BD(flood)or wait for joins(OMF)?Multidestination FloodingFor L2 mcast and broadcast,flood,

115、drop,or flood within epg encap?If flooding with EPG encap,proxy-arp is required for cross-epg L2 communicationL2 Unknown UnicastIf destination mac is unicast and unknown,flood or proxy to spines?Proxied,L2 Unknown Unicast is dropped if the Destination MAC isnt known in COOPBRKDCN-390051 2023 Cisco a

116、nd/or its affiliates.All rights reserved.Cisco Public#CiscoLiveBridge-Domain Level Forwarding OptionsFeatureWhat Does it Do?Limit IP Learning to SubnetOnly learn IPs if they are within the configured BD subnet for local learns.Unicast RoutingEnable IP learning as well as unicast routing(if a BD subn

117、et is configured)IP Data-plane LearningConfigured underneath the BD subnet.When disabled,IP/IPv6 learning is done via ARP/NDARP FloodingWhen disabled,ARP is unicast routed based on the Target IP(if known)Who has Who has 192.168.100.11?192.168.100.11?leaf#show endpoint ip 192.168.100.11show endpoint

118、ip 192.168.100.11leaf#show ip route 192.168.100.11 vrf CL2022:vrf1show ip route 192.168.100.11 vrf CL2022:vrf1192.168.100.0/24,ubest/mbest:1/0,direct,pervasivepervasive*via 10.0.176.66%overlay-1,1/0,01w00d,staticrecursive next hop:10.0.176.66/32%overlay-1Proxy!Proxy!BRKDCN-390052 2023 Cisco and/or i

119、ts affiliates.All rights reserved.Cisco Public#CiscoLiveEPG Level Forwarding OptionsFeatureWhat Does it Do?Flood in EncapsulationFeature is enabled for just the EPG(rather than all epgs in the BD).Requires proxy arp for L2 traffic between encaps.L4-L7 Virtual IPsDesigned for Direct Server Return flo

120、ws.This disables dataplane learning per IP.IP is learned by ARP/ND.Disable DP Learning Per-IP/PrefixDisables dataplane learning.More specific than VRF-level option.In most cases should be used for DSR too.New in 5.2,can also be configured on BDBRKDCN-390053 2023 Cisco and/or its affiliates.All right

121、s reserved.Cisco Public#CiscoLiveGlobal Forwarding OptionsFeatureWhat Does it Do?Enforce Subnet CheckDont learn an IP(both local and remote)if it is not within a configured BD subnet in the VRF.Disable Remote EP Learning on BLsRemote IP learning is disabled for Unicast flows on a leaf in a specific

122、VRF if an l3out exists in the same VRF Multicast sources are still learnedAlso implicitly disabled when intersite l3out is configuredBRKDCN-390054The Anatomy of an ACI Switch 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveLEAF ASIC GenerationsCisco ASIC1stgenerationBroadc

123、omCPU2ndgeneration(or later)CPUGSTingressLSTingressGSTegressLSTegressFPTilesN9K-C9332PQN9K-C9372PXN9K-C9372PX-EN9K-C9372TXN9K-C9372TX-EN9K-C9396PXN9K-C9396TXN9K-C93120TXN9K-C93128TXN9K-C*-EXN9K-C*-FXN9K-C*-FX2N9K-C*-FX3 LST:Local Station Table,GST:Global Station Table FP Tile:Forwarding and Policy T

124、ileTo SPINETo SPINECloud Scale ASICLocal EP LearnDest EP LookupRemote EP LearnDest EP LookupComplete separation of+Ingress and Egress+Source Learn and Destination LookupSeparate GST/LST for IP and MACMore flexible/scalable with configurable tilesAbstracted with HAL Tile X for both source learn and d

125、estination lookupTile X:IPTile Y:MACetc.N9K-C*-FXPN9K-C*-GXN9K-C*-GX2BRKDCN-390056 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveCisco ASICCloud Scale ASICLine cardFabric cardSUPCPUCloud Scale ASICSPINE ASIC GenerationsBroadcom1stgenerationCisco ASIC2ndgeneration(or late

126、r)COOP DatabaseN9K-X9736PQN9K-C9504-FMN9K-C9508-FMN9K-C9516-FMN9K-*XN9K-C*FM-EN9K-C*FM-E2N9K-C*FM-G number of ASIC per card depends on modelLine cardFabric cardSUPCPUCisco ASICN9K-*CN9K-*XN9K-C9336PQCOOP DatabaseTEP InformationTEP InformationLine cardBox spineFabric cardLine cardBox spineFabric card

127、BRKDCN-390057 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Switch ASIC(Gen 2 and Later)PhysPortParser Block(PRX)Lookup Block(LUA LUB)Forwarding Block(FPA FPC)Lookup Block(LUC)ACL Engine(ACA ACC)Lookup Block(LUD)Load Balancing(LBX)Buffering and Queueing Eng

128、ine(BMX/QSX/BAX)Rewrite Block(RWX)PhysPortEvaluate frame formatBased on FP result,re-evaluate LU ResultLookup Destination IP/MAC;FPC determines contractDetermine VRF,VLAN,EPG,etcEvaluate any matching ACL entriesRevaluate LU Result based on ACL hitsCalaculate Load-Balance HashingBuild the final frame

129、(egress qtag,etc)Apply QoS and Buffering PoliciesBRKDCN-390058 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Modular SpineASIC 0ASIC 1ASIC 2ASIC 3Ports A-BPorts G-HPorts E-FPorts C-D number of ASIC per card depends on modelACI Line CardFabric ModuleFabric M

130、oduleFabric ModuleFabric ModuleASIC 0ASIC 0ASIC 0ASIC 0Internal PCs(2 ports per)sp#vsh vsh-c slot 2 show plat internal hal l3 routes”c slot 2 show plat internal hal l3 routes”sp#vsh vsh-c slot 26 show plat internal hal l3 routes”c slot 26 show plat internal hal l3 routes”40.0.99.139/323.124.199.13/3

131、20.156.151.177/32Where are the linecard Where are the linecard forwarding tables?forwarding tables?What are the strange IPs on What are the strange IPs on the Fabric Modules?the Fabric Modules?BRKDCN-390059 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Modu

132、lar SpineHow is traffic forwarded?For Proxied TrafficFor Proxied TrafficDepending on if the dest IP is the L2 or L3 Proxy TEP the VRF VNID+Dest IP OR BD VNID+Dest MAC is used to hash a synthetic Dest IP and VRF IDSynthetic information is used on LC to hash the uplink port to FMFM routing lookup is b

133、ased on Synthetic IPEach Synthetic IP is owned by two FMsFM uses vnTag to tell egress LC which front panel port to useBRKDCN-390060 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Modular SpineHow is traffic forwarded?For Transit TrafficFor Transit TrafficLin

134、e card hashes across ALL FM uplinksALL FMs have overlay TEP routesFM uses vnTag to tell egress LC which front panel port to useBRKDCN-390061 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Modular SpineASIC 0ASIC 1ASIC 2ASIC 3Ports A-BPorts G-HPorts E-FPorts

135、C-DACI Line CardFabric ModuleFabric ModuleFabric ModuleFabric ModuleASIC 0ASIC 0ASIC 0ASIC 0Internal PCs(2 ports per)sp#moquery-c coopIpv4Rec-f coop.Ipv4Rec.addr=10.0.0.10#coop.Ipv4Recaddr :10.0.0.10synthIp :15.180.164.253synthVrf :250Ingress LC hashes Synth IP and Ingress LC hashes Synth IP and VRF

136、 based on Real Tenant IP+VRFVRF based on Real Tenant IP+VRFsp#vsh-c slot 26 show forwarding route platform|grep-A 10 15.180.164.253!Table:(IN-HW)Type=100 Vrf=750 Synth=0!FC Cards/ASICs:FC22/ASIC-0 FC26/ASIC-0Synthetic info programmed Synthetic info programmed on FMs 22 and 26on FMs 22 and 261DIPO is

