Professional Documents
Culture Documents
Brkarc 2025 PDF
Brkarc 2025 PDF
Awareness and
Troubleshooting
• Data Plane
• Active Monitoring
• Passive Flow Monitoring
• QoS
• Getting Started
Keeping Focused: What This Session is About
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
The Big Picture Internet’s
down.
It’s the
network
Somebody's
downloading
It’s not something.
Application Operator
the (?)
Can’t
network Network Operator
ping it.
Is it Pings
Monday? fine!
Not Server
happy network
Client
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Some More (network) Detail
• Multiple applications
Server B
Not DNS
happy LAN
Internet
DNS
DHCP
Client
802.1x
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
… and it keeps on going
• Load balancers
Server B
• Firewalls Enterprise
WAN Server A
• NATs ISP B
ISP A
Not DNS
happy LAN
Internet
DNS
DHCP
Client
802.1x
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Network state awareness?
• What is it:
• View of network, what it is doing, and why
• Monitoring of data network performance,
in comparison with previous working states
• Quick detection of hard failures
• Early warning for
• soft failures
• performance issues
• and tomorrows’ problems
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Control Plane & Data Plane
• Data Plane
Int B show ip cef
• The actual forwarding process packet
Int A
Data Plane show mpls forwarding…
show mac address-table
(might be SW or HW based) Int C
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Data Plane Decision Flexibility
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Network as a System: Independent Decisions
Congested link
R5 is doing
ECMP hash
R3
R1 R2 R6
R5
A B
R4
your network You don’t control
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Data Plane and Control Plane Changes
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Control Plane
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
How is it wired together?
• NetBrain
• (open source) NetDisco
http://www.netdisco.org
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
State of the Routing Table
• Be familiar with normal behavior of important service prefixes
• Establish quickly if problem is control plane or data plane
• show ip route / ipRouteTable MIB / show ip traffic (Drop stats)
• Nagios: check_snmp_iproute.pl
• Track objects and EEM
(config)
track 100 ip route 0.0.0.0 0.0.0.0 reachability
event manager applet TrackRoute_0.0.0.0
event track 100 state any
action 1.0 syslog msg "route is $_track_state“
#
01:09:21: %HA_EM-6-LOG: TrackRoute_0.0.0.0: route is down
blog.ipsapce.net
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
# show ip ospf
Routing Process "ospf 1" with ID 192.168.0.1
Start time: 00:01:46.195, Time elapsed: 00:48:27.308
Supports only single TOS(TOS0) routes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Neighbors
Show IP EIGRP Neighbors
Outstanding Packets
Last Reliable Packet Sent
RtrA#show ip eigrp neighbors
IP-EIGRP neighbors for process 1
H Address Interface Hold Uptime SRTT RTO Q Seq
(sec) (ms) Cnt Num
2 10.1.1.1 Et0 12 6d16h 20 200 0 233
1 10.1.4.3 Et1 13 2w2d 87 522 0 452
0 10.1.4.2 Et1 10 2w2d 85 510 0 3
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
BGP Monitoring Protocol (BMP) Overview
Collecting Pre-Policy BGP Messages
BMP collector
BMP message
Adj-RIB-in (pre-inbound-filter)
BGP Monitor Protocol update
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
BGP Monitoring Protocol
• IETF draft-ietf-grow-bmp
• BMP client (router) provides pre-policy view of the ADJ-RIB-IN of a peer
• Update messages from peer sent to BMP receiver
• Example uses:
• Realtime visualizer of BGP state
• Traffic engineering analytics
• BGP policy exploration
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
OpenBMP
http://www.openbmp.org
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Data Plane
R3
R1 R2 R6
R5
A B
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
IPSLA and Relatives
• IPSLA on router/switch – makes use of deployed network infra
