VSS VS VPC.pdf

download VSS VS VPC.pdf

of 49

Transcript of VSS VS VPC.pdf

  • 8/20/2019 VSS VS VPC.pdf

    1/124

    BRKCRS-1930

    VPC & VSS: Operation and Troubleshooting

  • 8/20/2019 VSS VS VPC.pdf

    2/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 2

    VSS and VPC

    No blocked ports, More usable bandwidth, Load-sharing

    Distribution or link failure != network reconvergence

    …enable us to build EtherChannel to 2 separate

    switches and transform network building blockto thisfrom this …or, logically

  • 8/20/2019 VSS VS VPC.pdf

    3/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 3

    Goals

    Understand generalconcepts of VPC on Nexus7000 and VSS on Catalyst6500

    Study the impact of VPC andVSS on bridging and routing

    Learn how to troubleshootVPC and VSS

  • 8/20/2019 VSS VS VPC.pdf

    4/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 4

    Spirit of this session

    Simple description on how things work

    Special cases

    Troubleshooting

    More on the topic

    Cisco Catalyst Virtual Switching System(BRKCRS-3468)

     Advanced Enterprise Campus Design: Virtual Switching System(BRKCRS-3035)

    Deploying Virtual Port Channel in NXOS(BRKDCT-2048)

  • 8/20/2019 VSS VS VPC.pdf

    5/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930

    VSS

  • 8/20/2019 VSS VS VPC.pdf

    6/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 6

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    7/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 7

    VSS

    1 active redundant control plane

    single config single point of management

    2 active data planes

    Standby switch is essentially a

    set of additional linecards

    Control messages and Data

    frames flow between active and

    standby via VSL(can be seen as backplane

    extension)

    Special encapsulation on VSL

    frames to carry additional

    information

    ActiveData Plane

    ActiveControl Plane

    ActiveData Plane

    StandbyControl Plane

    MEC

    VSL

    Dual-Active

    detection link

    Active Standby

    VSS domain

  • 8/20/2019 VSS VS VPC.pdf

    8/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 8

    VSS initializationBefore the Virtual Switch domain can become active, the Virtual Switch Link

    (VSL) must be brought online to determine Active and Standby roles. Theinitialization process essentially consists of 3 steps:

    Role Resolution Protocol (RRP) used to determine compatible Hardware and

    Software versions to form the VSL as well as determine which switch becomes

    Active and Hot Standby from a control plane perspective

    LMP LMP

    RRPRRP

    Link Management Protocol (LMP) used to track and reject Unidirectional Links,

    Exchange Chassis ID and other information between the 2 switches

    Link Bringup to establish connectivity with remote chassis1

    2

    3

  • 8/20/2019 VSS VS VPC.pdf

    9/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 9

    Troubleshooting VSS: quick sanity check

    vss# sh switch virtualSwitch mode : Virtual Switch

    Virtual switch domain number : 111Local switch number : 1Local switch operational role: Virtual Switch ActivePeer switch number : 2

    vss# sh switch virtual linkVSL Status : UPVSL Uptime : 18 hours, 38 minutesVSL SCP Ping : PassVSL ICC Ping : PassVSL Control Link : Te1/6/1

    vss# sh switch virtual link portLMP summaryLink info: Configured: 2 Operational: 1

    Peer Peer Peer Peer Timer(s)runningInterface Flag State Flag MAC Switch Interface (Time remaining)

    --------------------------------------------------------------------------------Te1/5/4 v link_down - - - -Te1/6/1 vfs operational vfs 0007.0d72.4800 2 Te2/6/1 T4(960ms)

    T5(29.98s)...vss# sh redundancy states

    my state = 13 -ACTIVEpeer state = 4 -STANDBY COLD

    Mode = Duplex

    ...

    In VSS mode? Domain# unique for each VSS?

    Role of this switch

    Peer-switch visible?

    VSL is up?

    Link used to carry control plane

    messages (ICC, IPC, SCP) VSL member-links state

    Redundancy mode SSO?

  • 8/20/2019 VSS VS VPC.pdf

    10/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 10

    Troubleshooting VSL:counters

    vss# sh switch virtual link counters

    Port InOctets InUcastPkts InMcastPkts InBcastPktsPo10 3084500343 31059 7382085 1046088Te1/6/4 523470151 139662 1323349 1045940Te1/6/5 2814244020 11346 6883221 258

    Port OutOctets OutUcastPkts OutMcastPkts OutBcastPktsPo10 1457635126 1467466 9890548 0Te1/6/4 363835687 264788 2732502 0Te1/6/5 1214900160 1202788 8103037 0...

    Port Align-Err FCS-Err Xmit-Err ...Po10 0 0 0 ...

    Te1/6/4 0 0 0 ...Te1/6/5 0 0 0 ...Port Single-Col Multi-Col Late-Col ...Po10 0 0 0 ...Te1/6/4 0 0 0 ...Te1/6/5 0 0 0 ...Port SQETest-Err Deferred-Tx IntMacTx-Err ...Po10 0 0 0 ...Te1/6/4 0 0 0 ...Te1/6/5 0 0 0 ...

     Aside from packet/bit rate this is

    one-stop-shop command for VSL

    packet and error counters

     Always take 2-3 samples

     All errors should be at or near zero

    and most importantly not

    incrementing (giants are ok)

  • 8/20/2019 VSS VS VPC.pdf

    11/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 11

    Troubleshooting VSL: LMPvss# sh switch virtual link detail...LMP summary

    ...

    LMP neighbors

    Peer Group info: # Groups: 1 (* => Preferred PG)

    PG # MAC Switch Ctrl Interface Interfaces---------------------------------------------------------------*1 0004.9bbe.ac00 2 Te1/6/4 Te1/6/4, Te1/6/5...LMP hello timer

    ...LMP FSM info

    sm(vslp_lmp 6/4), running yes, state operationalLast transition recorded: (hello)-> operational (t4_exp)-> operational (hello)->operational (hello)-> operational (t4_exp)-> operational (hello)-> operational...LMP counters

    Tx RxInterface OK Fail Bidir Uni Fail Bad--------------------------------------------------------------------Te1/6/4 805969 0 806270 7 0 0Te1/6/5 640674 0 640726 3 0 0

    Rx error detailsInterface My info My info Bad MAC Bad switch Domain id Peer info

    mismatch absent Address id mismatch mismatch-------------------------------------------------------------------------------

    Te1/6/4 0 7 0 0 0 0Te1/6/5 0 3 0 0 0 0

    Complete information about LMP

    layer of VSLP

     At least 1 link should be operational

    Should see a neighbor 

    Should not see any events except

    t4_exp (hello tx timer expiry)

    Non-zero (low number) error

    counters are acceptable as long as

    they do not increment (take 2-3

    snapshots)

  • 8/20/2019 VSS VS VPC.pdf

    12/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 12

    Troubleshooting VSL: LMPvss# sh switch virtual link portLMP summary

    Link info: Configured: 2 Operational: 2

    Peer Peer Peer Peer Timer(s)runningInterface Flag State Flag MAC Switch Interface (Time remaining)--------------------------------------------------------------------------------Te1/6/4 vfsp operational vfsp 0004.9bbe.ac00 2 Te2/6/4 T4(756ms)

    T5(29.98s)Te1/6/5 vfsp operational vfsp 0004.9bbe.ac00 2 Te2/6/5 T4(756ms)

    T5(29.92s)

    Flags: v - Valid flag set f - Bi-directional flag sets - Negotiation flag set p - Peer detected flag set

    Timers: T4 - Hello Tx Timer T5 - Hello Rx Timer

    LMP Status

    Last operational Current packet Last Diag Time sinceInterface Failure state State Result Last Diag

    -------------------------------------------------------------------------------Te1/6/4 Link down Hello bidir Never ran --Te1/6/5 Link down Hello bidir Never ran --

    LMP hello timer

    Hello Tx (T4) ms Hello Rx (T5*) msInterface State Cfg Cur Rem Cfg Cur Rem-------------------------------------------------------------------------

    Te1/6/4 operational - 1000 756 - 30000 29896Te1/6/5 operational - 1000 756 - 30000 29228

    Compared to previous command

    this one provides details of the

    previous failure (if there was any) of

    VSL links

    Rest of the information is identical

  • 8/20/2019 VSS VS VPC.pdf

    13/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 13

    Troubleshooting VSL:RRP

    vss# sh switch virtual role detail

    Switch Switch Status Preempt Priority Role Session IDNumber Oper(Conf) Oper(Conf) Local Remote

    ------------------------------------------------------------------LOCAL 1 UP FALSE(N ) 100(100) ACTIVE 0 0

    REMOTE 2 UP FALSE(N ) 100(100) STANDBY 6480 9910

    RRP Counters:--------------------------------------------------------------------

    Inst. Peer Direction Req Acc Est Rsugg Racc----------------------------------------------------------------------1 1 Tx 0 1 0 1 31 1 Rx 2 0 1 0 3

    RRP FSM info:--------------------------------------------------------------------sm(vslp_rrp RRP SM information for Instance 1, Peer 1), running yes, state role_resLast transition recorded: (lmac)-> lstart (req)-> hold (srt_exp)-> hold (req)-> hold(est)-> role_neg (srt_exp)-> role_neg (racc)-> role_res (racc)-> role_res (srt_exp)-> role_res (racc)-> role_res (srt_exp)-> role_res (srt_exp)-> role_res

    In dual-active recovery mode: No

    One of the switches must be

    standby. If both are active it means

    VSS has recovered from dual-

    active condition, but new standby

    has not been reloaded, most likely

    due to unsaved config

    This only refers to local switch

  • 8/20/2019 VSS VS VPC.pdf

    14/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 14

    Troubleshooting VSL

    vss# sh switch virtual link port-channelFlags: D - down P - bundled in port-channel

    I - stand-alone s - suspendedH - Hot-standby (LACP only)R - Layer3 S - Layer2U - in use N - not in use, no aggregationw - waiting to be aggregated