137、 IPv4 Proxy TEPDIPI is 10.0.0.10VRF Vnid is 111111 Ingress Traffic:BRKDCN-390062 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInside an ACI Modular SpineASIC 0ASIC 1ASIC 2ASIC 3Ports A-BPorts G-HPorts E-FPorts C-DACI Line CardFabric ModuleFabric ModuleFabric ModuleFabri

138、c ModuleASIC 0ASIC 0ASIC 0ASIC 0Traffic Hashes across either FM 22 Traffic Hashes across either FM 22 or 26 uplinksor 26 uplinksDIPO is IPv4 Proxy TEPDIPI is 10.0.0.10VRF Vnid is 111111 Fabric Module does route lookup Fabric Module does route lookup based on Synthetic IP and VRFbased on Synthetic IP

139、 and VRFvnTag is derived from route lookup,vnTag is derived from route lookup,FM forwards to egress LC which FM forwards to egress LC which forward only based on vnTagforward only based on vnTagEgress LC knows exactly which frontEgress LC knows exactly which front-panel port to panel port to forward

140、 out of based on the received vntagforward out of based on the received vntag2345Ingress Traffic:Internal PCs(2 ports per)BRKDCN-390063Understanding the Tools 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsUse Endpoint Tracker for Building a Top

141、ologyEP Locally Learned on EP Locally Learned on pod 2,nodes 401pod 2,nodes 401-402402No EP Learn,is this an No EP Learn,is this an L3out?L3out?BRKDCN-390065 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsUse Atomic Counters to Check for Overlay

142、 Drops and Latency(PTP)BRKDCN-390066 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsUse Atomic Counters to Check for Overlay Drops and Latency(PTP)104 Microseconds of 104 Microseconds of delay in overlaydelay in overlayNo overlay drops!No overla

143、y drops!BRKDCN-390067 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsUse Tenant Visibility tools to check for Contract DropsThis flow is being This flow is being contract droppedcontract droppedapic4#show acllog deny l3 pkt tenant common vrfCORE

144、srcIp dstIp protocol srcPort dstPort node srcIntf vrfEncap-BRKDCN-390068 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsPort Counters are as Useful as Everleaf1#show interface eth1/8Ethernet1/8 is upadmin state is up,Dedicated InterfaceLast link

145、 flapped 03:07:41RX3527922 unicast packets !ommitted4041582 input packets 609518993 bytes12 jumbo packets 0 storm suppression bytes0 runts 0 giants 0 CRC 0 Stomped CRC0 no buffer0 input error 0 short frame 0 overrun!ommitted0 watchdog 0 bad etype drop 0 bad proto drop!ommitted0 input with dribble 0

146、input discard0 input buffer drop 0 input total dropTX32262479565 unicast packets !ommitted32395063346 output packets 49034781261665 bytes32249687943 jumbo packets0 output error 0 collision 0 deferred 0 late collision0 lost carrier 0 no carrier 0 babble 0 output discard0 output buffer drops 0 output

147、total dropsFrames received with bad FCSIndicates a previously stomped frame was receivedWhat is a Stomp?When a frame is received with a bad FCS and/or is malformedANDThe frame is cut-through switchedThe switch will invert the new CRC to tell the first store-and-forward device to drop itFrame transmi

148、tted with stomped CRCBuffer drops,sign of congestionBRKDCN-390069 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveStart with High-level ToolsUsing moquery to check port counters fabric-wide#Check Fabric#Check Fabric-wide for FCS Errorswide for FCS Errorsmoquery-c rmonDot3S

149、tats-f rmon.Dot3Stats.fCSErrors=1|egrep dn|fCSErrors”#Check Fabric#Check Fabric-wide for total CRC Stomp+FCS Errorswide for total CRC Stomp+FCS Errorsmoquery-c rmonEtherStats-f rmon.EtherStats.cRCAlignErrors=1|egrep dn|cRCAlignErrors”#Check Fabric#Check Fabric-wide for Output Buffer Dropswide for Ou

150、tput Buffer Dropsmoquery-c rmonEgrCounters-f rmon.EgrCounters.bufferdroppkts=1|egrep dn|bufferdroppkts”#Check Fabric#Check Fabric-wide Output Errorswide Output Errorsmoquery-c rmonIfOut-f rmon.IfOut.errors=1|egrep dn|errors”BRKDCN-390070 2023 Cisco and/or its affiliates.All rights reserved.Cisco Pub

151、lic#CiscoLiveELAM Embedded Logic Analyzer ModuleIt is a tripwire in hardwareThe first frame to match a specified condition trips itReport is created with vast amount of data regarding asic decisionsDst TCP 10.0.0.1:3000Dst Dst TCP 10.0.0.1:3001TCP 10.0.0.1:3001Dst TCP 10.0.0.1:3002vsh_lcdebug platfo

152、rm internal tah elam asic 0trigger resettrigger init in-select 6 out-select 1set outer ipv4 dst_ip 10.0.0.1set outer l4 dst-port 3001startmodule-1(DBG-elam-insel6)#statELAM STATUS=Asic 0 Slice 0 Status ArmedAsic 0 Slice 1 Status Triggeredmodule-1(DBG-elam-insel6)#ereport|grep drop reasonRW drop reas

153、on :no dropLU drop reason :no dropMatching frame was Matching frame was caught!caught!Frame was not dropped in lookups!BRKDCN-390071 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat ASIC should be set in the ELAM?vsh_lcdebug platform internal elam asic 0ModelRoleAsic f

154、or ElamN9K-C*CFixed SpinerocN9K-C*GXFixed SpineappN9K-C*-EXLeaftahN9K-C*-FX/FXP/FX2LeafrocN9K-C*-GXLeafappN9K-C*-GX2LeafchoN9K-X97*-EXSpine LCtahN9K-X97*-FXSpine LCrocN9K-X97*-GXSpine LCappN9K-C95*-FM-ESpine FMtahN9K-C950*-FM-E2Spine FMrocN9K-C95*-FM-GSpine FMappBRKDCN-390072 2023 Cisco and/or its a

155、ffiliates.All rights reserved.Cisco Public#CiscoLiveSteps to Using Elam on Gen2+Leaf or Fixed Spinevsh_lcdebug platform internal tah elam asic 0trigger resettrigger init in-select 6 out-select 0set outer ipv4 dst_ip 10.0.0.1set outer l4 dst-port 3001startElams are run from Elams are run from the lin

156、e card shellthe line card shellRefer to“What ASIC should Refer to“What ASIC should be set in the ELAM”slide be set in the ELAM”slide Leafs and fixed spines are single Leafs and fixed spines are single asic switches.Always use asic 0asic switches.Always use asic 0Failing to reset the trigger Failing

157、to reset the trigger can cause past elam can cause past elam configurations to take effect.configurations to take effect.Always reset the trigger!Always reset the trigger!module-1(DBG-elam)#trigger init in-select?!ommitted14 Outer(l2(vntag)|l3|l4)-inner(l2|l3|l4)-ieth6 Outerl2-outerl3-outerl47 Inner

158、l2-innerl3-innerl4!ommittedDetermines which headers conditions can be matched in.Use 14 or 7 when matching vxlan encapsulated headers.Use 0 or 1Use 0 or 1BRKDCN-390073 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSteps to Using Elam on Gen2+Leaf or Fixed Spinevsh_lcdebu

159、g platform internal tah elam asic 0trigger resettrigger init in-select 6 out-select 0set outer ipv4 dst_ip 10.0.0.1set outer l4 dst-port 3001startUse“Use“set outer”or”or“set inner”depending”depending on inon in-select and if select and if matching outer or inner matching outer or inner headers in vx

160、lan packetheaders in vxlan packetWhich headers to match Which headers to match conditions for?conditions for?What to match in the What to match in the header?header?Finally enable the elam!Finally enable the elam!When running When running stat if if Triggered is seen,this is seen,this means a matchi

