Cisco Catalyst 6500 Switch Architecture

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cisco Catalyst 6500 Switch Architecture as PDF for free.

More details

  • Words: 8,992
  • Pages: 115
Cisco Catalyst 6500 Switch Architecture

RST-3465

RST-3465 12523_04_2006_c2

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

1

Session Goal To provide you with a thorough understanding of the Catalyst® 6500 switching architecture, packet flow, and key forwarding engine functions

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

2

2

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

3

Chassis Architecture

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

4

Catalyst 6500 Chassis Architecture • Modular chassis in variety of form factors 3, 4, 6, 9, and 13 - slot versions

• Enhanced (“E”) chassis offer higher system power capacity and better signal integrity 3, 4, 6, and -9 slot versions

• Classic switching bus traces/connectors • Crossbar fabric traces/connectors • Redundant power supplies • Fan tray for system cooling 6509 - NEB - A chassis offers redundant fan trays and air filtration

• Redundant voltage termination (VTT)/clock modules • Redundant MAC address EEPROMs

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

5

Catalyst 6503/6503E and 6504E • Slots 1 and 2—Supervisor engine, or switching module Power Supply

• Other slots—Any switching module • 2 fabric channels per slot

Power Supply

VTT/Clock Modules

EEPROMs

• Power supplies in rear

• 950W AC/DC and 1400W AC power supplies for 6503/6503E • 2700W AC/DC power supplies for 6504E

Fan Tray

6503/6503E—Power entry modules (PEMs) in front of chassis provides power connection

Dual Channels

Slot 1

Dual Channels

Slot 2

Dual Channels

Slot 3

Dual Channels

Slot 4

Crossbar

Shared Bus

5 RU 4 RU

Note: CEF720 modules not supported in Catalyst 6503 (non-E) chassis RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

6

Catalyst 6506/6509 and 6506E/6509E • Slots 1 and 2—Supervisor Engine 2, or switching module

VTT/Clock Modules

• Slots 5 and 6—Supervisor Engine 32/720, or switching module • Other slots—Any switching module

• Wide variety of power supplies, from legacy 1000W to new 6000W—E chassis requires at least 2500W PS

Fan Tray

• 2 fabric channels per slot

• NEB-A chassis has vertical slot alignment, dual fan trays, front-to-back air flow, air filtration system

21 RU

EEPROMs

Dual Channels

Slot 1

Dual Channels

Slot 2

Dual Channels

Slot 3

Dual Channels

Slot 4

Dual Channels

Slot 5

Dual Channels

Slot 6

Dual Channels

Slot 7

Dual Channels

Slot 8

Dual Channels Crossbar

Slot 9

Power Supply

Shared Bus Power Supply

12 RU 15 RU RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

7

Catalyst 6513 VTT/Clock Modules

• Slots 1 and 2—Supervisor Engine 2, or switching module • Slots 7 and 8—Supervisor Engine 32/720, or switching module Fan Tray

• Wide variety of power supplies, from 2500W to new 6000W • 1 fabric channel slots 1–8 Dual-fabric modules not supported in slots 1–8!

• 2 fabric channels slots 9–13

19 RU

Any switching module RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

EEPROMs

Single Channel

Slot 1

Single Channel

Slot 2

Single Channel

Slot 3

Single Channel

Slot 4

Single Channel

Slot 5

Single Channel

Slot 6

Single Channel

Slot 7

Single Channel

Slot 8

Dual Channels

Slot 9

Dual Channels

Slot 10

Dual Channels

Slot 11

Dual Channels

Slot 12

Dual Channels Crossbar

Slot 13

Power Supply

Shared Bus Power Supply Cisco Public

8

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

9

Supervisor Engine and Switch Fabric Architecture

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

10

Supervisor 2 • PFC2 forwarding engine daughter card

• Internal RP and SP bootflash (32MB each)

• Switch Processor CPU (300MHz R7000)

• External PCMCIA flash slot

• Optional MSFC2 daughter card with Route Processor CPU (300MHz R7000)

• Supports optional Switch Fabric Module (SFM)/SFM2 • 2 x 1GE GBIC uplink ports

• 256MB/256MB (Sup2) or 256MB/512MB (Sup2U) DRAM

Supported from Cisco IOS 12.1(5c)EX and Catalyst OS 6.1(1)/12.1(3a)E1 RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

11

Supervisor 2 / PFC2 Architecture RP CPU runs L3 protocols and maintains control plane state

FIB contains IPv4 prefix entries

QoS TCAM contains QoS ACL entries

Supervisor 2 Baseboard ACL TCAM contains security and feature ACL entries

DRAM

NetFlow table for stats and features

RP (MSFC2) CPU

1 Gbps

Port ASIC

QoS TCAM

FIB TCAM

L2/L4 Engine

GbE Uplinks

MSFC2 Daughter Card

ADJ contains rewrite info

ACL TCAM

SP CPU runs L2 protocols and manages hardware

Layer 3 Engine

DRAM

SP (NMP) 1 Gbps CPU

ADJ LCDBUS LCRBUS

NetFlow L2 CAM

Bus Interface

12523_04_2006_c1

16 Gbps Bus © 2006 Cisco Systems, Inc. All rights reserved.

Fabric Interface 8 Gbps

L2 CAM contains MAC entries RST-3465

PFC2 Daughter Card

Replication Engine

DBUS RBUS

MET

To SFM/SFM2 EOBC

Replication engine for multicast/ SPAN Interface to fabric and bus Cisco Public

12

Supervisor 720 • 720Gbps crossbar fabric • PFC3 forwarding engine daughter card • Integrated RP/SP CPUs on MSFC3 daughter card (600MHz MIPS)

• 512/512MB (3A/B) or 1/1GB (3BXL) DRAM • Internal RP and SP bootflash (64MB each) • Optional 512MB CF bootflash upgrade for SP (WS-CF-UPG=) • Dual external compact flash slots • 2 x GbE uplink ports— 2 x SFP 1 x SFP and 1 x 10/100/1000

Supported from Cisco IOS 12.2(14)SX and Catalyst OS 8.1(1)/12.2(14)SX2 RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

13

Supervisor 720 / PFC3 Architecture ACL and QoS classification move to L3/4 engine

Addition of ACL TCAM counters

GbE Uplinks

Supervisor 720 Baseboard Counter QoS FIB ADJ FPGA TCAM TCAM (B/BXL Only)

ACL TCAM

L3/4 Engine

L2 Engine L2 CAM

L2 CAM moved on-chip for higher performance RST-3465 12523_04_2006_c1

CPU Daughter Card

1 Gbps

RP (MSFC3) CPU

DRAM

1 Gbps

SP (NMP) CPU

DRAM

Port ASIC

NetFlow

PFC3 Daughter Card

16 Gbps Bus © 2006 Cisco Systems, Inc. All rights reserved.

RP and SP both sit on MSFC3 CPU daughter card

Fabric interface and replication engine combined

MET

Fabric Interface/ Replication Engine

20 Gbps

Integrated 720 Gbps Switch Fabric

17 x 20 Gbps Fabric Channels DBUS RBUS EOBC

… Crossbar switch fabric integrated on supervisor baseboard Cisco Public

14

Supervisor 32 • Classic supervisor—no fabric, uses 16Gig bus only • PFC3B forwarding engine daughter card • SP CPU (400MHz Sibyte) • MSFC2a routing engine