    Group Port-channel Protocol Ports------+-------------+-----------+-------------------10 Po10(RU) - Te1/6/4(P) Te1/6/5(P)20 Po20(RU) - Te2/6/4(P) Te2/6/5(P)

    vss# ping vslp output interface t1/6/4 count 100 size 1388

    Type escape sequence to abort.Sending 100, 1388-byte VSLP ping to peer-sup via output port 1/6/4, timeout is 2seconds:!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Success rate is 100 percent (100/100), round-trip min/avg/max = 12/12/28 ms

     All ports on both sides of VSL

    should be in bundled (P) state

    Verify reliability of each individual

    VSL link – output interface specifies

    egress link (one of the VSL

    interfaces). VSLP ping should work

    when VSL is up, even if remote is in

    RPR mode etc

  • 8/20/2019 VSS VS VPC.pdf

    15/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 15

    Note: with VSS many commands use ‘switch module ’notation instead of just ‘module ’

    In case of issues with VSL or VSS bring up, collect the followinginformation

    sh tech(if VSS is split, collect from both sides)

    remote command switch sh monitor event vslp all detail(if VSS is split, collect from both sides)

    Troubleshooting VSL:what information to collect

  • 8/20/2019 VSS VS VPC.pdf

    16/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 16

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    17/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 17

    High AvailabilityRedundancy Mechanisms

    The default redundancy mechanism between the 2 VSS chassis and their associated

    supervisors is NSF/SSO, allowing state information and configuration to besynchronized. Additionally, only in NSF/SSO mode does the Standby supervisor PFC,

    Switch Fabric, modules and their associated DFCs become active…

    VSL

    Should a mismatch of information occur between the Active and Standby Chassis, the

    Standby Chassis will revert to RPR mode, where only configuration is synchronized, but

    PFC, Switch Fabric and modules will not be brought up

    Switch 1

     Active

    Switch 2

    SSO Standby

    VSL

    Switch 1

    12.2(33)SXI3

     Active

    Switch 2

    12.2(33)SXH2

    RPR Standby

  • 8/20/2019 VSS VS VPC.pdf

    18/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 18

    In case of certain mismatches standby will only boot to RPR mode

    (fabric, PFC & modules will be down)

    vss# show switch virtual redundancyMy Switch Id = 1

    Peer Switch Id = 2Last switchover reason = none

    Configured Redundancy Mode = ssoOperating Redundancy Mode = rpr

    ...vss# show switch virtual redundancy mismatch

    Startup Config Mismatch:Mismatch in config file between local Switch 1 and peer Switch 2:ACTIVE : Interface TenGigabitEthernet1/6/5 shutdownSTANDBY : Interface TenGigabitEthernet1/6/5 not shut

    Other possibilities

    IOS version mismatch

    Other VSL-related config mismatch

    Non-SSO redundancy mode is configured

    Forwarding engine (PFC) mismatch

    Troubleshooting redundancy:why standby is not in SSO mode

  • 8/20/2019 VSS VS VPC.pdf

    19/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 19

    VSS with 4 supervisors

    Initially in-chassis redundantsupervisors were kept in rommon not used

     As of 12.2(33)SXI4 in-chassisredundant supervisors function asa linecard – ports are useable

    Before switching to linecard modesupervisors will boot to RPR-warm

    mode meaning they will have theirconfiguration synchronized

    If active supervisor fails entirechassis is reloaded 2nd chassistakes over same model as with2 sups

    If supervisor fails completely(doesn’t boot) or removed, the in-chassis redundant supevisor willboot as active supervisor noneed to follow procedure forsupervisor replacement

    VSL

    SiSi   SiSi

     Active SSO

    rommon> rommon>

    VSL

    SiSi   SiSi

     Active SSO

    RPR-warm RPR-warm

    Pre-12.2(33)SXI4

    12.2(33)SXI4 and later 

  • 8/20/2019 VSS VS VPC.pdf

    20/124© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 20

    What is Dual-Active?

    If VSL goes down standby needsto know if it was just VSL or the

    active switch that failed

    For faster failovers assumption isthat active switch fails Oldstandby becomes Active a.s.a.p.

    If old Active is still there however we will have 2 devices withidentical config on the network

    IGP adjacencies will start to flapor will go down

    L2 MEC will be error-disabledafter ~1 minute by EtherChannelmisconfig guard (because ofreceiving 2 different BPDUs)

    VSLSiSi   SiSi

    Active Standby

    SiSi

    Active

    Dual-active, if not detected will cause severe network outage

    Configure robust dual-active detection

    Layer2-MEC

    Layer3-MEC

  • 8/20/2019 VSS VS VPC.pdf

    21/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 21

    Dual-Active Detection options

    Enhanced PAGP

    Hot Standby Active

    Switch 1 Switch 2

    IP-BFD

    Switch 1

    VSLP VSLP BFD BFD

    Switch 2

    Hot Standby Active

    Switch 1 Switch 2

    Hot Standby Active

    VSLP Fast Hello

    L2 Heart Beat Link

    Software-12.2(33)SXI

    Enhanced subsecond detection in

    12.2(33)SXI3

    L3 Heart Beat Link

    Software -12.2(33)SXH1

    Requires PAGP+ capable neighbor with

    • 375012.2(46)SE

    • 450012.2(44)SE

    • 650012.2(33)SXH

    Software -12.2(33)SXH1

  • 8/20/2019 VSS VS VPC.pdf

    22/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 22

    Dual Active Recovery

    Switch 1 detects that switch 2 is now also active triggering dual active

    condition thus switch 1 brings down all the local interfaces to avoid networkinstability. Until VSL link restoration occurs, switch 1 is isolated from thenetwork;

    Once the VSL link comes up, the role negotiation determines that switch 1needs to come up in STAND_BY mode hence it reboots itself; finally, allinterface on switch 1 are brought on line and switch 1 assumes STAND_BY

    role

    Switch 1All

    InterfacesDown

    Dual Active Recovery

    Switch 1Reboot and

    Comes Up inSTAND_BY

    Mode

    VSS Restoration

    Switch 2 inACTIVEMode

    OLDACTIVE

    NewACTIVE

  • 8/20/2019 VSS VS VPC.pdf

    23/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 23

    If configuration was changed but has not been saved the would-be-standby switch will not be reloaded following VSL recovery

    Save the config & reload standby

    19:54:59: %VSLP-SW2_SP-5-RRP_MSG: Role change from Active to Standby and hence need

    to reload19:54:59: %VSLP-SW2_SP-5-RRP_UNSAVED_CONFIG: Ignoring system reload since there areunsaved configurations. Please save the relevant configurations

    19:54:59: %VSLP-SW2_SP-5-RRP_MSG: Use 'redundancy reload shelf' to bring this switchto its preferred STANDBY role

    Dual-active recovery, …

    Reload from active switch will not correct this

     After reloading it might happen that config between Active and Standbyis not consistent Standby will come up in RPR modeSave the config once again and reload standby again (redundancyreload peer)

  • 8/20/2019 VSS VS VPC.pdf

    24/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 24

    Virtual Switching SystemWhich Dual Active Recovery Method Should I Use?

    Since dual-active detection is importantredundancy is highly recommended

    Use Fast-hello + e-PAgP

    In case of all-LACP deployment, use Fast-hello over port-channel

    Only case where BFD had advantage was inpre-SXI3 release with routed ECMP uplinks

    and OSPF

    SiSiSiSi

    RedundantVSL Fiber 

    ePAgP

    ePAgP

    VSLP Fast-Hello

    or BFD

  • 8/20/2019 VSS VS VPC.pdf

    25/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 25

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    26/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 26

    Spanning Tree and VSS

    STP process

     Active Standby

    VSS domain behaves as a single bridge

    STP runs only on SP of active switch

    VSL is not part on STP and will not be blocked

    BPDUs will travel across single link of the MEC

    STP will be blocking ports is there are redundant

    links Keep STP enabled

    Physical Logical

    1

    2

    3

    4

    1 2

    3

    4

  • 8/20/2019 VSS VS VPC.pdf

    27/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 27

    Troubleshooting STPvss#sh spanning-tree interface po201 detail

    Port 5767 (Port-channel201) of VLAN0001 is designated forwarding

    Port path cost 3, Port priority 128, Port Identifier 128.5767.

    Designated root has priority 0, address 001e.4963.7b94

    Designated bridge has priority 32768, address 0008.e3ff.fdbdDesignated port id is 128.5767, designated path cost 16

    Timers: message age 0, forward delay 0, hold 0

    Number of transitions to forwarding state: 1

    Link type is point-to-point by default

    BPDU: sent 4447, received 12

    ...

    vss# remote login switch

    vss-sp# debug interface po201Condition 1 set

    vss-sp# debug spanning-tree switch tx

    Spanning Tree Switch Shim transmit bpdu debugging is on

    Dec 6 14:59:22.594: SW1_SP: STP SW: FAST TX: VLAN 555 Port-channel201: bpdu size 116, refcnt 1

    Dec 6 14:59:23.502: SW1_SP: STP SW: FAST TX: VLAN 1 Port-channel201: bpdu size 112, refcnt 1

    Dec 6 14:59:23.502: SW1_SP: STP SW: FAST TX: VLAN 1 Port-channel201: bpdu size 116, refcnt 1

    Dec 6 14:59:24.594: SW1_SP: STP SW: FAST TX: VLAN 555 Port-channel201: bpdu size 116, refcnt 1

    vss-sp# debug spanning-tree switch tx decodeSpanning Tree Switch Shim decode transmitted packets debugging is on

    Dec 6 14:59:43.510: SW1_SP: STP SW: FAST TX: 0180.c200.0000

  • 8/20/2019 VSS VS VPC.pdf

    28/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 28

    Spanning Tree stability features recap

    Feature Condition Works on Effect Note

    UDLD

    Detects if link becomes

    unidirectionalI.e. link cannot carry BPDUs

    both ways causes loops

    Physicalport

    Error-disables

    unidirectionallinks

    Useful on port-channels to

    take out broken links,alternative fast-timers

    PAGP/LACP

    Bridge

    Assurance

    (BA)

    Expects to receive a BPDU

    every hello_time from the

    peer.

