Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Version History Version Number Date Notes 1 This document was created upon test plan completion. March 12, 2004 Executive Summary Cisco IOS Safe Harbor is an initiative that provides the global financial services enterprise customer with a stable Cisco IOS 12.1 E version of choice. Safe Harbor focuses on satisfying customer quality requirements in key vertical markets. This program links and expands upon several Cisco testing projects, including development, regression testing, and systems testing critical to the success of the financial services business. Safe Harbor is the successful completion of extensive validated testing for each release targeting the financial enterprise market. The Cisco nEverest program will integrate testing for many diverse vertical markets and will leverage Safe Harbor testing to verify a "holistic" approach to the general improvement of Cisco IOS software. This document contains the following introductory sections: • About Cisco IOS Safe Harbor, page 2 • Financial Lab Topology, page 2 • Test Results Summary, page 243 • DDTS Summary, page 248 • Test Cases, page 249 This document contains the following test sections: • Memory Leak, page 249 • Hardware Redundancy, page 255 • Layer 2 Features, page 262 • Layer 3 Routing Features, page 285 • Network Management Features, page 442 • Miscellaneous Features, page 447 Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Copyright © 2004 Cisco Systems, Inc. All rights reserved. Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers About Cisco IOS Safe Harbor About Cisco IOS Safe Harbor The goal of Cisco IOS Safe Harbor is to provide improved network stability, reliability, and performance with respect to Cisco IOS software. Safe Harbor involves testing the feature sets and protocols in a particular Cisco IOS Release 12.1 E image on the Catalyst 6500 platform to provide high quality code for the financial services sector. This combination of features, hardware, and image is tested in a laboratory environment that simulates the financial services business network environment using regularly updated topologies and configurations provided by the financial customers. For information on the hardware tested and the network setup of the test environment, see the “Financial Lab Topology” section on page 2. The groups of feature sets that are tested are the following: hardware redundancy, Layer 2 features, hardware forwarding features, Layer 3 routing features, network management features, and several miscellaneous features. Regression tests are conducted to validate existing features and verify that functionality is maintained. Negative tests are designed and conducted to stress the features and their interoperability. For information on each feature and its testing, see the “Test Cases” section on page 249. During the testing, the network is placed under loads that are consistent with those in a financial services network. A standard suite of tools (for example, Netcom Smartbits, IXIA packet generator, or Cisco Pagent) is used to generate network traffic. Network testing includes a combination of automated and manual tests. Simple Network Management Protocol (SNMP) is used to poll the network during the tests, and all tests are analyzed. For a summary of the test results, see the “Basic Topology: Testbed Diagrams” section on page 4. Note Safe Harbor testing does not address issues that might exist in the customer change control and operations processes. Financial Lab Topology The base Native IOS financial lab topology is defined in the following sections and illustrated in Figure 1 through Figure 12: • Basic Topology: Port Channel Deployment, page 3 • Basic Topology: Routing Protocols, page 3 • Basic Topology: Testbed Diagrams, page 4 • Test Device Configurations, page 17 The financial services network environment configured in the lab includes the following hardware: • Sixteen Catalyst 6500 switches running Cisco Native IOS Release 12.1(13)E13 (SH1-97 to SH1-110, SH1-113, and SH1-114) • Two Catalyst 6500 switches that are running Hybrid CatOS 6.4(6) train with no routing (Dista-1 and Dista-2) • Pagent test devices to simulate the Internet Service Providers (ISPs), Area 3, and Area 4, injecting Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) routes • IXIA test devices to generate simulated customer traffic Cisco IOS Release 12.1(13)E13 2 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology The hardware configuration in the financial test lab includes a combination of distributed fabric, fabric-capable, and nonfabric modules. Note The Switch Fabric Module is supported only with the Supervisor Engine 2 in the Catalyst 6500 series switch. Basic Topology: Port Channel Deployment Figure 1 through Figure 12 show the portchannel deployment for the Safe Harbor testing. Catalyst 6500 series switches running Native Cisco IOS support both Layer 2 and Layer 3 EtherChannels, with up to eight ports aggregated in a single EtherChannel interface. All interfaces in each EtherChannel must be identically configured (the same speed, all Layer 2 or Layer 3, and so on). EtherChannel load balancing can use MAC addresses or IP addresses, and either source or destination or both source and destination addresses. The selected mode applies to all EtherChannels configured on the switch. EtherChannel is a trunking technology that groups multiple full-duplex 802.3 Ethernet interfaces to provide fault-tolerant high-speed links between switches, routers, and servers. An EtherChannel interface (consisting of up to eight Ethernet interfaces) is treated as a single interface; this is called a portchannel. The portchannels configured for Safe Harbor testing are Gigabit EtherChannels (GECs). The following types of GEC portchannels are configured and tested for Safe Harbor: • Layer 3 GEC distributed forwarding card (DFC) • Layer 3 GEC DFC and non-DFC mixed • Layer 3 GEC using fabric-capable modules, nonfabric modules, and combinations of both • Layer 2 GEC using fabric-capable modules, nonfabric modules, and combinations of both Basic Topology: Routing Protocols The following routing protocols are configured for Safe Harbor testing: • BGP – External BGP (eBGP) – Interior BGP (iBGP) • EIGRP • OSPF Figure 1 through Figure 12 shows the following: • Where each routing protocol is configured in the basic test lab topology. • The eBGP and iBGP routing protocol deployment for the Safe Harbor testing. • The EIGRP routing protocol deployment for Safe Harbor testing. • OSPF routing protocol areas configured for Safe Harbor testing. Cisco IOS Release 12.1(13)E13 3 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Basic Topology: Testbed Diagrams • Figure 1 on page 5 summarizes hardware module types per device and their position in the chassis. This data is taken directly from the output of the show module command. • Figure 5 on page 9 provides a detailed view of the Safe Harbor network OSPF routing topology. • Figure 3 on page 7 provides a detailed view of the Safe Harbor network EIGRP routing topology. • Figure 4 on page 8 provides a detailed view of the Safe Harbor network BGP routing topology. • Figure 5 on page 9 shows Ether Channeling—Part 1 configuration of the Safe Harbor testbed. It displays the number of ports in each channel, the Channel ID, the static or dynamic configuration of the channel, and whether the channel is Layer 3 or Layer 2. • Figure 6 on page 10 shows Ether Channeling—Part 2 configuration of the Safe Harbor testbed. It displays the number of ports in each channel, the Channel ID, the static or dynamic configuration of the channel, and whether the channel is Layer 3 or Layer 2. • Figure 7 on page 11 shows IP Interfaces—Part 1 configuration of the Safe Harbor testbed. • Figure 8 on page 12 shows IP Interfaces—Part 1 configuration of the Safe Harbor testbed. • Figure 9 on page 13 shows the Safe Harbor network multicast configuration overview based on one of our largest financial customers. It presents a real-world scenario. This figure shows the extent that devices participate in the overall multicast scheme, highlighting Multicast Source Discovery Protocol (MSDP) and