• May not be true check of data plane (shadow router)
• Resource contention (CPU) – group scheduling
• Simplistic service checks
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
IP SLA: Synthetic Traffic Measurements
Uses
Multiprotocol
Service Level
Network Label
VoIP Agreement Network Trouble
Availability Performance Switching
Monitoring (SLA) Assessment Shooting
Monitoring (MPLS)
Monitoring
Monitoring
Measurement Metrics
Packet Network Dist. of
Latency Connectivity
Loss Jitter Stats
Operations
Jitter FTP DNS DHCP DLSW ICMP UDP TCP HTTP LDP H.323 SIP RTP
Cisco IOS
Software
IP SLA Destination
Source MIB Data Active Generated Traffic to Measure the
Cisco IOS Network
Cisco IOS IP SLA
Software Software
IP SLA Responder
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Reference
IPSLA Multicast Support
• IPSLA Multicast
One Way Delay (NTP req)
One Way Jitter
Packet Loss
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
iperf3
• Active measurement tool to discover available path capacity
• worst link and worst host configurations
• Test can be in either direction (only static NAT works)
• TCP (retransmissions, rate, cwd), SCTP and UDP (loss, jitter, out of order) tests
TCP/5201
sender receiver
Test traffic: TCP,
SCTP, UDP
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
bwctl
• bwctl client coordinates active measurement tests
• Authentication – IP subnets, AES key/username
• Scheduling/reserving
• result gathering – gathered from both server and client systems
• Does not have to be on bwctl server (3rd party)
• bwctl server hosts the test resources (iperf3, ping, traceroute/path, owamp)
• Allows for multi-admin domain (along path) active tests
• bwtraceroute: wrapper for bwctl and traceroute
• bwctl distributed with Ubuntu, may need to be installed (yum, apt-get, compiled) for other UNIXes
$ bwtraceroute -s 205.186.62.54
bwtraceroute: Using tool: traceroute Local machine
bwtraceroute: 17 seconds until test results available
SENDER START
traceroute to 152.22.242.103 (152.22.242.103), 30 hops max, 60 byte packets
1 205-186-62-53.generic.c-light.net (205.186.62.53) 0.104 ms 0.098 ms 0.102 ms
2 xe-1-1-1-816-t01-sox.culr.net (205.186.63.2) 2.932 ms 2.934 ms 2.929 ms
…
9 152.22.242.103 (152.22.242.103) 12.188 ms 12.180 ms 12.144 ms
SENDER END
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
$ bwctl -T iperf3 -t 30 -O 4 -s "56m-ps-4x10.sox.net:4823"
bwctl: Using tool: iperf3
Iperf3 bwctl: 40 seconds until test results available
SENDER START
examples Connecting to host 152.22.242.103, port 5160
[ 15] local 143.215.194.123 port 45609 connected to 152.22.242.103 port 5160
Client to server [ ID] Interval Transfer Bandwidth Retr Cwnd
(local to remote) [ 15] 0.00-1.00 sec 107 MBytes 898 Mbits/sec 0 3.06 MBytes (omitted)
[ 15] 1.00-2.00 sec 112 MBytes 944 Mbits/sec 0 3.06 MBytes (omitted)
…
[ 15] 29.00-30.00 sec 112 MBytes 944 Mbits/sec 0 3.06 MBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
Throw away stats [ ID] Interval Transfer Bandwidth Retr
from first 4 sec [ 15] 0.00-30.00 sec 3.29 GBytes 942 Mbits/sec 0 sender
[ 15] 0.00-30.00 sec 3.29 GBytes 943 Mbits/sec receiver
iperf Done.
Run for 30 sec
SENDER END
Use –P for parallel
streams
$ $ bwctl -T iperf3 -t 30 -O 4 -c "56m-ps-4x10.sox.net:4823"
bwctl: Using tool: iperf3
bwctl: 39 seconds until test results available
SENDER START
~940 mbps (remote
Connecting to host 143.215.194.123, port 5327 to local)
[ 15] local 152.22.242.103 port 44855 connected to 143.215.194.123 port 5327
[ ID] Interval Transfer Bandwidth Retr Cwnd
[ 15] 0.00-1.00 sec 5.14 MBytes 43.1 Mbits/sec 411 25.5 KBytes (omitted)
[ 15] 1.00-2.00 sec 2.26 MBytes 19.0 Mbits/sec 15 19.8 KBytes (omitted) retransmissions
…
[ 15] 28.00-29.00 sec 2.26 MBytes 18.9 Mbits/sec 16 25.5 KBytes
- - - - - - - - - - - - - - - - - - - - - - - - -
[ ID] Interval Transfer Bandwidth Retr
[ 15] 0.00-30.00 sec 59.8 MBytes 16.7 Mbits/sec 539 sender ~19mbps (local to
[ 15] 0.00-30.00 sec 60.7 MBytes 17.0 Mbits/sec receiver
remote)
iperf Done.
