Professional Documents
Culture Documents
Catalyst 6500 Architecture
Catalyst 6500 Architecture
BRKARC-3465
BRKARC-3465
Cisco Public
Session Goal
To provide you with a
thorough understanding
of the Catalyst
6500 switching
architecture, packet flow,
forwarding engine
functions, and key
feature operations.
BRKARC-3465
Cisco Public
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
6509-V-E
6513-E
6509-E
6506-E
6504-E
6503-E
Cisco Public
FABRIC
BUS
Linecard
Slots
Supervisor
32/720/2T
Slots
Linecard
Slots
BRKARC-3465
Cisco Public
DBUS
RBUS
EOBC
Linecard
Linecard
Linecard
CROSSBAR
Linecard
Linecard
BRKARC-3465
Cisco Public
6503/
6503-E
6504-E
6506/
6506-E
6509/
6509-E
6509NEBS-A
6509-V-E
6513
6513-E
Dual
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Single
Dual
Dual
Dual
Dual
Dual
Dual
10
Dual
Dual
11
Dual
Dual
12
Dual
Dual
13
Dual
Dual
BRKARC-3465
Cisco Public
Combined Mode
Catalyst 6500
50%
Power Supply 1
Catalyst 6500
50%
83%
Power Supply 2
Power Supply 1
83%
Power Supply 2
If one fails, the second supply can power the system on its
own
This is the default and recommended configuration for the
power supplies
If one fails, the second supply may not be able to power the
system on its own - this could result in devices or linecards
being shut down
This is not the recommended mode for production
BRKARC-3465
Cisco Public
11
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
12
Supervisor 720
3A / 3B / 3BXL
Supervisor 720-10G
3C / 3CXL
BRKARC-3465
Cisco
(more information
inPublic
the notes)
13
Classic BUS
Crossbar Fabric Channels
L2 CAM
Switch
Fabric
FIB TCAM
FIB Table
QOS ACL
MET
Security ACL
Fabric /
Layer 3
FWD
Engine
Replication
ASIC
RP
Flash
RP
DRAM
SP
Flash
SP
DRAM
MSFC3
BRKARC-3465
RP
SP
Port
ASIC
Counters
Netflow TCAM
Netflow Table
Netflow Stats
Port
ASIC
Adjacency
Adj Stats
1G
1G
1G
14
Classic BUS
Crossbar Fabric Channels
Switch
Fabric
Fabric
ASIC
L2 CAM
FIB Table
QOS ACL
20Gbps
Layer
2/3
FWD
Engine
Fabric /
MET
RP
SP
RP
Flash
SP
Flash
RP
DRAM
SP
DRAM
MSFC3
BRKARC-3465
FIB TCAM
Replication
ASIC
Security ACL
Counters
Netflow TCAM
Netflow Table
Netflow Stats
Port
ASIC
Adjacency
Port
ASIC
Adj Stats
10G
1G
1G
1G
10G
Cisco Public
15
Supervisor 2T
PFC4 / PFC4XL
BRKARC-3465
Ciscoin
Public
(more information
the notes)
16
Classic BUS
Crossbar Fabric Channels
Switch
Fabric
Fabric
ASIC
L2
NetFlow
CAM
20Gbps
MET
FIB
Layer
Counters
2/3 L3/4 Forwarding
LIF FWD
Engine
Netflow TCAM ADJ
Table
Engine
Fabric /
Replication
ASIC
Netflow Table
Netflow Stats
Port
ASIC
Flash
MSFC5
BRKARC-3465
FIB Table
CL2
TCAM
QOS ACL
CL1
TCAM
Security ACL
CPU
DRAM
FIB TCAM
Port
ASIC
LIF
DB
LIF
Stats
10G
1G
1G
1G
10G
RPF