Rendezvous Point (RP). • Figure 10 on page 14 shows background traffic running to emulate real-world network conditions with three multicast traversing the network and the devices they cross in a majority of the test plan. • Figure 11 on page 15 shows background traffic running to emulate real-world network conditions four unicast streams traversing the network and the devices they cross in a majority of the test plan. • Figure 12 on page 16 shows the Safe Harbor network multicast test traffic configuration based on one of our largest financial customers. It presents a real-world scenario. This figure shows the extent that devices participate in the overall multicast scheme, highlighting Multicast Source Discovery Protocol (MSDP) and Rendezvous Point (RP). Cisco IOS Release 12.1(13)E13 4 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 1 Safe Harbor Device Modules and Chassis Positions Cisco IOS Release 12.1(13)E13 5 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 2 Safe Harbor OSPF Routing Cisco IOS Release 12.1(13)E13 6 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 3 Safe Harbor EIGRP Routing Cisco IOS Release 12.1(13)E13 7 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 4 Safe Harbor BGP Routing Cisco IOS Release 12.1(13)E13 8 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 5 Safe Harbor EtherChannel—Part A Cisco IOS Release 12.1(13)E13 9 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 6 Safe Harbor EtherChannel—Part B Cisco IOS Release 12.1(13)E13 10 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 7 Safe Harbor IP Interfaces—Part A Cisco IOS Release 12.1(13)E13 11 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 8 Safe Harbor IP Interfaces—Part B Cisco IOS Release 12.1(13)E13 12 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 9 Safe Harbor Multicast Cisco IOS Release 12.1(13)E13 13 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 10 Safe Harbor Background Traffic—Multicast Cisco IOS Release 12.1(13)E13 14 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 11 Safe Harbor Background Traffic—Unicast Cisco IOS Release 12.1(13)E13 15 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Figure 12 Safe Harbor Multicast Test Traffic Cisco IOS Release 12.1(13)E13 16 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Test Device Configurations The following configuration files were used in the Safe Harbor testbed for the following devices tested. • SH1-97, page 17 • SH1-98, page 30 • SH1-99, page 41 • SH1-100, page 54 • SH1-101, page 68 • SH1-102, page 81 • SH1-103, page 99 • SH1-104, page 112 • SH1-105, page 123 • SH1-106, page 137 • SH1-107, page 151 • SH1-108, page 164 • SH1-109, page 177 • SH1-110, page 193 • SH1-113, page 209 • SH1-114, page 221 • Dista-1, page 232 • Dista-2, page 237 SH1-97 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-97#show config Using 13544 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption ! hostname SH1-97 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console enable secret 5 $1$2F4A$t7Nm9kVDxoJbcdKfoUgkr0 ! clock timezone EST -5 clock summer-time EDT recurring vtp mode transparent ip subnet-zero ! ! Cisco IOS Release 12.1(13)E13 17 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check ! redundancy mode rpr-plus main-cpu auto-sync startup-config auto-sync running-config auto-sync config-register auto-sync bootvar auto-sync standard ! power redundancy-mode combined ! ! vlan 1 tb-vlan1 1002 tb-vlan2 1003 ! vlan 97 remote-span ! vlan 294 ! vlan 1002 tb-vlan1 1 tb-vlan2 1003 ! vlan 1003 tb-vlan1 1 tb-vlan2 1002 parent 1005 backupcrf enable ! vlan 1004 bridge 1 stp type ibm ! vlan 1005 bridge 15 ! ! interface Loopback0 ip address 172.31.4.97 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.98 255.255.255.255 ip pim sparse-mode ! interface Loopback110 ip address 10.1.1.1 255.255.255.255 ! interface Loopback111 ip address 11.1.1.1 255.255.255.255 ! interface Loopback112 ip address 12.1.1.1 255.255.255.255 Cisco IOS Release 12.1(13)E13 18 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Loopback113 ip address 13.1.1.1 255.255.255.255 ! interface Loopback114 ip address 14.1.1.1 255.255.255.255 ! interface Port-channel 11 description sh1-98 po11 ip address 172.31.1.1 255.255.255.252 ip access-group 182 in ip access-group 182 out ip pim sparse-mode logging event link-status ! interface Port-channel 12 description sh1-99 po12 ip address 172.31.1.5 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel13 description sh1-100 po13 ip address 172.31.1.21 255.255.255.252 ip access-group 182 in ip access-group 182 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 description sh1-99 gi2/1 no ip address logging event link-status channel-group 12 mode on ! interface GigabitEthernet1/2 description sh1-100 gi1/2 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 13 mode on ! interface GigabitEthernet2/1 description sh1-99 g1/1 no ip address logging event link-status channel-group 12 mode on ! interface GigabitEthernet2/2 description sh1-100 g2/2 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 13 mode on ! interface GigabitEthernet3/1 description sh1-99 g3/5 no ip address logging event link-status channel-group 12 mode on Cisco IOS Release 12.1(13)E13 19 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet3/2 description sh1-100 g3/6 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 13 mode on ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-99 g4/15 no ip address logging event link-status channel-group 12 mode on ! interface GigabitEthernet3/10 description sh1-100 g4/14 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 13 mode on ! interface GigabitEthernet3/11 no ip address shutdown ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 Cisco IOS Release 12.1(13)E13 20 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet3/16 no ip address shutdown ! interface FastEthernet4/1 no ip address shutdown ! interface FastEthernet4/2 no ip address shutdown ! interface FastEthernet4/3 no ip address shutdown ! interface FastEthernet4/4 no ip address shutdown ! interface FastEthernet4/5 no ip address shutdown ! interface FastEthernet4/6 no ip address shutdown ! interface FastEthernet4/7 no ip address shutdown ! interface FastEthernet4/8 no ip address shutdown ! interface FastEthernet4/9 no ip address shutdown ! interface FastEthernet4/10 no ip address shutdown ! interface FastEthernet4/11 no ip address shutdown ! interface FastEthernet4/12 no ip address shutdown ! interface FastEthernet4/13 no ip address shutdown ! interface FastEthernet4/14 no ip address shutdown ! interface FastEthernet4/15 Cisco IOS Release 12.1(13)E13 21 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet4/16 no ip address shutdown ! interface FastEthernet4/17 no ip address shutdown ! interface FastEthernet4/18 no ip address shutdown ! interface FastEthernet4/19 no ip address shutdown ! interface FastEthernet4/20 no ip address shutdown ! interface FastEthernet4/21 no ip address shutdown ! interface FastEthernet4/22 no ip address shutdown ! interface FastEthernet4/23 no ip address shutdown ! interface FastEthernet4/24 description flashnet ip address 10.194.17.97 255.255.255.0 shutdown duplex full ! interface GigabitEthernet7/1 description sh1-98 g7/1 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 11 mode on ! interface GigabitEthernet7/2 description sh1-98 g7/2 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 11 mode on ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown Cisco IOS Release 12.1(13)E13 22 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 no ip address shutdown ! interface GigabitEthernet7/8 no ip address shutdown ! interface GigabitEthernet7/9 no ip address shutdown ! interface GigabitEthernet7/10 no ip address shutdown ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 no ip address shutdown ! interface FastEthernet8/1 description rtp-wbu-te-p1 fa0/1 ip address 172.31.1.145 255.255.255.252 speed 100 duplex full ! interface FastEthernet8/2 no ip address shutdown ! interface FastEthernet8/3 no ip address shutdown ! interface FastEthernet8/4 Cisco IOS Release 12.1(13)E13 23 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet8/5 no ip