    I.e. cases of dead control

    plane on the remote side,also BPDU loss

    Logical

    port

    Blocks port at

    STP level

    (BA-

    inconsistent

    state)

    Main protection mechanism

    where supported, alternative

    is Loop Guard

    Dispute

    Checks the remote port role

    in the received BPDU, role

    should not be designated in

    BPDU received on

    designated port

    Cases of unidirectionalcommunication

    Logical

    port

    Blocks port at

    STP level

    (Disputed

    state)

    Complements BA, on by

    default. Somewhat overlaps

    with UDLD, but not as

    effective on port-channels.

    Only works with RSTP/MST

    BPDUs

    Loop

    Guard

    Doesn’t allow port to takedesignated role if it stopped

    receiving BPDUs

    Unidirectional

    communication, control plane

    issues on remote

    Logical

    port

    Blocks port at

    STP level

    (Loop-

    inconsistent)

    Superseded by BA + Dispute,

    use with PVST+ or when BA

    is not supported

  • 8/20/2019 VSS VS VPC.pdf

    29/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 29

    Bridge assurance, Dispute & UDLD

    Preferred combination is Bridge Assurance + UDLD normalmode + Dispute (on all interswitch links) when both sidessupport it

    UDLD is needed to take out bad links from port-channels(otherwise BA or Dispute will keep whole port-channelblocked). PAgP/LACP will take out bad links, but will takelonger (~105sec vs ~20sec for UDLD with 7 sec timer)

    If preferred config is not supported use Loop Guard + UDLD

    (supported by all Cisco switches)

    Defaults: BA/UDLD – disabled, Dispute - enabled

  • 8/20/2019 VSS VS VPC.pdf

    30/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 30

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    31/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 31

    Asymmetric Routing

     Alternating HSRP Active betweendistribution switches can be usedfor upstream load balancing,however downstream traffic hitsboth distribution block switches

    This can cause a problem

    with unicast flooding  ARP entries age in 4 hours while

    L2 entries age in 5 minutes

     ARP entry with no matching L2entry unicast flooding

    In many cases when the HSRPstandby needs to forward a frameit will have to unicast flood theframe since it’s CAM table isempty VLAN 2

    SiSiSiSi

    VLAN 3

    Switch 1: Active

    HSRP and Root

    Bridge VLAN 3

    VLAN 2VLAN 3

    Switch 2: Active

    HSRP and Root

    Bridge VLAN 2

    CAM Table

    Empty for

    VLAN 2

    CAM Table

    Empty for

    VLAN 3

    B

    BB

    B

    B

    With VSS there is single logical router thus no asymmetric routing

  • 8/20/2019 VSS VS VPC.pdf

    32/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 32

    1st hop redundancy with VSS

    MAC_A  Router MAC

    IP A IP B

    Router MAC

    0001.0002.0003

    Router MAC

    0001.0002.0003

    MAC_B  Router MAC

    IP B IP A

    PC A

    PC BVSS acts as 1 router there is 1 router MAC

    address, both switches will L3 switch packets

    destined to that MAC address

    Once either switch learns dynamic MAC address,

    other switch will also learn no unicast floods

    due to asymmetry of traffic between switches

    In case of failover router MAC address does not

    change Inherrent 1st hop redundancy

  • 8/20/2019 VSS VS VPC.pdf

    33/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 33

    VSS mac-address

    By default VSS will use Router mac-address from active switch backplane

    Router mac-address is maintained across switchovers – no 1st hop redundancyprotocol is needed

    If entire VSS system is brought down and then up again and switch 2 ends upbeing active – router mac-address might change (this will only have impact ondevices that ignore gratuitous ARPs)

    To avoid such change, use ‘mac-address use-virtual’ – with this command VSS willuse special mac-address reserved for VSS

    vss(config)#switch virtual domain 111vss(config-vs-domain)#mac-address use-virtual

    Configured Router mac address is different from operational value. Change will takeeffect after config is saved and the entire Virtual Switching System (Active andStandby) is reloaded.

    Virtual mac is based on 0008.e3ff.fc00

     Alternatively router-mac maybe statically configured with ‘mac-address’ in the domain config context

  • 8/20/2019 VSS VS VPC.pdf

    34/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 34

    Troubleshooting Router-MAC

    vss# sh interface vlan 226

    Vlan226 is up, line protocol is up

    Hardware is EtherSVI, address is 0008.e3ff.fdbc (bia 0008.e3ff.fdbc)

    Internet address is 192.168.222.18/30

    ...

    vss# sh mac-address-table address 0008.e3ff.fdbc vlan 226 allLegend: * - primary entry

    age - seconds since last seen

    n/a - not available

    vlan mac address type learn age ports

    ------+----------------+--------+-----+----------+--------------------------

    Supervisor switch 1 Module 6

    * 226 0008.e3ff.fdbc static No - Router

    Supervisor switch 2 Module 6* 226 0008.e3ff.fdbc static No - Router

    vss# sh mac-address-table address 0008.e3ff.fdbc vlan 226 detail switch 2 module 6

    MAC Table shown in details

    ========================================PI_E RM RMA Type Alw-Lrn Trap Modified Notify Capture Flood Mac Address Age Pvlan SWbits Index XTag

    ----+---+---+----+-------+----+--------+------+-------+------+--------------+----+------+------+------+----

    Supervisor switch 2 Module 6

    Yes No No ST No No No No No No 0008.e3ff.fdbc 0xE8 226 0 0x380 1

    What is router MAC for given

    interface

    It should be pointing to the ‘Router’

     Actual hardware L2 entry must

    have non-zero Xtag in order forforwarding engine to consider such

    packets for L3 switching

    When VSS receives a packet destined to Router-MAC it will try to L3 switch

    (route in hardware) the packet, else the packet will be bridged

  • 8/20/2019 VSS VS VPC.pdf

    35/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 35

    MAC address learning with VSS

     A ↓  A ↓

    PC A

    PC B

    MAC A is learned on lower MEC, triggering theframe to be sent to every forwarding engine

    (DFC/PFC) Flood to Fabric mechanism (HW)1

    Internal frame header (carried over VSL) includes

    source index which identifies source port and

    hence the MAC is learned on lower MEC although

    the frame is received on VSL

    Depending on how traffic is flowing through VSS

    some forwarding engines might not see the

    packets from A after initial flood to fabric which

    might lead to aging of address and flooding

    MAC synchronization feature keeps address fromexpiring as long as traffic from that address is

    seen anywhere in the system

    1

    2

    2

  • 8/20/2019 VSS VS VPC.pdf

    36/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 36

    MAC address synchronization Initial new learns are syncronized between switch 1 and switch 2

    However if only switch 1 or switch 2 ‘sees’ the traffic for given address L2 entry might age out

    in one of the switches (this behavior is per forwarding engine: PFC/DFC) In order to reduce chance of unicast flooding we need to keep L2 entries consistent access

    both switches

    ‘mac-address-table synchronize’ feature will keep L2 tables synchronized

    Enabled by default when WS-X6708 linecard is present in the chassis

    Enabled by default in VSS as of 12.2(33)SXI4

    Recommended in all cases

    Make sure there is at least 2x aging intervals in synchonization interval(i.e. for sync interval 160, L2 aging is >320 seconds, 480 recommended)

    vss(config)# mac-address-table synchronize

    % Current OOB activity time is [160] seconds

    % Recommended aging time for all vlans is atleast three times the activity intervaland global aging time will be changed automatically if required

    When troubleshooting unicast flooding, 2 items are very important

    What module traffic arrives to (use commands to check ether-channel load-balancing)

    Whether the module in question has the mac-address learned

    (use ‘sh mac-address address all’)

  • 8/20/2019 VSS VS VPC.pdf

    37/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 37

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    38/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 38

    Ingress forwarding model

    Distributed architecture. Ingress forwarding engine makesforwarding, ingress *and* egress ACL/QOS decisions

    IMPORTANT: If the linecard where packet is received has DFC –entries on that linecard need to be looked at when troubleshooting.

    Otherwise look at active supervisor’s forwarding entries i.e. ‘sh mls cef module ’

    or ‘sh mls cef ’

    DFC DFC

    Ingress EgressXFabric

    Traffic flow

  • 8/20/2019 VSS VS VPC.pdf

    39/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 39

    Traffic locality

    Main concept for traffic forwarding is locality – Only local ports are used to send traffic out

     – … except when there are no local ports, this is when traffic will crossVSL/Peer-link

  • 8/20/2019 VSS VS VPC.pdf

    40/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 40

    Traffic locality for ECMP routes

    ECMP follows a similar behavior, locallinks are preferred and all traffic isforwarded out of a locally attached link

    Hardware FIB inserts entries for ECMProutes using locally attached links

    If all local links fail the FIB is programmedto forward across the VSL link

    vss# sh ip route 10.121.0.0 255.255.128.0 longer-prefixes

    D 10.121.0.0/17[90/3328] via 10.122.0.33, 2d10h, TenGigabitEthernet2/2/1

    [90/3328] via 10.122.0.27, 2d10h, TenGigabitEthernet1/2/1[90/3328] via 10.122.0.22, 2d10h, TenGigabitEthernet2/2/2[90/3328] via 10.122.0.20, 2d10h, TenGigabitEthernet1/2/2

    vss# sh mls cef 10.121.0.0 17 switch 1

    Codes: decap - Decapsulation, + - Push LabelIndex Prefix Adjacency102400 10.121.0.0/17 Te1/2/2 , 0012.da67.7e40 (Hash: 0001)

    Te1/2/1 , 0018.b966.e988 (Hash: 0002)

    Four ECMPEntries

    Two FIB

    Entries

    Te1/2/2

    Te1/2/1

    SW1

    SiSi   SiSi

  • 8/20/2019 VSS VS VPC.pdf

    41/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 41

    Important:: Only use parameters

    consistent with the configured

    load-balancing algorithm.