Table
Adjacency
Adj Stats
L2 Forwarding
Engine
ACE
Counter
L2 CAM (128K)
PFC4
Cisco Public
17
Chassis
Supervisor 720s
Supervisor 2Ts
All E-Series
Only E-Series
Fan Trays
Power Supplies
3-Slot : 1 and 2
4-slot : 1 and 2
Supervisor Slots
6-slot : 5 and 6
9-slot : 5 and 6
13-slot : 7 and 8
BRKARC-3465
Cisco Public
18
Linecard
Slot #7
Linecard
Slot #2
Linecard
Slot #6
Data Flows
BRKARC-3465
Linecard
Slot #8
Linecard
Slot #3
Linecard Supervisor
Slot #4
Slot #5
Cisco Public
19
Cisco Public
20
Switch Fabric
BRKARC-3465
Cisco Public
21
Chanl
Speed
rate
20G
10%
20%
20G
20%
10%
20G
0%
1% @20:30 13Jan12
0%
1% @20:46 06Jan12
20G
0%
1% @20:47 16Jan12
0%
1% @16:52 06Jan12
20G
20%
0%
0% @13:49 06Jan12
20G
0%
1% @17:44 06Jan12
0%
1% @00:36 08Jan12
8G
0%
3% @16:33 12Feb12
50%
BRKARC-3465
peak
rate
peak
Cisco Public
22
MSFC3
MSFC5
Cisco Public
23
USB Support
- USB serial console access
BRKARC-3465
Cisco Public
24
PFC4
IPv4 - IPv6 - MPLS - Multicast - Policing - Classification RACL - VACL - PACL - GRE - Tunneling - URPF - Control
Plane Policing - and more
Flexible NetFlow - ACL Dry Run - ACL Hitless Commit Cisco TrustSec VPLS - Egress NetFlow - IPv6 uRPF Roles Based Access Control 512K Multicast Routes
Improved EtherChannel Hash and more
BRKARC-3465
Cisco Public
26
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
29
Linecard
Port
ASIC
BRKARC-3465
Cisco Public
30
EoBC
Fabric ASIC
Rbus
Replication
ASIC
Port
ASIC
Port
ASIC
Port
ASIC
Port
ASIC
BRKARC-3465
Linecard
Dbus
Cisco Public
31
Port
ASIC
Port
ASIC
Centralized
Forwarding Card
Fabric and
Replication
ASIC
Port
ASIC
Linecard
Fabric and
Replication
ASIC
Dbus
Rbus
EoBC
20Gbps Fabric
Channel
Port
ASIC
Cisco Public
33
20Gbps Fabric
Channel
EoBC
Distributed
Forwarding Card
L2 FWD
Fabric and
Replication
ASIC
L3 FWD
Port
Port
..
ASIC
ASIC
Linecard
Fabric and
Replication
ASIC
Port
Port
..
ASIC
ASIC
BRKARC-3465
Cisco Public
34
40Gbps Fabric
Channel
EoBC
FABRIC INTERFACE
FIRE
ASIC
L2 FWD
FIRE
ASIC
FIRE
ASIC
L3 FWD
PORT
ASIC
PORT
ASIC
PORT
ASIC
PORT
ASIC
PORT
ASIC
PORT
ASIC
PORT
ASIC
PORT
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
CTS
ASIC
Linecard
FIRE
ASIC
Distributed
Forwarding Card
BRKARC-3465
Cisco Public
35
BRKARC-3465
Cisco Public
36
Cisco Public
37
Cisco Public
38
Cisco Public
39
Mode
Description
Between non fabric modules and between a non fabric and
FLOW THROUGH
TRUNCATED
Data H
Data
the chassis.
Throughput 15 Mpps (@ 64 byte frames); independent of
frame size for CEF256 and CEF720
Bandwidth 16 G shared for classic; 8 G per CEF256; 20
G/channel CEF720
Data Bus frame size is variable; min of 4 cycles (64 Bytes
Data) on the Data Bus for every frame.