address shutdown ! interface FastEthernet8/6 no ip address shutdown ! interface FastEthernet8/7 no ip address shutdown ! interface FastEthernet8/8 no ip address shutdown ! interface FastEthernet8/9 no ip address shutdown ! interface FastEthernet8/10 no ip address ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status load-interval 30 shutdown ! interface FastEthernet8/11 description IXIA 4/5 ip address 172.31.97.101 255.255.255.240 ip pim sparse-mode speed 100 duplex full ! interface FastEthernet8/12 no ip address shutdown ! interface FastEthernet8/13 description Ixia 4/3 - NAT Inside ip address 172.31.97.1 255.255.255.240 ip nat inside ip pim sparse-mode hold-queue 300 in ! interface FastEthernet8/14 description Ixia 4/4 - NAT Outside ip address 172.31.97.17 255.255.255.240 ip nat outside ip pim sparse-mode hold-queue 300 in ! interface FastEthernet8/15 no ip address shutdown ! interface FastEthernet8/16 no ip address shutdown Cisco IOS Release 12.1(13)E13 24 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet8/17 no ip address ! interface FastEthernet8/18 no ip address shutdown ! interface FastEthernet8/19 no ip address shutdown ! interface FastEthernet8/20 no ip address shutdown ! interface FastEthernet8/21 no ip address shutdown ! interface FastEthernet8/22 no ip address shutdown ! interface FastEthernet8/23 no ip address ! interface FastEthernet8/24 description flashnet ip address 10.194.17.97 255.255.255.0 no ip route-cache no ip mroute-cache speed 100 duplex full ! interface FastEthernet8/25 no ip address ! interface FastEthernet8/26 no ip address shutdown ! interface FastEthernet8/27 no ip address shutdown ! interface FastEthernet8/28 no ip address shutdown ! interface FastEthernet8/29 no ip address shutdown ! interface FastEthernet8/30 no ip address shutdown ! interface FastEthernet8/31 no ip address shutdown ! interface FastEthernet8/32 no ip address Cisco IOS Release 12.1(13)E13 25 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet8/33 no ip address shutdown ! interface FastEthernet8/34 no ip address shutdown ! interface FastEthernet8/35 no ip address shutdown ! interface FastEthernet8/36 no ip address shutdown ! interface FastEthernet8/37 no ip address ! interface FastEthernet8/38 no ip address shutdown ! interface FastEthernet8/39 no ip address shutdown ! interface FastEthernet8/40 no ip address shutdown ! interface FastEthernet8/41 no ip address shutdown ! interface FastEthernet8/42 no ip address shutdown ! interface FastEthernet8/43 no ip address shutdown ! interface FastEthernet8/44 no ip address speed 100 duplex full ! interface FastEthernet8/45 no ip address ! interface FastEthernet8/46 no ip address shutdown ! interface FastEthernet8/47 description rtp-wbu-te-p4 fa1/0 ip address 172.31.1.141 255.255.255.252 speed 100 duplex full ! interface FastEthernet8/48 Cisco IOS Release 12.1(13)E13 26 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description rtp-wbu-te-p4 fa1/1 ip address 172.31.1.157 255.255.255.252 ! interface Vlan1 no ip address shutdown ! interface Vlan140 no ip address shutdown ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface FastEthernet8/11 no passive-interface FastEthernet8/48 no passive-interface Port-channel11 no passive-interface Port-channel12 no passive-interface Port-channel13 network 10.1.1.1 0.0.0.0 area 0 network 11.1.1.1 0.0.0.0 area 0 network 12.1.1.1 0.0.0.0 area 0 network 13.1.1.1 0.0.0.0 area 0 network 14.1.1.1 0.0.0.0 area 0 network 172.31.0.0 0.0.0.255 area 0 network 172.31.1.0 0.0.0.7 area 0 network 172.31.1.20 0.0.0.3 area 0 network 172.31.1.156 0.0.0.3 area 6 network 172.31.1.0 0.0.0.255 area 0 network 172.31.2.1 0.0.0.0 area 0 network 172.31.4.0 0.0.0.255 area 0 network 172.31.97.0 0.0.0.255 area 0 maximum-paths 6 ! router bgp 100 no synchronization bgp log-neighbor-changes neighbor sh1-ibgp peer-group neighbor sh1-ibgp remote-as 100 neighbor sh1-ibgp version 4 neighbor sh1-ibgp next-hop-self neighbor 172.31.1.142 remote-as 10 neighbor 172.31.1.146 remote-as 20 neighbor 172.31.4.98 peer-group sh1-ibgp neighbor 172.31.4.99 peer-group sh1-ibgp neighbor 172.31.4.100 peer-group sh1-ibgp no auto-summary ! ip nat inside source static 10.2.2.10 100.100.100.10 ip nat outside source static 10.2.2.10 10.50.50.10 ip classless ip route 0.0.0.0 0.0.0.0 Null0 ip route 10.2.2.0 255.255.255.0 172.31.97.2 ip route 10.50.50.0 255.255.255.0 172.31.97.18 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.98 3 override ip pim spt-threshold infinity ip pim send-rp-announce Loopback1 scope 64 group-list 1 ip pim send-rp-discovery Loopback1 scope 64 ip msdp peer 172.31.4.98 connect-source Loopback0 ip msdp description 172.31.4.98 SH1-98 Cisco IOS Release 12.1(13)E13 27 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip msdp sa-filter out 172.31.4.98 list 131 ip msdp mesh-group global 172.31.4.98 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.98.0.0 0.0.255.255 access-list 3 permit 224.0.1.39 access-list 3 permit 224.0.1.40 access-list 15 permit 10.128.0.0 0.0.255.255 access-list 16 deny 170.1.1.0 0.0.0.255 access-list 16 permit any access-list 30 deny 172.31.1.96 access-list 30 permit any access-list 94 permit 10.207.0.0 0.0.255.255 access-list 151 permit ip 10.2.2.0 0.0.0.255 any access-list 152 permit ip 10.2.2.0 0.0.0.31 any access-list 153 permit ip 10.2.2.32 0.0.0.31 any access-list 154 permit ip 10.2.2.64 0.0.0.31 any access-list 155 permit ip 10.2.2.96 0.0.0.31 any access-list 156 permit ip 10.2.2.128 0.0.0.31 any access-list 157 permit ip 10.2.2.160 0.0.0.31 any access-list 158 permit ip 10.2.2.192 0.0.0.31 any access-list 159 permit ip 10.2.2.224 0.0.0.31 any access-list 181 permit ip any any access-list 182 permit ip any any snmp-server community public RO snmp-server community cisco RW ! alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec ospf sh run | be router ospf alias exec bgp sh run | be router bgp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi line vty 5 10 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 ntp clock-period 17179768 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer ! monitor session 1 source interface Fa8/13 monitor session 2 source interface Fa8/14 end Cisco IOS Release 12.1(13)E13 28 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology SH1-97#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-97 uptime is 2 weeks, 2 days, 22 hours, 46 minutes Time since SH1-97 switched to active is 2 weeks, 2 days, 22 hours, 45 minutes System returned to ROM by power-on (SP by power-on) System restarted at 12:58:01 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205SV R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 2 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 36 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 227328K/34816K bytes of memory. Configuration register is 0x2102 SH1-97#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 24 24 port 100FX Multi mode 5 0 Switching Fabric Module-136 (Standby) 6 0 Switching Fabric Module-136 (Active) 7 16 SFM-capable 16 port 1000mb GBIC 8 48 48 port 10/100 mb RJ45 Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6324-100FX-MM WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.740c to 0002.7e38.740d 3.2 6.1(3) 2 0001.c9db.4aac to 0001.c9db.4aad 3.9 6.1(3) 3 0002.7ee1.4158 to 0002.7ee1.4167 1.2 12.1(5r)E1 4 0008.a430.08d0 to 0008.a430.08e7 3.0 5.4(2) 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0009.11e3.5430 to 0009.11e3.543f 5.5 6.3(1) 8 0005.7481.34a8 to 0005.7481.34d7 6.0 5.4(2) Mod --1 1 2 2 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD060202WE SAD0628036R SAD055101LP SAD055106YN SAD055204B7 SAD055002UW SAL06313ZS8 SAL0552FQTY Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060204KK 3.0 Ok SAD055205SV 1.3 Ok SAD062802C1 3.2 Ok SAD062803HM 2.5 Ok Cisco IOS Release 12.1(13)E13 29 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 3 Distributed Forwarding Card WS-F6K-DFC Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass SH1-97# SAD055102P1 Return to SH1-97, page 17 SH1-98 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-98#show config Using 11158 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption ! hostname SH1-98 