2 10GE Xenpak + 1 10/100/1000 RJ-45 uplink ports

• 256MB/256MB DRAM (512MB/512MB with non-$0 feature set) • Internal CF bootdisk (256MB) and MSFC2A bootflash (64MB) • External CF slot • Uplink options: 8 SFP + 1 10/100/1000 2 10GE + 1 10/100/1000

8 1GE SFP + 1 10/100/1000 RJ-45 uplink ports

Supported from Cisco IOS 12.2(18)SXF and Catalyst OS 8.4(1)/12.2(17)SXB7 RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

15

Supervisor 32-GE / PFC3 Architecture PFC3 exactly the same as on Supervisor 720

Supervisor Engine 32 Baseboard Counter FPGA

GbE Uplinks

QoS FIB ADJ TCAM TCAM

1 Gbps

SP CPU

DRAM

RP CPU

DRAM

Port ASIC ACL TCAM

L3/4 Engine

1 Gbps NetFlow

MSFC2a Daughter Card L2 Engine L2 CAM

PFC3 Daughter Card

Replication Engine WS-SUP32-GE-3B

MET

16 Gbps Bus RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

DBUS RBUS EOBC

Bus attached only; no fabric support Cisco Public

16

Supervisor 32-10GE / PFC3 Architecture Dual port ASICs to support two 10GE interfaces

Supervisor Engine 32 Baseboard Counter FPGA

ACL TCAM

QoS FIB ADJ TCAM TCAM

L3/4 Engine

L2 Engine L2 CAM

10GE Uplinks

Port ASIC

Port ASIC

1 Gbps 1 Gbps

NetFlow

FPGA MUX PFC3 Daughter Card

DRAM

RP CPU

DRAM

MSFC2a Daughter Card

Replication Engine WS-SUP32-10GE-3B

MET

16 Gbps Bus RST-3465 12523_04_2006_c1

SP CPU

© 2006 Cisco Systems, Inc. All rights reserved.

DBUS RBUS EOBC Cisco Public

17

Supervisor Chassis Requirements Supervisor 720 and Supervisor 32 require: • Catalyst 6500 or 6500-E chassis • High speed fan tray (FAN2/E-FAN) • 2500W power supply (AC or DC) or greater 3000W supply recommended for new deployments

• Specific chassis slots: Slot 1 or 2 in 3/4 slot Slot 5 or 6 in 6/9 slot Slot 7 or 8 in 13 slot

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

18

Crossbar Switch Fabric • Provides multiple conflict-free paths between switching modules Dedicated bandwidth per slot Compare to system bus which is shared by all bus-attached modules

• 18 fabric channels in total • Two fabric channels per slot in 6503/6504/6506/6509 • In 6513: One fabric channel slots 1–8 Two fabric channels slots 9–13 “Dual-fabric channel” modules not supported in slots 1–8 of 6513

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

19

Switch Fabric Module and SFM2 • 256 Gbps crossbar switch fabric • Works with Supervisor 2 and CEF256/dCEF256 modules • Fabric channels run at 8 Gbps full duplex 8 Gbps in/8 Gbps out per channel

• Fabric module occupies a full slot 6506/6509—Slots 5 and 6 6513—Slots 7 and 8

• SFM—Supports 6506 and 6509 (and E-versions) • SFM2—Supports 6506, 6509, and 6513 (and E-versions) • Not supported in 6503/6504

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

20

Supervisor 720 Switch Fabric • 720 Gbps crossbar switch fabric • Integrated on Supervisor 720 baseboard • Fabric channels run at 20 Gbps full duplex 20 Gbps in/20 Gbps out per channel

• Works with all fabric-capable modules Fabric channels auto-sync speed on per-slot basis (8 Gbps or 20Gbps)

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

21

Monitoring Fabric Status and Utilization • Cisco IOS: show fabric [active | channel-counters | errors | fpoe | medusa | status | switching-mode | utilization] • Catalyst OS: show fabric {channel {counters | switchmode | utilization} | status} 6506#show fabric utilization slot channel speed 1 0 8G 2 0 8G 3 0 20G 3 1 20G 4 0 20G 4 1 20G 6 0 20G 6506# RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Ingress % 22 4 0 11 0 10 0

Egress % 23 9 1 12 1 13 1 Cisco Public

22

Monitoring System Bus Utilization • Monitor the traditional Catalyst 6500 bus when using: Classic modules Centralized forwarding with a fabric • Cisco IOS: show catalyst6000 traffic-meter • Catalyst OS: show traffic 6506#show catalyst6000 traffic-meter traffic meter = peak = 6506#

RST-3465 12523_04_2006_c1

7% 46%

Never cleared reached at 08:07:50 PST Fri Dec 30 2005

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

23

Policy Feature Cards • Mandatory daughter card for supervisor engine • Provides the key components enabling high-performance hardware packet processing • Supervisor 2 supports PFC2 • Supervisor 32 supports PFC3B • Supervisor 720 supports: PFC3A PFC3B PFC3BXL

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

24

Policy Feature Cards (Cont.) Key hardware-enabled features: • Layer 2 switching • IPv4 unicast forwarding • IPv4 multicast forwarding • Security ACLs • QoS/policing • NetFlow accounting PFC3 also supports: • IPv6, MPLS*/VRF-lite, Bidir PIM, NAT/PAT, GRE/v6 tunnels, CoPP RST-3465 12523_04_2006_c1

* MPLS on 3B/3BXL only © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

25

High-Level Forwarding Engine Logic Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup*

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup*

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame *PFC3 only

Cisco Public

26

PFC TCAM Technology • TCAM—Ternary Content Addressable Memory

• Leveraged heavily in Catalyst 6500

Value 1 Value 2 Mask 1

Value 4 Value 5

FIB, ACL, QoS, NetFlow all utilize TCAM memory

• All entries accessed in parallel—fixed performance independent of number of entries • Memory consists of groups of values and associated masks

Value 6 Value 7 Value 8 Value 1 Value 2 Mask 2

Value 5 Value 6

• Masks are used to “wildcard” some portion of values

Value 7 Value 8 Masks

© 2006 Cisco Systems, Inc. All rights reserved.