    Command uses all the specified

    arguments to calculate the hash.

    VSS L2/L3 Forwarding (Data Plane)

    Identify the physical path for flow from host 2 host 1 (out of Port-channel 2)

    vss# show etherchannel load-balance hash-result interface Port-channel 2 switch 1ip 9.0.1.2 vlan 705 8.0.1.1

    Computed RBH: 0x6Would select Gi1/6/2 of Po2

    vss# show etherchannel load-balance hash-result interface Port-channel 2 switch 2ip 9.0.1.2 vlan 705 8.0.1.1

    Computed RBH: 0x6

    Would select Gi2/9/15 of Po2

    Packet coming in on switch 1, needing to goout on Po2 will select Gi1/6/2

    Packet coming in on switch id 2, needing to

    go out on Po2 will select Gi2/9/15

    Verify the load-balance algorithm usedvss# show etherchannel load-balance switch 2 module 2

    EtherChannel Load-Balancing Configuration:

    src-dst-ip vlan included 

    mpls label-ip

    EtherChannel Load-Balancing Addresses Used Per-Protocol:

    Non-IP: Source XOR Destination MAC address

    IPv4: Source XOR Destination IP addressIPv6: Source XOR Destination IP address

    MPLS: Label or IP

    VSS Data Plane Troubleshooting L2 MECVSS specific commands

    augmented with switch id

  • 8/20/2019 VSS VS VPC.pdf

    42/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 42

    VSS L2/L3 Forwarding (Data Plane)

    Routing table shows two Equal Cost Paths to 9.0.0.0/8vss# show ip route 9.0.0.0 | i via

    Known via "eigrp 101", distance 90, metric 3072, type internal

    Redistributing via eigrp 101

    7.7.1.2, from 7.7.1.2, 1d00h ago, via TenGigabitEthernet2/2/7

    * 7.6.1.2, from 7.6.1.2, 1d00h ago, via TenGigabitEthernet1/3/2

    Looking at the HW table shows next hop directly attached to local switchis preferred

    vss# show mls cef lookup 9.0.1.0 switch 1 mod 3

    Codes: decap - Decapsulation, + - Push Label

    Index Prefix Adjacency

    108775 9.0.0.0/8 Te1/3/2 , 000f.35ed.7c00

    vss# show mls cef lookup 9.0.1.0 switch 2 mod 2

    Codes: decap - Decapsulation, + - Push Label

    Index Prefix Adjacency

    108775 9.0.0.0/8 Te2/2/7 , 000f.35ed.7c00

    DUT# show mls cef exact-route 8.0.1.1 0 9.0.1.2 0 switch 1 mod 3

    Interface: Te1/3/2, Next Hop: 7.6.1.2, Vlan: 4064, Destination Mac: 000f.35ed.7c00

    DUT# show mls cef exact-route 8.0.1.1 0 9.0.1.2 0 switch 2 mod 2

    Interface: Te2/2/7, Next Hop: 7.7.1.2, Vlan: 4056, Destination Mac: 000f.35ed.7c00

    Packet coming in on switch 1 module 3, for 9.0.0.0/8

    prefers next hop attached to local switch id 1

    Packet coming in on switch 2 module 2, for 9.0.0.0/8

    prefers next hop attached to local switch id 2

    VSS Data Plane Troubleshooting ECMP: Host 1 Host 2

  • 8/20/2019 VSS VS VPC.pdf

    43/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 43

    vss# sh mac-address-table address 0005.9a3b.6c80 vlan 226

    ...

    vlan mac address type learn age ports

    ------+----------------+--------+-----+----------+--------------------------

    Supervisor switch 1 Module 6

    * 226 0005.9a3b.6c80 dynamic Yes 10 Po3

    Supervisor switch 2 Module 6* 226 0005.9a3b.6c80 dynamic Yes 10 Po3

    vss# sh etherchannel 3 summary

    ...

    Group Port-channel Protocol Ports

    ------+-------------+-----------+-----------------------------------------------

    3 Po3(SU) PAgP Gi1/1/15(D) Gi2/6/3(P)

    VSS

    Po4

    What is the port for this mac

    address

    What are physical ports of port-

    channel

    All ports on switch1 side aredown

    If packet will arrive to switch1 to

    be switched to po3, packet will

    cross VSL

    Po3

    1/1/33

    2/4/33

    1/1/15

    2/6/3

    0005.9a3b.6c80

    Will thepacket crossVSL link?

  • 8/20/2019 VSS VS VPC.pdf

    44/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 44

    vss# sh mac-address-table address 0005.9a3b.6c80 vlan 226 detail switch 1 module 6MAC Table shown in details

    ========================================PI_E RM RMA Type Alw-Lrn Trap Modified Notify Flood Mac Address Age Pvlan Index XTag----+---+---+----+-------+----+--------+------+------+--------------+----+------+------+----Supervisor switch 1 Module 6Yes No No DY No No Yes No No 0005.9a3b.6c80 0x86 226 0xB40 0

    vss# remote command switch test switch virtual ltl index 0xB40...

    Unmapped index: 0xB40------+----------------------------------------SW viewIndex | Ports------+----------------------------------------0x0B40 Po3[Gi2/6/3],Po10[Te1/6/4]...------+----------------------------------------HW view

    Index | Ports------+----------------------------------------0x0B40 Te1/6/4,Gi2/6/3...

    vss# sh switch virtual link port-channel | i PoGroup Port-channel Protocol Ports10 Po10(RU) - Te1/6/4(P)20 Po20(RU) - Te2/6/4(P)

    VSS

    Po4

    Find the index for given mac

    address on ingress forwarding

    engine

    Find what ports on the local

    switch (1) this index includes Index should include VSL ports

    How to verify if the packet from

    switch 1 will cross VSL in order to

    reach next-hop mac-address?

    Po3

    1/1/33

    2/4/33

    1/1/15

    2/6/3

    0005.9a3b.6c80

    Will thepacket crossVSL link?

    VSS f di t bl h ti

  • 8/20/2019 VSS VS VPC.pdf

    45/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 45

    VSS forwarding troubleshootingsummary

    Unless the traffic is crossing VSL,troubleshooting VSS packet forwarding isexactly the same as troubleshootingstandalone cat6500

    When traffic crosses VSL, verify

     – L3 entries on the ingress forwardingengine (PFC or DFC)

     – L2 entries (for next hop destination mac)on forwarding engine servicing the VSL onthe 2nd chassis (strictly speaking L2 entriesneed to be checked on all DFCs along thepacket path)

  • 8/20/2019 VSS VS VPC.pdf

    46/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 46

    Special case for flooding

    MAC_A

    MAC_B

    MAC B is not known flood the frame11

    Internal frame header (carried over VSL) includes

    destination index which is remapped by egress

    switch to another index that does not include any

    MEC that has operational ports on ingress switch

    2

    Frame is flooded to devices that are single

    connected to egress switch (on the right)

    3

    2

    3

  • 8/20/2019 VSS VS VPC.pdf

    47/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 47

    Each flow is assigned to 1 of 8 ‘buckets’ Each port in port-channel transmits traffic for some buckets (i.e. 4 for 2-port channel, 2

    for 4-port etc) When ports are joining/leaving channel the buckets are redistributed among operational

    ports in deterministic fashion

    Flows that remain on operational ports might be disturbed while ASICs are beingprogrammed

    With adaptive hash option, only buckets that must move are reprogrammed

    Member 1 Member 2

    1 23 4

    5 6

    7 8

    Member 1 Member 2 Member 3

    1 2 34 5 6

    7 8

    New member

     joins

    EtherChannel Adaptive Hash

    Member 1 Member 2

    1 2

    3 4

    5 6

    7 8

    Member 1 Member 2 Member 3

    1 2 3

    5 4 6

    7 8

    New member

     joins

    buckets that must move

    buckets moving betweenoperational ports

    buckets that must move

  • 8/20/2019 VSS VS VPC.pdf

    48/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 48

     Adaptive hash is enabled by default on VSL link

    If there is 1 link / chassis / MEC – adaptive hash on MEC will not make any difference

    If the network consists of several adjacent VSS systems, adaptive hash was enhancedto avoid traffic polarization (as of 12.2(33)SXI)

    Configured per port-channel

    With adaptive hash less flows should be impacted when ports join or leave port-channels

    This is mostly evident when control-plane is busy (i.e. when many changes arehappening at the same time – during failovers etc)

    EtherChannel Adaptive Hash

    vss(config)#int port-channel200

    vss(config-if)#port-channel port hash-distribution adaptive

  • 8/20/2019 VSS VS VPC.pdf

    49/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 49

    SPAN

    When SPAN’ed traffic is crossing VSL it is transmittedover single link this might cause oversubscription ofVSL link if amount of SPAN’ed traffic is significant

    Use MEC as SPAN destination to prevent SPAN’edtraffic from crossing VSL

    If one side of the MEC goes down – SPAN’ed traffic willcross VSL

    Provision enough bandwidth on VSL

    Use ‘port-channel min-links’ LACP feature on SPAN

    destination MEC to bring down MEC if link is down on oneside

    Use EEM script to shut down MEC or SPAN session whenone side of SPAN destination MEC goes down

  • 8/20/2019 VSS VS VPC.pdf

    50/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 50

    VSS Agenda

    Initialization

    Internal redundancy considerations

    Spanning Tree

    1st hop redundancy

    Traffic forwarding

    Multicast considerations

  • 8/20/2019 VSS VS VPC.pdf

    51/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 51

    Multicast forwarding

    Layer 2 access has two multicast routers on the access subnet, RPFchecks and split roles between high and low IP address routers

    VSS has a single multicast router which simplifies multicast topology

    The multicast forwarder is selected based on which member of VSSlink receives multicast traffic

    SiSi

    Designated

    Router (High IP Address)

    IGMP Querier (Low IP address)