161、ng packet was receivedmeans a matching packet was receivedBRKDCN-390074 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveReading an ElamAt a high-levelmodule-1(DBG-elam-insel6)#ereport!ommitted-Outer L3 Header-L3 Type :IPv4IP Version :4DSCP :0IP Packet Length :84(=IP header

162、(28 bytes)+IP payload)Dont Fragment Bit :setTTL :64IP Protocol Number :ICMPDestination IP :192.168.200.11Source IP :192.168.100.10!omittedContract ResultContract Drop :noContract Logging :noContract Applied :yesContract Hit :yesereportereport available since 4.2ereport provides a simple,human-readab

163、le report outputereport requires=5.2 code for modular spinesGroups data into outer/inner,headers,and lookup resultsBRKDCN-390075 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveAt a low-levelreport detail|grep F-|grep-v VECTOR|grep-v endLU BEGIN-LUA-LUB-LUC-LUD-LU END-*FP

164、latch results-*LBX latch results -*ACX latch results -RW BEGIN-RW END-ereportereport available since 4.2An elam report provides a walkthrough of each ASIC blockEach decision in each block is recordedRefer to“Inside an ACI Switch ASIC”from part 1 for more detailsAll output is in HEXReading an ElamBRK

165、DCN-390076 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveWhat if Elam Shows a Drop?ereportereport available since 4.2ereportLookup Drop-LU drop reason :SECURITY_GROUP_DENYDrop CodeWhat Does it Mean?What to Do?ACL_DROPFor traffic destined to the CPU on an FX switch it is

166、expected and cosmetic.Also seen when traffic was received from a fabric port and the leaf has a remote EP learn with no bounce flag.Ignore if its an FX switch and destined to local switch IP/process.Otherwise,check for incorrect EP learn.DCI_*_XLATE_MISSFor multisite/remote-leaf,there was no matchin

167、g vnid or pctag translation found.Check contracts between local and remote resources.INFRA_ENCAP_SRC_TEP_MISSNo route and/or tunnel found back to the outer source IPCheck for a tunnel pointing back to the outer source IP.Also,check for a route in overlay.SECURITY_GROUP_DENYSECURITY_GROUP_DENYFrame w

168、as contract droppedFrame was contract droppedMake sure a contract is configured to allow Make sure a contract is configured to allow the flow.the flow.SRC_VLAN_MBRReceived vlan not programmed on ingress port.Check if the frame was correct tagged/untagged.Make sure no invalid-path faults exist for th

169、e epg.UC_PC_CFG_TABLE_DROPNo route was found for the destination.Check the routing table for the destination.VLAN_XLATE_MISSReceived vlan doesnt exist on the switch.Check if the frame is tagged with correct vlan.Check for invalid-path faults on the epg.Common Drop ReasonsCommon Drop ReasonsBRKDCN-39

170、0077 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveSteps to Using Elam on Gen2+Modular SpineChallenges of Modular SpinesLine cards(and potentially FMs)have multiple asicsElam must specify asic numberIngress/Egress ports may be internal LC FM connectionsereport only avail

171、able in 5.2 and laterFortunately,spine Fortunately,spine elamselams arent needed as commonly as leaf arent needed as commonly as leaf elamselams!BRKDCN-390078 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveAutomating Modular Spine ELAMsCLI-based Modular Spine Elam tool av

172、ailable at EasySpineElamspine1#./easy-spine-elam.sh-m all-d ingressFinal module list is:2 23 26 32022-06-08T14:55:57 In-select-14 and out-select-0 are being used.!ommitted70.inner ipv4 destination ip Format:d.d.d.d71.inner ipv4 protocol Format:0-25573.inner ipv4 source ip Format:d.d.d.d91.inner l4 d

173、est port Format:0-65535Select corresponding numbers of conditions to set.Separate numbers with commas.Ex:1,2,3,4,5Enter selections:70,73,71,91Enter inner ipv4 destination ip Format:d.d.d.d:80.0.0.1Enter inner ipv4 source ip Format:d.d.d.d:150.0.0.100Enter inner ipv4 protocol Format:0-255:6Enter inne

174、r l4 dest port Format:0-65535:8989Easily Set Conditions on All or Some ModulesWhich conditions to match?Which conditions to match?Set conditionsSet conditionsBRKDCN-390079 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveAutomating Modular Spine ELAMsCLI-based Modular Spine

175、 Elam tool available at EasySpineElam2022-06-08T14:56:28 Checking elam status for module 22022-06-08T14:56:28 Checking elam status for module 232022-06-08T14:56:28 Checking elam status for module 262022-06-08T14:56:28 Checking elam status for module 3ELAM TRIGGERED on module 26:ASIC:0 SLICE:1ELAM TR

176、IGGERED on module 2:ASIC:3 SLICE:1Type status to check elam status again.Type ereport,report or report detail to collect all reports:ereport2022-06-08T14:57:36 Collecting report for module 26 asic 0.2022-06-08T14:57:36 Collecting report for module 2 asic 3.2022-06-08T14:57:46 Converting reports to e

177、report format!The following decoded elams are available-/data/techsupport/mod26-asic0-elamreport-2022-06-08T14-57-36-EREPORT/data/techsupport/mod2-asic3-elamreport-2022-06-08T14-57-36-EREPORT2022-06-08T14:57:49 FINISHED!Generate and view ereport from all Triggered Modules!ELAM triggered on ELAM trig

178、gered on LC and FM!LC and FM!Locally view or copy Locally view or copy off the final ereportsoff the final ereportsBRKDCN-390080 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveShouldnt ELAM be More Simple?https:/ELAM(Embedded Logic Analyzer Module)Perform an ASIC level pa

179、cket captureELAM Assistant You can perform ELAM like a TAC engineer!With a nicely formatted result reportDetail Explanations:https:/ to use video,pictures A download link for ELAM AssistantElam Assistant in DCAppCenterBRKDCN-390081 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Ci

180、scoLiveELAM Assistant in ACI AppCenter(example)1.Perform an ElamTriggered!andReport is ReadySet ParametersBRKDCN-390082 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveELAM Assistant in ACI AppCenter(example)2.Read a ReportScroll DownClick to see reportReport shows up here

181、BRKDCN-390083 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveFTRIAGE Automating Elamsapic1#ftriage route-ii LEAF:101,102-dip 10.99.99.100-sip 192.168.100.1020:19:54 INFO main:1295 L3 packet Seen on leaf102 Ingress:Eth1/34(Po5)Egress:Eth1/54 Vnid:252313620:19:55 INFO main:

182、1364 leaf102:Packets egress outer SIP:10.0.176.67,DIP:10.0.64.7020:19:55 INFO main:1371 leaf102:Outgoing packets Vnid:252313620:19:56 INFO main:353 Computed ingress encap string vlan-350120:20:03 INFO main:464 Ingress BD(s)CL2022:bd120:20:03 INFO main:476 Ingress Ctx:CL2022:vrf1 Vnid:2523136!20:21:4

183、6 INFO main:1295 L3 packet Seen on spine1005 Ingress:Eth1/1 Egress:Eth1/3 Vnid:252313620:22:38 INFO fib:737 spine1005:Transit in spine20:23:32 INFO main:1295 L3 packet Seen on leaf103 Ingress:Eth1/29 Egress:Eth1/27/4 Vnid:NULL!20:24:02 INFO fib:219 leaf103:L3 out interface Ethernet1/27/420:24:10 INF

184、O main:781 Computed egress encap string vlan-105520:24:17 INFO main:1796 Packet is Exiting fabric with peer-device:N3K-1 and peer-port:Ethernet1/31Orchestrate EndOrchestrate End-toto-End End ELAMs from the APIC!ELAMs from the APIC!BRKDCN-390084 2023 Cisco and/or its affiliates.All rights reserved.Ci

185、sco Public#CiscoLiveSPAN/ERSPANDont neglect old friends!Both local span and erspan supportedERSPAN requires an l3 endpoint learned anywhere in the fabricStill the best tool for checking Packet contentsFrame formatRetransmissionsand anything else that can be seen in a pcapBRKDCN-390085 2023 Cisco and