When only ALL fabric enabled linecards in a chassis
COMPACT
BRKARC-3465
Illustration
Data
Bus
H
D H
Bus
D H D H D H D H
Bus
Cisco Public
41
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
42
Layer 2 Table
Learn
Layer 2 Table
Yes
Source MAC
Lookup
Destination MAC
Lookup
New MAC?
Router MAC?
No
Update entry
Layer 2 Table
Layer 2 Table
Yes
L3 forwarding
No
Known MAC?
L2 forwarding
Yes
No
L2 flooding
BRKARC-3465
Cisco Public
PFC
A
B
C
D
E
F
16, 24, or
32 pages
1
2
3
4
5
6
4096
rows
MAC Table
PFC3B/BXL = 16 pages (64K entries)
PFC3C/CXL = 24 pages (96K entries)
PFC4/XL = 32 pages (128K entries)
BRKARC-3465
Cisco Public
44
VLAN
16, 24, or
32 Pages
PFC
MAC
Hash
0000.2222.7777 | 20
0000.1111.cccc | 10
0000.dddd.a112 | 30
4096
Rows
0000.bbbb.ac1c | 30
HIT!!!
MAC Table
1. Hash result identifies the starting Page and Row in MAC table
2. Lookup key (VLAN + MAC) compared to contents of indexed line on each page, sequentially
3. Destination lookup: Match returns destination interface(s), Miss results in Flood
4. Source lookup: Match updates age of matching entry, Miss installs new entry in table
BRKARC-3465
Cisco Public
45
vlan
mac address
type
learn
age
ports
----+----+---------------+-------+-----+----------+----------------------------*
192 00d0.0053.bc00
dynamic
Yes
205 0024.c4dc.d740
static
No
Router
20 0024.c4dc.d740
static
No
Router
192 0014.5e31.4220
dynamic
Yes
65
Gi7/3
60 00d0.2bfc.23f5
dynamic
Yes
30
Gi5/14
192 00e0.1e5d.e9ff
dynamic
Yes
30
Gi7/3
BRKARC-3465
Gi7/3
Cisco Public
46
Cisco Public
47
1 2 3 4 5 6 7 8
EtherChannel Hash
3 bit result
E/Chan
Bundle
Link1
Link2
Link3
Link4
Link5
Link6
Link7
Link8
2 Links
50%
50%
--
--
--
--
--
--
3 Links
37.5%
37.5%
25%
--
--
--
--
--
4 Links
25%
25%
25%
25%
--
--
--
--
5 Links
25%
25%
25%
12.5%
12.5%
--
--
--
6 Links
25%
25%
12.5%
12.5%
12.5%
12.5%
--
--
7 Links
25%
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
--
8 Links
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
Cisco Public
48
..
1 2 3
EtherChannel Hash
256
8 bit result
E/Chan
Bundle
Link1
Link2
Link3
Link4
Link5
Link6
Link7
Link8
2 Links
50%
50%
--
--
--
--
--
--
3 Links
33.6%
33.2%
33.2%
--
--
--
--
--
4 Links
25%
25%
25%
25%
--
--
--
--
5 Links
20.4%
19.9%
19.9%
19.9%
19.9%
--
--
--
6 Links
16.8%
16.8%
16.8%
16.8%
16.4%
16.4%
--
--
7 Links
14.5%
14.5%
14.5%
14.5%
14%
14%
14%
--
8 Links
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
12.5%
Cisco Public
49
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
52
BRKARC-3465
Cisco Public
53
Supervisor 2T
16K Bridge
Domains
128K Logical
Interfaces
L3 Ports
L3 Ports
Tunnels
Etc
VLAN 14K
SVI
VLAN 14K
CoPP
Tunnels
Etc
VLAN 14K
BRKARC-3465
Cisco Public
54
Netflow TCAM
L3 Engine
Netflow Table
Netflow Statistics
8
Adjacency Statistics
3 8
2
1 8
BRKARC-3465
Adjacency Table
IP Packet Parse
L2 Engine
IP Packet Parse
L2 MAC Table
Cisco Public
55
GV
IF
RP
CL1
PO
CL2
RI
L2
Engine
BRKARC-3465
PL
L3
NF
L3
Engine
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public
56
GV
IF
RP
CL1
PO
CL2
RI
L2
Engine
BRKARC-3465
PL
L3
NF
L3
Engine
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public
57
Routing Protocols
OSPF, EIGRP, ISIS, BGP, etc
Software CEF
Hardware CEF
Cisco Public
58
IPv4 Unicast
IPv4 Multicast
IPv6 Unicast
IPv6 Multicast
MPLS
172.20.45.1
10.1.1.100
MASK (/32)
IF, MACs, MTU
10.1.3.0
10.1.2.0
MASK (/24)
10.1.0.0
172.16.0.0
MASK (/16)
Adjacency
Table
0.0.0.0
MASK (/0)
FIB TCAM
BRKARC-3465
Cisco Public
59
172.20.45.1
Packet
10.1.1.100
MASK (/32)
Key Gen
10.1.3.0
10.1.2.0
Load-Sharing
Hash
MASK (/24)
Lookup Key
HIT!