Value 3 Value 4

8:1 ratio of values to masks

RST-3465 12523_04_2006_c1

Value 3

Values Cisco Public

27

Generic TCAM Lookup Logic 1 Packet

Fields

3 Compare

Generate Lookup Key

01101010 011010xx 0110xxxx

110110xx

Lookup Key

000111xx

1 2

101101xx

3

100111xx

4

000000xx

5

010010xx

6

111111xx

7

2. Lookup key created

001100xx

8

3. As lookup key compared to value entries, associated mask applied

0111xxxx 1011xxxx

1 2

1101xxxx

3

0110xxxx 1110xxxx

4 45

0011xxxx

6

0000xxxx

7

1000xxxx

8

2

11111100

1. Relevant fields read from contents of packet

1=“Compare” 0=“Mask”

4. Longest match returns result

11110000 HIT!

Result format varies depending on lookup type

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Masks

Values

Result

Cisco Public

28

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

29

Switching Module Architecture

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

30

Classic Module DBUS RBUS

Example: WS-X6416-GBIC

Classic Module Port ASIC

Port ASIC

Port ASIC

Port ASIC

4xGE

4xGE

4xGE

4xGE

Port ASICs for physical connectivity, buffering, and queueing

DBUS RBUS

Classic Module Port ASIC

Example: WS-X6148A-RJ-45 RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

48x10/100

Cisco Public

31

CEF256 Module Example: WS-X6516-GBIC

8Gbps Fabric Channel

DBUS RBUS

CEF256 Module

Fabric Interface Fabric interface to interface with fabric and bus

LCDBUS LCRBUS

MET

Replication Engine

Replication engine for local SPAN/multicast replication RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Port ASIC

Port ASIC

Port ASIC

Port ASIC

4xGE

4xGE

4xGE

4xGE

Local linecard bus for ASIC interconnection Cisco Public

32

CEF256 Module with DFC Example: WS-X6516-GBIC with WS-F6K-DFC

Layer 2/4 Engine for L2 and ACL/QoS lookups 8Gbps Fabric Channel

Fabric Interface

Layer 2/4 Engine

CEF256 Module with DFC

L3 Engine

Layer 3 Engine for FIB/Adj and NetFlow lookups

DFC LCDBUS LCRBUS

MET

RST-3465 12523_04_2006_c1

Replication Engine

© 2006 Cisco Systems, Inc. All rights reserved.

Port ASIC

Port ASIC

Port ASIC

Port ASIC

4xGE

4xGE

4xGE

4xGE

Cisco Public

33

CEF720 Module Example: WS-X6748-SFP

DBUS RBUS

20Gbps Fabric Channel

Complex A

MET

Combined fabric interface and replication engine

Fabric Interface & Replication Engine

Bus Interface CFC

20Gbps Fabric Channel

CEF720 Module

Complex B Bus Interface

Fabric Interface & Replication Engine

Port ASIC

Port ASIC

Port ASIC

Port ASIC

12xGE

12xGE

12xGE

12xGE

MET

Transparent bus interface

Bus interface for control data only!! RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

34

CEF720 Module with DFC3 Example: WS-X6748-SFP with WS-F6700-DFC3B

20Gbps Fabric Channel

20Gbps Fabric Channel

Complex A

MET

Fabric Interface & Replication Engine Port ASIC

Port ASIC

12xGE

12xGE

Layer 2 Engine

DFC3

Layer3/4 Engine for FIB/Adj, ACL, QoS and NetFlow lookups RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

CEF720 Module with DFC3

Complex B Layer 2 Engine

L3/4 Engine

Fabric Interface & Replication Engine Port ASIC

Port ASIC

12xGE

12xGE

MET

Layer 2 Engine for L2 lookups Cisco Public

35

Distributed Forwarding • One or more modules have local forwarding engine (DFC—Distributed Forwarding Card) • Central engine and distributed engines perform different lookups independently and simultaneously • Implementation is fully distributed All hardware from PFC is present on the DFC Full Layer 2, Layer 3, ACL/QoS information downloaded from Supervisor Ingress DFC performs all lookups locally

• Deterministic, highly scalable—Not flow-based • NOT just for local switching— destination interface irrelevant • DFCs always require Cisco IOS software and a switch fabric RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

36

Distributed Forwarding Cards • DFCs work in conjunction with specific supervisor DFC works with PFC2 on Supervisor 2 DFC3A/3B/3BXL works with PFC3 on Supervisor 720

• PFC/DFC “major” module version must be identical PFC/DFC “minor” module version mismatch supported in lowest common denominator mode Example: System with PFC3B and DFC3As runs in PFC3A mode

• DFC is optional daughter card for CEF256 modules • DFC3 is optional daughter card for CEF256/CEF720 modules Several flavors and form factors available

• WS-X6816-GBIC module REQUIRES either DFC or DFC3 • Local CPU for managing hardware tables • Use remote login module command to access DFC console Commands available on DFC console for troubleshooting use, under direction from Cisco TAC/escalation

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

37

Centralized Forwarding Supervisor Engine 32

L3/4 Engine

Red D

Classic Module B

L2 Engine 2 3 PFC3

Port ASIC

Port4 ASIC

DBUS RBUS

Classic Module A

Port ASIC 1

Port ASIC

Blue S

Source

S

Destination

D

Blue VLAN Red VLAN

Entire Packet Packet Header

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

38

Centralized Forwarding with Fabric Red D

Port ASIC

Supervisor Engine 720

L3/4 Engine

Port ASIC LCRBUS LCDBUS

L2 Engine 3 PFC3

720Gbps Switch Fabric

8Gbps

6 Fabric Interface

CEF256 Module B DBUS RBUS

2 Fabric 5 Interface 4

8Gbps

CEF256 Module A

LCDBUS LCRBUS

Source

S

Destination

D

Blue VLAN Red VLAN

Port ASIC 1

Port ASIC

Entire Packet Packet Header

Blue S RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

39

Distributed Forwarding Red D

Port ASIC

Port ASIC

DFC3

Supervisor Engine 720 5 Fabric Interface/ 720Gbps Replication Switch 20Gbps Engine Fabric

Layer 2 Engine

20Gbps

PFC3

L3/4 Engine

CEF720 Module B w/DFC3

4 Fabric Interface/ 2 Replication Engine Port ASIC

Port ASIC

Layer 2 3Engine

CEF720 Module A w/DFC3

Source

S

Destination

D

Blue VLAN Red VLAN

DFC3

1

L3/4 Engine

Entire Packet Packet Header

Blue S RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

40

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

41

Layer 2 Forwarding

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

42

Layer 2 Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame Cisco Public

43

Layer 2 Forwarding • Layer 2 forwarding based on {VLAN, MAC} pairs Same MAC can be learned in multiple VLANs

• MAC learning fully hardware based CPU not involved in learning

• PFC and DFCs have copies of MAC table Refreshing of entries based on “seeing” traffic—forwarding engines age entries independently New learns on one forwarding engine communicated to other engines

• MAC table size: 128K entries on PFC2 (32K effective) 64K entries on PFC3 (32K effective)

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

44

Layer 2 Forwarding Logic Frame received

Layer 2 Table

Learn

SMAC lookup

DMAC lookup

New MAC?

Router MAC? Yes

Yes Layer 2 Table

Layer 2 Table

No

Update entry

L3 forwarding

No

L2 forwarding

Known MAC? Yes

Layer 2 Table

No

L2 flooding RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

45

Layer 2 Forwarding Table Design PFC2

PFC3

16 pages

4096 rows

16384 rows

MAC Table 8 pages RST-3465 12523_04_2006_c1

MAC Table

16K*8=128K entries

© 2006 Cisco Systems, Inc. All rights reserved.