∫∫∫∫∫∫∫
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
owamp
• One way delay/jitter to/from end systems
• Checks for loss, order
> owping -c 10000 -i 0.01 2hd32g-2.cenic.org:861
• NTP needed (check is done) Approximately 103.5 seconds until results available
--- owping statistics from [152.22.242.103]:9525 to [2hd32g-
2.cenic.org]:9105 ---
SID: 89a41e75da6e5be4ad003a66630c3668
first: 2016-02-16T21:39:34.059
last: 2016-02-16T21:41:13.152
10000 sent, 1 lost (0.010%), 0 duplicates
one-way delay min/median/max = 52.7/54.5/58.5 ms, (err=1.6 ms)
one-way jitter = 1.3 ms (P95-P50)
55ms(to) vs Hops = 10 (consistently)
no reordering
12ms(from)
--- owping statistics from [2hd32g-2.cenic.org]:9207 to
[152.22.242.103]:9111 ---
SID: 9816f267da6e5be4b0980a5547a7e2f0
first: 2016-02-16T21:39:34.046
last: 2016-02-16T21:41:13.438
10000 sent, 0 lost (0.000%), 0 duplicates
one-way delay min/median/max = 10.2/11.9/16 ms, (err=1.6 ms)
one-way jitter = 1.4 ms (P95-P50)
Hops = 10 (consistently)
no reordering
∫∫∫∫∫∫∫
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
perfsonar
• Scheduling, execution
and visualization for
various tests across
servers
• Registry of public
servers
∫∫∫∫∫∫∫ BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Diagnostic Tools Hosting Platforms Along the Path
IOS XR
Support RPM package installation directly to the system.
Nexus OS
Support for 3rd party LXC containers. Support for Guest Shell LXC. Future support for
Docker containers.
IOS XE
Open to any 3rd party or custom KVM application on routing platforms.
Ultimate flexibility with UCS-E module.
bwctl/oaping/iperf3 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
ISR 4400 Series Service Containers
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Internet: aka the
traceroute TCP/80 network
Widest dispersion
• Understand the limitations against possibilities.
• Sends 3 packets (default) at each TTL Difficult to
understand though.
• Implementations
• Linux/Cisco: UDP (ICMP and TCP-SYN are Linux optional)
• UDP DST port # used to keep track of packets, increments per packet. Initial= 33434 (default)
• SRC port #: randomized (linux), incrementing per packet (IOS) Narrower
• Linux (GNU inetutils-traceroute) dispersion.
• UDP DST port# increments per TTL (not per packet) Story might be
• SRC port is random but fixed per entire run misleading.
• Windows: ICMP Echo request
ICMP blocked
• IOS ICMP responses limited to 1 per 500ms frequently
• Configurable via: ip icmp rate-limit unreachable <ms>
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Reference
Unix traceroute
1 AAA
• Multiple path options 2 BBB
3 CCC
• Topology ‘shortcuts’ (same router seen at diff hop) 4 DDD
5 EEE
6 FGF
• Ultimately all paths result in similar e2e delay 7 HII
8 JKK +10ms (unsustained)
$ traceroute 62.2.88.172
traceroute to 62.2.88.172 (62.2.88.172), 30 hops max, 60 byte packets 9 JLJ
1 152.22.242.65 (152.22.242.65) 1.044 ms 1.371 ms 1.585 ms 10 LLM +120ms (sustained)
2 152.22.240.8 (152.22.240.8) 0.219 ms 0.328 ms 0.327 ms 11 NNM
3 128.109.70.9 (128.109.70.9) 1.066 ms 1.059 ms 1.168 ms 12 NNO
4 rtp7600-gw-to-dep7600-gw2.ncren.net (128.109.70.137) 1.634 ms 1.628 ms 1.736 ms 13 PPP
5 rlasr-gw-link1-to-rtp7600-gw.ncren.net (128.109.9.17) 5.354 ms 5.446 ms 5.557 ms