10.1.0.0
172.16.0.0
MASK (/16)
5
Adjacency Table
0.0.0.0
MASK (/0)
FIB TCAM
BRKARC-3465
Cisco Public
60
XL PFCs = 1M entries
NON-XL PFCs
XL PFCs
IPv4, MPLS
192k
512k
IPv6, Multicast
32k
256k
BRKARC-3465
Cisco Public
62
Protocol
IPv4
MPLS
EoM
IPv6
IPv4 mcast
IPv6 mcast
Adjacency usage:
Total
1048576
Used
28
7
%Used
1%
1%
Used
28
0
0
%Used
1%
0%
0%
1
3
3
1%
1%
1%
Used
171
%Used
1%
<snip>
BRKARC-3465
Cisco Public
63
Prefix
255.255.255.255/32
Adjacency
receive
75
76
10.10.1.1/32
10.10.1.0/32
receive
receive
77
10.10.1.255/32
receive
78
10.10.1.2/32
Gi1/1,
3200
3201
224.0.0.0/24
10.10.1.0/24
receive
glean
3202
3203
10.100.0.0/24
10.100.1.0/24
Gi1/1,
Gi1/1,
0030.f272.31fe
0030.f272.31fe
3204
3205
10.100.2.0/24
10.100.3.0/24
Gi1/1,
Gi1/1,
0030.f272.31fe
0030.f272.31fe
0030.f272.31fe
<>
BRKARC-3465
Cisco Public
64
Prefix
Adjacency
Prefix
Adjacency
3531584 171.0.0.0/8
Vl192
,00d0.0053.bc00
Prefix
512 FF00::/8
BRKARC-3465
Adjacency
glean
Cisco Public
65
10.10.0.0/16
via Rtr-A
via Rtr-B
10.10.0.0/16
Cisco Public
66
Prefix
Adjacency
3222
10.100.20.0/24
Gi1/1,
0030.f272.31fe
Gi1/2,
0008.7ca8.484c
Gi2/1,
000e.382d.0b90
Gi2/2,
000d.6550.a8ea
Interface: Gi1/1, Next Hop: 10.10.1.2, Vlan: 1019, Destination Mac: 0030.f272.31fe
Interface: Gi2/2, Next Hop: 10.40.1.2, Vlan: 1018, Destination Mac: 000d.6550.a8ea
BRKARC-3465
Cisco Public
67
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
68
Netflow
Collection
Server
Netflow
Data Flow
Exported Netflow
Record
BRKARC-3465
Cisco Public
69
The Catalyst 6500 supports the following flow masks - these are used to identify which
pieces of information in the header will be used as input into generating a key for flow
lookups
BRKARC-3465
Cisco Public
70
2
Flow Key
3
HIT!