4K*16=64K entries Cisco Public

46

PFC2 Layer 2 Lookup Frame 1

2 VLAN

16384 rows

Lookup Key

10 | 0000.aaaa.aaaa MAC Address

5 Compare

4000 3233.1111.3333 40| 20 | 0000.1111.2222 | 0000.cccc.cccc 111 | 9000.8000.7000 3999 | 9090.9090.9090 100 10| 0000.1111.1111 | 0000.bbbb.bbbb 2101 | 4334.5445.6556 44444 | 6666.6666.6666 | 0100.5e01.0101 10 | 0000.aaaa.aaaa HIT! 44 | 2468.ace0.2468 30 | 0000.dddd.dddd

3 Hash Function

8 pages © 2006 Cisco Systems, Inc. All rights reserved.

DMAC lookup

6 SMAC lookup

Update Entry

Starting Page and Row 4

RST-3465 12523_04_2006_c1

Destination interface(s)

MAC Table Cisco Public

47

PFC3 Layer 2 Lookup Frame 1

2 VLAN

Lookup Key

10 | 0000.aaaa.aaaa MAC Address DMAC lookup

Destination interface(s)

5 Compare

3 Hash Function

20 | 0000.cccc.cccc

MAC Table Row

4

4096 rows

10 | 0000.bbbb.bbbb HIT!

10 | 0000.aaaa.aaaa

6

30 | 0000.dddd.dddd 16 pages

MAC Table Update Entry RST-3465 12523_04_2006_c1

SMAC lookup © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

48

Displaying the Layer 2 Table • Cisco IOS: show mac-address-table • Catalyst OS: show cam 6509#show mac-address-table dynamic vlan 30 Codes: * - primary entry vlan

mac address

type

learn qos

ports

------+----------------+--------+-----+---+----------------------* 30 0003.a088.c408 dynamic Yes -- Fa3/18 *

30

0012.d949.04d2

dynamic

Yes

--

Gi5/1

*

30

0003.a08a.15f3

dynamic

Yes

--

Fa3/24

*

30

0090.a400.1850

dynamic

Yes

--

Fa3/14

*

30

0003.a08a.15f9

dynamic

Yes

--

Fa3/25

<…> 6509# RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

49

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

50

IPv4 Forwarding

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

51

IPv4 Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame Cisco Public

52

Hardware-Based CEF • Catalyst 6500 leverages existing software Cisco Express Forwarding (CEF) model • Supervisor 2, Supervisor 32, Supervisor 720 extend CEF to hardware • What is CEF, in a nutshell? Boil down the routing table = FIB table Boil down the ARP table = adjacency table

• FIB table contains IP prefixes • Adjacency table contains next-hop information

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

53

Hardware-Based CEF (Cont.) • Decouples control plane and data plane Forwarding tables built on control plane Tables downloaded to hardware for data plane forwarding

• Hardware CEF process: FIB lookup based on destination prefix (longest-match) FIB “hit” returns adjacency, adjacency contains rewrite information (next-hop) ACL, QoS, and NetFlow lookups occur in parallel and affect final result

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

54

FIB TCAM and Adjacency Entries FIB: • IPv4 entries logically arranged from most to least specific

172.20.45.1

• 0/0 default entry terminates unicast FIB entries

MASK (/32)

• Overall FIB hardware shared by IPv4 unicast

10.1.1.100 … 10.1.3.0

IF, MACs, MTU

10.1.2.0 MASK (/24)

IPv4 multicast IPv6 unicast



IPv6 multicast

10.1.0.0

MPLS

172.16.0.0

Adjacency table: • Hardware adjacency table also shared among protocols • Actual adjacency table entries are NOT shared RST-3465 12523_04_2006_c1

IF, MACs, MTU

© 2006 Cisco Systems, Inc. All rights reserved.

IF, MACs, MTU IF, MACs, MTU

MASK (/16) … 0.0.0.0

Adjacency Table

MASK (/0) FIB TCAM

Cisco Public

55

IPv4 FIB TCAM Lookup Generate Lookup Key

Compare 3

10.1.1.10 10.1.1.xx

2

10.1.1.2 10.1.1.3

1 2

10.1.1.4

3

10.10.0.10

4

10.10.0.100

5

10.10.0.33

6

IF, MACs, MTU

10.100.1.1

7

10.100.1.2

8

10.1.2.xx

Load-Sharing IF, MACs, MTU Hash Offset 5 IF, MACs, MTU 6

10.1.3.xx

1 2

IF, MACs, MTU

10.10.100.xx

3

10.1.1.xx 10.100.1.xx

4 45

10.10.0.xx

6

10.100.1.xx

7

Lookup Key 1

DIP 10.1.1.10

FFFFFFFF

Packet

/32 entries (compare all bits)

FFFFFF00 HIT!

/24 entries (mask last octet)

Flow Data

Adj Index Result

Adjacency Table

8 RST-3465 12523_04_2006_c1

Masks

FIB TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Values

Cisco Public

56

Displaying IPv4 Forwarding Summary Information • Cisco IOS: show mls cef summary show mls cef statistics

6509-neb#show mls cef summary Total routes:

8309

IPv4 unicast routes:

5948

IPv4 Multicast routes:

2359

MPLS routes:

0

IPv6 unicast routes:

0

show mls cef

IPv6 multicast routes:

0

show mls

EoM routes:

0

show mls statistics show mls cef hardware

• Catalyst OS:

6509-neb#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

57

Displaying Hardware IPv4 Prefix Entries 6509-neb#show mls cef Codes: decap - Decapsulation, + - Push Label Index

Prefix

Adjacency

64

127.0.0.51/32

receive

65

127.0.0.0/32

receive

66

127.255.255.255/32

receive

67

0.0.0.0/32

receive

68

255.255.255.255/32

receive

75

10.10.1.1/32

receive

76

10.10.1.0/32

receive

77

10.10.1.255/32

receive

78

10.10.1.2/32

Gi1/1,

3200

224.0.0.0/24

receive

3201

10.10.1.0/24

glean

3202

10.100.0.0/24

Gi1/1,

0030.f272.31fe

3203

10.100.1.0/24

Gi1/1,

0030.f272.31fe

3204

10.100.2.0/24

Gi1/1,

0030.f272.31fe

3205

10.100.3.0/24

Gi1/1,

0030.f272.31fe

• Cisco IOS: show mls cef • Catalyst OS: show mls entry cef ip

0030.f272.31fe

<…> RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

58

Displaying Detailed Hardware Entries • Cisco IOS: show mls cef <prefix> [detail] show mls cef adjacency [entry <entry> [detail]]

• Catalyst OS: show mls entry cef ip <prefix/mask> [adjacency] 6509-neb#show mls cef 10.100.20.0 detail <…> M(3222 ): E | 1 FFF 0 0 0 0 255.255.255.0 V(3222 ): 8 | 1 0 0 0 0 0 10.100.20.0

(A:98304

,P:1,D:0,m:0 ,B:0 )

6509-neb#show mls cef adjacency entry 98304 Index: 98304 smac: 000f.2340.5dc0, dmac: 0030.f272.31fe mtu: 1518, vlan: 1019, dindex: 0x0, l3rw_vld: 1 packets: 4203, bytes: 268992 6509-neb#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

59

Finding the Longest-Match Prefix Entry • Cisco IOS: show

mls cef lookup [detail]

6509-neb#show mls cef 10.101.1.0 Codes: decap - Decapsulation, + - Push Label Index