    Non-DR Has to

    Drop AllNon-RPF Traffic

    SiSi

    Single Logical MulticastDesignated Router and IGMP Querier

    MEC behavior upon

  • 8/20/2019 VSS VS VPC.pdf

    52/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 52

    MEC behavior uponVSS recovery after SSO switchover 

    vss(config)#port-channel load-defer 120vss(config)#int po200vss(config-if)#port-channel port load-deferThis will enable the load share deferral feature on this port-channel.The port-channel should connect to a Virtual Switch (VSS).Do you wish to proceed? [yes/no]: y

    To prevent this issue, configure ‘port-channel load-defer ’ feature on upstream switch

    Upstream switch will delay sending traffic to newly bundled port for configured duration

    Following SSO switchover left switch comes up

    after reload

    1

    MEC link from left switch is brought up and joins

    the bundle

    2

    Top switch starts sending a share of traffic to the left

    switch, but the left switch might still be converging

    (loading FIB tables, programming ASICs etc), so itmight not be fully ready to correctly forward the this

    traffic

    this might cause part of traffic to be lost for

    some time after the switch recovery

    3

    1

    2

    3

  • 8/20/2019 VSS VS VPC.pdf

    53/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 53

    Multicast fast-redirect

    When a member of egress

    Layer2 port-channel (MEC orDEC) is unbundled/bundled OnVSS replicating multicast traffic inegress mode it might takenoticeable time to reprogramhardware to send traffic via

    remaining links (local or acrossVSL)

    Fast-redirect feature shortensreprogramming time bypreprogramming most of theneeded changes

    SiSi   SiSi

    MEC

    MEC

    Sources

    Receivers

    vss(config)#interface port-channel 40vss(config-if)#mls ip multicast egress fast-redirect

    VSS s mmar

  • 8/20/2019 VSS VS VPC.pdf

    54/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 54

    VSS: summary

    1 active redundant control plane

    single config single point of management

    2 active data planes

    Standby switch is essentially a

    set of additional linecards

    Control messages and Data

    frames flow between active and

    standby via VSL(can be seen as backplane

    extension)

    Special encapsulation on VSL

    frames to carry additional

    information

    Active

    Data Plane

    ActiveControl Plane

    Active

    Data Plane

    StandbyControl Plane

    MEC

    VSL

    Dual-Active

    detection link

    Active Standby

    VSS domain

  • 8/20/2019 VSS VS VPC.pdf

    55/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930

    VPC

  • 8/20/2019 VSS VS VPC.pdf

    56/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 56

    Both VPC and VSS

    • simplify logical Layer 2 topology• use Traffic Locality for efficient shortest pathforwarding

  • 8/20/2019 VSS VS VPC.pdf

    57/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 57

    VPC Agenda

    Initialization

    Redundancy considerations

    Spanning Tree

    Traffic forwarding

    1st hop redundancy

    Multicast considerations

    VPC Virtual Port channel

  • 8/20/2019 VSS VS VPC.pdf

    58/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 58

    VPC – Virtual Port channel 2 active control planes

    2 configs

    2 points of management

    2 active data planes

    Primary-Secondary notion for some

    aspects of operation

    Control messages and Data framesflow between active and standby via

    Peer-Link

    Peer-Link is L2 trunk with plain 802.1q

    encapsulation

    Control messages are carried by CFS

    over Peer Link

    Peer keepalive link to detect dual-

    active condition

    We call VPC the MCEC between VPC

    domain and access switches

    ActiveData Plane

    ActiveControl Plane

    ActiveData Plane

    ActiveControl Plane

    VPC

    Peer-Link

    Peer Keepalive link

    Primary Secondary

    VPC domain

  • 8/20/2019 VSS VS VPC.pdf

    59/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 59

    VPC initialization

    VPC init is largely independent of NXOS boot eachswitch boots on its own

    VPC feature starts

    Keep-alive linkup / peer communication is established

    Peer-link linkup / CFS communication is established

    Primary/Secondary role is resolved

    Consistency is checked via CFS and applications synced

    Peer-Link brought UP for data

    VPCs brought UP

    Cisco Fabric Services

  • 8/20/2019 VSS VS VPC.pdf

    60/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 60

    Nexus# sh cfs application----------------------------------------------Application Enabled Scope----------------------------------------------arp Yes Physical-ethstp Yes Physical-ethvpc Yes Physical-ethigmp Yes Physical-ethl2fm Yes Physical-eth

    ...

    Cisco Fabric ServicesCFS

    Uses

    • Configuration validation

    • MAC member port synchronization

    • vPC member port status

    • IGMP snooping synchronization

    • vPC status

    For VPC CFS messages are encapsulated in Ethernet framesdelivered between peers on the peer-link

    CFS messaging

    VPC Configuration consistency

  • 8/20/2019 VSS VS VPC.pdf

    61/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 61

    VPC has distributed management plane. Configurations of bothswitches are managed separately

    Some configurations inconsistencies could lead to undesirableforwarding implications (packet duplication, blackholing etc). VPCtakes different action depending on the type of inconsistency

    Type 1: VPC will not come up

    Type 2: VPC will come up, but undesirable forwarding implications

    might occur, syslog will be printed upon detected inconsistency

    VPC Configuration consistency

    Nexus# sh vpc consistency-parameters interface port-channel 1Name Type Local Value Peer Value------------- ---- ---------------------- -----------------------lag-id 1 [(7f9b, [(7f9b,...mode 1 active activeSTP Port Type 1 Default Default

    STP Port Guard 1 None NoneSTP MST Simulate PVST 1 Default DefaultNative Vlan 1 1 1Port Mode 1 trunk trunkMTU 1 1500 1500Duplex 1 full fullSpeed 1 10 Gb/s 10 Gb/sAllowed VLANs - 101 101

    Nexus# sh vpc consistency-parameters globalName Type Local Value Peer Value------------- ---- ---------------------- -----------------------STP Mode 1 Rapid-PVST Rapid-PVSTSTP Disabled 1 None NoneSTP MST Region Name 1 "" ""STP MST Region Revision 1 0 0

    STP MST Region Instance to 1VLAN MappingSTP Loopguard 1 Disabled DisabledSTP Bridge Assurance 1 Enabled EnabledSTP Port Type, Edge 1 Normal, Disabled, Normal, Disabled,BPDUFilter, Edge BPDUGuard Disabled DisabledSTP MST Simulate PVST 1 Enabled EnabledInterface-vlan admin up 2 101 101

    Interface-vlan routing 2 1,101 1,101

    T bl h ti VPC i iti li ti

  • 8/20/2019 VSS VS VPC.pdf

    62/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 62

    Troubleshooting VPC initialization Use sh vpc to check the feature status

    vpc1# show feature | i vpc

    vpc 1 enabledvpc1# sh vpc

    Legend:

    (*) - local vPC is down, forwarding via vPC peer-link

    vPC domain id : 1

    Peer status : peer adjacency formed ok

    vPC keep-alive status : peer is alive

    Configuration consistency status: success

    Type-2 consistency reason : Consistency Check Not Performed

    vPC role : primary

    Number of vPCs configured : 1

    Peer Gateway : Disabled

    Dual-active excluded VLANs : -

    vPC Peer-link status

    ---------------------------------------------------------------------

    id Port Status Active vlans

    -- ---- ------ --------------------------------------------------

    1 Po100 up 1,101

    vPC status

    ----------------------------------------------------------------------

    id Port Status Consistency Reason Active vlans

    -- ---- ------ ----------- ------ ------------

    1 Po1 up success success 101

    CFS can communicate with the

    peer  We hear peer-alives

    Configs are compatible

    Master/Slave for certain apps

    Peer-Link will come up after CFS +

    Peer-Keepalive + Config check are

    ok

    T bl h ti VPC i iti li ti

  • 8/20/2019 VSS VS VPC.pdf

    63/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 63

    Troubleshooting VPC initialization

    Stable, not expecting issues here

    Set VPC logging level to 5 (default) to see more verbose messaging during theVPC bringup

    vpc1(config)# logging level vpc 5

    08:18:47 %ETHPORT-5-SPEED: Interface port-channel100, operational speed changed to 10 Gbps   Peer-Link comes up

    08:18:51 %VPC-3-PEER_UNREACHABLE: Remote Switch Unreachable

    08:18:51 %VPC-3-VPC_PEER_LINK_BRINGUP_FAILED: vPC peer-link bringup failed (vPC peer is not reachable over cfs)

    08:18:51 %ETHPORT-3-IF_ERROR_VLANS_SUSPENDED: VLANs 1,100-101 on Interface port-channel100 are being suspended.(Reason: vPC peer is not reachable over cfs)

    08:18:51 %ETHPORT-5-IF_UP: Interface port-channel100 is up in mode trunk

    08:18:58 %VPC-4-VPC_ROLE_CHANGE: In domain 1, VPC role status has changed to primary

    08:18:58 %ETHPORT-3-IF_ERROR_VLANS_REMOVED: VLANs 1,100-101 on Interface port-channel100 are removed fromsuspended state.