6 128.109.9.117 (128.109.9.117) 5.671 ms 128.109.9.170 14 QQQ
Multiple paths(128.109.9.170) 7.141 ms 128.109.9.117 (128.109.9.117)
15 ***
7 wscrs-gw-to-ws-a1a-ip-asr-gw-sec.ncren.net (128.109.1.105) 9.174 ms 128.109.1.209 (128.109.1.209)
5.433 ms
8.256 ms 6.397 ms
+120ms Atlantic
8 dcp-brdr-03.inet.qwest.net (205.171.251.110) 18.414 ms chr-edge-03.inet.qwest.net 16 RRR
(65.114.0.205) ~268ms
27.353 (all ms
ms 27.438 three)
9 dcp-brdr-03.inet.qwest.net (205.171.251.110) 21.739 ms 63-235-40-106.dia.static.qwest.net (63.235.40.106) 17.750 ms
dcp-brdr-03.inet.qwest.net (205.171.251.110) 22.450 ms
crossing
10 63-235-40-106.dia.static.qwest.net (63.235.40.106) 22.531 ms 22.516 ms 84-116-130-173.aorta.net (84.116.130.173) 140.738 ms
11 nl-ams02a-rd1-te0-2-0-2.aorta.net (84.116.130.65) 140.831 ms 140.816 ms 84-116-130-173.aorta.net (84.116.130.173) 144.819 ms
12 nl-ams02a-rd1-te0-2-0-2.aorta.net (84.116.130.65) 144.074 ms 144.761 ms 84-116-130-58.aorta.net (84.116.130.58) 138.455 ms
13 84-116-130-58.aorta.net
filter (84.116.130.58) 141.844 ms 141.924 ms 142.459 ms
14 84.116.204.234 (84.116.204.234) 145.603 ms 145.891 ms 145.987 ms + > 100 ms delay
15 * * *
16 62-2-88-172.static.cablecom.ch (62.2.88.172) 268.281 ms 268.245 ms 268.176 ms
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Reference
Unix inetutils traceroute
• Narrower view (no alternate paths directly seen)
• Repeating nodes suggests multipath, or (unlikely) routing issue
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Reference
LFT
• lft ‘layer 4 traceroute’ dynamically adjusts to responses
• Firewall detection, whois and AS lookup integrated
• Narrower packet changes, so narrower multi-path
$ sudo lft -ENA 62.2.88.172
Tracing ________________________________________________________________. Used tcp/80 SYN
TTL LFT trace to 62-2-88-172.static.cablecom.ch (62.2.88.172):80/tcp
1 [AS81] [NCREN-B22] 152.22.242.65 20.1/17.2ms
2 [AS81] [NCREN-B22] 152.22.240.8 20.1/20.1ms
3 [AS81] [CONCERT] 128.109.70.9 20.1/20.1ms
4 [AS81] [CONCERT] rtp7600-gw-to-dep7600-gw2.ncren.net (128.109.70.137) 20.1/20.1ms
5 [AS81] [CONCERT] rlasr-gw-link1-to-rtp7600-gw.ncren.net (128.109.9.17) 20.1/20.1ms
6 [AS81] [CONCERT] 128.109.9.117 20.1/20.1ms
7 [AS209] [unknown] chr-edge-03.inet.qwest.net (65.121.156.209) 20.1/19.5ms
8 [AS209] [QWEST-INET-35] dcp-brdr-03.inet.qwest.net (205.171.251.110) 20.1/18.4ms
9 [AS209] [QWEST-INET-17] 63-235-40-106.dia.static.qwest.net (63.235.40.106) 20.1/60.3ms
10 [AS6830] [84-RIPE/LGI-Infrastructure] 84-116-130-173.aorta.net (84.116.130.173) 160.7/160.7ms
11 [AS6830] [84-RIPE/LGI-Infrastructure] nl-ams02a-rd1-te0-2-0-2.aorta.net (84.116.130.65) 160.7/160.7ms
12 [AS6830] [84-RIPE/LGI-Infrastructure] 84-116-130-58.aorta.net (84.116.130.58) 140.6/140.6ms
** [firewall] the next gateway may statefully inspect packets
13 [AS6830] [84-RIPE/LGI-Infrastructure] 84.116.204.234 160.7/160.6ms
** [neglected] no reply packets received from TTL 14
15 * [AS6830] [RIPE-C3/CC-HO841-NET] [target] 62-2-88-172.static.cablecom.ch (62.2.88.172):80 160.7ms
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Reference
MTR
• Interactive combined traceroute and ping
• Gives a sense of health of path (loss, delay Standard Deviation)
Just local noise, no
• Narrow path view carry over to later hops Sustained loss.