Prefix

Adjacency

6509-neb#show mls cef lookup 10.101.1.0 Codes: decap - Decapsulation, + - Push Label Index

Prefix

Adjacency

3203

10.101.0.0/16

Gi2/12,

0007.b30a.8bfc

6509-neb#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

60

IPv4 CEF Load Sharing • Up to 8 hardware load-sharing paths per prefix • Use maximum-paths command in routing protocols to control number of load-sharing paths

10.10.0.0/16 via Rtr-A via Rtr-B

• IPv4 CEF load-sharing is per-IP flow • Per-packet load-balancing NOT supported • Load-sharing based on Source and Destination IP addresses by default

A

B

“Unique ID” in PFC3 prevents polarization

• Configuration option supports inclusion of L4 ports in the hash

10.10.0.0/16

mls ip cef load-sharing full

• Unique ID not included in hash in “full” mode RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

61

Load-Sharing Prefix Entry Example • show mls cef • show mls cef lookup 6509-neb#show mls cef lookup 10.100.20.1 Codes: decap - Decapsulation, + - Push Label Index Prefix Adjacency 3222 10.100.20.0/24 Gi1/1, 0030.f272.31fe Gi1/2, 0008.7ca8.484c Gi2/1, 000e.382d.0b90 Gi2/2, 000d.6550.a8ea 6509-neb#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

62

Identifying the Load-Sharing Path show mls cef exact-route

6509-neb#show mls cef exact-route 10.77.17.8 10.100.20.199

Interface: Gi1/1, Next Hop: 10.10.1.2, Vlan: 1019, Destination Mac: 0030.f272.31fe

6509-neb#show mls cef exact-route 10.44.91.111 10.100.20.199

Interface: Gi2/2, Next Hop: 10.40.1.2, Vlan: 1018, Destination Mac: 000d.6550.a8ea

6509-neb#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

63

IPv4 Unicast RPF Check 6500 Routing Table Prefix

Next Hop

Interface

10.255.0.0/16

10.10.1.1 10.20.1.1 10.30.1.1 10.40.1.1 10.20.1.1

gig 1/1 gig 1/2 gig 2/1 gig 2/2 gig 6/3

g1/1 10.20.0.0/16

g1/2

10.255.0.0/16

10.20.0.0/16

g2/1 gig 6/3 g2/2

Supervisor 2:

Supervisor 720/Supervisor 32:

• One RPF interface per prefix in hardware • Enabling uRPF check halves available FIB TCAM (128K entries)

• • • •

Up to 6 RPF interfaces per prefix in hardware Enabling does not affect available FIB entries Two reverse-path interfaces for all prefixes Four user-configurable “multipath interface groups” to define additional interfaces for uRPF

Gotcha: System supports only a global uRPF mode—strict or loose—last configured mode overrides RST-3465 12523_04_2006_c1

Gotcha: uRPF with exception ACL not recommended due to software processing © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

64

Verifying uRPF Check Configuration • show mls cef ip rpf [<prefix>] (PFC3 only) 6509#show mls cef ip rpf RPF global mode:

strict

RPF mpath mode:

punt

Index

Global uRPF check mode

Interfaces

-------+----------------------------------------

Global uRPF multipath mode

0 1

uRPF interface groups (not configured)

2 3 6509#show mls cef ip rpf 192.168.1.0 RPF information for prefix 192.168.1.0 uRPF check performed in the hardware for interfaces: Vlan776 Vlan777 uRPF check punted to software for interfaces:

uRPF details for specific IP prefix

uRPF check disabled for interfaces:

RST-3465 12523_04_2006_c1

6509# © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

65

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

66

IPv4 Multicast Forwarding

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

67

IPv4 Multicast Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame Cisco Public

68

IPv4 Multicast Forwarding • Central and distributed IPv4 multicast hardware forwarding • Distributed multicast replication with appropriate switching modules† • PIM-SSM and PIM-SM forwarding in hardware • BiDir-PIM forwarding in hardware‡ • Off-loads majority of forwarding tasks from RP CPU

† Supervisor 2/SFM and Supervisor 720 only, with fabric-enabled modules ‡ Supervisor 32 and Supervisor 720 only RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

69

Multicast Forwarding Tables • RP CPU derives 3 key data structures from multicast routing table Multicast FIB—Consists of (S,G) and (*,G) entries, and RPF VLAN Adjacency table—Contains rewrite MAC and MET index Multicast Expansion Table (MET)—Contains output interface lists (OILs), i.e., lists of interfaces requiring replication

• RP CPU downloads tables to SP CPU • SP CPU installs tables in the appropriate hardware Multicast FIB and adjacency tables installed in PFC/DFC hardware MET installed in replication engines

• SP CPU also maintains L2 table for IGMP snooping

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

70

Multicast Hardware Entries • FIB

MAC, MET Index

IPv4 multicast entries arranged logically from most to least specific

• Adjacency table Different format than unicast Key piece of data is MET index

172.21.4.19, 225.3.3.3 10.1.44.199, 240.9.8.1

MAC, MET Index

10.1.1.1, 239.1.1.1

MAC, MET Index

… MASK (S,G) /32

MAC, MET Index

… *, 234.0.1.1

• MET Contains OILs for multicast routes Memory resident on replication engines (not PFC/DFC)

MASK BiDir Entries



Adjacency Table

10.1.1.0, 224.0.0.0 MASK IF 224/4 Entries

OIL #1



OIL #2

*, 229.0.1.1 MASK PIM-SM (*,G) /32

OIL #3 OIL #4

FIB TCAM RST-3465 12523_04_2006_c1

MET © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

71

Multicast FIB TCAM Lookup Generate Lookup Key

Compare

10.1.1.10, 239.1.1.1

10.1.1.10, 239.1.1.1 10.1.1.10, 239.1.1.1

1 2

10.1.1.10, 239.1.1.1

3

10.1.1.10, 239.1.1.1

4

10.1.1.10, 239.1.1.1 HIT! 10.1.1.10, 239.1.1.1

5 4 6

10.1.1.10, 239.1.1.1

7

10.1.1.10, 239.1.1.1

8

Lookup Key 2

1

S,G 10.1.1.10, 239.1.1.1

FFFFFFFF FFFFFFFF

Multicast Packet

S,G compares all bits in SIP and GIP

3

FIB TCAM

Masks

Result Adj Index RPF VLAN

Values

Replication Engine(s)

MAC, MET Index OIL #1 6

OIL #2 OIL #3

MAC, MET Index 5 MAC, MET Index

OIL #4 MET RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

MAC, MET Index Adjacency Table

Cisco Public

72

Displaying Summary Hardware Multicast Information • Cisco IOS: show mls ip multicast summary

6506#show mls ip multicast summary

• show mls ip multicast statistics

Number of partial hardware-switched flows: 0

• Catalyst OS: show mls multicast

21210 MMLS entries using 3394656 bytes of memory

Number of complete hardware-switched flows: 21210

Directly connected subnet entry install is enabled Hardware shortcuts for mvpn mroutes supported Current mode of replication is Ingress Auto-detection of replication mode is enabled Consistency checker is enabled Bidir gm-scan-interval: 10 6506#

