Cisco Catalyst 6500 IOS Update Chew Kin Pheng, Systems Engineer (kchew@cisco.com) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Agenda Introduction Embedded Event Monitoring (EEM) Generic Online Diagnostics (GOLD) Smart Call Home (SCH) Global Balancing Protocol (GLBP) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Wiring Closet Backbone Data Center EWAN Metro NEW SP Network Unified Network Services • Non-Stop Communication LLDP-MED IPv6 Innovations NAC Integration 16 port 10G linecard VS-S720-10G IPsec Leadership Multicast VPN Inter-AS and Extranet EnhancedSoftware Object 16-way SHIPPING! IOS Software 12.2(33)SXH Tracking Loadbalancing Modularity IOS Modularity GOLD CPP HSRP and GLBP SSO Fast Fabric Switchover BFD with BGP Smart Call Home Multiple SPAN Enhancements Smart Call-Home IP SLA EEM Smart Call-Home VRF Aware Services MPLS (L2, L3VPN, TE) Innovations VRF Aware Services LLDP-MED NAC Integration MPLS HA MPLS FRR link and Node protection Multiplexed UNI 200+ Features with Full IOS Software Modularity Operational Manageability Smart-Ports EEMIOS Transition Release CatOS to AutoSecure MPLS MIBs Multi-VRF with Smart Call Home Multicast Smart-Ports, 802.1x, MAC Auth, AutoQoS, Web Auth for AutoSecure Access Control Private Hosts Major Virtualization Application Intelligence Integrated Security Presentation_ID E-OAM (802.1ag and 802.3ah) Security Enhancements (IBNS, 802.1x etc) L2, L3 VPN Innovations Per interface NDE Scalability Virtual & L2 Innovations NBARSwitching on PISA NetFlow Top Sophisticated Sophisticated AutoQoS NetFlow Top Talkers Multcast NDE Talkers Per interface NDE QOS support with LLQ, cRTP, LFI, MLPPP QOS support for optimized Triple Play services 16K IPSec tunnels DMVPN support in HW Layer 3 NAC Address Spoofing Prevention Continued End-To-End Leadership FPM on PISA CIST, NAC, IBNS Solution Integration © 2006 Cisco Systems, Inc. All rights reserved. Policy-Based ACLs IGMP Filtering Cisco Confidential Policy-Based ACLs Multicast Router Guard CoPP 3 Embedded Event Management (EEM) Overview Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 EEM – What is it? Embedded Event Manager (EEM) is a programmable subsystem that is present in the IOS that runs on the Catalyst 6500 It allows Network Administrators to automate responses to specific events that occur on the switch Simplified Operation - Embedded Event Manager provides a means to automate the operational management in real time - EEM monitors for specific events on the switch and can invoke pre defined actions to correct, take remedial action and report the event to network operations… 5 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential EEM - How does it work? Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 EEM Basic Architecture Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 EEM - Examples of its Use? Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 EEM - Examples of its Use? Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Catalyst 6500 Management Simplified Operation - EEM Example Automate switch configuration for connected IP phones Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 EEM - The Hardware and Software it works with? Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Generic Online Diagnostics For The Catalyst 6500 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Generic Online Diagnostics What is GOLD? GOLD defines a common framework for diagnostics operations across Cisco platforms running Cisco IOS Software. Goal: check the health of hardware components and verify proper operation of the system data plane and control plane at run-time and boottime. Provides a common CLI and scheduling for field diagnostics including : • Bootup tests (includes online insertion) • Health monitoring tests (background non-disruptive) • On-Demand tests (disruptive and non-disruptive) • User scheduled tests (disruptive and non-disruptive) • CLI access to data via management interface Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Generic Online Diagnostics How does GOLD work? Diagnostic packet switching tests verify that the system is operating correctly: – Is the supervisor control plane and forwarding plane functioning properly? – Is the standby supervisor ready