aakhter-nlr-ubuntu-01 (0.0.0.0) Sat May 30 18:57:09 2015 Likely something
Keys: Help Display mode Restart statistics Order of fields quit wrong 12->13, or
Packets Pings
Host Loss% Snt Last Avg Best Wrst StDev way back
1. 152.22.242.65 0.0% 145 0.8 0.9 0.7 10.0 0.8
2. 152.22.240.8 0.0% 145 0.3 0.2 0.2 0.3 0.0
3. 128.109.70.9 0.0% 145 1.0 3.3 1.0 182.3 17.2
4. rtp7600-gw-to-dep7600-gw2.ncren.net 1.0% 145 9.2 4.1 1.6 203.4 18.6
5. rlasr-gw-link1-to-rtp7600-gw.ncren.net 0.0% 145 5.3 5.3 5.1 6.8 0.2
6. 128.109.9.166 0.0% 145 7.1 7.3 7.1 16.1 0.8
7. wscrs-gw-to-ws-a1a-ip-asr-gw-sec.ncren.net 0.0% 145 6.8 8.3 6.2 10.6 1.0
8. chr-edge-03.inet.qwest.net 0.0% 145 9.4 12.3 9.3 62.1 9.5 Note
9. dcp-brdr-03.inet.qwest.net 0.0% 145 21.8 22.8 21.7 70.7 5.5 variability,
10. 63-235-40-106.dia.static.qwest.net 0.0% 145 21.8 24.5 21.7 86.1 10.6
11. 84-116-130-173.aorta.net 0.0% 145 144.8 145.0 144.7 152.9 1.0 probably just
12. nl-ams02a-rd1-te0-2-0-2.aorta.net 0.0% 145 144.1 145.5 144.0 165.4 3.7 the end
13. 84-116-130-58.aorta.net 5.0% 144 142.9 142.3 142.0 145.6 0.4
14. 84.116.204.234 5.0% 144 145.1 145.1 144.9 145.3 0.0 system
15. 217-168-62-150.static.cablecom.ch 5.0% 144 145.9 146.1 145.2 164.3 1.9
16. 62-2-88-172.static.cablecom.ch 5.0% 144 313.0 260.3 152.6 508.0 80.0
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Show interface # show interface
GigabitEthernet1 is up, line protocol is up
Hardware is CSR vNIC, address is 000c.291a.7f97 (bia
000c.291a.7f97)
Internet address is 192.168.225.130/24
MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full Duplex, 1000Mbps, link type is auto, media type is RJ45
output flow-control is unsupported, input flow-control is
unsupported
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:05:35, output 00:09:58, output hang never
Last clearing of "show interface" counters never
• Classic command Input queue: 0/375/0/0 (size/max/drops/flushes); Total output
drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
• Check ‘up’ status 5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
25349 packets input, 2381158 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicasts)
• Stability: log event or ‘show ip route’ 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
3958 packets output, 312408 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
• Monitor in/out bit/packet changes 56 unknown protocol drops
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 pause output
0 output buffer failures, 0 output buffers swapped out
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Follow the Flow with NetFlow
• Per-Node: Data plane observations and decisions captured
• Src/dst mac/IP/port#s, DSCP values, in/out interfaces, etc.
• Network view: flows centrally analyzed- NetFlow collector/analyzer
• Biggest value: strategically placed partial views
(eg WAN edge)
NetFlow Collector
LiveAction
R3
R1 R2 R6
R5
A B
R4
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
NetFlow—What Is It?
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Flexible NetFlow
Multiple Monitors with Unique Key Fields
Flow Flow
Monitor 1 Monitor 2
Key Fields Packet 1 Non-Key Fields Key Fields Packet 1 Non-Key Fields
Packets Source IP 3.3.3.3 Packets
Source IP 3.3.3.3
Bytes Dest IP 2.2.2.2 Timestamps
Destination IP 2.2.2.2
Timestamps Input Interface Ethernet 0
Source Port 23
Next Hop Address SYN Flag 0
Destination Port 22078
Layer 3 Protocol TCP - 6
TOS Byte 0
Security Analysis Cache
Input Interface Ethernet 0
Source IP Dest. IP Input I/F Flag … Pkts
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Network Performance Monitor
Network nodes are able to discover & validate RTP, TCP and IP-CBR traffic on hop by hop
basis
À la carte metric (loss, latency, jitter etc.) selections, applied on operator selected sets of traffic
Allows for fault isolation and network span validation
Per-application threshold and altering.