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

73

Displaying Hardware Multicast Forwarding Entries • Cisco IOS: show mls ip multicast • Catalyst OS: show mls multicast entry 6506#show mls ip multicast Multicast hardware switched flows: (10.3.1.100, 239.1.1.100) Incoming interface: Gi3/1, Packets switched: 720396460 Hardware switched outgoing interfaces: Gi3/2 Vlan100 Vlan150 Gi4/1 Gi4/2 Vlan200 RPF-MFD installed

(10.3.1.103, 230.100.1.1) Incoming interface: Gi3/1, Packets switched: 443201 Hardware switched outgoing interfaces: Gi3/2 Gi4/1 RPF-MFD installed <…>

For more details, attend: “RST-3262: Catalyst 6500 IP Multicast Architecture and Troubleshooting” RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

74

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

75

Security and Feature ACLs

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

76

ACL Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame Cisco Public

77

Security ACLs • Enforce security policies based on Layer 2, Layer 3, and Layer 4 information • Dedicated ACL TCAM ensures security ACLs do not affect system performance • Router ACL (RACL)—Enforced for all traffic crossing a Layer 3 interface in a specified direction IPv4, IPX†, IPv6‡ RACLs supported

• VLAN ACLs (VACLs)—Enforced for all traffic in the VLAN IPv4, IPX†, MAC VACLs supported

• Port ACLs (PACLs)††—Enforced for all traffic input on a Layer 2 interface IPv4, MAC PACLs supported † IPX ACLs in Supervisor 2 only ‡ IPv6 ACLs on Supervisor 720 and Supervisor 32 only †† PACLs in Supervisor 720 and Supervisor 32 in CatOS only RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

78

Feature ACLs • Classify traffic that requires additional or special handling Policy-Based Routing (PBR) Reflexive ACLs Network Address Translation (NAT/PAT) WCCP redirection

• Programmed in ACL TCAM to preserve performance • Override FIB forwarding decision to allow alternative processing • Typically paired with NetFlow table and/or Adjacency table

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

79

ACL Merge • Sophisticated feature merge algorithm allows multiple security and feature ACLs to be applied to a single interface/VLAN • What is merging? PFC/DFC hardware supports limited number of ACL lookups on a single packet May need two or more ACL features on a single interface (e.g., RACL and PBR) Merge produces ACEs that return correct result in a single lookup

• Downside: Can cause TCAM blowup ACE intersection/interrelations can require lots of TCAM entries

• Two algorithms: ODM and BDD (Supervisor 2 only) • If using Supervisor 2, USE ODM! (mls aclmerge algorithm odm) • PFC3 dual-bank TCAM architecture can avoid merge entirely

White Paper on ACL Merge Algorithms and ACL Hardware Resources: http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/tech/65acl_wp.pdf RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

80

ACL TCAM Entry Population Protocol

Dest IP

Source IP 00000000 FFFFFFFF 00 0000 0000

Dest Port

xxxxxxxx 10.1.2.100 xx xxxx xxxx

1

Permit

xxxxxxxx 10.1.68.101 xx xxxx xxxx

2

Deny

xxxxxxxx 10.33.2.25 xx xxxx xxxx

3

Deny

4

Source Port

5 6

1=“Compare” 0=“Mask”

7 8

ip access-list extended example

xxxxxxxx xxxxxxxx 06 xxxx 0016

1

Permit

permit ip any host 10.1.2.100

xxxxxxxx xxxxxxxx 06 xxxx 0017

2

Deny

xxxxxxxx xxxxxxxx 11 xxxx 0202

3

Deny

xxxxxxxx xxxxxxxx 06 xxxx 0080

4

Permit

xxxxxxxx xxxxxxxx 11 xxxx 00A1

5

Permit

deny ip any host 10.1.68.101 00000000 00000000 FF 0000 FFFF

deny ip any host 10.33.2.25 permit tcp any any eq 22 deny tcp any any eq 23 deny udp any any eq 514

6

permit tcp any any eq 80

7

permit udp any any eq 161

8

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Masks

Values

Cisco Public

81

ACL TCAM Lookup Generate Lookup Key

Compare 3 10.1.1.10 xxxxxxxx xxxxxxxx | 10.1.2.11 xxxxxxxx 10.1.2.11| 06 xx 06|xxxx xxxx 84C8xxxx 0050 | 0050

2

Lookup Key

1

00000000 FFFFFFFF 00 0000 0000

SIP=10.1.1.10 DIP=10.1.2.11 Protocol=TCP (6) SPORT=33992 DPORT=80

xxxxxxxx 10.1.2.100 xx xxxx xxxx

1

xxxxxxxx 10.1.68.101 xx xxxx xxxx

2

xxxxxxxx 10.33.2.25 xx xxxx xxxx

3 4 5 6

Entries matching only destination IP

Packet

7 8

ip access-list extended example

xxxxxxxx xxxxxxxx 06 xxxx 0016

1

permit ip any host 10.1.2.100

xxxxxxxx xxxxxxxx 06 xxxx 0017

2

xxxxxxxx xxxxxxxx 11 xxxx 0202

3

HIT! xxxxxxxx xxxxxxxx 06 xxxx 0050

4 45

deny ip any host 10.1.68.101 00000000 00000000 FF 0000 FFFF

deny ip any host 10.33.2.25 permit tcp any any eq 22

xxxxxxxx xxxxxxxx 11 xxxx 00A1

deny tcp any any eq 23 deny udp any any eq 514 permit tcp any any eq 80

Entries matching only protocol and destination port

6

© 2006 Cisco Systems, Inc. All rights reserved.

Result

7

permit udp any any eq 161 RST-3465 12523_04_2006_c1

Permit

8 Masks

Values

Cisco Public

82

Monitoring ACL TCAM Utilization 6509 -

• Cisco IOS: show tcam counts

neb#show tcam counts Used

Free

Percent Used

Reserved

- - --

- ---

- - ----------

- - ------

23

4073

0

Masks:

2902

1194

70

72

Entries:

15261

17507

46

576

Masks:

7

4089

0

18

Entries:

32

32736

0

144

LOU:

47

81

36

ANDOR:

1

15

6

ORAND:

0

16

0

ADJ:

0

2048

0

Labels:

• Catalyst OS: show security acl resource-usage

ACL_TCAM --------

QOS_TCAM --------

6509 RST-3465 12523_04_2006_c1

neb# © 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

83

Verifying Hardware ACL Enforcement • show fm summary 6509-neb#show fm summary Interface: Vlan199 is up TCAM screening for features: ACTIVE inbound Interface: Vlan400 is up TCAM screening for features: ACTIVE inbound TCAM screening for features: ACTIVE outbound Interface: Vlan402 is up TCAM screening for features: ACTIVE inbound TCAM screening for features: ACTIVE outbound Interface: Vlan404 is up TCAM screening for features: INACTIVE inbound Interface: Vlan405 is up TCAM screening for features: ACTIVE inbound 6509-neb# fm = “Feature Manager” ACTIVE = ACL policy is installed in hardware INACTIVE = ACL policy is NOT installed in hardware RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