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console enable secret 5 $1$TRrh$wAA8amAvRdJKslmhmOEjj1 ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ip domain-name cisco.com no ip dhcp conflict logging ip dhcp excluded-address 172.31.20.70 ip dhcp excluded-address 172.31.20.71 ip dhcp excluded-address 172.31.20.1 ip dhcp excluded-address 172.31.20.254 ip dhcp excluded-address 172.31.100.66 ip dhcp excluded-address 172.31.100.67 ip dhcp excluded-address 172.31.100.1 ip dhcp excluded-address 172.31.100.254 ! ip dhcp pool SH1-109-Vlan10 network 172.31.20.0 255.255.255.0 lease 0 0 5 ! Cisco IOS Release 12.1(13)E13 30 2.0 Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip dhcp pool SH1-105-Vlan40 network 172.31.100.0 255.255.255.0 lease 0 0 5 ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.98 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.98 255.255.255.255 ip pim sparse-mode ! interface Port-channel11 description sh1-97 po11 ip address 172.31.1.2 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel12 description sh1-99 po112 ip address 172.31.1.17 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel13 description sh1-100 po113 ip address 172.31.1.9 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 Cisco IOS Release 12.1(13)E13 31 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet3/1 description sh1-100 g3/5 no ip address channel-group 13 mode desirable ! interface GigabitEthernet3/2 description sh1-99 g3/6 no ip address channel-group 12 mode on ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-100 g4/13 no ip address channel-group 13 mode desirable ! interface GigabitEthernet3/10 description sh1-99 g4/14 no ip address channel-group 12 mode on ! interface GigabitEthernet3/11 no ip address shutdown ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 Cisco IOS Release 12.1(13)E13 32 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet3/16 no ip address shutdown ! interface FastEthernet4/1 no ip address shutdown ! interface FastEthernet4/2 no ip address shutdown ! interface FastEthernet4/3 no ip address shutdown ! interface FastEthernet4/4 no ip address shutdown ! interface FastEthernet4/5 no ip address shutdown ! interface FastEthernet4/6 no ip address shutdown ! interface FastEthernet4/7 no ip address shutdown ! interface FastEthernet4/8 no ip address shutdown ! interface FastEthernet4/9 no ip address shutdown ! interface FastEthernet4/10 no ip address shutdown ! interface FastEthernet4/11 no ip address shutdown ! interface FastEthernet4/12 no ip address shutdown ! interface FastEthernet4/13 no ip address shutdown ! interface FastEthernet4/14 no ip address shutdown ! interface FastEthernet4/15 Cisco IOS Release 12.1(13)E13 33 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet4/16 no ip address shutdown ! interface FastEthernet4/17 no ip address shutdown ! interface FastEthernet4/18 no ip address shutdown ! interface FastEthernet4/19 no ip address shutdown ! interface FastEthernet4/20 no ip address shutdown ! interface FastEthernet4/21 no ip address shutdown ! interface FastEthernet4/22 no ip address shutdown ! interface FastEthernet4/23 no ip address shutdown ! interface FastEthernet4/24 description flashnet ip address 10.194.17.98 255.255.255.0 shutdown duplex full ! interface GigabitEthernet7/1 description sh1-97 g7/1 no ip address ip access-group 181 in ip access-group 181 out channel-group 11 mode on ! interface GigabitEthernet7/2 description sh1-97 g7/2 no ip address ip access-group 181 in ip access-group 181 out channel-group 11 mode on ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 Cisco IOS Release 12.1(13)E13 34 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 no ip address shutdown ! interface GigabitEthernet7/8 no ip address shutdown ! interface GigabitEthernet7/9 no ip address shutdown ! interface GigabitEthernet7/10 no ip address shutdown ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 no ip address shutdown ! interface FastEthernet8/1 description rtp-wbu-te-p1 fa1/0 ip address 172.31.1.153 255.255.255.252 speed 100 duplex full ! interface FastEthernet8/2 no ip address shutdown ! interface FastEthernet8/3 no ip address shutdown ! interface FastEthernet8/4 no ip address shutdown Cisco IOS Release 12.1(13)E13 35 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet8/5 no ip address shutdown ! interface FastEthernet8/6 no ip address shutdown ! interface FastEthernet8/7 no ip address shutdown ! interface FastEthernet8/8 no ip address shutdown ! interface FastEthernet8/9 no ip address shutdown ! interface FastEthernet8/10 no ip address shutdown ! interface FastEthernet8/11 no ip address shutdown ! interface FastEthernet8/12 no ip address shutdown ! interface FastEthernet8/13 no ip address shutdown ! interface FastEthernet8/14 no ip address shutdown ! interface FastEthernet8/15 no ip address shutdown ! interface FastEthernet8/16 no ip address shutdown ! interface FastEthernet8/17 no ip address shutdown ! interface FastEthernet8/18 no ip address shutdown ! interface FastEthernet8/19 no ip address shutdown ! interface FastEthernet8/20 no ip address shutdown Cisco IOS Release 12.1(13)E13 36 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet8/21 no ip address shutdown ! interface FastEthernet8/22 no ip address shutdown ! interface FastEthernet8/23 no ip address shutdown ! interface FastEthernet8/24 description flashnet ip address 10.194.17.98 255.255.255.0 speed 100 duplex full ! interface FastEthernet8/25 no ip address shutdown ! interface FastEthernet8/26 no ip address shutdown ! interface FastEthernet8/27 no ip address shutdown ! interface FastEthernet8/28 no ip address shutdown ! interface FastEthernet8/29 no ip address shutdown ! interface FastEthernet8/30 no ip address shutdown ! interface FastEthernet8/31 no ip address shutdown ! interface FastEthernet8/32 no ip address shutdown ! interface FastEthernet8/33 no ip address shutdown ! interface FastEthernet8/34 no ip address shutdown ! interface FastEthernet8/35 no ip address shutdown ! interface FastEthernet8/36 Cisco IOS Release 12.1(13)E13 37 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet8/37 no ip address shutdown ! interface FastEthernet8/38 no ip address shutdown ! interface FastEthernet8/39 no ip address shutdown ! interface FastEthernet8/40 no ip address shutdown ! interface FastEthernet8/41 no ip address shutdown ! interface FastEthernet8/42 no ip address shutdown ! interface FastEthernet8/43 no ip address shutdown ! interface FastEthernet8/44 no ip address shutdown ! interface FastEthernet8/45 no ip address shutdown ! interface FastEthernet8/46 no ip address shutdown ! interface FastEthernet8/47 description rtp-wbu-te-p4 fa2/0 ip address 172.31.1.149 255.255.255.252 duplex full ! interface FastEthernet8/48 description rtp-wbu-te-p4 fa4/0 ip address 172.31.1.169 255.255.255.252 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface FastEthernet8/48 no passive-interface Port-channel11 no passive-interface Port-channel12 no passive-interface Port-channel13 Cisco IOS Release 12.1(13)E13 38 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology network 172.31.0.0 0.0.0.255 area 0 network 172.31.1.0 0.0.0.3 area 0 network 172.31.1.8 0.0.0.3 area 0 network 172.31.1.16 0.0.0.3 area 0 network 172.31.1.168 0.0.0.3 area 6 network 172.31.2.5 0.0.0.0 area 0 network 172.31.4.0 0.0.0.255 area 0 maximum-paths 6 ! router bgp 100 no synchronization bgp log-neighbor-changes neighbor sh1-ibgp peer-group neighbor sh1-ibgp remote-as 100 neighbor sh1-ibgp version 4 neighbor sh1-ibgp next-hop-self neighbor 172.31.1.150 remote-as 10 neighbor 172.31.1.154 remote-as 20 neighbor 172.31.4.97 peer-group sh1-ibgp neighbor 172.31.4.99 peer-group sh1-ibgp neighbor 172.31.4.100 peer-group sh1-ibgp no auto-summary ! ip classless ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.98 3 override ip pim spt-threshold infinity ip pim send-rp-announce Loopback1 scope 64 group-list 1 ip pim send-rp-discovery Loopback1 scope 64 ip msdp peer 172.31.4.97 connect-source Loopback0 ip msdp description 172.31.4.97 SH1-97 ip msdp sa-filter out 172.31.4.97 list 131 ip msdp mesh-group global 172.31.4.97 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.98.0.0 0.0.255.255 