Hash Function
Key
Key
Key
Key
Key
Key
Key
Key
Key
Key
Key
6
Compare
NetFlow
Table Index
Result
Mask
Hash Key
Key 4Compare
Hash
Flow Data
Flow Data
Flow Data
Flow Data HIT!
Flow Data
Flow Data 7
Flow Data
Flow Data
Flow Data
Flow Data
Flow Data
Flow Data
128K/256K
entries
Netflow TCAM
Statistics
128K/256K
rows
Netflow Table
Key
128 entries
BRKARC-3465
Alias CAM
Cisco Public
71
Netflow
Data
WS-X6748-GE-TX w\DFC4
Netflow
Data
EOBC
Netflow Collector
Direct Export supported with Supervisor 720 and :
WS-X6708-10GE-3C/3CXL
WS-X6716-10x-3C/3CXL
WS-X6908-10G-2T\2TXL
Netflow
Data
BRKARC-3465
Cisco Public
73
Cisco Public
74
Incoming
Packet
Ingress
ACL
Ingress
NetFlow
Accounting of packets
admitted by input processing
L3
Lookup
Ingress
QoS
IFE Process
OFE Process
Outgoing
Packet
Egress
QoS
BRKARC-3465
Egress
NetFlow
Egress
ACL
Cisco Public
75
SRC IP
10.1.2.11
10.1.1.10
1
Flow
FlowKey
Key
2
Hash Function
Compare
all pages
4
Lookup
Key
3
Proto
0x6
DataKey
Key
Data
Data
Key
Data
KeyKey
Data
Data
Key
Data
Key
Data
KeyKey
Data
Data
Key
DataKey
Key
Data
DataKey
Key
Data
Data
Key
Data
KeyKey
Data
Data
Key
Data
Key
Data
KeyKey
Data
Data
Key
DataKey
Key
Data
DataKey
Key
HIT!
Data
DataKey
Key
Data
Data
Key
Data
Key
DataKey
Key
Data
Data
Key
DataKey
Key
Data
Data
KeyKey
Data
Data
Key
Data
Key
Data
KeyKey
Data
Data
Key
DataKey
Key
Data
DST Port
80
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
Index
SRC Port
33992
Compare
Flow Data
6
5
Index to
NF Data
Table
Flow Data
Flow Data
Flow Data
Flow Data
Flow Data
Flow Data
Flow
HIT!Data
Flow Data
Flow Data
Flow Data
Flow Data
7
Update
Stats
Data Key
512K
entries
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
Statistics
NetFlow Statistics
Table
76
Non-Key Field
Key Field
Non-Key Field
Flow Export
Export Profile
Multiple Exporters can
be associated with a
single FNF monitor
Export Profile
Flow Monitor
Flow Monitor
Interfaces
Ingress
or/and
Egress
BRKARC-3465
Ingress
or/and
Egress
77
CPU
Utilization
Yielding NDE
threshold
70%
30%
BRKARC-3465
Cisco Public
80
NetFlow cache
srcIf
SrcIPadd
DstIf
DstIPadd
TTL
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
10
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
200
BRKARC-3465
NetFlow cache
srcIf
SrcIPadd
DstIf
DstIPadd
bytes
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
34346
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
300
Fa1/0
173.1.1.2
Fa0/0
10.0.277.1
1000
81
BRKARC-3465
Input flows
Output flows
10%
10%
25%
25%
Cisco Public
82
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
83
DFC
DFC
Router ACLs
Vlan ACLs
Port Based ACLs
Role Based ACLs
PFC
PFC
DFC
Hardware- Assist
Features
Netflow
WCCP
Reflexive ACLs
Network Address
Translation
Cisco Trust Sec
BRKARC-3465
Cisco Public
84
Applied as an input or
output policy to a Layer
3 interface
Applied as a policy to a
VLAN - is inherently
applied to both
inbound and outbound
traffic
Applied as a policy to a