    08:18:58 %VPC-5-VPC_DELAY_SVI_BUP_TIMER_START: vPC restore, delay interface-vlan bringup timer started

    08:19:08 %VPC-5-VPC_DELAY_SVI_BUP_TIMER_EXPIRED: vPC restore, delay interface-vlan bringup timer expired,reiniting interface-vlans

    08:19:08 %VPC-5-VPC_RESTORE_TIMER_START: vPC restore timer started to reinit vPCs

    08:19:38 %VPC-5-VPC_RESTORE_TIMER_EXPIRED: vPC restore timer expired, reiniting vPCs

    In case process does not go beyond certain stage, one should look atcommunication between the peers (CFS)

  • 8/20/2019 VSS VS VPC.pdf

    64/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 64

    VPC config remarks

    Check config consistency using ‘sh vpc consistency-parameters’

    Complete list of parameters which should be consistent is quiteextensive: physical port config, QOS, security, STP, routingprotocols etc

      check config guide for specific NXOS version

    Domain id must be unique for each domain reachable adjacentat Layer 2

    VPC domain 100

    VPC domain 200

    VPC

    Domain id MUST be

    different

    (can’t be 100 on bothPair)

  • 8/20/2019 VSS VS VPC.pdf

    65/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 65

    VPC: CFS troubleshooting

    Cisco Fabric Services Transport of control messages between VPC peers

    Nexus# show cfs status

    Distribution : Enabled

    Distribution over IP : Disabled

    IPv4 multicast address : 239.255.70.83

    IPv6 multicast address : ff15::efff:4653

    Distribution over Ethernet : Enabled

    Nexus# show cfs peers

    Physical Fabric

    ---------------------------------------------

    Switch WWN IP Address

    ---------------------------------------------

    20:00:00:1b:54:c2:42:41 10.48.73.222 [Local]

    Nexus

    20:00:00:1b:54:c2:42:44 0.0.0.0

    Total number of entries = 2

    Nexus# show cfs internal ethernet-peer statistics| i Trans|Rece

    Number of Segments Transmitted : 218

    Number of Acks Transmitted : 223

    Maximum Segment Size Transmitted : 0

    Number of Transmission Timeouts : 0

    Number of segments in Transmit Queue : 0

    Number of segments in Re-Transmit Queue : 0

    Total Number of Segments Received : 441

    Number of Acks Received : 217

    Number of Duplicate Messages Received : 0

    Number of Unexpected Segments Received : 0

    Number of fragmented segments Received : 2

    Number of duplicate fragments Received : 0

    Number of unfragmented segments Received : 210

    Number of Received Segments Dropped : 0

    Number of Unreliable segments Transmitted : 1Number of Unreliable segments Received : 1

    Nexus# sh cfs internal notification log name vpc

    Sun Nov 14 15:27:22 2010: Peer add 20:00:00:1b:54:c2:42:44

    Sun Nov 14 19:05:25 2010: Peer gone 20:00:00:1b:54:c2:42:44

    Sun Nov 14 19:08:03 2010: Peer add 20:00:00:1b:54:c2:42:44

    TX/RX counters should move whenVPC is active or coming up

    Remote peer should be seen

    Shows timestamps for when CFS

    communication for VPC was

    interrupted (peer-reload, peer-link

    issues etc)

  • 8/20/2019 VSS VS VPC.pdf

    66/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 66

    More information

    sh tech(collect for offline analysis, takes ~5 min when redirected to file)

    sh tech vpc(collect when there is no time for ‘big’ sh tech)

    debug vpc peer (peer events, useful for indepth vpc troubleshooting)

    debug vpc peer-link(peer-link events, for indepth vpc bringup troubleshooting)

    debug cfs event ethernet

    (cfs event – peer communication)

  • 8/20/2019 VSS VS VPC.pdf

    67/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 67

    VPC Agenda

    Initialization

    Redundancy considerations

    Spanning Tree

    Traffic forwarding

    1st hop redundancy

    Multicast considerations

    VPC redundancy model

  • 8/20/2019 VSS VS VPC.pdf

    68/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 68

    Process restartability

    Supervisor redundancy

    VPC redundancy

     Active

    Standby(SSO)

     Active

    Standby(SSO)

    Process 1

    Process 2

    Process X

    Process 1

    Process 2

    Process X

    Switch 1 Switch 2

    VPC Domain

    Processes checkpoint their runtime state Crashing process is restarted statefully by

    system manager 

    HA-policy will triggersupervisor switchover

    in response to

    excessive process

    crashing, software,

    hardware or

    diagnostic failure

    VPC redundancy model

    Devices dual-attached to VPC domain are protected against

    single switch failure (power, hardware, maintenance etc)

    Peer-link failure handling

  • 8/20/2019 VSS VS VPC.pdf

    69/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 69

    Peer link failure handling(similar to dual-active detection in VSS)

    VPC peer-link failure

    I am primary

    Done

    ReceivingKeepalives*

    Bring down all VPC ports

    Become primary

    primary

    2ndary

    yes

    no

    Primary is alive

    Primary is gone

    VPC peers do not require reload following

    peer-link failure or recovery

  • 8/20/2019 VSS VS VPC.pdf

    70/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 70

    Keepalive link

    Heartbeat between vPC peers to prevent dual-active scenario

    Keepalives are sent every second by default on UDP port 3200

    3 second hold timeout on peer-link loss (ignore keepalive to leavetime for convergence before taking action)

    5 seconds keepalive timeout (starts after hold timeout after peer-linkdown) – if no keepalive received during this timeout dual active

    detection seconday bring down VPC Use dedicated link, though NXOS does not enforce this – just IP

    connectivity is verified

    Mgmt interface can be used as keepalive link, but do not connect themanagemet interfaces together directly (only active supervisormanagement interface is up)

    vpc1# debug vpc peer-keepalive13:10:54.257099 vpc: received new OOB packet, version(0) flags(0) my_context(0)your_context(0) my_epoch(604049) your_epoch(604104) my_ip(1.1.1.2)13:10:54.257126 vpc: your_ip(1.1.1.1) domainId(1)13:10:55.257442 vpc: received new OOB packet, version(0) flags(0) my_context(0)your_context(0) my_epoch(604050) your_epoch(604105) my_ip(1.1.1.2)13:10:55.257469 vpc: your_ip(1.1.1.1) domainId(1)13:10:56.257324 vpc: received new OOB packet, version(0) flags(0) my_context(0)your_context(0) my_epoch(604051) your_epoch(604106) my_ip(1.1.1.2)13:10:56.257351 vpc: your_ip(1.1.1.1) domainId(1)

    Peer Keepalives

    Troubleshooting VPC peer-keepalives

  • 8/20/2019 VSS VS VPC.pdf

    71/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 71

    Troubleshooting VPC peer keepalives

    Nexus# show vpc peer-keepalive

    vPC keep-alive status : peer is alive

    --Send status : Success

    --Last send at : 2009.06.19 00:41:15 589 ms

    --Sent on interface : Eth2/35

    --Receive status : Success

    --Last receive at : 2009.06.19 00:41:14 580 ms

    --Received on interface : Eth2/35

    --Last update from peer : (1) seconds, (9) msec

    vPC Keep-alive parameters--Destination : 7.7.7.77

    --Keepalive interval : 1000 msec

    --Keepalive timeout : 5 seconds

    --Keepalive hold timeout : 3 seconds

    --Keepalive vrf : v1

    --Keepalive udp port : 3200

    --Keepalive tos : 192

    Nexus# show vpc statistics peer-keepalive

    vPC keep-alive status : peer is alive

    vPC keep-alive statistics

    ----------------------------------------------------

    peer-keepalive tx count: 9773

    peer-keepalive rx count: 8985

    average interval for peer rx: 991

    Count of peer state changes: 0

    Peer-keepalive is only essential at

    the time when peer-link goes down  At any other time peer-keepalive

    failure will only trigger syslog

    Peer-keepalives might be affected

    by extreme control plane load

    (check CPU utilization & COPP)

    Number of keepalive state

    transitions, closer to 0 - better 

    VPC behavior at initialization

  • 8/20/2019 VSS VS VPC.pdf

    72/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 73

    C be a o at t a at o(default)

    VPC needs to be able to talk to the

    peer (over peer-link) before bringingup VPC port-channels Negotiate LACP/STP operating roles for

    the chassis

    Wait for per-port peer parameters andhandshake to bring up vPC ports

    Performs peer parameters consistencycheck on each VPC bringup

    Only after VPC port-channels arebrought up.

    What if after a full DC outage (bothNexus down), only one switch is comingup ?

    Will not bring up VPCs if after adatacenter outage, only one VPC peercomes back up

  • 8/20/2019 VSS VS VPC.pdf

    73/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 74

    VPC Reload Restore

     Allows to bring up VPCs after timeoutif peer is presumed dead

    Default timeout 240 sec

     Assumes primary role for STP andLACP

    Nexus(config)# vpc domain 1Nexus(config-vpc-domain)# reload restore ?

    delay Duration to wait before assuming

    peer dead and restoring vpcs

    Nexus(config-vpc-domain)# reload restore delay ? Time-out for restoring vPC links

    (in seconds)

  • 8/20/2019 VSS VS VPC.pdf

    74/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 75

    ARP synchronization

    PC A

    PC B

    ARP

    Ip B Mac B

    ARPIp B ???

    Needs to be

    Resolved ?

    When traffic patternchanges (due to VPC linksgoing up/down, due tofailover etc) the peer thathandles the traffic mightneed to resolve ARP beforebeing able to forwardpackets

    This might introduceadditional delay to trafficrecovery

     ARP sync feature issupported as of 4.2(6), andallows VPC peers tosynchronize their ARPtables over CFS

    vpc(config)# vpc domain 1vpc(config-vpc-domain)# ip arp synchronize

    More information

  • 8/20/2019 VSS VS VPC.pdf

    75/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 76

    More information

    sh log last

    (review sequence of events) show file logflash://sup-standby/log/messages

    (in case other supervisor was active when everything started)

    sh process log(which processes have crashed when)

    sh redundancy status(status of supervisor redundancy & last switchover data)

    sh system reset-reason(last reset/switchover reason per module)

    sh logging onboard internal reset-reason(reset reason from different components point of view – usefulfor complex cases)

    sh tech /from main VDC/(collects most of the above for offline analysis)

  • 8/20/2019 VSS VS VPC.pdf

    76/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 77

    VPC Agenda

    Initialization

    Redundancy considerations

    Spanning Tree

    Traffic forwarding

    1st hop redundancy

    Multicast considerations

    Handling of Spanning Tree: VPC

  • 8/20/2019 VSS VS VPC.pdf

    77/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 78

    Handling of Spanning Tree: VPC

    STP process

    Primary Secondary

    STP process

    STP runs on both switches (2 active control

    planes) but only primary switch controls VPCs.(even if root is secondary , then Primary will send

    bpdu with root info being secondary)

    VPC port states changes are communicated to

    secondary via CFS messages.