84

Displaying Hardware ACL “Hit Counters” Cisco IOS: show tcam interface acl {in | out} ip 6509-neb#show tcam interface vlan199 acl in ip <…> permit

udp any 10.89.210.0 0.0.0.255 (234265 matches)

permit

udp any 10.90.143.0 0.0.0.255 (6860 matches)

permit

udp any 10.91.25.0 0.0.0.255 (23 matches)

permit

udp any 10.92.82.0 0.0.0.255 (23662 matches)

permit

udp any 10.93.154.0 0.0.0.255 (3232 matches)

permit

udp any 10.94.1.0 0.0.0.255 (12113 matches)

permit

udp any 10.95.109.0 0.0.0.255 (247878 matches)

permit

udp any 10.96.201.0 0.0.0.255 (33234 matches)

permit

udp any 10.97.16.0 0.0.0.255 (6855 matches)

permit

udp any 10.98.43.0 0.0.0.255 (89745 matches)

permit

udp any 10.1.1.0 0.0.0.255 (7893485 matches)

deny

ip any any (448691555 matches)

6509-neb# ACL Hit Counters Supported on PFC3B/BXL Only! RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Global or per-ACL entry (use [no] mls acl tcam share-global to toggle) Cisco Public

85

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

86

QoS

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

87

Catalyst 6500 QoS Model

Receive Interface

Input Queue Schedule QoS Actions at Ingress Port ASIC

RST-3465 12523_04_2006_c1

Classify

Mark

Ingress Police

QoS Actions at PFC/DFC

© 2006 Cisco Systems, Inc. All rights reserved.

Egress Police

Congestion Avoidance

Output Queue Schedule

QoS Actions at Egress Port ASIC

Transmit Interface

Cisco Public

88

QoS Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup*

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup*

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame *PFC3 only

Cisco Public

89

Classification • Selects traffic for further QoS processing Marking Policing

• Based on— Port trust QoS ACLs

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

90

QoS ACLs • Support standard and extended IPv4, IPv6,† and MAC ACLs for classification • Use QoS TCAM to classify traffic for marking and policing • Leverage dedicated QoS TCAM 32K entries/4K masks

• Share other resources (LOUs and labels) with security ACLs

† PFC3 only RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

91

QoS ACL Lookup Results • QoS TCAM lookups behave exactly the same as ACL TCAM lookups • But, returned result differs: Index into Aggregate table (identifies aggregate policer to use) Index into Microflow table (identifies microflow policer to use) Remarked DSCP/IP precedence value

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

92

Marking • Untrusted port—Set a default QoS value • Trusted port—Use the marking (COS, precedence, DSCP) provided by upstream device • QoS ACLs / service-policies—Set QoS values based on standard or extended ACL match

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

93

Policing • Enforces a policy on a port or VLAN for traffic matching classification policy Markdown Police (drop)

• Two types of policers: Aggregate Microflow

• Based on a classic token bucket scheme Add tokens to bucket at constant rate (equivalent to policed rate) Packets are “in profile” if enough tokens exist in the bucket to transmit the packet Packets without adequate tokens are dropped or marked down

• Note! PFC2 uses Layer 3 packet size, PFC3 uses Layer 2 frame size, when determining rate RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

94

Aggregate Policing • Bandwidth limit applied cumulatively to all flows that match the associated class Example—All FTP flows in a VLAN limited in aggregate to configured rate

• Ingress policing performed on per-switchport, per-Layer 3 interface, or per-VLAN basis PFC2 and PFC3 both support ingress policing

• Egress policing on a performed on per-Layer 3 interface or perVLAN basis NOT possible on a per-switchport basis PFC3 support only

• Dual-rate policers allow for combined markdown and drop policies Normal rate and excess rate are configurable PFC3 support only

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

95

Microflow Policing • Bandwidth limit applied separately to each individual flow that matches the associated class Every individual FTP flow limited to configured rate

• User-based rate limiting using source-only and destination-only flow masks All FTP from a given source IP limited to configured rate PFC3 only

• Leverages NetFlow table • Microflow policing performed on ingress only

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

96

Remarking Traffic with Policers • Policing action may remark certain traffic For example, transmit with marked-down DSCP

• Dual-rate aggregate policer can mark-down traffic exceeding the normal rate and drop traffic exceeding the excess rate • Use markdown maps to configure marked-down DSCP values mls qos map policed-dscp (Cisco IOS) or set qos policed-dscp-map (CatOS)

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

97

Monitoring Service Policies (Marking and Policing) • Cisco IOS: show policy-map interface*

6506#show policy- map interface vlan 100 Service class -

policy input: VLAN map: NET -

Match: access -

100

44 - TCP (match- all) group name POL -

44 - TCP

police : 100000000 bps 100000 limit 100000 extended limit Earl in slot 6 :

Policed Class

2940073472 bytes

• Catalyst OS: show qos statistics {aggregatepolicer | l3stats}

5 minute offered rate 358172704 bps aggregate -

forwarded 608631808 bytes action: transmit

exceeded 2331441664 bytes action: drop aggregate class -

map: NET -

Match: access -

forward 100352000 bps exceed 384495616 bps 55 (match -

all)

group name MARK -

55

set precedence 5:

Marked Class

Earl in slot 6 : 2940069888 bytes 5 minute offered rate 358172616 bps aggregate -

RST-3465 12523_04_2006_c1

forwarded 2940069888 bytes

6506# © 2006 Cisco Systems, Inc. All rights reserved.

* Shows aggregate policer stats only; Cisco Publicpolicing 98 use NetFlow table to monitor microflow

Agenda • Chassis Architecture • Supervisor Engine and Switch Fabric Architecture • Switching Module Architecture • Layer 2 Forwarding • IPv4 Forwarding • IPv4 Multicast Forwarding • Security and Feature ACLs • QoS • NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

99

NetFlow

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

100

NetFlow Lookups Frame received

Input Layer 2 lookup Layer 2 Table

Ingress Forwarding Engine

FIB TCAM FIB lookup ACL TCAM

Router MAC?

Yes

No

Input QoS lookup

Input ACL lookup

QoS TCAM

NetFlow Table NetFlow lookup

Input QoS lookup QoS TCAM Input ACL lookup ACL TCAM

Bridged NetFlow NetFlow Table

RST-3465 12523_04_2006_c1

Output QoS lookup

Output ACL lookup

Output Layer 2 lookup

QoS TCAM

ACL TCAM

Layer 2 Table

Output QoS lookup

Output ACL lookup

QoS TCAM

ACL TCAM

© 2006 Cisco Systems, Inc. All rights reserved.