Layer 2 Switch port
interface - is applied for
inbound traffic only
BRKARC-3465
Cisco Public
85
Input RACL
Output RACL
VACL
VACL
Input PACL
Note that no Output PACL
exists
Destination
Source
BRKARC-3465
Cisco Public
86
Dest IP
Source IP
Dest Port
Source Port
1
2
3
4
5
Permit
Deny
Deny
1=Compare
0=Mask
7
8
BRKARC-3465
Permit
Deny
Deny
Permit
Permit
Masks
Values
Cisco Public
87
xxxxxxxx
xxxxxxxx
10.1.2.11
xxxxxx
0050
xxxx
10.1.1.10
| 10.1.2.11
| 06
06
|xxxx
84C8
| 0050
Compare 3
1
xxxxxxxx 10.1.68.101 xx xxxx xxxx
2
Lookup Key 2
xxxxxxxx 10.33.2.25 xx xxxx xxxx
00000000
FFFFFFFF
00
0000
0000
3
SIP=10.1.1.10
DIP=10.1.2.11
4
Protocol=TCP (6)
SPORT=33992
5
1 DPORT=80
6
Entries
matching only
7
Packet
destination IP
8
xxxxxxxx xxxxxxxx 06 xxxx 0016
ip access-list extended example
1
xxxxxxxx xxxxxxxx 06 xxxx 0017
permit ip any host 10.1.2.100
2
xxxxxxxx xxxxxxxx 11 xxxx 0202
deny ip any host 10.1.68.101
3
00000000 00000000 FF 0000 FFFF
xxxxxxxx
xxxxxxxx
06
xxxx
0050
HIT!
deny ip any host 10.33.2.25
4
xxxxxxxx xxxxxxxx 11 xxxx 00A1 4
permit tcp any any eq 22
5
Entries matching
deny tcp any any eq 23
6
only protocol and
destination port
deny udp any any eq 514
7
permit tcp any any eq 80
8
Masks
permit
udp any any eq 161
Cisco PublicValues
BRKARC-3465
2012 Cisco and/or its affiliates. All rights reserved.
xxxxxxxx 10.1.2.100 xx xxxx xxxx
Permit
Result
88
MASK
0.0.255.255
10.1.1.0
permit
Mask 0.0.0.255
10.1.1.0
permit
10.2.1.0
10.3.0.0
-
permit
permit
-
Mask 0.0.0.255
10.2.1.0
permit
Mask 0.0.255.255
10.3.0.0
permit
Cisco Public
90
TCAM B
BANK 2
Forwarding Engine
(PFC4 or DFC4)
BANK 3
VACL
QoS
SGT
RACL
ACE
Counters
(L2 ASIC)
3
TCAM Controller
4 X Results
2 X Lookup Keys
ACL
Labels
ACL
LOUs
4 X Result Data
Final Result to
Netflow
6
Classification Module 2
Classification Module 1
1
BRKARC-3465
5
2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public
91
BRKARC-3465
Cisco Public
93
IPv4
IPv6
MAC
ACL Updates
BRKARC-3465
Cisco Public
95
TCAM B
TCAM A
BANK 0
BANK 1
QoS-1
SGT-1
RACL-1
SGT-2
RACL-2
VACL-2
BANK 3
VACL-1
QoS-2
BANK 2
TCAM Controller
4 X Results
2 X Lookup Keys
ACL
Labels
1, 2
ACL LOUs
Classification Module 1
BRKARC-3465
Cisco Public
96
Agenda
Chassis and Power Supplies
Supervisor Engine and Switch
Fabric Architectures
Module Architectures
Layer 2 Forwarding
IP Unicast Forwarding
NetFlow
Access Control Lists
Packet Walks
BRKARC-3465
Cisco Public
97
Port ASIC B
Port ASIC A
Port ASIC B
Slot 1
Classic
Slot 2
Classic
Dbus
Rbus
Michael
Engineering
Switch Fabric
Amanda
Marketing
3
R
PFC4
Fabric / Bus
Interface &
Replication ASIC
2
R
P
Layer 2 Engine
Layer 3 Engine
Supervisor Engine 2T
BRKARC-3465
P = Packet
H = Header
R = Result
Cisco Public
Port ASIC A
Port ASIC B
Slot 2 CEF720
Port ASIC A
Port ASIC B
CFC
P
FIRE ASIC A
FIRE ASIC B
Dbus
Michael
Engineering
Switch Fabric
Amanda
Marketing
Question : How
will the packet get
to the CEF720
Module ? Bus or
Switch Fabric ?