to take over? – Are linecards forwarding packets properly? – Are all ports working? – Is the backplane connection working? Other types of diagnostics tests including memory and error correlation tests are also available Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Forwarding Engine Line card Fabric Forwarding Engine CPU Active Supervisor Standby Supervisor Line card 16 Generic Online Diagnostics What type of failure does GOLD detect? Diagnostics capabilities built in hardware Depending on hardware, GOLD can catch: –Port Failure –Bent backplane connector –Bad fabric connection –Malfunctioning Forwarding engines –Stuck Control Plane –Bad memory –… Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 Generic Online Diagnostics Diagnostic Integration Configuration/reporting Action Boot-up diagnostics Runtime diagnostics Configure online diagnostics and check diagnostics results On-demand Si Scheduled Health-monitoring Provides generic diagnostics framework •Default corrective action Supervisor reset Supervisor switch-over Fabric switch-over Port shut down Line card reset Line card power down Generate a call-home message •Trigger Syslog •Trigger EEM policies •Generate SNMP Trap Automated action based on diagnostics results Verify hardware functionalities Detect and identify problems before they result in network downtime! Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 Generic Online Diagnostics Diagnostic Operation Boot-Up Diagnostics Switch(config)#diagnostic bootup level complete Run During System Bootup, Line Card OIR or Supervisor Switchover Makes Sure Faulty Hardware Is Taken out of Service Runtime Diagnostics Health-Monitoring Switch(config)#diagnostic monitor module 5 test 2 Switch(config)#diagnostic monitor interval module 5 test 2 00:00:15 Non-Disruptive Tests Run in the Background Serves as HA Trigger On-Demand Switch#diagnostic start module 4 test 8 Module 4: Running test(s) 8 may disrupt normal system operation Do you want to continue? [no]: y Switch#diagnostic stop module 4 Scheduled Switch(config)#diagnostic schedule module 4 test 1 port 3 on Jan 3 2005 23:32 Switch(config)#diagnostic schedule module 4 test 2 daily 14:45 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential All Diagnostics Tests Can Be Run on Demand, for Troubleshooting Purposes. It Can Also Be Used As A Pre-deployment Tool Schedule Diagnostics Tests, for Verification and Troubleshooting Purposes 19 Generic Online Diagnostics View the GOLD Tests and Attributes Switch#show diagnostic content mod 5 Module 5: Supervisor Engine 720 (Active) <snip> Testing Interval ID Test Name Attributes ==== ================================== ============ (day hh:mm:ss.ms) ================= 1) TestScratchRegister -------------> ***N****A*** 000 00:00:30.00 2) TestSPRPInbandPing --------------> ***N****A*** 000 00:00:15.00 3) TestTransceiverIntegrity --------> **PD****I*** not configured 4) TestActiveToStandbyLoopback -----> M*PDS***I*** not configured 5) TestLoopback --------------------> M*PD****I*** not configured 6) TestNewIndexLearn ---------------> M**N****I*** not configured 7) TestDontConditionalLearn --------> M**N****I*** not configured Diagnostics test suite attributes: 8) TestBadBpduTrap -----------------> M**D****I*** not configured M/C/* - Minimal bootup level test / Complete bootup level 9) TestMatchCapture ----------------> M**D****I*** test /not NA configured 10) TestProtocolMatchChannel --------> M**D****I*** B/* - not Basic configured ondemand test / NA 11) TestFibDevices ------------------> M**N****I*** P/V/* -not Perconfigured port test / Per device test / NA 12) TestIPv4FibShortcut -------------> M**N****I*** D/N/* -not Disruptive configured test / Non-disruptive test / NA 13) TestL3Capture2 ------------------> M**N****I*** S/* - not Onlyconfigured applicable to standby unit / NA 14) TestIPv6FibShortcut -------------> M**N****I*** X/* - not Not configured a health monitoring test / NA 15) TestMPLSFibShortcut -------------> M**N****I*** F/* - not Fixed configured monitoring interval test / NA 16) TestNATFibShortcut --------------> M**N****I*** E/* - not Always configured enabled monitoring test / NA 17) TestAclPermit -------------------> M**N****I*** A/I - not Monitoring configured is