access-list 3 permit 224.0.1.39 access-list 3 permit 224.0.1.40 access-list 10 permit 224.0.0.0 31.255.255.255 access-list 10 deny any access-list 131 permit ip any 239.98.0.0 0.0.255.255 access-list 181 permit ip any any access-list 182 permit ip any any snmp-server community public RO snmp-server community cisco RW ! alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec ospf sh run | be router ospf alias exec bgp sh run | be router bgp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login Cisco IOS Release 12.1(13)E13 39 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 ntp clock-period 17180183 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-98#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-98 uptime is 2 weeks, 2 days, 19 hours, 29 minutes Time since SH1-98 switched to active is 2 weeks, 2 days, 19 hours, 29 minutes System returned to ROM by power-on (SP by power-on) System restarted at 16:14:03 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205W6 R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 1 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 36 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-98#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 24 24 port 100FX Multi mode 5 0 Switching Fabric Module-136 (Active) 6 0 Switching Fabric Module-136 (Standby) 7 16 SFM-capable 16 port 1000mb GBIC 8 48 48 port 10/100 mb RJ45 Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6324-100FX-MM WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.e7b4 to 0001.c9da.e7b5 3.2 6.1(3) 2 0001.c9da.e70c to 0001.c9da.e70d 3.2 6.1(3) Cisco IOS Release 12.1(13)E13 40 Serial No. ----------SAD0602034Z SAD055006L4 SAD055101KD SAD055106XK SAD05520493 SAD055204C7 SAD055204T3 SAL0547ESP4 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 3 4 5 6 7 8 Mod --1 1 2 2 3 0001.63d3.b64a 0003.3287.5f9a 0001.0002.0003 0001.0002.0003 0001.63d4.2862 0005.740b.7138 to to to to to to 0001.63d3.b659 0003.3287.5fb1 0001.0002.0003 0001.0002.0003 0001.63d4.2871 0005.740b.7167 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card 1.2 3.0 1.1 1.1 4.0 6.0 12.1(5r)E1 5.4(2) 6.1(3) 6.1(3) 6.1(3) 5.4(2) Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060204RK 3.0 Ok SAD055205W6 1.3 Ok SAD060204LM 3.0 Ok SAD0552067L 1.3 Ok SAD055102R3 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass SH1-98# Return to SH1-98, page 30 SH1-99 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-99#show config Using 15625 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-99 ! boot system flash sup-bootflash: boot bootldr bootflash: logging buffered 100000 debugging no logging console enable secret 5 $1$kOP5$LkWaG3ARMT5Cpj9tDHJ9G. ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh Cisco IOS Release 12.1(13)E13 41 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip domain-lookup ! ip multicast-routing ip multicast cache-headers mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check chat-script 10 m d' ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.99 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.100 255.255.255.255 ip pim sparse-mode ! interface Port-channel12 description sh1-97 po12 ip address 172.31.1.6 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel13 description sh1-100 po12 ip address 172.31.1.13 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel14 description sh1-101 po14 ip address 172.31.1.25 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel15 description sh1-102 po15 ip address 172.31.1.29 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel16 description sh1-103 po16 ip address 172.31.1.33 255.255.255.252 ip access-group 181 in ip access-group 181 out Cisco IOS Release 12.1(13)E13 42 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim sparse-mode logging event link-status ! interface Port-channel17 description sh1-104 po17 ip address 172.31.1.37 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel64 description SH1-113 Po64 ip address 172.31.11.1 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel65 description SH1-114 Po65 ip address 172.31.11.5 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel66 description sh1-105 po66 ip address 172.31.1.65 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel67 description sh1-106 po67 ip address 172.31.1.69 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel112 description sh1-98 po12 ip address 172.31.1.18 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 description sh1-97 gi2/1 no ip address channel-group 12 mode on ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 description sh1-97 gi1/1 no ip address channel-group 12 mode on ! interface GigabitEthernet2/2 description SH1-113 g3/9 no ip address Cisco IOS Release 12.1(13)E13 43 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology channel-group 64 mode on ! interface GigabitEthernet3/1 description sh1-100 g3/9 no ip address channel-group 13 mode on ! interface GigabitEthernet3/2 description sh1-101 g3/1 no ip address channel-group 14 mode on ! interface GigabitEthernet3/3 description sh1-103 g3/1 no ip address ip access-group 181 in ip access-group 181 out channel-group 16 mode on ! interface GigabitEthernet3/4 description sh1-102 g3/3 no ip address channel-group 15 mode on ! interface GigabitEthernet3/5 description sh1-97 g3/1 no ip address channel-group 12 mode on ! interface GigabitEthernet3/6 description sh1-98 g3/2 no ip address channel-group 112 mode on ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 description sh1-100 g3/16 no ip address channel-group 13 mode on ! interface GigabitEthernet3/9 description sh1-100 g3/9 no ip address channel-group 13 mode on ! interface GigabitEthernet3/10 description sh1-101 g3/9 no ip address channel-group 14 mode on ! interface GigabitEthernet3/11 description sh1-103 g3/9 no ip address ip access-group 181 in ip access-group 181 out channel-group 16 mode on ! interface GigabitEthernet3/12 description sh1-104 g3/10 no ip address channel-group 17 mode desirable Cisco IOS Release 12.1(13)E13 44 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet3/13 description SH1-114 g2/1 no ip address channel-group 65 mode on ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 description SH1-114 g2/2 no ip address channel-group 65 mode on ! interface GigabitEthernet3/16 description sh1-100 g3/16 no ip address channel-group 13 mode on ! interface GigabitEthernet4/1 description sh1-100 g4/9 no ip address channel-group 13 mode on ! interface GigabitEthernet4/2 description sh1-101 g3/2 no ip address channel-group 14 mode on ! interface GigabitEthernet4/3 description sh1-103 g4/1 no ip address ip access-group 181 in ip access-group 181 out channel-group 16 mode on ! interface GigabitEthernet4/4 description sh1-104 g4/2 no ip address channel-group 17 mode desirable ! interface GigabitEthernet4/5 description SH1-113 g3/10 no ip address channel-group 64 mode on ! interface GigabitEthernet4/6 no ip address shutdown ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 description sh1-100 g4/16 no ip address channel-group 13 mode on ! interface GigabitEthernet4/9 description sh1-100 g4/9 no ip address channel-group 13 mode on Cisco IOS Release 12.1(13)E13 45 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet4/10 description sh1-101 g3/10 no ip address channel-group 14 mode on ! interface GigabitEthernet4/11 description sh1-103 g4/9 no ip address ip access-group 181 in ip access-group 181 out channel-group 16 mode on ! interface GigabitEthernet4/12 description sh1-102 g3/11 no ip address channel-group 15 mode on ! interface GigabitEthernet4/13 description sh1-97 gi3/9 no ip address channel-group 12 mode on ! interface GigabitEthernet4/14 description sh1-98 g3/10 no ip address channel-group 112 mode on ! interface GigabitEthernet4/15 no ip address shutdown ! interface GigabitEthernet4/16 description sh1-100 g4/16 no ip address channel-group 13 mode on ! interface FastEthernet7/1 description flashnet ip address 10.194.17.99 255.255.255.0 shutdown speed 100 duplex full ! interface FastEthernet7/2 description IXIA 4/7 ip address 172.31.99.101 255.255.255.252 ip pim sparse-mode speed 100 duplex full ! interface FastEthernet7/3 no ip address shutdown ! interface FastEthernet7/4 no ip address shutdown ! interface FastEthernet7/5 no ip address shutdown ! interface FastEthernet7/6 Cisco IOS Release 12.1(13)E13 46 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet7/7 no ip address ! interface FastEthernet7/8 no ip address shutdown ! interface FastEthernet7/9 no ip address shutdown ! interface FastEthernet7/10 no ip address shutdown ! interface FastEthernet7/11 no ip address shutdown ! interface FastEthernet7/12 no ip address shutdown ! interface FastEthernet7/13 no ip address shutdown ! interface FastEthernet7/14 no ip address shutdown ! interface FastEthernet7/15 no ip address shutdown ! interface FastEthernet7/16 no ip address shutdown ! interface FastEthernet7/17 no ip address shutdown ! interface FastEthernet7/18 no ip address shutdown ! interface FastEthernet7/19 no ip address shutdown ! interface FastEthernet7/20 no ip address shutdown ! interface FastEthernet7/21 no ip address shutdown ! interface FastEthernet7/22 no ip address Cisco IOS Release 12.1(13)E13 47 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet7/23 no ip address shutdown ! interface FastEthernet7/24 description flashnet ip address 10.194.17.99 255.255.255.0 speed 100 duplex full ! interface FastEthernet7/25 no ip address shutdown ! interface FastEthernet7/26 no ip address shutdown ! interface FastEthernet7/27 no ip address shutdown ! interface FastEthernet7/28 no ip address shutdown ! interface FastEthernet7/29 no ip address shutdown ! interface FastEthernet7/30 no ip address shutdown ! interface FastEthernet7/31 no ip address shutdown ! interface FastEthernet7/32 no ip address shutdown ! interface FastEthernet7/33 no ip address shutdown ! interface FastEthernet7/34 no ip address shutdown ! interface FastEthernet7/35 no ip address shutdown ! interface FastEthernet7/36 no ip address ! interface FastEthernet7/37 no ip address ! interface FastEthernet7/38 description rtp-wbu-te-p4 fa3/1 Cisco IOS Release 12.1(13)E13 48 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip address 172.31.3.40 255.255.255.192 load-interval 30 hold-queue 400 in ! interface FastEthernet7/39 no ip address shutdown ! interface FastEthernet7/40 no ip address shutdown ! interface FastEthernet7/41 no ip address shutdown ! interface FastEthernet7/42 no ip address shutdown ! interface FastEthernet7/43 no ip address shutdown ! interface FastEthernet7/44 no ip address shutdown ! interface FastEthernet7/45 no ip address shutdown ! interface FastEthernet7/46 no ip address shutdown ! interface FastEthernet7/47 description Ix-6/1 ip address 172.31.1.121 255.255.255.252 speed 100 duplex full hold-queue 400 in ! interface FastEthernet7/48 description Ix-6/2 ip address 172.31.1.125 255.255.255.252 speed 100 duplex full hold-queue 400 in ! interface GigabitEthernet9/1 description sh1-105 g3/1 no ip address channel-group 66 mode on ! interface GigabitEthernet9/2 description sh1-105 g4/1 no ip address channel-group 66 mode on ! interface GigabitEthernet9/3 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 49 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet9/4 no ip address shutdown ! interface GigabitEthernet9/5 description sh1-106 g3/1 no ip address channel-group 67 mode on ! interface GigabitEthernet9/6 description sh1-106 g4/1 no ip address channel-group 67 mode on ! interface GigabitEthernet9/7 description SH1-113 g2/1 no ip address channel-group 64 mode on ! interface GigabitEthernet9/8 description SH1-113 g2/2 no ip address channel-group 64 mode on ! interface GigabitEthernet9/9 description SH1-114 g3/9 no ip address channel-group 65 mode on ! interface GigabitEthernet9/10 description SH1-114 g3/10 no ip address channel-group 65 mode on ! interface GigabitEthernet9/11 no ip address shutdown ! interface GigabitEthernet9/12 no ip address shutdown ! interface GigabitEthernet9/13 no ip address shutdown ! interface GigabitEthernet9/14 no ip address shutdown ! interface GigabitEthernet9/15 no ip address shutdown ! interface GigabitEthernet9/16 no ip address shutdown ! interface Vlan1 no ip address shutdown ! router eigrp 1320 redistribute ospf 1 metric 100000 10 255 1 1500 route-map OSPF2EIGRP-tag Cisco IOS Release 12.1(13)E13 50 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology passive-interface Loopback1 network 172.31.0.126 0.0.0.0 network 172.31.1.24 0.0.0.3 network 172.31.1.28 0.0.0.3 network 172.31.1.160 0.0.0.3 no auto-summary eigrp log-neighbor-changes ! router ospf 1 router-id 172.31.2.9 log-adjacency-changes auto-cost reference-bandwidth 100000 redistribute eigrp 1320 subnets route-map EIGRP2OSPF-tag passive-interface default no passive-interface FastEthernet7/2 no passive-interface FastEthernet7/47 no passive-interface FastEthernet7/48 no passive-interface Port-channel12 no passive-interface Port-channel13 no passive-interface Port-channel14 no passive-interface Port-channel15 no passive-interface Port-channel16 no passive-interface Port-channel17 no passive-interface Port-channel64 no passive-interface Port-channel65 no passive-interface Port-channel66 no passive-interface Port-channel67 no passive-interface Port-channel112 network 172.31.0.0 0.0.0.255 area 0 network 172.31.1.4 0.0.0.3 area 0 network 172.31.1.12 0.0.0.3 area 0 network 172.31.1.16 0.0.0.3 area 0 network 172.31.1.32 0.0.0.7 area 1 network 172.31.1.64 0.0.0.7 area 2 network 172.31.1.120 0.0.0.3 area 3 network 172.31.1.124 0.0.0.3 area 5 network 172.31.1.252 0.0.0.3 area 0 network 172.31.2.8 0.0.0.3 area 0 network 172.31.2.0 0.0.0.255 area 0 network 172.31.3.0 0.0.0.255 area 4 network 172.31.4.0 0.0.0.255 area 0 network 172.31.10.0 0.0.0.3 area 0 network 172.31.11.0 0.0.0.255 area 4 network 172.31.99.0 0.0.0.255 area 0 maximum-paths 6 ! router bgp 100 no synchronization bgp log-neighbor-changes network 172.31.0.0 mask 255.255.128.0 network 172.31.128.0 mask 255.255.224.0 redistribute eigrp 1320 redistribute ospf 1 neighbor sh1-ibgp peer-group neighbor sh1-ibgp remote-as 100 neighbor sh1-ibgp update-source Loopback0 neighbor sh1-ibgp version 4 neighbor sh1-ibgp next-hop-self neighbor 172.31.4.97 peer-group sh1-ibgp neighbor 172.31.4.98 peer-group sh1-ibgp neighbor 172.31.4.100 peer-group sh1-ibgp no auto-summary ! ip classless Cisco IOS Release 12.1(13)E13 51 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip route 130.3.1.0 255.255.255.0 FastEthernet7/47 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.98 3 override ip pim spt-threshold infinity ip pim send-rp-announce Loopback1 scope 64 group-list 1 ip pim send-rp-discovery Loopback1 scope 64 ip msdp peer 172.31.4.100 connect-source Loopback0 ip msdp description 172.31.4.100 SH1-100 ip msdp sa-filter out 172.31.4.100 list 131 ip msdp mesh-group regional 172.31.4.100 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.100.0.0 0.0.255.255 access-list 3 permit 224.0.1.39 access-list 3 permit 224.0.1.40 access-list 10 permit 224.0.0.0 31.255.255.255 access-list 10 permit any access-list 17 permit 130.1.0.0 0.0.255.255 access-list 18 permit 180.1.0.0 0.0.254.255 access-list 22 permit 160.0.0.0 0.255.254.255 access-list 41 permit 140.0.0.0 0.255.255.255 access-list 50 permit 224.0.0.0 31.255.255.255 access-list 100 deny ip host 172.31.1.29 host 172.31.1.30 access-list 100 deny ip host 172.31.1.30 host 172.31.1.29 access-list 110 permit ip host 224.0.0.10 host 172.31.1.30 access-list 131 permit ip any 239.100.0.0 0.0.255.255 access-list 178 permit ip 140.0.0.0 0.255.255.255 any access-list 181 permit ip any any route-map OSPF2EIGRP-tag deny 10 match tag 140 ! route-map OSPF2EIGRP-tag permit 20 set tag 140 ! route-map EIGRP2OSPF-tag deny 10 match tag 150 ! route-map EIGRP2OSPF-tag permit 20 set tag 150 ! route-map EIGRP2BGP permit 10 match ip address 18 ! route-map OSPF2EIGRP-odd deny 10 match ip address 22 ! route-map OSPF2EIGRP-odd permit 20 ! route-map OSPF2EIGRP deny 10 match ip address 17 ! route-map OSPF2EIGRP permit 20 ! route-map ospf-to-eigrp permit 10 set tag 140 ! route-map ospf-to-eigrp deny 20 match tag 140 Cisco IOS Release 12.1(13)E13 52 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! route-map eigrp-to-ospf permit 10 set tag 150 ! route-map eigrp-to-ospf deny 20 match tag 150 ! snmp-server community public