BRKARC-3465
Rbus
Fabric / Bus
ADD QUESTION IN SANInterface &
Replication ASIC
DIEGO. Make it appear
R
PFC4
2
R
P
Layer 2 Engine
Layer 3 Engine
Supervisor Engine 2T
P = Packet
H = Header
R = Result
Cisco Public
Port ASIC A
Port ASIC B
Slot 2 CEF720
Port ASIC A
Port ASIC B
1
CFC
2
H
FIRE ASIC A
Dbus
Switch Fabric
Rbus
Amanda
Marketing
5
R
Fabric / Bus
Interface &
Replication ASIC
4
R
P
Layer 2 Engine
Layer 3 Engine
Supervisor Engine 2T
BRKARC-3465
FIRE ASIC B
Michael
Engineering
PFC4
P = Packet
H = Header
R = Result
Cisco Public
Port ASIC A
FIRE ASIC A
Port ASIC B
Port ASIC A
CFC
Port ASIC B
CFC
FIRE ASIC B
Slot 2 CEF720
FIRE ASIC A
FIRE ASIC B
Dbus
Rbus
Michael
Engineering
Switch Fabric
Amanda
Marketing
5
R
Fabric / Bus
Interface &
Replication ASIC
Layer 2 Engine
Layer 3 Engine
Supervisor Engine 2T
BRKARC-3465
PFC4
P = Packet
H = Header
R = Result
Cisco Public
Port ASIC A
2
P
FIRE ASIC A
4
H
Port ASIC B
DFC4
L
2
Slot 2 CEF720/DFC4
Port ASIC A
DFC4
L
3
FIRE ASIC B
Port ASIC B
L
2
L
3
FIRE ASIC A
6
FIRE ASIC B
Dbus
Rbus
Michael
Engineering
Switch Fabric
Amanda
Marketing
PFC4
Fabric / Bus
Interface &
Replication ASIC
Layer 2 Engine
Layer 3 Engine
Supervisor Engine 2T
BRKARC-3465
P = Packet
H = Header
R = Result
Cisco Public
Summary
The Catalyst 6500 architecture provides a robust
infrastructure upon which the system can provide
hardware-based forwarding at high speeds
L2 and L3 switching are done via the same hardware
forwarding process, so there is no difference in
performance between the two
Enabling features such as Netflow, QoS and ACLs can
be done without impact to forwarding performance as
these features are processed in hardware in parallel to
the L2 and L3 lookup processes
The Catalyst 6500 architecture is designed so that
unicast and multicast can coexist within the same
infrastructure, providing a versatile platform for the
networks of today and tomorrow
BRKARC-3465
Cisco Public
108
Conclusion
You should now have a
thorough understanding of the
Catalyst 6500 switching
architecture, packet flow, and
key forwarding engine
functions
Any Questions?
BRKARC-3465
Cisco Public
109
BRKARC-3465
Cisco Public
110
Final Thoughts
Get hands-on experience with the Walk-in Labs located in World of
Solutions, booth 1042
Come see demos of many key solutions and products in the main Cisco
booth 2924
Visit www.ciscoLive365.com after the event for updated PDFs, ondemand session videos, networking, and more!
Follow Cisco Live! using social media:
Facebook: https://www.facebook.com/ciscoliveus
Twitter: https://twitter.com/#!/CiscoLive
111
Presentation_ID
Cisco Public