186、/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOther Tools Requiring External ResourcesNetflowCaptures flow information based on specified criteriaUseful for troubleshooting packet loss and latencyFlow TelemetryHardware directly streams flow data to Nexus Dashboard InsightsUseful for t

187、roubleshooting packet loss and latencyLatency measurements leverage PTP for additional accuracyNDI can perform additional flow analyticsBRKDCN-390086Debugging ACI BUM Flows 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpine

188、EP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafLeaf Floods ARP in BD GIPO Leaf Floods ARP in BD GIPO on selected FTAG tree with BD on selected FTAG tree with BD vnid setvnid setBridge Domain Settings:Unicast Routing DisableARP Flooding EnabledEP1EP1192.168.100.10/24192.1

189、68.100.10/240000.cccc.dddd0000.cccc.ddddARP:Who has 192.168.100.10?show ip mroute 225.0.2.128 vrf overlay-1IP Multicast Routing Table for VRF overlay-1(*,225.0.2.128/32),uptime:22w2d,isisIncoming interface:Null,RPF nbr:0.0.0.0Outgoing interface list:(count:2)Ethernet1/29.9,uptime:8w2dEthernet1/30.10

190、,uptime:22w2dCheck GIPO Route1BRKDCN-390088 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP How to Find the GiPoFrom the GUImoquery-c fvBD-f fv.BD.dn*tn-CL2022/BD-bd1#fv.BDarpFlood :yesbcastP :225.0.2.128dn :uni/tn-CL2022/BD-bd1moquery-c l2BD-f l2.BD.name=CL2022:bd1-x

191、rsp-subtree=full rsp-subtree-class=fmcastGrp#fmcast.Grpaddr :225.0.2.128dn :sys/ctx-vxlan-2523136/bd-vxlan-14811121/fmgrp-225.0.2.128rn :fmgrp-225.0.2.128From the APIC CLIFrom the Switch CLIBRKDCN-390089 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP Ingress LeafLeafL

192、eafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafLeaf Floods ARP in BD GIPO Leaf Floods ARP in BD GIPO on selected FTAG tree with BD on selected FTAG tree with BD vnid setvnid setBridge Domain Settings:Unicast Routing DisableARP Flooding Enab

193、ledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddARP:Who has 192.168.100.10?vsh_lcdebug plat internal app elam asic 0trigger resettrigger init in-select 6 out-select 0set outer arp source-ip 192.168.100.11set outer arp target-ip 192.168.100.10start!statELAM STATUS=Asic 0 Slice

194、0 Status ArmedAsic 0 Slice 1 Status ArmedAsic 0 Slice 2 Status TriggeredAsic 0 Slice 3 Status ArmedELAM the ARP request!1BRKDCN-390090 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveOuter L2 Header -Access Encap VLAN :3502(0 xDAE)Outer L3 Header -ARP Opcode :Request(0 x1)

195、ARP Sender IP :192.168.100.11ARP Target IP :192.168.100.10Contract Result -Contract Drop :noContract Applied :noFINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_IG MC TENANT MYTEP BRIDGE MISS FLOODLookup Drop-LU drop reason :no dropARP Ingress Leaf Elam Results(ereport)Bridge Domai

196、n Settings:Unicast Routing DisableARP Flooding EnabledNot Dropped in lookups!Not Dropped in lookups!Make sure this matches Make sure this matches what is expectedwhat is expectedFrame is flooded in the Bridge Domain!BRKDCN-390091 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#Cisc

197、oLiveARP How to Find the FTAGNo other way than Elammodule-1(DBG-elam-insel6)#ereport|grep nopad.ftagwol_lu2ba_sb_info.mc_info.mc_info_nopad.ftag:0 x8Selected ftag is 0 x8Selected ftag is 0 x8Leaf forwards to root port and OIFs for ftag 8Since GIPO is 225.0.2.128,Dest multicast address is 225.0.2.136

198、(gipo+ftag)Check ftag topology with show isis internal mcast routes ftagleaf103#show isis internal mcast routes ftagIS-IS process:isis_infraVRF:defaultFTAG Routes=FTAG ID:8 Enabled Cost:(1/6/0)-Root port:Ethernet1/29.9OIF List:Leaf appends ftag to gipo and Leaf appends ftag to gipo and forwards out

199、Eth1/29 to spineforwards out Eth1/29 to spineBRKDCN-390092 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP-SpineLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafRoot spine for ftag 8 Root spine for ftag 8 f

200、orwards out OIFsforwards out OIFsBridge Domain Settings:Unicast Routing DisableARP Flooding EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddARP:Who has 192.168.100.10?spine1005#show isis internal mcast routes ftagIS-IS process:isis_infraVRF:defaultFTAG Routes=FTAG ID:8 Roo

201、t Enabled Cost:(0/0/0)-Root port:-OIF List:Ethernet1/1.20Ethernet1/2.21Ethernet1/3.19This spine is the root!Root for Root for Ftag 8Ftag 8Spine forwards out OIFs2BRKDCN-390093 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP Egress LeafLeafLeafLeafLeafSpineSpineSpineSpi

202、neEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafBridge Domain Settings:Unicast Routing DisableARP Flooding EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddARP:Who has 192.168.100.10?leaf102#show vlan|grep CL2022:bd170CL2022:bd1 activeleaf102#s

203、how vlan id 70 extendedVLAN Name Encap Ports-70 CL2022:bd1 vxlan-14811121 Eth1/33,Eth1/34,Eth1/43,Eth1/48,Po5,Po6,Po8,Po9Flood out these ports and encaps in this BDEgress leaf(s)floods out Egress leaf(s)floods out all ports in the BD(except all ports in the BD(except with flood in encap)with flood i

204、n encap)3BRKDCN-390094 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafBridge Domain Settings:Unicast Routing DisableARP Flooding EnabledEP1EP1192

205、.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddARP:Who has 192.168.100.10?Egress leaf(s)floods out Egress leaf(s)floods out all ports in the BD(except all ports in the BD(except with flood in encap)with flood in encap)vsh_lcdebug plat internal tah elam asic 0trigger resettrigger init in-

206、select 14 out-select 1set inner arp source-ip 192.168.100.11 set inner arp target-ip 192.168.100.10set inner l2 dst_mac ffff.ffff.ffffstartstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedELAM the ARP request!3BRKDCN-390095 2023 Cisco and/or its affiliates.All rights reserve

207、d.Cisco Public#CiscoLiveOuter L3 Header-Destination IP :225.0.2.136Inner L3 Header-ARP Sender IP :192.168.100.11ARP Target IP :192.168.100.10Outer L4 Header-VRF or BD VNID :14811121(0 xE1FFF1)Contract Result-Contract Drop :noFINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_EG MC IN

208、FRA ENCAP MYTEP BRIDGE MISS FLOODLookup Drop-LU drop reason :no dropARP Egress Leaf Elam Results(ereport)Bridge Domain Settings:Unicast Routing DisableARP Flooding EnabledNot Dropped in lookups!Not Dropped in lookups!Destination is GIPO Destination is GIPO(225.0.2.128)+FTAG(0 x8)(225.0.2.128)+FTAG(0

209、 x8)Frame is flooded in the Bridge Domain!2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveARP Egress Leaf Port is VPCBridge Domain Settings:Unicast Routing DisableARP Flooding EnabledBoth VPC members receive a flooded copyOne VPC member is the Designated Forwarder(DF)for t

210、he flowDF is hashed per flowOnly DF floods out VPC interfacesmodule-1(DBG-elam-insel14)#ereport|grep df|grep vpcsug_lub_latch_results_vec.lub4_1.vpc_df:0 x0sug_fpx_lookup_vec.lkup.dciptvec.pt.vpc_df:0 x0sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec.pt.vpc_df:0 x0sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec

211、.pt.vpc_df:0 x0module-1(DBG-elam-insel14)#ereport|grep df|grep vpcsug_lub_latch_results_vec.lub4_1.vpc_df:0 x1sug_fpx_lookup_vec.lkup.dciptvec.pt.vpc_df:0 x1sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec.pt.vpc_df:0 x1sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec.pt.vpc_df:0 x1DF LeafDF LeafNonNon-DF LeafDF

212、LeafBRKDCN-390097Debugging ACI Bridged Flows 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafLeaf looks at the dst mac to Leaf looks at

213、 the dst mac to determine if it should route or switchdetermine if it should route or switchBridge Domain Settings:Unicast Routing DisableUnknown Unicast FloodEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10leaf103#show endpoint mac 0000.cccc.dddd+-+-+-+-+VLAN/

214、Encap MAC Address InterfaceDomain VLAN IP Address +-+-+-+-+32/CL2022:vrf1 vxlan-14811121 0000.cccc.dddd tunnel1Lookup dst mac in ingress BDSince dst mac is not the Since dst mac is not the router(GW)mac,leaf does router(GW)mac,leaf does mac lookup in BD(usually mac lookup in BD(usually determined by

215、 ingress vlan)determined by ingress vlan)21leaf103#show int tun1Tunnel destination 10.0.176.67BRKDCN-390099 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0

216、000.aaaa.bbbbLeafLeafBridge Domain Settings:Unicast Routing DisableUnknown Unicast FloodEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10vsh_lcdebug plat internal app elam asic 0trigger resettrigger init in-select 6 out-select 0set outer ipv4 src_ip 192.168.100.

217、11 dst_ip 192.168.100.10startELAMELAMBRKDCN-3900100 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafForwarding VerificationsBridge Domain Settings:Unicast Routing DisableUnknown Unicast FloodOuter L2 Header-Destination MAC :0000.cccc.ddddSource MA

218、C :0000.aaaa.bbbbAccess Encap VLAN :3502(0 xDAE)Outer L3 Header-IP Protocol Number:ICMPDestination IP :192.168.100.10Source IP :192.168.100.11Other Forwarding Information-Encap Index is valid :yesEncap Index :34(0 x22)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_IG UC TENANT MY

219、TEP BRIDGE HITLookup Drop-LU drop reason :no dropDest mac that is looked up within BDDest mac that is looked up within BDMake sure this is the expected vlanMake sure this is the expected vlanDest is tunnelDest is tunnelshow plat internal hal tunnel rtep apd=ifId IP RwEncapIdx=18010001 10.0.176.67 22

220、 Forward to this overlay TEPForward to this overlay TEPNot Dropped in lookups!Not Dropped in lookups!Unicast+Bridge(L2 lookup)+Destination KnownBRKDCN-3900101 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafForwarding VerificationsBridge Domain Se

221、ttings:Unicast Routing DisableUnknown Unicast Floodereport|grep ovector ovector :152(0 x98)show platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a01c000 Eth1/290 59 2 18 18 98Traffic is forwarded out Eth1/29!Traffic is forwarded out Eth1/29!BRKDCN-3900102 2023 Cisco and/or its affi

222、liates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafContract VerificationBridge Domain Settings:Unicast Routing DisableUnknown Unicast FloodContract Lookup Key-IP Protocol :ICMP(0 x1)L4 Src Port :2048(0 x800)L4 Dst Port :35914(0 x8C4A)sclass(src pcTag):49154(0 xC002)dclass(dst

223、 pcTag):49154(0 xC002)src pcTag is from local table :yesUnknown Unicast/Flood Packet:noContract Result-Contract Drop :noContract Applied :yesContract Hit :yesContract Aclqos Stats Index :131025(show sys int aclqos zoning-rules|grep-B 9 Idx:131025)Source and Dest EPG is the Source and Dest EPG is the

224、 same.Implicitly permit!same.Implicitly permit!(unless isolation enabled)(unless isolation enabled)Contract Applied and Contract Applied and no Drop!no Drop!BRKDCN-3900103 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Egress LeafLeafLeafLeafLeafSpineSpineSp

225、ineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafPolicy was applied by ingress Policy was applied by ingress leaf.Dont apply contracts!leaf.Dont apply contracts!Bridge Domain Settings:Unicast Routing DisableUnknown Unicast FloodEP1EP1192.168.100.10/24192.168.100.10

226、/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10leaf101#show endpoint mac 0000.cccc.dddd+-+-+-+-+VLAN/Encap MAC Address InterfaceDomain VLAN IP Address +-+-+-+-+3/CL2022:vrf1 vlan-3501 0000.cccc.dddd po5Forward out portchannel 5 in vlan 3501!Since VNID is the BD VNID,forward Since VNID is the BD V

227、NID,forward based on dest endpoint macbased on dest endpoint mac34BRKDCN-3900104 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.100.11/24192.168.100.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafBridge

228、Domain Settings:Unicast Routing DisableUnknown Unicast FloodEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10debug plat internal tah elam asic 0trigger resettrigger init in-select 14 out-select 0set inner ipv4 src_ip 192.168.100.11 dst_ip 192.168.100.10startElam

229、ElamBRKDCN-3900105 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInner L2 Header-Inner Destination MAC :0000.cccc.ddddInner L3 Header-Destination IP :192.168.100.10Outer L4 Header-L4 Type :iVxLANSrc Policy Applied Bit:1Dst Policy Applied Bit:1VRF or BD VNID :14811121(0 x

230、E1FFF1)Sideband Information-ovector:146(0 x92)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_EG UC INFRA ENCAP MYTEP BRIDGE HITLookup Drop-LU drop reason :no dropKnown Unicast Egress LeafBridge Domain Settings:Unicast Routing DisableUnknown Unicast Floodshow platform internal hal

231、 l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a021000 Eth1/340 32 1 9 12 92Unicast+Bridge(L2 lookup)+Destination KnownContracts have already been Contracts have already been applied.No need to check.applied.No need to check.Forward out Eth1/34!Forward out Eth1/34!Mac lookup done in bridge Mac lookup

232、 done in bridge domain with this VNIDdomain with this VNIDBRKDCN-3900106Debugging ACI Routed Flows 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.

233、bbbbLeafLeafLeaf looks at the dst mac to Leaf looks at the dst mac to determine if it should route or switchdetermine if it should route or switchBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddleaf103#show endpoint ip 192.168.100.10+

234、-+-+-+VLAN/MAC Address InterfaceDomain IP Address +-+-+-+CL2022:vrf1 192.168.100.10 tunnel1Lookup dst IP in ingress VRFSince dst mac is the router(GW)mac,leaf Since dst mac is the router(GW)mac,leaf does IP lookup in VRF of source IPdoes IP lookup in VRF of source IPleaf103#show int tun1Tunnel desti

235、nation 10.0.176.67Ping 192.168.100.1021BRKDCN-3900108 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafBridge Domain Settings:Unicast Ro

236、uting EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10Leaf forwards packet to remote Leaf forwards packet to remote TEP with VRF VNID setTEP with VRF VNID set4103#show sys internal epm endpoint ip 192.168.200.11!omittedBD vnid:16613259:VRF vnid:2523136sc

237、lass:32771103#show zoning-rule src-epg 32771 dst-epg 49154 scope 2523136+-+-+-+|RuleID|Name|Action|+-+-+-+|4209|CL2022:allow-all|permit|+-+-+-+103#show sys internal epm endpoint ip 192.168.100.10!omittedBD vnid:0:VRF vnid:2523136sclass:49154Leaf does contract Leaf does contract lookup based on src l

238、ookup based on src and dst pcTag valuesand dst pcTag values3Get SclassGet DclassCheck ContractBRKDCN-3900109 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb

239、0000.aaaa.bbbbLeafLeafEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10vsh_lcdebug plat internal app elam asic 0trigger resettrigger init in-select 6 out-select 0set outer ipv4 src_ip 192.168.200.11set outer ipv4 dst_ip 192.168.100.10startstatELAM STATUS=Asic 0