RO snmp-server community cisco RW ! alias exec ip sh ip int brief | be Port alias exec ospf sh run | be router ospf alias exec eigrp sh run | be router eigrp alias exec bgp show runn | beg router bgp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180096 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-99#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-99 uptime is 2 weeks, 2 days, 19 hours, 24 minutes Time since SH1-99 switched to active is 2 weeks, 2 days, 19 hours, 24 minutes System returned to ROM by power-on (SP by power-on) System restarted at 16:19:07 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205S7 R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 1 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 52 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. Cisco IOS Release 12.1(13)E13 53 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-99#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC 5 0 Switching Fabric Module-136 (Standby) 6 0 Switching Fabric Module-136 (Active) 7 48 48 port 10/100 mb RJ45 9 16 SFM-capable 16 port 1000mb GBIC Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6348-RJ-45 WS-X6516-GBIC Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.e6e8 to 0001.c9da.e6e9 3.2 6.1(3) 2 0002.7e38.70e0 to 0002.7e38.70e1 3.2 6.1(3) 3 0001.63d3.b42a to 0001.63d3.b439 1.2 12.1(5r)E1 4 0001.63d3.b80a to 0001.63d3.b819 1.2 12.1(5r)E1 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0005.7481.6778 to 0005.7481.67a7 6.0 5.4(2) 9 0009.11e0.a7d0 to 0009.11e0.a7df 5.0 6.3(1) Mod --1 1 2 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 9 Pass SH1-99# Return to SH1-99, page 41 SH1-100 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-100#show config Using 15703 out of 391160 bytes Cisco IOS Release 12.1(13)E13 54 Serial No. ----------SAD06020371 SAD060100AY SAD055101KC SAD055101KU SAD0552044G SAD055204EZ SAL0552FSB6 SAL06200YL1 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060204MJ 3.0 Ok SAD055205S7 1.3 Ok SAD060201EJ 3.0 Ok SAD055205VK 1.3 Ok SAD055102T4 2.0 Ok SAD055102NR 2.0 Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-100 ! boot system flash sup-bootflash: boot bootldr bootflash: logging buffered 1000000 debugging no logging console enable secret 5 $1$2yp5$0ms6Prwm8UItyW5GFN2Ba1 ! clock timezone EDT -5 clock summer-time EST recurring ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.100 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.100 255.255.255.255 ip pim sparse-mode ! interface Port-channel12 description sh1-99 po13 ip address 172.31.1.14 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel13 description sh1-97 po13 ip address 172.31.1.22 255.255.255.252 ip access-group 182 in ip access-group 182 out ip pim sparse-mode logging event link-status ! Cisco IOS Release 12.1(13)E13 55 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface Port-channel14 description sh1-101 po114 ip address 172.31.1.41 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel15 description sh1-102 po115 ip address 172.31.1.45 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel16 description sh1-103 po116 ip address 172.31.1.49 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel17 description sh1-104 po117 ip address 172.31.1.53 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel24 no ip address ! interface Port-channel64 description SH1-113 Po164 ip address 172.31.11.9 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel65 description SH1-114 Po165 ip address 172.31.11.13 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel66 description sh1-105 po166 ip address 172.31.1.93 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel67 description sh1-106 po167 ip address 172.31.1.97 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel113 Cisco IOS Release 12.1(13)E13 56 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description sh1-98 po13 ip address 172.31.1.10 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 description SH1-113 g3/1 no ip address ip access-group 182 in ip access-group 182 out channel-group 64 mode on ! interface GigabitEthernet1/2 description sh1-97 g1/2 no ip address ip access-group 182 in ip access-group 182 out channel-group 13 mode on ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 description sh1-97 g2/2 no ip address ip access-group 182 in ip access-group 182 out channel-group 13 mode on ! interface GigabitEthernet3/1 description sh1-99 g3/1 no ip address channel-group 12 mode on ! interface GigabitEthernet3/2 description sh1-102 g3/1 no ip address channel-group 15 mode on ! interface GigabitEthernet3/3 description sh1-104 g3/1 no ip address channel-group 17 mode on ! interface GigabitEthernet3/4 description sh1-101 g3/3 no ip address channel-group 14 mode on ! interface GigabitEthernet3/5 description sh1-98 g3/1 no ip address channel-group 113 mode auto ! interface GigabitEthernet3/6 description sh1-97 g3/2 no ip address ip access-group 182 in ip access-group 182 out channel-group 13 mode on ! Cisco IOS Release 12.1(13)E13 57 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet3/7 description SH1-113 g3/2 no ip address channel-group 64 mode on ! interface GigabitEthernet3/8 description sh1-99 g3/8 no ip address channel-group 12 mode on ! interface GigabitEthernet3/9 description sh1-99 g3/9 no ip address channel-group 12 mode on ! interface GigabitEthernet3/10 description sh1-102 g3/9 no ip address channel-group 15 mode on ! interface GigabitEthernet3/11 description sh1-104 g3/9 no ip address channel-group 17 mode on ! interface GigabitEthernet3/12 description sh1-103 g4/10 no ip address channel-group 16 mode on ! interface GigabitEthernet3/13 no ip address ip pim sparse-mode shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 description sh1-99 g3/16 no ip address channel-group 12 mode on ! interface GigabitEthernet4/1 description sh1-99 g4/1 no ip address channel-group 12 mode on ! interface GigabitEthernet4/2 description sh1-102 g3/2 no ip address channel-group 15 mode on ! interface GigabitEthernet4/3 description sh1-104 g4/1 no ip address channel-group 17 mode on ! interface GigabitEthernet4/4 Cisco IOS Release 12.1(13)E13 58 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description sh1-103 g3/2 no ip address channel-group 16 mode on ! interface GigabitEthernet4/5 description SH1-114 g2/9 no ip address channel-group 65 mode on ! interface GigabitEthernet4/6 description SH1-114 g2/10 no ip address channel-group 65 mode on ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 description sh1-99 g4/8 no ip address channel-group 12 mode on ! interface GigabitEthernet4/9 description sh1-99 g4/9 no ip address channel-group 12 mode on ! interface GigabitEthernet4/10 description sh1-102 g3/10 no ip address channel-group 15 mode on ! interface GigabitEthernet4/11 description sh1-104 g4/9 no ip address channel-group 17 mode on ! interface GigabitEthernet4/12 description sh1-101 g3/11 no ip address channel-group 14 mode on ! interface GigabitEthernet4/13 description sh1-98 g3/9 no ip address channel-group 113 mode auto ! interface GigabitEthernet4/14 description sh1-97 g3/10 no ip address ip access-group 182 in ip access-group 182 out channel-group 13 mode on ! interface GigabitEthernet4/15 no ip address shutdown ! interface GigabitEthernet4/16 description sh1-99 g4/16 no ip address channel-group 12 mode on ! Cisco IOS Release 12.1(13)E13 59 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet7/1 description flashnet ip address 10.194.17.100 255.255.255.0 shutdown speed 100 duplex full ! interface FastEthernet7/2 no ip address switchport switchport access vlan 40 switchport mode access ! interface FastEthernet7/3 no ip address ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status load-interval 30 shutdown ! interface FastEthernet7/4 no ip address shutdown ! interface FastEthernet7/5 no ip address shutdown ! interface FastEthernet7/6 no ip address shutdown ! interface FastEthernet7/7 no ip address ! interface FastEthernet7/8 no ip address shutdown ! interface FastEthernet7/9 no ip address shutdown ! interface FastEthernet7/10 no ip address shutdown ! interface FastEthernet7/11 no ip address shutdown ! interface FastEthernet7/12 