active / Monitoring is inactive 18) TestAclDeny ---------------------> M**N****A*** R/* - 000 Power-down 00:00:05.00 line cards and need reset supervisor / NA 19) TestQoSTcam ---------------------> M**D****I*** K/* - not Require configured resetting the line card after the test has completed / NA <snip> T/* - Shut down all ports and need reset supervisor / NA Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Generic Online Diagnostics GOLD Test Attributes (Con’t) 20) TestL3VlanMet -------------------> M**N****I*** not configured n/a 21) TestIngressSpan -----------------> M**N****I*** not configured n/a 22) TestEgressSpan ------------------> M**D****I*** not configured n/a 23) TestNetflowInlineRewrite --------> C*PD****I*** not configured n/a 24) TestFabricSnakeForward ----------> M**N****I*** not configured n/a 25) TestFabricSnakeBackward ---------> M**N****I*** not configured n/a 26) TestTrafficStress ---------------> ***D****I**T not configured n/a 27) TestFibTcamSSRAM ----------------> ***D*X**IR** not configured n/a 28) TestAsicMemory ------------------> ***D*X**IR** not configured n/a 29) TestNetflowTcam -----------------> ***D*X**IR** not configured n/a 30) ScheduleSwitchover --------------> ***D****I*** not configured n/a 31) TestFirmwareDiagStatus ----------> M**N****I*** not configured n/a 32) TestAsicSync --------------------> ***N****A*** 000 00:00:15.00 10 Diagnostics test suite attributes: M/C/* - Minimal bootup level test / Complete bootup level test / NA B/* - Basic ondemand test / NA P/V/* - Per port test / Per device test / NA D/N/* - Disruptive test / Non-disruptive test / NA Pay Extra Attention to Memory Tests: Memory Tests Can Take Hours to Complete and a Reset Is Required After Running These Tests S/* - Only applicable to standby unit / NA X/* - Not a health monitoring test / NA F/* - Fixed monitoring interval test / NA E/* - Always enabled monitoring test / NA A/I - Monitoring is active / Monitoring is inactive R/* - Power-down line cards and need reset supervisor / NA K/* - Require resetting the line card after the test has completed / NA T/* - Shut down all ports and need reset supervisor / NA Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 Generic Online Diagnostics An example: Supervisor datapath coverage MSFC PFC3 L3/4 Engine L2 Engine Port ASIC RP CPU SP CPU Fabric Interface/ Replication Engine Switch Fabric DBUS RBUS EOBC 16 Gbps Bus Monitors forwarding path between the Switch Processor, Route Processor and Forwarding Engine Runs Periodically every 15 Seconds after System is Online (Configurable) 10 Consecutive Failures is treated as FATAL and will result in supervisor switchover or supervisor reset Switch(config)#diagnostic monitor module 5 test 2 Switch(config)#diagnostic monitor interval module 5 test 2 00:00:15 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 Generic Online Diagnostics View GOLD Results Switch#show diagnostic result mod 7 Current bootup diagnostic level: complete Module 7: CEF720 24 port 1000mb SFP Overall Diagnostic Result for Module 7 : MINOR ERROR Diagnostic level at card bootup: complete Test results: (. = Pass, F = Fail, U = Untested) 1) TestTransceiverIntegrity: Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ---------------------------------------------------------------------------U U . U . . U U . . U U . . U U U U U U U U U U 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 2) TestLoopback: Port 1 2 3 4 ---------------------------------------------------------------------------. . . . . . . . . . . . F . . . . . . . . . . . 3) TestScratchRegister -------------> . 4) TestSynchedFabChannel -----------> . <snip> Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23 GOLD Operation Example GOLD generic Syslog messages start with the string “DIAG”; CONST_DIAG” messages platform specific… Bootup Test Failure: %CONST_DIAG-SP-3-BOOTUP_TEST_FAIL: Module 2: TestL3VlanMet failed Health Monitoring Test Failure: %CONST_DIAG-SP-3-HM_TEST_FAIL: Module 5 TestSPRPInbandPing consecutive failure count:10 %CONST_DIAG-SP-6-HM_TEST_INFO: CPU util(5sec): SP=3% RP=12% Traffic=0% %CONST_DIAG-SP-4-HM_TEST_WARNING: Sup switchover will occur after 10 consecutive failures On Demand Diagnostics Test Failure: %DIAG-SP-3-TEST_FAIL: Module 5: TestTrafficStress{ID=24} has failed. Error code = 0x1 Scheduled Diagnostics Test Failure: %DIAG-SP-3-TEST_FAIL: Module 3: TestLoopback{ID=1} has failed. Error code = 0x1 Generic Minor and Major Failure: %DIAG-SP-3-MINOR: Module 3: Online Diagnostics detected a Minor Error. Please use 'show diagnostic result <target>' to see test results. %DIAG-SP-3-MAJOR: Module 6: Online Diagnostics detected a Major Error. Please use 'show diagnostic Module 6' to see test results. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 Reducing Downtime Thru Automation GOLD Integration With EEM and Call Home Automates problem diagnosis and information gathering Configure User Policies EEM applets and scripts can initiate GOLD tests Automates corrective actions and notifications GOLD events can trigger EEM scripts Gather Information & Diagnose Known Issues Beginning in release 12.2(33)SXH GOLD corrective actions are configured via EEM scripts Automates result notification GOLD events are monitored by Call Home diagnostics profile group Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Take Corrective Actions Dispatch & Repair 25 Embedded Event Manager Supports Event Detector for GOLD EEM can be used to track and perform corrective actions for GOLD Beginning in release 12.2(33)SXH all GOLD corrective actions are scripted using EEM Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Core1# show event manager policy register detail Mandatory.go_unusedportlpbk.tcl ::cisco::eem::event_register_gold card all testing_type monitoring test_name TestUnusedPortLoopback action_notify TRUE consecutive_f ailure 10 platform_action 0 queue_priority last # # GOLD TestUnusedPortLoopback Test TCL script # # April 2006, Sifang Li # # Copyright (c) 2005-2007 by cisco Systems, Inc. # All rights reserved. # # # Register for TestUnusedPortLoopback test event # the elements for register the event # card [all | card #] # sub_card [all | sub_card #] # severity_major | severity_minor | severity_normal default : severity_normal # new_failure [true | false] default: dont_care # testing_type [ondemand | schedule | monitoring] # test_name [ test name ] # test_id [ test # ] # consecutive_failure [ consecutive_failure # ] # platform_action [action_flag] # action_flag [ 0 | 1 | 2 ] # queue_priority [ normal | low | high | last] default: normal # #.... Cisco Confidential 26 Call Home Service Monitors GOLD Status Automates the notification process Allows customization via profiles Severity levels Who gets notified Which transport method call-home alert-group configuration alert-group diagnostic alert-group environment alert-group inventory alert-group syslog profile "CiscoTAC-1" no active no destination transport-method http destination transport-method email destination address email callhome@cisco.com destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService subscribe-to-alert-group diagnostic severity minor subscribe-to-alert-group environment severity minor subscribe-to-alert-group syslog severity major pattern ".*" subscribe-to-alert-group configuration periodic monthly 8 16:34 subscribe-to-alert-group inventory periodic monthly 8 16:19 Initially supported in IOS 12.2(33)SXH Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27 Generic Online Diagnostics Recommendations Bootup diagnostics: Set level to complete On demand diagnostics: Use as a pre-deployment tool: run complete diagnostics before putting hardware into production environment Use as a troubleshooting tool when suspecting hardware failure Si Scheduled diagnostics: Schedule key diagnostics tests periodically Schedule all non-disruptive tests periodically Health-monitoring diagnostics: Key tests running by default Enable additional non-disruptive tests for specific functionalities enabled in your network: IPv6, MPLS, NAT Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28 Generic Online Diagnostics Summary Provides a common framework to configure, view and schedule diagnostics across Cisco IOS based switches and routers GOLD functional tests verify both the data path and control path of the device, can be run during bootup and during runtime When combined with other features such as Embedded Event Manger and Call Home the MTTR, mean time to