240、Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedELAMELAMBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900110 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafForwarding VerificationsOuter L2 Header-Destination MAC :0022.BDF8.19FFAccess E

241、ncap VLAN :3769(0 xEB9)Outer L3 Header-Destination IP :192.168.100.10Source IP :192.168.200.11Other Forwarding Information-Encap Index is valid :yesEncap Index :34(0 x22)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_IG UC TENANT MYTEP ROUTE HITLookup Drop-LU drop reason :no drop

242、ACI Router Mac.Route this packet!ACI Router Mac.Route this packet!Make sure this is the expected vlanMake sure this is the expected vlanDest is tunnelDest is tunnelshow plat internal hal tunnel rtep apd=ifId IP RwEncapIdx=18010001 10.0.176.67 22 Forward to this overlay TEPForward to this overlay TEP

243、Not Dropped in lookups!Not Dropped in lookups!Unicast+Route(L3 lookup)+L3 Route FoundBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900111 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafForwarding Verificationsereport|grep ovector ovector

244、:152(0 x98)show platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a01c000 Eth1/290 59 2 18 18 98Traffic is forwarded out Eth1/29!Traffic is forwarded out Eth1/29!Bridge Domain Settings:Unicast Routing EnabledBRKDCN-3900112 2023 Cisco and/or its affiliates.All rights reserved.Cisco P

245、ublic#CiscoLiveKnown Unicast Ingress LeafContract VerificationContract Lookup Key-IP Protocol :ICMP(0 x1)L4 Src Port :2048(0 x800)L4 Dst Port :31219(0 x79F3)sclass(src pcTag):32771(0 x8003)dclass(dst pcTag):49154(0 xC002)src pcTag is from local table :yesUnknown Unicast/Flood Packet:noContract Resul

246、t-Contract Drop :noContract Applied :yesContract Hit :yesContract Aclqos Stats Index :131025Source and Dest EPG Source and Dest EPG used for contract lookupused for contract lookupContract Applied and Contract Applied and no Drop!no Drop!Bridge Domain Settings:Unicast Routing EnabledBut how do I kno

247、w which But how do I know which contract this is actually hitting?contract this is actually hitting?BRKDCN-3900113 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Ingress LeafContract VerificationContract Result-Contract Drop :noContract Applied :yesContract

248、Hit :yesContract Aclqos Stats Index:131025Hardware Index of Hardware Index of matching contractmatching contractBridge Domain Settings:Unicast Routing Enabledshow sys int aclqos zoning-rules|grep-B 9 Idx:130974=Rule ID:4163 Scope 8 Src EPG:32771 Dst EPG:49154 Filter 532Curr TCAM resource:=SDK Info=R

249、esult/Stats Idx:130974ZoningZoning-rule IDrule IDRun this from vsh_lcRun this from vsh_lcshow zoning-rule rule-id 4163+-+-+-+-+-+-+-+|Rule ID|SrcEPG|DstEPG|FilterID|Scope|Name|Action|+-+-+-+-+-+-+-+|4163|32771|49154|532|2523136|CL2022:allow-all|permit|+-+-+-+-+-+-+-+Traffic hit this contract!Traffic

250、 hit this contract!Run this from normal shellRun this from normal shellBRKDCN-3900114 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafPo

251、licy was applied by ingress Policy was applied by ingress leaf.Dont apply contracts!leaf.Dont apply contracts!EP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddleaf102#show endpoint ip 192.168.100.10+-+-+-+-+VLAN/Encap MAC Address InterfaceDomain VLAN IP Address +-+-+-+-+3 vlan-350

252、1 0000.cccc.dddd po5CL2022:vrf1 vlan-3501 192.168.100.10 po5Forward out portchannel 5 in vlan 3501!Since VNID is the VRF VNID,forward Since VNID is the VRF VNID,forward based on dest endpoint IPbased on dest endpoint IPBridge Domain Settings:Unicast Routing Enabled56Ping 192.168.100.10BRKDCN-3900115

253、 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveKnown Unicast Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10

254、debug plat internal tah elam asic 0trigger resettrigger init in-select 14 out-select 0set inner ipv4 src_ip 192.168.200.11 set inner ipv4 dst_ip 192.168.100.10startstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedElamElamBridge Domain Settings:Unicast Routing EnabledBRKDCN-3

255、900116 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveInner L2 Header-Inner Destination MAC :000C.0C0C.0C0CInner L3 Header-Destination IP :192.168.100.10Outer L4 Header-L4 Type :iVxLANSrc Policy Applied Bit:1Dst Policy Applied Bit:1VRF or BD VNID :2523136(0 x268000)Sideba

256、nd Information-ovector:146(0 x92)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_EG UC INFRA ENCAP MYTEP ROUTE HITLookup Drop-LU drop reason :no dropKnown Unicast Egress Leafshow platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a021000 Eth1/340 32 1 9 12 92Unicas

257、t+Route(L3 lookup)+L3 Route FoundContracts have already been Contracts have already been applied.No need to check.applied.No need to check.Forward out Eth1/34!Forward out Eth1/34!IP lookup done in VRF with this VNIDIP lookup done in VRF with this VNIDBridge Domain Settings:Unicast Routing EnabledBRK

258、DCN-3900117 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafDst mac is router mac so Route!Dst mac is router mac so Route!Lookup dest

259、 IP in vrf of source IP.Lookup dest IP in vrf of source IP.Bridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddshow endpoint ip 192.168.100.10+-+-+-+VLAN/MAC Address InterfaceDomain IP Address +-+-+-+Lookup dst IP in ingress VRFPing 192.1

260、68.100.10show ip route 192.168.100.10 vrf CL2022:vrf1192.168.100.0/24,attached,direct,pervasive*via 10.0.176.66%overlay-1,1/0,staticrecursive next hop:10.0.176.66/32%overlay-1No endpoint learn,No endpoint learn,check route table!check route table!show isis dtep vrf overlay-1DTEP-Address Role Type10.

261、0.176.66 SPINE PHYSICAL,PROXY-ACAST-V4Send to Send to spine proxy!spine proxy!11a1b1cBRKDCN-3900118 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aa

262、aa.bbbbLeafLeafBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddContract not applied for proxy lookups.Contract not applied for proxy lookups.Leaf forwards packet to spine Leaf forwards packet to spine proxy TEP with VRF VNID setproxy

263、TEP with VRF VNID set32Ping 192.168.100.10BRKDCN-3900119 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafEP1EP1192.168.100.10/24192.1

264、68.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10vsh_lcdebug plat internal app elam asic 0trigger resettrigger init in-select 6 out-select 0set outer ipv4 src_ip 192.168.200.11set outer ipv4 dst_ip 192.168.100.10startstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status Arme

265、dELAMELAMBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900120 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafForwarding Verifications121BRKDCN-3900Outer L2 Header-Destination MAC :0022.BDF8.19FFAccess Encap VLAN :3769(0 xEB9)Outer L3 He

266、ader-Destination IP :192.168.100.10Source IP :192.168.200.11Other Forwarding Information-Encap Index is valid :yesEncap Index :1(0 x1)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_IG UC TENANT MYTEP ROUTE HITLookup Drop-LU drop reason :no dropACI Router Mac.Route this packet!ACI

267、 Router Mac.Route this packet!Make sure this is the expected vlanMake sure this is the expected vlanDest is tunnelDest is tunnelshow plat internal hal tunnel rtep apd=ifId IP RwEncapIdx=18010007 10.0.176.66 1 Forward to this overlay TEPForward to this overlay TEPNot Dropped in lookups!Not Dropped in

268、 lookups!Unicast+Route(L3 lookup)+L3 Route FoundBridge Domain Settings:Unicast Routing Enabled 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafForwarding Verificationsereport|grep ovector ovector :152(0 x98)show platform internal hal l2 port gpd

269、=IfId Ifname As AP Sl Sp Ss Ovec=1a01c000 Eth1/290 59 2 18 18 98Traffic is forwarded out Eth1/29!Traffic is forwarded out Eth1/29!Bridge Domain Settings:Unicast Routing EnabledBRKDCN-3900122 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Ingress LeafContra