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Performance Monitor Information Elements
Media Monitoring Application Response Time Other Metrics
• RTP SSRC • CND - Client Network Delay (min/max/sum) • L3 counter (bytes/packets)
• RTP Jitter (min/max/mean) • SND – Server Network Delay (min/max/sum) • Flow event
• Transport Counter (expected/loss) • ND – Network Delay (min/max/sum) • Flow direction
• Media Counter • AD – Application Delay (min/max/sum) • Client and server address
(bytes/packets/rate)
• Total Response Time (min/max/sum) • Source and destination address
• Media Event
• Total Transaction Time (min/max/sum) • Transport information
• Collection interval
• Number of New Connections • Input and output interfaces
• TCP MSS
• Number of Late Responses • L3 information (TTL, DSCP,
• TCP round-trip time TOS, etc.)
• Number of Responses by Response Time (7-
bucket histogram) • Application information (from
• Number of Retransmissions NBAR2)
• Monitoring class hierarchy
• Number of Transactions
• Client/Server Bytes
• Client/Server Packets
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
NetFlow QoS Analysis
LiveAction
flow 5-tuple DPI/NBAR QoS processing DSCP
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
NetFlow QoS Flow exporter:
option c3pl-class-table timeout <timeout>
option c3pl-policy-table timeout <timeout>
QoS Queue performance:
flow record type performance monitor qos-record
match policy qos queue index
collect policy qos queue drops
(or)
flow record qos-record
match policy qos queue index
collect policy qos queue drops
• QoS queue performance Flow to QoS Association:
flow record type performance-monitor A
(drops) match connection client ipv4 address
match connection server ipv4 address
match connection server transport port
• QoS class structure class-map collect policy qos class hierarchy
collect policy qos queue id
…
and policy map names (or)
flow record qos-class-record
match ipv4 source address
match ipv4 destination address
collect policy qos classification hierarchy
collect policy qos queue index
…
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Enhanced NetFlow CLI Example
R1#show flow monitor qos-flow-monitor cache
IP FORWARDING STATUS: Forward
IPV4 SOURCE ADDRESS: 192.168.32.128
platform qos performance-monitor IPV4 DESTINATION ADDRESS: 224.0.0.5
! INTERFACE INPUT: Null
flow record qos-class-record INTERFACE OUTPUT: Gi2 0x30 = CS6: in
match routing forwarding-status FLOW DIRECTION: Output ‘control’ class
match ipv4 dscp IP DSCP: 0x30
match ipv4 source address policy qos class hierarchy: WAN-EDGE-4-CLASS: CONTROL
match ipv4 destination address policy qos queue index: 1073741827
match interface input IP FORWARDING STATUS: Consume
match interface output IPV4 SOURCE ADDRESS: 192.168.225.128
match flow direction IPV4 DESTINATION ADDRESS: 192.168.225.130
My VTY
collect policy qos classification hierarchy INTERFACE INPUT: Gi1 session
collect policy qos queue index INTERFACE OUTPUT: Null
! FLOW DIRECTION: Input
flow monitor qos-flow-monitor IP DSCP: 0x04
record qos-class-record policy qos class hierarchy: WAN-EDGE-4-CLASS: class-default
! policy qos queue index: 0
interface GigabitEthernet1 Data
IP FORWARDING STATUS: Forward
ip flow monitor qos-flow-monitor input IPV4 SOURCE ADDRESS: 192.168.225.128 traffic
! IPV4 DESTINATION ADDRESS: 5.5.5.5
interface GigabitEthernet2 INTERFACE INPUT: Gi1
ip flow monitor qos-flow-monitor output INTERFACE OUTPUT: Gi2
service-policy output WAN-EDGE-4-CLASS FLOW DIRECTION: Output
IP DSCP: 0x00
policy qos class hierarchy: WAN-EDGE-4-CLASS: class-default
policy qos queue index: 1073741829
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
CBQoS MIB
• IOS QoS collects vital information regarding
health of QoS classes
• Pre and Post bytes, drops, etc
• Same class names from different routers
can be compared
• For flow level analysis, use NetFlow QoS
reporting
• ‘snmp mib persist CBQoS’ (IOS 12.4(4)T)
Adventnet © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Dedicated Protocol Analyzers
• Wireshark, Cisco NAM and other protocol analyzers are great
• Detailed analysis for variety of protocols at deep level
• Dedicated probes are expensive to deploy pervasively
• Operator has to make difficult judgment calls on where the problem is going to be– before it
happens
• Can be challenging after the fact- need on-site trained personnel.