repair, can be dramatically lowered via process automation Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29 Smart Call Home Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30 Catalyst 6500 Management Simplified Operation - Smart Call Home Cisco TAC investigates problem and suggests remediation including shipping replacement parts if necessary Customer implements remediation and replaces faulty part (if applicable) Sends message to Cisco TAC with precise information and diagnostics Detects GOLD events and sends to Call Home GOLD runs diags, isolates fault and precise location Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31 What Is Smart Call Home? Interactive Technical Services Unique Catalyst 6500 Differentiator Customer Internet Customer Notification Device and Message Reports Exceptions/Fault Analysis TAC 3 Secure Transport* Messages Received: Call Home Diagnostics Environmental Syslog Inventory and Configuration Automated Diagnosis Capability 2 Call Home DB IOS 12.2(33)SXH 1 Service Request Tracking System *Ensures data protection HTTPS Encryption Certificate-based authentication Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32 The Smart Call Home Difference Before 45 min Minor hardware failure—undetected P3 Service Request opened Customer’s Ops team discovers IP multicast configuration problem Cisco RP team checks IP Multicast configuration 3.75 hrs 12 hrs Problem narrowed to specific Cat 6500 ports Look into various known issues and bugs on WSX6548-GE-TX. Re-queued to LAN SW team Find nothing. Request logs from customer 25 hours Logs received and analyzed Identify online diagnostics failure for test TestL3VlanMet 29 hours Replacement part received (4 –hour replacement coverage) RMA created After 12 min Minor hardware failure—detected and Service Request automatically generated Presentation_ID P3 SR opened due to GOLD failure. Diag. info attached Cisco LAN SW team takes ownership © 2006 Cisco Systems, Inc. All rights reserved. 42 min Informs customer of problem and confirms hardware fault Cisco Confidential 1.2 hrs RMA created and part dispatched. 5.5 hrs Replacement part received (4 –hour replacement coverage) 35 Increased Value Proposition for Cisco Customers Proactive, fast issue resolution Higher Network Availability Devices continually monitored with secure, connected service Real-time alerts for early detection of potential network problems Automatic, accurate fault diagnosis Smart Call Home Increased Operational Efficiency Fast Access to Information Less time troubleshooting Automated Service Request (SR) creation Detailed diagnostics attached to SR Routed to correct TAC team Fast, web-based access to information Call Home messages, diagnostics and recommendations Inventory and configuration for all Call Home devices Security alerts, Field and End-of-life Notices Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37 Global Load Balancing Protocol (GLBP) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38 First Hop Routing Protocols Hot Standby Router Protocol (HSRP) Cisco informational RFC 2281 ( March 1998) Patented: US Patent 5,473,599, December 5, 1995 Virtual Router Redundancy Protocol (VRRP) IETF Standard RFC 2338 (April 1998) Now made obsolete by www.ietf.org/rfc/rfc3768.txt Gateway Load Balancing Protocol (GLBP) Cisco innovation, load sharing, patent pending Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39 GLBP Business Benefit Suppose a network with dual routers and Standby links, with HSRP Active GLBP allows use of all available paths GLBP cuts useable bandwidth costs in half $648 vs. $1295 6 x T1 = 9.264 Mbps T1 Costs $1000 $6000 / 9.264 = $648/Mb WAN or MAN Only using 4.632Mbps Active $1295/Mb Active Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. But really only half the links in use, these are idle Standby Standby Cisco Confidential 42 The Enterprise Premise Edge: Greater Efficiency at Same Cost With Active/Standby Packet rate Buffer threshold Packet rate Buffer Load balancing improves threshold throughput & reduces potential of packet loss Single buffer pool, single set of queues Packet loss Higher risk of packet loss With GLBP Load is shared More available resources GLBP improvements over HSRP/VRRP •Simplified provisioning •Improved redundancy model •Superior throughput Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43 How GLBP Works R1—AVG; R1, R2, R3 All Forward Traffic GLBP AVG/AVF,SVF IP: 10.0.0.254 MAC: 0000.0c12.3456 vIP: 10.0.0.10 vMAC: 0007.b400.0101 AVG GLBP AVF,SVF IP: 10.0.0.253 MAC: 0000.0C78.9abc vIP: 10.0.0.10 vMAC: 0007.b400.0102 R1 R2 ARP ARP IP: MAC: GW: ARP: Presentation_ID R3 Gateway Routers ARP ARP Reply ARP Reply Clients GLBP AVF,SVF IP: 10.0.0.252 MAC: 0000.0cde.f123 vIP: 10.0.0.10 vMAC: 0007.b400.0103 CL1 ARP Reply 10.0.0.1 aaaa.aaaa.aa01 10.0.0.10 0007.B400.0101 © 2006 Cisco Systems, Inc. All rights reserved. CL2 IP: MAC: GW: ARP: Cisco Confidential 10.0.0.2 aaaa.aaaa.aa02 10.0.0.10 0007.B400.0102 CL3 IP: MAC: GW: ARP: 10.0.0.3 aaaa.aaaa.aa03 10.0.0.10 0007.B400.0103 44 How GLBP Works R1—AVG; R1, R2, R3 All Forward Traffic GLBP AVG/AVF,SVF IP: 10.0.0.254 MAC: 0000.0c12.3456 vIP: 10.0.0.10 vMAC: 0007.b400.0101 AVG Clients IP: MAC: GW: ARP: Presentation_ID GLBP AVF,SVF IP: 10.0.0.253 MAC: 0000.0C78.9abc vIP: 10.0.0.10 vMAC: 0007.b400.0102 R1 GLBP AVF,SVF IP: 10.0.0.252 MAC: 0000.0cde.f123 vIP: 10.0.0.10 vMAC: 0007.b400.0103 R2 CL1 10.0.0.1 aaaa.aaaa.aa01 10.0.0.10 0007.B400.0101 © 2006 Cisco Systems, Inc. All rights reserved. R3 CL2 IP: MAC: GW: ARP: Cisco Confidential 10.0.0.2 aaaa.aaaa.aa02 10.0.0.10 0007.B400.0102 Gateway Routers CL3 IP: MAC: GW: ARP: 10.0.0.3 aaaa.aaaa.aa03 10.0.0.10 0007.B400.0103 45 GLBP – Protocol Details ‘Hello’ messages are exchanged between group members AVG election by priority vMAC distribution, learning of VF instances GLBP will use the following multicast destination for packets sent to all GLBP group members: 224.0.0.102, UDP port 3222 Virtual MAC addresses will be of the form: 0007.b4yy.yyyy where yy.yyyy equals the lower 24 bits; these bits consist of 6 zero bits, 10 bits that correspond to the GLBP group number, and 8 bits that correspond to the virtual forwarder number 0007.b400.0102 : last 24 bits = 0000 0000 0000 0001 0000 0010 = GLBP group 1, forwarder 2 Protocol allows for 1024 groups and 255 forwarders Number of forwarders are capped at 4 Hardware restrictions limit actual number of groups and forwarders Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46 GLBP Configuration Rules Load balancing operates on a per-host basis All connections for a given host will use the same gateway Maximum of 4 MAC addresses per GLBP Group Load balancing algorithm, 3 types: Round-robin Each virtual forwarder MAC takes turns Weighted Directed load determined by advertised weighting factor Host-dependent Ensures that each host is always given the same vMAC If no load balance algorithm is specified, default is round-robin MD5 authentication security (Releases 12.3(2)T and 12.2(18)S)) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47 GLBP Configuration Example ! interface FastEthernet2/0 ip address 10.88.49.1 255.255.255.0 duplex full glbp 1 ip 10.88.49.10 glbp 1 priority 105 glbp 1 authentication text magicword glbp 1 weighting 100 lower 95 glbp 1 weighting track 10 decrement 10 glbp 1 forwarder preempt delay minimum 0 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48 Cisco Catalyst 6500 Series and Cisco 7600 Series GLBP Specifics GLBP “reserves” 4 MAC filter entries The number of forwarders in the group is limited to 4* Active Virtual Gateway will ‘allocate’ these to GLBP group members (Virtual Forwarders) There is a restriction on GLBP group number for the MSFC2/PFC2 – Only a single group may be defined The single group may be reused on all VLAN Sup720 supports both plain text & MD5 auth; Sup2 plain text only HSRP & GLBP can co-exist in Sup720 but not in Sup2 GLBP Availability: Cisco IOS Software Release Switching Product 12.2(17d)SXA and later Cisco Catalyst 6500 SUP720/MSFC3 12.2(17d)SXB and later Cisco Catalyst 6500 SUP2/MSFC2, C7600 SUP2/MSFC2 Group/Forwarder Limits 1024 / 4 1/4 * Note: 1024 group limit is an arbitrary cap, the protocol design actually allows for 4096; as is the forwarder limit of 4 – the design could allow for up to 16. Customers not requested the additional capacity. Presentation_ID © 2006 Ciscohave Systems, Inc. All rights reserved. Cisco Confidential 50 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51