    For non-VPC ports domain appears as 2 bridges

    1

    Peer-link is part of STP. BPDU handling ismodified such that Peer-link will never be blocked

    (similar to MST implementation of IST)

    2

    Non-VPC ports are managed independently by

    local STP process on each switch

    1 1

    2

  • 8/20/2019 VSS VS VPC.pdf

    78/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 79

    STP troubleshooting

    Peer link is running STP

    Left-Root# sh spanning vlan 35

    VLAN0035

    Spanning tree enabled protocol rstpRoot ID Priority 24611

    Address 001b.54c2.4241

    This bridge is the root

    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

    Bridge ID Priority 24611 (priority 24576 sys-id-ext 35)

    Address 001b.54c2.4241

    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec

    Interface Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- --------------------------------

    Po1 Desg FWD 1 128.4096 (vPC) P2p

    Po100 Desg FWD 2 128.4195 (vPC peer-link) Network P2p

    Right# sh spanning-tree vl 35 detail | i "^ Port|BPDU"Port 4096 (port-channel1, vPC) of VLAN0035 is designated forwarding

    BPDU: sent 0, received 0

    Port 4195 (port-channel100, vPC Peer-link) of VLAN0035 is root forwarding

    BPDU: sent 3754, received 3755

    On the other end of peer-link po1 is designated despite not sending or

    receiving single BPDU

    STP troubleshooting

    This output can be easily limited to

  • 8/20/2019 VSS VS VPC.pdf

    79/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 80

    g Looking at BPDUs

    Left-Root# debug spanning-tree bpdu_tx tree 101

    14:20:37.556707 stp: RSTP(101): transmitting RSTP BPDU on port-channel10014:20:37.556750 stp: vb_vlan_shim_send_bpdu(1933): VDC 4 Vlan 101 port port-

    channel100 enc_type 1 len 42

    14:20:37.556834 stp: RSTP(101): transmitting RSTP BPDU on port-channel1

    14:20:37.556863 stp: vb_vlan_shim_send_bpdu(1933): VDC 4 Vlan 101 port port-channel1enc_type 2 len 36

    Left-Root# debug spanning-tree all

    14:22:23.560147 stp: RSTP(1): transmitting RSTP BPDU on port-channel100

    14:22:23.560169 stp: vb_vlan_shim_send_bpdu(1933): VDC 4 Vlan 1 port port-channel100enc_type 2 len 36

    14:22:23.560219 stp: BPDU TX: vb 1 vlan 1 port port-channel100 len 36 ->0180c2000000CFG P:0000 V:02 T:02 F:78 R:80:01:00:1b:54:c2:42:43 00000002B:80:01:00:1b:54:c2:42:44 9063 A:0000 M:0014 H:0002 F:000f

    Left-Root# sh spanning-tree internal event-history tree 0 interface port-channel 50

    VDC02 MST0000

    0) Transition at 497772 usecs after Tue Oct 20 17:42:01 2009State: FWD Role: Root Age: 5 Inc: no [STP_PORT_STATE_CHANGE]

    1) Transition at 661395 usecs after Tue Oct 20 17:42:01 2009

    State: FWD Role: Root Age: 4 Inc: no [STP_PORT_ROLE_CHANGE]

    2) Transition at 17741 usecs after Tue Oct 20 17:42:03 2009

    State: BLK Role: Root Age: 5 Inc: no [STP_PORT_STATE_CHANGE]

    ...

    Looking at past events…

    p y

    necessary Vlan/Interface, but it

    doesn’t dump the BPDU

    Very chatty – use ‘debug logfile

    ’ to redirect output to a file

  • 8/20/2019 VSS VS VPC.pdf

    80/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 81

    STP inconsistencies

      STP-2-VPC_PEER_LINK_INCONSIST_BLOCK: vPC peer-link detected BPDU receive timeoutblocking port-channel11 VLAN0121.

    When STP detects certain abnormal situations it maymark ports as inconsistent and block them to preventforwarding loops

    Root – Root Guard feature detected inconsistency(unwanted bridge tries to become root)

    Loop – Loop Guard feature detected inconsistency

    (port becomes designated because no BPDUs are beingreceived)

    Bridge Assurance (BA)

    (no BPDUs are received from remote side)

    VPC Peer-link

    (any of above inconsistencies happened on VPC peer-link)

    Handling Peer-Link STP inconsistencies

  • 8/20/2019 VSS VS VPC.pdf

    81/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 82

    gon Primary switch

    Primary SecondaryWhen peer-link STP inconsistency is detected on

    primary switch the link will be put in ‘inconsistent’

    STP state (effectively blocking state)

    1

    BPDUs are not sent on peer-link when it is

    inconsistent. This is to allow secondary switch to

    detect inconsistency and react

    1

            i      n      c      o      n      s        i      s

            t      e      n      c      y

    Handling Peer-Link STP inconsistencies

  • 8/20/2019 VSS VS VPC.pdf

    82/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 83

    gon Secondary switch

    Primary Secondary

    When peer-link STP inconsistency is detected on

    secondary switch the peer link will be put in

    ‘inconsistent’ STP state (effectively blockingstate)

    1

    Respective vlans or MST instances are also

    blocked on all VPCs

    22

    2

    1        i      n      c      o      n      s        i      s

            t      e      n      c      y

            i      n      c      o      n      s        i      s

            t      e      n      c      y

  • 8/20/2019 VSS VS VPC.pdf

    83/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 85

    Bridge assurance, Dispute & UDLD

    BA is default enabled on Peer-Link (and recommended to remain

    enable), not recommended for VPCs unless Peer-Switch feature isused

    Dispute is default enabled (for both RSTP and MST on VPC)

    UDLD [normal mode] is recommended to take out bad links fromchannels (otherwise LACP takes ~100sec vs ~20 with UDLD)

    Recommendation

    Preferred BA + UDLD + Dispute (on all interswitch links when usingPeer-switch) when all switches support this (nexus7000/5000 andcat6500/VSS do support)

    Without Peer-switch BA should be kept only on Peer-Link (noBA/Loop guard on VPCs)

    If preferred config is not supported use Loop Guard + UDLD(supported by all Cisco switches)

    STP behavior upon VPC primary failure

  • 8/20/2019 VSS VS VPC.pdf

    84/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 86

    p p y

    Primary SecondaryOP-Primary

    ROOT ROOTBackup

    ROOT

    Depending on control plane load it might take few

    seconds for Op-primary to start sending BPDUs.

    This might cause STP reconvergence on

    connected switches hence increasing hello timeor peer-switch feature might be considered in

    large deployments

    Primary switch (STP root) fails1

    Secondary switch becomes operational primary

    and STP root

    2

    STP root port doesn’t change for access switch

    nor any STP port states for VPCs, forwardingcontinues1

    2

    STP behavior upon VPC primary recovery

  • 8/20/2019 VSS VS VPC.pdf

    85/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 87

    p p y y

    SecondaryOP-Primary

    ROOT ROOT

    OP-Secondary

    SYNC BackupROOT

    Left switch comes back up1

    Peer-Link comes back up2

    VPC role is resolved as Operational-secondary3

    Left switch has better STP priority becomesSTP root4

    STP root port of right switch will change and that

    will trigger SYNC: all non-edge STP ports will be

    temporarily blocked

    5

    Once sync is complete ports will resume

    forwarding

    1

    23

    4 5

    VPC Peer-Switch feature

  • 8/20/2019 VSS VS VPC.pdf

    86/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 88

    Primary Secondary

    Both VPC switches originate BPDUs with preconfigured information. Thisallows to keep the same BPDU when primary fails/recovers no extraSYNC required avoid short interruption in forwarding described on

    previous slide is avoided

    Both left and right switches consider themselves root

    Both left and right switches send BPDUs all the time no need to raisehello time

     Available 4.2(6) – 5.x software

    spanning-tree vlan 1-1000 priority 8192vpc domain 1peer-switch

    spanning-tree vlan 1-1000 priority 8192vpc domain 1peer-switch

    ROOT ROOT

    VPC Peer-Switch feature

  • 8/20/2019 VSS VS VPC.pdf

    87/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 89

    Primary Secondaryleft# sh span vlan 101

    VLAN0101Spanning tree enabled protocol rstp

    Root ID Priority 8293Address 0023.04ee.be01This bridge is the root

    ...

    Bridge ID Priority 8293 (priority 8192)Address 0023.04ee.be01

    ...

    Interface Role Sts Cost Prio.Nbr Type

    ---------------- ---- --- --------- -------- ---------------Po1 Desg FWD 1 128.4096 (vPC) P2pPo100 Root FWD 2 128.4195 (vPC peer-link)

    left# sh vpc role | i macvPC system-mac : 00:23:04:ee:be:01 vPC local system-mac : 00:1b:54:c2:42:43

    right# sh span vlan 101

    VLAN0101Spanning tree enabled protocol rstpRoot ID Priority 8293

    Address 0023.04ee.be01

    This bridge is the root

    ...