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Embedded Packet Capture & Analyze
• Capture packets locally to buffer on router
• Store to flash, USB, FTP, TFTP for analysis in protocol analyzer
• IOS XE Cat 4k Sup 7E & Sup 7L-E (XE 3.3.0 SG) include built in Wireshark decode capability
• Capture does not add traffic to network
Gig0/0
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC-EM Flow Path Analysis
5 tuple Input via Use Interface
Note: L4 Port and Protocol information is optional but highly recommended for accurate path calculation
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Flow Path Analysis
Enhanced Application Flow Visibility
CAPWAP
tunnel
visualization Link source
information
Accuracy value
Ingress/Egress
Interface
∫
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Flow Path Analysis
Enhanced Application Flow Visibility – Key Statistics
Area of Interest
Interface and
QoS Queue
Stats
∫
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Getting Started
Be Prepared!
• Be prepared and have data collection systems enabled
• Enable passive monitoring on endpoints and network
• Enable active tests
• Helpdesk
• Interview Script => establish & maintain checklists
• Multi-group access to tools, logs, etc.
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Expanding your Toolbox and Knowledge
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Complete Your Online
Session Evaluation
• Give us your feedback to be
entered into a Daily Survey
Drawing. A daily winner will
receive a $750 gift card.
• Complete your session surveys
through the Cisco Live mobile
app or on www.CiscoLive.com/us.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
Continue Your Education
• Demos in the Cisco campus
• Walk-in Self-Paced Labs
• Lunch & Learn
• Meet the Engineer 1:1 meetings
• Related sessions
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Thank you
Backup Slides
Performance Monitor Configuration
Flow
Flow Where to send data?
Exporter
Record (optional)
Policy-map
Applied inbound or
Flow Monitor outbound
Class-map
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Example Configuration – Flow Record
flow record type performance-monitor default-rtp-pt-name
match ipv4 protocol
Flow Record defines what metrics to match ipv4 source address
match ipv4 destination address
collect and how to collect them (just like in match transport source-port
match transport destination-port
Flexible NetFlow configuration) match transport rtp ssrc
match policy performance-monitor classification hierarchy
collect routing forwarding-status
collect ipv4 dscp
Performance monitor introduces collect ipv4 ttl
collect transport packets expected counter
flow record type performance-monitor collect transport packets lost counter
collect transport packets lost rate
collect transport event packet-loss counter
Match field types perform aggregation collect transport rtp jitter mean
collect transport rtp jitter minimum
towards that field. collect transport rtp jitter maximum
collect interface input
collect interface output
collect counter bytes
Ie collect counter packets
collect counter bytes rate
match ipv4 source address collect timestamp interval
collect application name
match ipv4 destination address collect application media bytes counter
collect application media bytes rate
collect application media packets counter
collect application media packets rate
will create a unique entry per src-dst collect application media event
collect monitor event
combinations !
collect transport rtp payload-type
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Example Configuration – monitor
flow exporter mn-campus-samplicator
destination 10.1.160.37
source Loopback0
flow monitor pulls together the flow record, transport udp 2055
exporter, and specific cache management template data timeout 60
option c3pl-class-table
configurations (just like Flexible NetFlow) option c3pl-policy-table
option interface-table
option application-table
Special type of flow monitor option sub-application-table
flow monitor type performance-monitor !
flow monitor type performance-monitor default-rtp-pt-name
record default-rtp-pt-name
(optional) Flow exporter configures how the exporter mn-campus-samplicator
NetFlow exporting is done cache timeout synchronized 10 export-spread 5
history size 10
!