Transmit frame Cisco Public

101

IPv4 NetFlow • Tracks statistics for traffic flows through the system • Entries created in NetFlow table when new flows start Flow mask determines format of entries

• Entries removed when flows expire Timer and session based expiration

• Full collection by default when NetFlow enabled Also support time- and packet-based NetFlow sampling

• Flow statistics can be exported using NetFlow Data Export (NDE) Supported export formats include NetFlow v5 and v7 NetFlow v9 export format supported in Supervisor 720 and Supervisor 32

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

102

Displaying NetFlow Statistics Entries • Cisco IOS: show mls netflow ip • Catalyst OS: show mls statistics entry

Which fields are populated depends on the configured flow mask

6506#show mls netflow ip Displaying Netflow entries in Supervisor Earl DstIP

SrcIP

Prot:SrcPort:DstPort

Src i/f

:AdjPtr

--------------------------------------------------------------------------Pkts

Bytes

Age

LastSeen

Attributes

--------------------------------------------------10.102.130.213 7

3766

10.230.215.148 25

9

47

10.17.64.177 7664

10.90.33.185

17

10.155.22.221

21329

10.97.36.200

2569654

10.214.39.79

17

10.46.13.211 1269409076

17

tcp :46528 15:47:37 tcp :51813 15:47:39 tcp :65211 15:47:38 tcp :27077 15:47:38

:www L3-

Vl39 Dynamic

:45912 L3-

Vl144

:0x0

:0x0

Dynamic

:60425 L3-

Vl22

Dynamic

:www L3-

:0x0

Vl13

:0x0

Dynamic

<…> RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

103

NetFlow Table Utilization • PFC2 NetFlow table contains 128K entries Hash ~25% efficient (32K entries) Probability of collision increases after 32K entries

• PFC3 NetFlow table size varies • PFC3A/B—128K entries • PFC3BXL—256K entries

Hash ~50–90% efficient (64/96/230K entries for PFC3A/B/BXL) Probability of collision increases after 64K/96K/230K entries Alias CAM handles hash collision cases RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

104

PFC2 NetFlow Table Architecture Packet 1 Flow Key 2 | 1044 | 80 SIP 10.10.20.1 DIP | 10.20.2.2 Proto | 6SPort DPort

16K rows

5 Compare 3 Hash Function

172.16.8.2 | 192.168.1.2 | 6 | 1025 | 80 172.16.1.1 | 172.16.2.2 17 | 2334 | 23 10.1.1.1 | 10.1.1.2 | 6 | 1030 || 80 10.10.10.1 6 | 2334 | 80 10.1.1.1 | 10.1.1.2| |10.20.1.1 6 | 1030 || 80 10.1.1.1 | 10.1.1.2 | 6 | 1030 | 80 |0|0 10.1.1.1 | 10.1.1.2 |80 6 | 1030| 1 | 80 10.1.1.2 |192.168.1.1 10.1.1.1 | 6 || 10.1.1.2 10.4.4.4 | 172.16.8.8 17 | 1025 10.1.1.1 | 10.1.1.2 6 | |1030 | 80 | 514 10.1.1.2 | 10.1.1.1 | 6 | |80 10.1.1.1 | 10.1.1.2 | 6 | 1030 | 80 10.1.1.2 | 10.1.1.1 | 6 | 80 10.1.1.1 | 239.1.1.1 10.1.1.2 | 10.1.1.1 | 6 | 17 80 | 5000 1030 | 5000 10.10.20.1 | 10.20.2.2 | 1044 | 80 10.1.1.2 | 10.1.1.1 | 6 | 80| 6 | 1030 10.1.1.2 | 10.1.1.1 | 6 | 80 | 1030 HIT! 6 10.1.1.2 | 10.1.1.1 | 6 | 22 | 3245 10.99.1.1 | 10.99.100.1 | 6 | 4444 | 25

Update Statistics

10.99.100.1 | 10.4.5.6 | 6 | 25 | 1080

Starting Page 4 and Row

8 pages RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

NetFlow Table

Cisco Public

105

PFC3 NetFlow Lookups Packet 1 Mask

2 Flow Flow Key Key

HIT!

3 Hash Function

Key Key Key Key Key Key Key Key Key Key Key

Compare

5

NetFlow Table Index Result

Mask Hash Key Key Hash

4 Compare

6

Flow Data Flow Data Flow Data Flow Data HIT! Flow Data 7 Flow Data Flow Data Flow Data Flow Data Flow Data Flow Data Flow Data

128K/256K entries

Netflow TCAM

Statistics

128K/256K rows

Netflow Table

Key 128 entries RST-3465 12523_04_2006_c1

Alias CAM

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

106

Monitoring NetFlow Table Usage • Cisco IOS: show mls netflow table-contention • Catalyst OS: show mls debug 6506#show mls netflow table -

contention detailed

Earl in Module 6 Detailed Netflow CAM (TCAM and ICAM) Utilization ================================================ TCAM Utilization

:

100%

ICAM Utilization

:

82%

Netflow TCAM count

:

131072

Netflow ICAM count

:

105

Netflow Creation Failures

:

3432605

Netflow CAM aliases

:

8

6506#show mls netflow table -

contention aggregate

Current utilization

Clear on read

Earl in Module 6 Aggregate Netflow CAM Contention Information =============================================

RST-3465 12523_04_2006_c1

Netflow Creation Failures

:

222917949

Netflow Hash Aliases

:

834

6506# © 2006 Cisco Systems, Inc. All rights reserved.

Cumulative Cisco Public

107

NetFlow Aging • Process of removing stale NetFlow entries • Types of aging Normal—Fixed idle time for flows Fast—Threshold-based aging of flows Long—Maximum lifetime for flows Session-based—Based on TCP FIN/RST flags

• Default timers are conservative Tuning is recommended! Start with more aggressive normal aging timer— Reduce until no creation failures seen or CPU is at threshold Enable fast aging to remove short-lived flows—Adjust until creation failures cease or CPU is at threshold RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

108

Changing and Viewing the NetFlow Aging Configuration • Cisco IOS: mls aging {normal | fast | long} show mls netflow aging

• Catalyst OS: set mls agingtime [fast | long-duration] show mls 6506#show mls netflow aging enable timeout

packet threshold

------ -------

----------------

normal aging true

300

N/A

fast aging

false

32

100

long aging

true

1920

N/A

6506# RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

109

Conclusion • You should now have a thorough understanding of the Catalyst 6500 switching architecture, packet flow, and key forwarding engine functions… ANY QUESTIONS?

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

110

Related Networkers Sessions • RST-3262: IP Multicast Architecture and Troubleshooting for the Cisco Catalyst 6500 Series • RST-3143: Troubleshooting Catalyst 6500 Series Switches • RST-2031: Multilayer Campus Architectures and Design Principles • RST-3466: Cisco IOS Software Modularity—Architecture and Deployment • TECRST-3101: Troubleshooting Cisco Catalyst Switches • TECRST-2001: Enterprise High Availability • BoF-06: Enterprise Switching

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

111

Q and A

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

112

Recommended Reading • Continue your Cisco Networkers learning experience with further reading from Cisco Press • Check the Recommended Reading flyer for suggested books

Available Onsite at the Cisco Company Store RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

113

Complete Your Online Session Evaluation • Win fabulous prizes; Give us your feedback • Receive ten Passport Points for each session evaluation you complete • Go to the Internet stations located throughout the Convention Center to complete your session evaluation • Drawings will be held in the World of Solutions Tuesday, June 20 at 12:15 p.m. Wednesday, June 21 at 12:15 p.m. Thursday, June 22 at 12:15 p.m. and 2:00 p.m.

RST-3465 12523_04_2006_c1

© 2006 Cisco Systems, Inc. All rights reserved.

Cisco Public

114

RST-4501 11366_06_2005_x

© 2005 Cisco Systems, Inc. All rights reserved.

115

Related Documents