    Bridge ID Priority 8293 (priority 8192)Address 0023.04ee.be01

    ...Interface Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- ---------------Po1 Desg FWD 1 128.4096 (vPC) P2pPo100 Desg FWD 2 128.4195 (vPC peer-link)

    In Peer-Switch mode bridge-IDcomes from system-mac asopposed to local mac in normalmode

    ROOT ROOT

    M i f i

  • 8/20/2019 VSS VS VPC.pdf

    88/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 90

    More information

    show spanning-tree internal event-history all(allows to look back at past STP events, not included in sh tech)

    sh tech stp(from both sides of VPC)

    sh tech

    (from both sides of VPC, this will include in it ‘sh tech stp’, in caseVPC is is non-default VDC collect also sh tech from VDC 1)

    VPC A d

  • 8/20/2019 VSS VS VPC.pdf

    89/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 91

    VPC Agenda

    Initialization

    Redundancy considerations

    Spanning Tree

    Traffic forwarding

    1st hop redundancy

    Multicast considerations

    Special case for forwarding

  • 8/20/2019 VSS VS VPC.pdf

    90/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 92

    p g

         x

         x

         x

    PC A ends a packet to PC B1

    MAC B is not known by left switch flood2

    MAC B is not known by right switch flood3

    B receives duplicate frames4

    MAC A will be learned on wrong port on the lower

    access switch blackholing traffic to A

    5

    Frames received on Peer-Link may not be flooded

    out of VPCs

    PC A

    PC B

     A ←

    1

    2 3

    4

    5 A ↑     x

    Special case for forwarding:VPC i l t ti

  • 8/20/2019 VSS VS VPC.pdf

    91/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 93

    VPC implementation

    MAC B is not known by left switch flood1

    Frames received from Peer-Link are never sent

    out of VPC (except those without operational

    ports on ingress switch)

    Egress port ASICs will drop the frame

    Frame is still flooded to devices that are solely

    connected to egress switch3

    This rule (called ‘VPC check’) stands for all traffic

    (L2, L3, unicast, multicast, broadcast, flooded etc)

    1

    3

    2

    2

    2

    PC A

    PC B

    Summary: VPC traffic forwarding

  • 8/20/2019 VSS VS VPC.pdf

    92/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 94

    √ √   X √

         x

    VPC f di d L3 i li ti

  • 8/20/2019 VSS VS VPC.pdf

    93/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 95

    vPC view Layer 2 topology Layer 3 topology

    Port-channel looks likea single L2 pipe.

    Hashing will decidewhich link to chose

    Layer 3 will use ECMP

    for northbound traffic

    7k1 7k2

    R

    7k1 7k2

    R

    7k vPC

    R

    R could be any router,

    L3 switch or VSSbuilding a port-channel

    VPC forwarding and L3 implication

    R can Decide to send to 7k1 at L3 (next-hop = 7k1 if Po) and

    uses link to 7k2 at L2 level !!!

     

    Path is R 7k2 

    7k1 DROPPED (per VPC check) as

    incoming on peer-link if it must be routed to another VPC

    Layer 3 and vPC Design update

  • 8/20/2019 VSS VS VPC.pdf

    94/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 96Router 

    7k1 7k2

    Switch

    Po1

    Po2

    Use L3 links to hook up routers and peer with a vPC domain

    Don’t use L2 port channel to attach routers to a vPC domain unless you statically route toHSRP address

    If both, routed and bridged traffic is required, use individual L3 links for routed traffic and L2port-channel for bridged traffic

    Use of peer-gateway does NOT change above recommendations

    Router 

    Switch

    L3 ECMP

    Po2

    Layer 3 and vPC Design update

    PP

    P

    Routing Protocol Peer 

    Dynamic Peering Relationship

    P

    P

    L 3 d VPC id ti

  • 8/20/2019 VSS VS VPC.pdf

    95/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 97

    Layer 3 and VPC – consideration

    Best : use Routed links from VPC pair to routers

     Alternative : VPC in a pure L2 VDC and routing in aseparate VDC

    Do not make L3 routing protocol peering between

    VPC pair of switches on a VPC vlan.May lead to routing frame towards Peer-link leading to dropper VPC-Check

    If peering between VPC devices is needed, must be doneoutside of the peer link

    Keep SVI interface administrative status in sync(both up or both down) – This is a type 2consistency check

    Special case for L2 learning

  • 8/20/2019 VSS VS VPC.pdf

    96/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 99

     A ↓  A

         x

     A ↓

    MAC A is learned on lower VPC1

    PC A

    PC BMAC A is learned on Peer-Link2

    Frame destined to A arriving to right switch will be

    sent to Peer-Link

    3

    Traffic should prefer local links when available

    (traffic locality rule)

    1

    2

    3

    L2 learning: VPC implementation

  • 8/20/2019 VSS VS VPC.pdf

    97/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 100

     A ↓ A ↓

    MAC A is learned on lower VPC1

    PC A

    PC B

    MAC addresses are never learned from traffic on

    Peer-Link

    Frame destined to A arriving to right switch will be

    sent out of lower VPC3

    1

    2

    3

    Left switch sends a CFS message to right switch

    telling about MAC A learned on lower VPC. Right

    switch updates MAC address table

    2

    CFS message

    TroubleshootingPo50

    Vlan 50

    Po22

    Vlan 20

  • 8/20/2019 VSS VS VPC.pdf

    98/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 102

    gLayer 2

    20.1.2.391.0.0.10

    0013.1908.e246

    nexus# sh mac address-table address 0013.1908.e246 vlan 50

    VLAN MAC Address Type age Secure NTFY Ports---------+-----------------+--------+---------+------+----+------------------* 50 0013.1908.e246 dynamic 0 F F Po50

    nexus# sh spanning-tree vlan 50 interface port-channel 50Mst Instance Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- --------------------------------MST0002 Desg FWD 200 128.4145 (vPC) P2p

    nexus# sh hardware mac address-table 2 address 0013.1908.e246 vlan 50

    Valid| PI | BD | MAC | Index | Stat| SW | Modi| Age | Tmr || | | | | ic | | fied| Byte| Sel |

    -----+----+-------+---------------+--------+-----+----+-----+-----+-----+1 1 161 0013.1908.e246 0x00a36 0 3 0 141 1

    nexus# sh system internal pixm info ltl 0x00a36 | i Eth.*,0x0a36 Eth2/36,

    nexus# sh mac address-table address 0021.55e0.66c2 vlan 20

    VLAN MAC Address Type age Secure NTFY Ports---------+-----------------+--------+---------+------+----+------------------* 20 0021.55e0.66c2 dynamic 660 F F Po22

    nexus# sh spanning-tree vlan 20 interface port-channel 22Mst Instance Role Sts Cost Prio.Nbr Type---------------- ---- --- --------- -------- --------------------------------MST0000 Desg FWD 200 128.4117 (vPC) Network P2p

    nexus# sh hardware mac address-table 1 address 0021.55e0.66c2 vlan 20Valid| PI | BD | MAC | Index | Stat| SW | Modi| Age | Tmr |

    | | | | | ic | | fied| Byte| Sel |-----+----+-------+---------------+--------+-----+----+-----+-----+-----+1 1 18 0021.55e0.66c2 0x00a32 0 2 0 103 1

    nexus# sh system internal pixm info ltl 0x00a32 | i Eth.*,

    0x0a32 Eth1/13, Eth1/14,

    MAC addresses should point

    to expected ports in expected

    vlans (path towards source)

    The ports should be in STP

    forwarding mode

    Hardware MAC address

    table should be consistentwith software table

    Finding port# for given index

    VPC

    TroubleshootingLayer 3

    Po50

    Vlan 50

    Po22

    Vlan 20

  • 8/20/2019 VSS VS VPC.pdf

    99/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 105

    Layer 3

    nexus# sh routing ip 20.1.2.3...20.1.2.3/32, ubest/mbest: 1/0

    *via 20.1.1.240, Vlan20, [1/0], 03:48:59, static

    nexus# sh ip arp 20.1.1.240Address Age MAC Address Interface20.1.1.240 00:02:17 0021.55e0.66c2 Vlan20

    nexus# sh forwarding ip route 20.1.2.3 module 2...------------------+------------------+---------------------Prefix | Next-hop | Interface------------------+------------------+---------------------20.1.2.3/32 20.1.1.240 Vlan20

    nexus# sh forwarding adjacency 20.1.1.240 module 2

    IPv4 adjacency information

    next-hop rewrite info interface-------------- --------------- -------------20.1.1.240 0021.55e0.66c2 Vlan20

    nexus# sh int vl 20 | i addressHardware is EtherSVI, address is 0023.ac66.1a42

    nexus# sh mac address-table address 0023.ac66.1a42 vlan 20

    VLAN MAC Address Type age Secure NTFY Ports---------+-----------------+--------+---------+------+----+------------------

    G 20 0023.ac66.1a42 static - F F sup-eth1(R)

    Is there route to

    destination

    Is the next hop resolved

    Looking at module 2

    because this is wherepackets in question

    should be received

    Is adjacency consistent

    with ARP

    Router MAC must have

    Gateway flag in order for

    packet to be L3 switched

    20.1.2.391.0.0.10

    0013.1908.e246

    VPC

    Where given packet will be load-balanced

  • 8/20/2019 VSS VS VPC.pdf

    100/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 106

    For equal-cost routes

    nexus# sh routing hash 91.0.0.10 20.1.2.3

    Load-share parameters used for software forwarding:load-share mode: address source-destination port source-destinationUniversal-id seed: 0xcdb5769fHash for VRF "default"Hashing to path *20.1.1.3 (hash: 0x2a), for route:

    20.1.2.3/32, ubest/mbest: 2/0*via 20.1.1.3, Vlan20, [1/0], 00:01:37, static*via 20.1.1.240, Vlan20, [1/0], 16:32:42, static

    For port-channels

    nexus# sh port-channel load-balance forwarding-path interface port-channel 22 dst-ip20.1.2.3 src-ip 91.0.0.10 vlan 20 module 2

    Missing params will be substituted by 0's.

    Module 2: Load-balance Algorithm: source-dest-ip-vlan

    RBH: 0 Outgoing port id: Ethernet1/14

    Load-balancing is configurable

    under ‘ip load-sharing address’ in

    default VDC and affects all VDCs

    Load-balancing is configurable

    under ‘port-channel load-balance’

    in default VDC and affects all VDCs

    Use ‘sh port-channel rbh-distribution’ to see which link sends traffic forwhich of 8 available load-balancing ‘buckets’

    Hardware path packet drops

    #1 command to look for hardware

  • 8/20/2019 VSS VS VPC.pdf

    101/124

    © 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKCRS-1930 109

    nexus# sh hardware internal errors all----------------------------------------Hardware errors as reported in module 1----------------------------------------

    |------------------------------------------------------------------------|

    | Device:R2D2 Role:MAC ||------------------------------------------------------------------------|Instance:7ID Name Value Ports-- ---- ----- -----28688 aric_no_port_select_error 0000000000000002 1,3,5,7 I2...|------------------------------------------------------------------------|| Device:Ashburton Role:MAC Mod: 1 ||------------------------------------------------------------------------|Instance:03629 Egr