Policy map specifies which traffic to monitor policy-map type performance-monitor rtp-traffic-name
class VOIP
(via class-map), how to monitor (via monitor), flow monitor default-rtp-pt-name
and any per-class threshold crossing actions react 1 transport-packets-lost-rate
threshold value ge 1.00
alarm severity error
Typed policy-map (performance monitor) action syslog
class VIDEO-CONF
flow monitor default-rtp-pt-name
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Example Configuration – Interface attachment
• Finally, policy map is applied to interface
• Note typed policy is used
• Direction of monitoring (input|output) selectable for some platforms
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Audio Quality Metrics (AQM) on CUBE
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Example Configuration –
AQM performance monitor
‘media monitoring’ configuration under voice service voip
media monitoring [num] persist
! num is number of channels used to monitor
‘voice service voip’ or dial-peer media statistics
! delay calc, MOS etc
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Video Quality Metrics (VQM) on ISR G2
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Example Configuration –
VQM performance monitor
video monitoring
maximum-sessions 10
no shutdown
monitor configuration – just collect application video frame [ I | STR | LTR | super-P | NR ] counter
packets [lost]
collect application video frame [ I | STR | LTR | super-P | NR ] counter bytes
include the AQM fields collect application video frame [ I | STR | LTR | super-P | NR ] slice-
quantization-level
collect application video eMOS compression [ network | bitstream ]
collect application video eMOS packet-loss [ network | bitstream ]
collect application video frame percentage damaged
collect application video scene-complexity
collect application video level-of-motion
collect transport rtpsequence-number [ last ]
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
show commands 1861-AA0213#show performance monitor history
Load for five secs: 20%/16%; one minute: 8%; five minutes: 4%
Time source is NTP, 01:52:12.052 EST Fri Oct 29 2010
Match: ipv4 src addr = 10.1.160.19, ipv4 dst addr = 10.1.3.5, ipv4 prot = udp, trns src
port = 32760, trns dst port = 22802, SSRC = 1717646439
Policy: all-apps, Class: telepresence-CS4, Interface: FastEthernet0/0, Direction: input
(usec)
:
:
:
:
25
Normal
1
476
transport rtp jitter minimum (usec) : 1
• transport rtp jitter maximum
*transport rtp payload type
transport event packet-loss counter
(usec) :
:
:
1997
96
0
*transport event packet-loss counter min : 0
*transport event packet-loss counter max : 0
transport packets expected counter : 773
transport packets lost counter : 0
*transport packets lost counter minimum : 0
*transport packets lost counter maximum : 0
transport packets lost rate ( % ) : 0.00
*transport packets lost rate min ( % ) : 0.00
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Service Planning
FNF Configuration - Example
1. Configure the Exporter
Router(config)# flow exporter my-exporter
Where do I want my data sent?
Router(config-flow-exporter)# destination 1.1.1.1
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
R1#show ip traffic [interface <interface>]
IP statistics:
Rcvd: 1117 total, 1116 local destination
0 format errors, 0 checksum errors, 0 bad hop count
show ip traffic
0 unknown protocol, 0 not a gateway
0 security failures, 0 bad options, 0 with options
Opts: 0 end, 0 nop, 0 basic security, 0 loose source route
0 timestamp, 0 extended security, 0 record route
0 stream ID, 0 strict source route, 0 alert, 0 cipso, 0 ump
0 other
Frags: 0 reassembled, 0 timeouts, 0 couldn't reassemble
0 fragmented, 0 fragments, 0 couldn't fragment
Bcast: 58 received, 0 sent
Mcast: 442 received, 221 sent
Sent: 842 generated, 1195 forwarded
Drop: 1 encapsulation failed, 0 unresolved, 0 no adjacency
0 no route, 0 unicast RPF, 0 forced drop
0 options denied
Drop: 0 packets with source IP address zero
Drop: 0 packets with internal loop back IP address
0 physical broadcast
Reinj: 0 in input feature path, 0 in output feature path
ICMP statistics:
Rcvd: 0 format errors, 0 checksum errors, 0 redirects, 0 unreachable
0 echo, 0 echo reply, 0 mask requests, 0 mask replies, 0 quench
0 parameter, 0 timestamp, 0 timestamp replies, 0 info request, 0 other
0 irdp solicitations, 0 irdp advertisements
0 time exceeded, 0 info replies
Sent: 0 redirects, 0 unreachable, 0 echo, 0 echo reply
0 mask requests, 0 mask replies, 0 quench, 0 timestamp, 0 timestamp replies
0 info reply, 0 time exceeded, 0 parameter problem
0 irdp solicitations, 0 irdp advertisements
UDP statistics:
Rcvd: 58 total, 0 checksum errors, 58 no port 0 finput
Sent: 0 total, 0 forwarded broadcasts
BGP statistics:
Rcvd: 0 total, 0 opens, 0 notifications, 0 updates
0 keepalives, 0 route-refresh, 0 unrecognized
Sent: 0 total, 0 opens, 0 notifications, 0 updates
0 keepalives, 0 route-refresh
TCP statistics:
Rcvd: 1471 total, 0 checksum errors, 85 no port
Sent: 597 total
..
OSPF statistics:
Last clearing of OSPF traffic counters never
Rcvd: 460 total, 0 checksum errors
414 hello, 8 database desc, 3 link state req
22 link state updates, 13 link state acks
Sent: 245 total
199 hello, 12 database desc, 2 link state req
21 link state updates, 12 link state acks
BRKARC-2025 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 87