270、ct VerificationContract Lookup Key-IP Protocol :ICMP(0 x1)L4 Src Port :2048(0 x800)L4 Dst Port :31219(0 x79F3)sclass(src pcTag):32771(0 x8003)dclass(dst pcTag):1(0 x1)src pcTag is from local table :yesUnknown Unicast/Flood Packet:noContract Result-Contract Drop :noContract Applied :noContract Hit :y

271、esContract Aclqos Stats Index :131025Dest EPG is 1 for fabric Dest EPG is 1 for fabric owned subnetsowned subnetsContract not applied Contract not applied since this is proxied!since this is proxied!Bridge Domain Settings:Unicast Routing EnabledBRKDCN-3900123 2023 Cisco and/or its affiliates.All rig

272、hts reserved.Cisco Public#CiscoLiveProxied Unicast SpineLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafSince this is proxied,Spine does Since this is proxied,Spine does COOP lookup.Since VRF vnid is set,COOP lookup.Since VRF vnid is se

273、t,Spine looks up IP rather than macSpine looks up IP rather than macBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10spine#show coop internal info ip-db|grep-B 1-A 15 192.168.100.10-IP address:192.168.100.10Vrf:25231

274、36Num tunnels:1Tunnel address:10.0.176.67Tunnel ref count:1apic1#moquery-c ipv4Addr-f ipv4.Addr.addr=10.0.176.67*node-101/*dom-overlay-1/if-lo1/addr-10.0.176.67/32*node-102/*dom-overlay-1/if-lo1/addr-10.0.176.67/32Dest TEP of Leaf(s)that Dest TEP of Leaf(s)that own this Endpointown this Endpoint4BRK

275、DCN-3900124 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafPolicy was NOT applied by Policy was NOT applied by ingress leaf.Apply con

276、tracts!ingress leaf.Apply contracts!EP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10leaf102#show endpoint ip 192.168.100.10+-+-+-+-+VLAN/Encap MAC Address InterfaceDomain VLAN IP Address +-+-+-+-+3 vlan-3501 0000.cccc.dddd po5CL2022:vrf1 vlan-3501 192.168.100.1

277、0 po5Forward out portchannel 5 in vlan 3501!Since VNID is the VRF VNID,forward Since VNID is the VRF VNID,forward based on dest endpoint IPbased on dest endpoint IPBridge Domain Settings:Unicast Routing Enabled56BRKDCN-3900125 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLi

278、veProxied Unicast Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineEP2EP2192.168.200.11/24192.168.200.11/240000.aaaa.bbbb0000.aaaa.bbbbLeafLeafEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 192.168.100.10debug plat internal tah elam asic 0trigger resettrigger init in-select 1

279、4 out-select 0set inner ipv4 src_ip 192.168.200.11 set inner ipv4 dst_ip 192.168.100.10startstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedElamElamBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900126 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public

280、#CiscoLiveInner L3 Header-Destination IP :192.168.100.10Outer L4 Header-L4 Type :iVxLANSrc Policy Applied Bit:0Dst Policy Applied Bit:0VRF or BD VNID :2523136(0 x268000)Sideband Information-ovector :146(0 x92)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_EG UC INFRA ENCAP MYTEP

281、ROUTE HITLookup Drop-LU drop reason :no dropProxied Unicast Egress LeafForwarding Verificationsshow platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a021000 Eth1/340 32 1 9 12 92Unicast+Route(L3 lookup)+L3 Route FoundContracts have not been applied yet!Contracts have not been appli

282、ed yet!Forward out Eth1/34!Forward out Eth1/34!IP lookup done in VRF with this VNIDIP lookup done in VRF with this VNIDBridge Domain Settings:Unicast Routing EnabledNot Dropped in lookups!Not Dropped in lookups!BRKDCN-3900127 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiv

283、eProxied Unicast Egress LeafContract VerificationContract Lookup Key-IP Protocol :ICMP(0 x1)L4 Src Port :2048(0 x800)L4 Dst Port :33226(0 x81CA)sclass(src pcTag):32771(0 x8003)dclass(dst pcTag):49154(0 xC002)src pcTag is from local table :noUnknown Unicast/Flood Packet:noContract Result-Contract Dro

284、p :noContract Applied :yesContract Hit :yesContract Aclqos Stats Index :131025Source and Dest EPG used Source and Dest EPG used for contract lookup.for contract lookup.Contract Applied and Contract Applied and no Drop!no Drop!Bridge Domain Settings:Unicast Routing EnabledBut how do I know which But

285、how do I know which contract this is actually hitting?contract this is actually hitting?BRKDCN-3900128 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveProxied Unicast Egress LeafContract VerificationContract Result-Contract Drop :noContract Applied :yesContract Hit :yesCon

286、tract Aclqos Stats Index:81836Hardware Index of Hardware Index of matching contractmatching contractBridge Domain Settings:Unicast Routing Enabledshow sys int aclqos zoning-rules|grep-B 9 Idx:81836=Rule ID:4234 Scope 16 Src EPG:32771 Dst EPG:49154 Filter 532=SDK Info=Result/Stats Idx:81836ZoningZoni

287、ng-rule IDrule IDRun this from vsh_lcRun this from vsh_lcshow zoning-rule rule-id 4234+-+-+-+-+-+-+-+|Rule ID|SrcEPG|DstEPG|FilterID|Scope|Name|Action|+-+-+-+-+-+-+-+|4163|32771|49154|532|2523136|CL2022:allow-all|permit|+-+-+-+-+-+-+-+Traffic hit this contract!Traffic hit this contract!Run this from

288、 normal shellRun this from normal shellBRKDCN-3900129 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineLeafLeafLeaf looks at the dst mac to Leaf looks at the dst mac to determine if it should route or switchd

289、etermine if it should route or switchBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddSince dst mac is the router(GW)mac,Since dst mac is the router(GW)mac,leaf does IP lookup in VRF of source IPleaf does IP lookup in VRF of source IPP

290、ing 10.99.99.100External IPExternal IP10.99.99.10010.99.99.100show endpoint ip 10.99.99.100+-+-+-+VLAN/MAC Address InterfaceDomain IP Address +-+-+-+Lookup dst IP in ingress VRFshow ip route 10.99.99.100 vrf CL2022:vrf110.99.99.0/24,ubest/mbest:1/0*via 10.0.64.70%overlay-1,200/20,bgp-65100recursive

291、next hop:10.0.64.70/32%overlay-1No endpoint learn,No endpoint learn,check route table!check route table!acidiag fnvread|grep 10.0.64.70Name IP Address Role-leaf10310.0.64.70/32 leafSend to BL Send to BL PTEP!PTEP!122a2b2cBRKDCN-3900130 2023 Cisco and/or its affiliates.All rights reserved.Cisco Publi

292、c#CiscoLiveL3Out Destination Ingress LeafLeafLeafLeafLeafSpineSpineSpineSpineLeafLeafBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddLeaf derives dest pcTag for Leaf derives dest pcTag for contract lookup based on l3out contract looku

293、p based on l3out policy prefixpolicy prefixPing 10.99.99.100External IPExternal IP10.99.99.10010.99.99.100leaf#vsh_lc vsh_lc-c show forwarding route 10.99.99.100 platf vrf CL2022:vrf1c show forwarding route 10.99.99.100 platf vrf CL2022:vrf1!Policy Prefix 10.99.99.0/24Policy Prefix 10.99.99.0/24!vrf

294、:16(0 x10),routed_if:0 x0 epc_classepc_class:3277232772(0 x8004)3Leaf forwards packet to Leaf forwards packet to remote TEP with VRF VNID setremote TEP with VRF VNID set4BRKDCN-3900131 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingress LeafLeafLeafLe

295、afLeafSpineSpineSpineSpineLeafLeafBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 10.99.99.100External IPExternal IP10.99.99.10010.99.99.100vsh_lcdebug plat internal tah elam asic 0trigger resettrigger init in-select 6 out-select

296、 0set outer ipv4 src_ip 192.168.100.10set outer ipv4 dst_ip 10.99.99.100startstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedELAMELAMBRKDCN-3900132 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingress LeafForwarding Verificati

297、onsOuter L2 Header-Destination MAC :0022.BDF8.19FFAccess Encap VLAN :3501(0 xDAD)Outer L3 Header-Destination IP :10.99.99.100Source IP :192.168.100.10Other Forwarding Information-Encap Index is valid :yesEncap Index :37(0 x25)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_IG UC T

298、ENANT MYTEP ROUTE HITLookup Drop-LU drop reason :no dropACI Router Mac.Route this packet!ACI Router Mac.Route this packet!Make sure this is the expected vlanMake sure this is the expected vlanDest is tunnelDest is tunnelshow plat internal hal tunnel rtep apd=ifId IP RwEncapIdx=18010004 10.0.64.70 25

299、 Forward to this overlay TEPForward to this overlay TEPNot Dropped in lookups!Not Dropped in lookups!Unicast+Route(L3 lookup)+L3 Route FoundBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900133 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingres

300、s LeafForwarding Verificationsereport|grep ovector ovector :48(0 x30)show platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=1a035000 Eth1/540 19 0 18 30 30Traffic is forwarded out Eth1/54!Traffic is forwarded out Eth1/54!Bridge Domain Settings:Unicast Routing EnabledBRKDCN-3900134 20

301、23 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingress LeafContract VerificationContract Lookup Key-IP Protocol :ICMP(0 x1)L4 Src Port :2048(0 x800)L4 Dst Port :12063(0 x2F1F)sclass(src pcTag):49154(0 xC002)dclass(dst pcTag):32772(0 x8004)src pcTag is from

302、 local table :yesUnknown Unicast/Flood Packet:noContract Result-Contract Drop :noContract Applied :yesContract Hit :yesContract Aclqos Stats Index :81765Source and Dest EPG Source and Dest EPG used for contract lookupused for contract lookupContract Applied and Contract Applied and no Drop!no Drop!B

303、ridge Domain Settings:Unicast Routing EnabledBut how do I know which But how do I know which contract this is actually hitting?contract this is actually hitting?BRKDCN-3900135 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Ingress LeafContract Verificati

304、onContract Result-Contract Drop :noContract Applied :yesContract Hit :yesContract Aclqos Stats Index:81765Hardware Index of Hardware Index of matching contractmatching contractBridge Domain Settings:Unicast Routing Enabledshow sys int aclqos zoning-rules|grep-B 9 Idx:81765=Rule ID:4248 Scope 16 Src

305、EPG:0 Dst EPG:32772 Filter 532Curr TCAM resource:=SDK Info=Result/Stats Idx:81765ZoningZoning-rule IDrule IDRun this from vsh_lcRun this from vsh_lcshow zoning-rule rule-id 4248+-+-+-+-+-+-+-+|Rule ID|SrcEPG|DstEPG|FilterID|Scope|Name|Action|+-+-+-+-+-+-+-+|4248|0|32772|532|2523136|CL2022:l3out-allo

306、w-all|permit|+-+-+-+-+-+-+-+Traffic hit this contract!Traffic hit this contract!Run this from normal shellRun this from normal shellBRKDCN-3900136 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveshow mac address addr 0005.73ff.593c vl 25VLAN MAC Address Ports-+-+-*25 0005.

307、73ff.593c eth1/27/4L3Out Destination Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineLeafLeafBridge Domain Settings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddSince received VNID is the VRF VNID,Since received VNID is the VRF VNID,forward based on dest

308、endpoint IPforward based on dest endpoint IPPing 10.99.99.100External IPExternal IP10.99.99.10010.99.99.100show endpoint ip 10.99.99.100+-+-+-+VLAN/MAC Address InterfaceDomain IP Address +-+-+-+Lookup dst IP in received VRFshow ip route 10.99.99.100 vrf CL2022:vrf110.99.99.0/24,ubest/mbest:1/0*via 1

309、0.55.0.100,vlan25,110/20,ospf,type-2No endpoint learn,No endpoint learn,check route table!check route table!show ip arp 10.55.0.100 vrf CL2022:vrf1Address MAC Address Interface10.55.0.100 0005.73ff.593c vlan25Forward based on ARP Forward based on ARP and MAC Adajcenciesand MAC Adajcencies55a5b5c5dPo

310、licy was applied by ingress Policy was applied by ingress leaf.No need to apply contractsleaf.No need to apply contracts6BRKDCN-3900137 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Egress LeafLeafLeafLeafLeafSpineSpineSpineSpineLeafLeafBridge Domain Se

311、ttings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddPing 10.99.99.100External IPExternal IP10.99.99.10010.99.99.100debug plat internal app elam asic 0trigger resettrigger init in-select 14 out-select 0set inner ipv4 src_ip 192.168.100.10 set inner ipv4 d

312、st_ip 10.99.99.100startstatELAM STATUS=Asic 0 Slice 0 Status TriggeredAsic 0 Slice 1 Status ArmedElamElamBRKDCN-3900138 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Destination Egress LeafInner L2 Header-Inner Destination MAC :000C.0C0C.0C0CInner L3 Header-Destina

313、tion IP :10.99.99.100Outer L4 Header-L4 Type :iVxLANSrc Policy Applied Bit:1Dst Policy Applied Bit:1VRF or BD VNID :2523136(0 x268000)Sideband Information-ovector:147(0 x93)FINAL FORWARDING LOOKUP-Bits set in Final Forwarding Block:IFABRIC_EG UC INFRA ENCAP MYTEP ROUTE HITLookup Drop-LU drop reason

314、:no dropshow platform internal hal l2 port gpd=IfId Ifname As AP Sl Sp Ss Ovec=4301a000 Eth1/27/40 54 2 13 13 93Unicast+Route(L3 lookup)+L3 Route FoundContracts have already been Contracts have already been applied.No need to check.applied.No need to check.Forward out Eth1/27/4!Forward out Eth1/27/4

315、!IP lookup done in VRF with this VNIDIP lookup done in VRF with this VNIDBridge Domain Settings:Unicast Routing EnabledBRKDCN-3900139 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveL3Out Source Ingress Border LeafLeafLeafLeafLeafSpineSpineSpineSpineLeafLeafBridge Domain S

316、ettings:Unicast Routing EnabledEP1EP1192.168.100.10/24192.168.100.10/240000.cccc.dddd0000.cccc.ddddICMP ReplyExternal IPExternal IP10.99.99.10010.99.99.100If VRF is in ingress mode,BL If VRF is in ingress mode,BL doesnt apply policydoesnt apply policyForward based on longest prefixForward based on l

317、ongest prefix-match within match within source VRF.EP learns are always longest.source VRF.EP learns are always longest.If dest IP is not learned endpoint and If dest IP is not learned endpoint and subnet is BD subnet,proxy!subnet is BD subnet,proxy!Refer back to the Routed Known Unicast and Proxied

318、 Unicast for more verifications12a2bBRKDCN-3900140 2023 Cisco and/or its affiliates.All rights reserved.Cisco Public#CiscoLiveFill out your session surveys!Attendees who fill out a minimum of four session surveys and the overall event survey will get Cisco Live-branded socks(while supplies last)!The

319、se points help you get on the leaderboard and increase your chances of winning daily and grand prizesAttendees will also earn 100 points in the Cisco Live Challenge for every survey completed.BRKDCN-3900141 2023 Cisco and/or its affiliates.All rights reserved.Cisco PublicContinue your educationVisit the Cisco Showcase for related demosBook your one-on-oneMeet the Engineer meetingAttend the interactive education with DevNet,Capture the Flag,and Walk-in LabsVisit the On-Demand Library for more sessions at www.CiscoL you#CiscoLive#CiscoLive

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(ACI 轉發網絡工程師藍圖.pdf)為本站 (2200) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站