no ip address shutdown ! interface FastEthernet7/13 no ip address shutdown ! interface FastEthernet7/14 no ip address shutdown Cisco IOS Release 12.1(13)E13 60 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet7/15 no ip address shutdown ! interface FastEthernet7/16 no ip address shutdown ! interface FastEthernet7/17 no ip address ! interface FastEthernet7/18 no ip address shutdown ! interface FastEthernet7/19 no ip address shutdown ! interface FastEthernet7/20 no ip address shutdown ! interface FastEthernet7/21 no ip address shutdown ! interface FastEthernet7/22 no ip address shutdown ! interface FastEthernet7/23 no ip address shutdown ! interface FastEthernet7/24 description flashnet ip address 10.194.17.100 255.255.255.0 speed 100 duplex full ! interface FastEthernet7/25 no ip address shutdown ! interface FastEthernet7/26 no ip address shutdown ! interface FastEthernet7/27 no ip address shutdown ! interface FastEthernet7/28 no ip address shutdown ! interface FastEthernet7/29 no ip address shutdown ! interface FastEthernet7/30 no ip address Cisco IOS Release 12.1(13)E13 61 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet7/31 no ip address shutdown ! interface FastEthernet7/32 no ip address shutdown ! interface FastEthernet7/33 no ip address shutdown ! interface FastEthernet7/34 no ip address shutdown ! interface FastEthernet7/35 no ip address shutdown ! interface FastEthernet7/36 no ip address shutdown ! interface FastEthernet7/37 no ip address shutdown ! interface FastEthernet7/38 ip address 172.31.1.137 255.255.255.252 secondary ip address 172.31.3.65 255.255.255.192 no ip redirects no ip unreachables ! interface FastEthernet7/39 no ip address shutdown ! interface FastEthernet7/40 no ip address ! interface FastEthernet7/41 no ip address shutdown ! interface FastEthernet7/42 no ip address shutdown ! interface FastEthernet7/43 no ip address shutdown ! interface FastEthernet7/44 no ip address shutdown ! interface FastEthernet7/45 no ip address shutdown ! interface FastEthernet7/46 Cisco IOS Release 12.1(13)E13 62 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet7/47 description Ix-6/3 ip address 172.31.1.129 255.255.255.252 speed 100 duplex full hold-queue 400 in ! interface FastEthernet7/48 description Ix-6/4 ip address 172.31.1.133 255.255.255.252 hold-queue 400 in ! interface GigabitEthernet9/1 description sh1-105 g5/1 no ip address channel-group 66 mode on ! interface GigabitEthernet9/2 description sh1-105 g6/1 no ip address channel-group 66 mode on ! interface GigabitEthernet9/3 no ip address shutdown ! interface GigabitEthernet9/4 no ip address shutdown ! interface GigabitEthernet9/5 description sh1-106 g5/1 no ip address channel-group 67 mode on ! interface GigabitEthernet9/6 description sh1-106 g6/1 no ip address channel-group 67 mode on ! interface GigabitEthernet9/7 description SH1-113 g2/9 no ip address channel-group 64 mode on ! interface GigabitEthernet9/8 description SH1-113 g2/10 no ip address channel-group 64 mode on ! interface GigabitEthernet9/9 description SH1-114 g3/1 no ip address channel-group 65 mode on ! interface GigabitEthernet9/10 description SH1-114 g3/2 no ip address channel-group 65 mode on ! interface GigabitEthernet9/11 Cisco IOS Release 12.1(13)E13 63 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet9/12 no ip address shutdown ! interface GigabitEthernet9/13 no ip address shutdown ! interface GigabitEthernet9/14 no ip address shutdown ! interface GigabitEthernet9/15 no ip address shutdown ! interface GigabitEthernet9/16 no ip address shutdown ! interface Vlan1 no ip address shutdown ! router eigrp 1320 redistribute ospf 1 metric 100000 10 255 1 1500 route-map OSPF2EIGRP-tag network 172.31.0.126 0.0.0.0 network 172.31.1.40 0.0.0.7 network 172.31.1.136 0.0.0.3 no auto-summary eigrp log-neighbor-changes ! router ospf 1 router-id 172.31.2.13 log-adjacency-changes auto-cost reference-bandwidth 100000 redistribute eigrp 1320 subnets route-map EIGRP2OSPF-tag passive-interface default no passive-interface GigabitEthernet3/13 no passive-interface FastEthernet7/3 no passive-interface FastEthernet7/47 no passive-interface FastEthernet7/48 no passive-interface Port-channel12 no passive-interface Port-channel13 no passive-interface Port-channel14 no passive-interface Port-channel15 no passive-interface Port-channel16 no passive-interface Port-channel17 no passive-interface Port-channel64 no passive-interface Port-channel65 no passive-interface Port-channel66 no passive-interface Port-channel67 no passive-interface Port-channel113 network 172.31.0.0 0.0.0.255 area 0 network 172.31.1.12 0.0.0.3 area 0 network 172.31.1.8 0.0.0.7 area 0 network 172.31.1.20 0.0.0.3 area 0 network 172.31.1.48 0.0.0.7 area 1 network 172.31.1.92 0.0.0.3 area 2 network 172.31.1.96 0.0.0.3 area 2 network 172.31.1.128 0.0.0.3 area 3 Cisco IOS Release 12.1(13)E13 64 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology network 172.31.1.132 0.0.0.3 area 5 network 172.31.1.252 0.0.0.3 area 0 network 172.31.2.12 0.0.0.3 area 0 network 172.31.3.0 0.0.0.255 area 4 network 172.31.4.0 0.0.0.255 area 0 network 172.31.10.0 0.0.0.3 area 0 network 172.31.11.0 0.0.0.255 area 4 network 172.31.99.0 0.0.0.255 area 0 maximum-paths 6 ! router bgp 100 no synchronization bgp log-neighbor-changes network 172.31.0.0 mask 255.255.128.0 network 172.31.128.0 mask 255.255.224.0 redistribute eigrp 1320 redistribute ospf 1 neighbor sh1-ibgp peer-group neighbor sh1-ibgp remote-as 100 neighbor sh1-ibgp update-source Loopback0 neighbor sh1-ibgp version 4 neighbor sh1-ibgp next-hop-self neighbor 172.31.4.97 peer-group sh1-ibgp neighbor 172.31.4.98 peer-group sh1-ibgp neighbor 172.31.4.99 peer-group sh1-ibgp no auto-summary ! ip classless ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 ip route 172.31.1.98 255.255.255.255 Port-channel67 no ip http server ip pim rp-address 172.31.0.98 3 override ip pim spt-threshold infinity ip pim send-rp-announce Loopback1 scope 64 group-list 1 ip pim send-rp-discovery Loopback1 scope 64 ip msdp peer 172.31.4.99 connect-source Loopback0 ip msdp description 172.31.4.99 SH1-99 ip msdp sa-filter out 172.31.4.99 list 131 ip msdp mesh-group regional 172.31.4.99 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging 172.18.177.132 access-list 1 permit 239.100.0.0 0.0.255.255 access-list 3 permit 224.0.1.39 access-list 3 permit 224.0.1.40 access-list 10 permit 239.255.254.241 access-list 17 permit 0.0.0.0 255.254.255.255 access-list 18 permit 180.1.0.0 0.0.254.255 access-list 22 permit 160.0.0.0 0.255.254.255 access-list 26 permit 165.250.241.0 0.0.0.255 access-list 30 deny 172.31.1.96 access-list 30 permit any access-list 44 permit 172.31.1.129 access-list 131 permit ip any 239.100.0.0 0.0.255.255 access-list 181 permit ip any any access-list 182 permit ip any any access-list 191 permit ip host 172.31.1.20 host 172.31.1.21 access-list 191 permit ip host 172.31.1.21 host 172.31.1.20 access-list 199 permit ip host 172.31.1.98 host 172.31.1.97 log route-map EIGRP2BGP permit 10 Cisco IOS Release 12.1(13)E13 65 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology match ip address 18 ! route-map OSPF2EIGRP-tag deny 10 match tag 150 ! route-map OSPF2EIGRP-tag permit 20 set tag 150 ! route-map EIGRP2OSPF-tag deny 10 match tag 140 ! route-map EIGRP2OSPF-tag permit 20 set tag 140 ! route-map OSPF2EIGRP-odd deny 10 match ip address 22 ! route-map OSPF2EIGRP-odd permit 20 ! route-map OSPF2EIGRP deny 10 match ip address 17 ! route-map OSPF2EIGRP permit 20 ! route-map ospf-to-eigrp permit 10 set tag 140 ! route-map ospf-to-eigrp deny 20 match tag 140 ! route-map eigrp-to-ospf permit 10 set tag 150 ! route-map eigrp-to-ospf deny 20 match tag 150 ! snmp-server community public RO snmp-server community cisco RW ! alias exec ospf sh run | be router ospf alias exec eigrp sh run | be router eigrp alias exec bgp sh runn | beg router bgp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180152 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-100#show version Cisco IOS Release 12.1(13)E13 66 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-100 uptime is 2 days, 22 hours, 46 minutes Time since SH1-100 switched to active is 2 days, 22 hours, 32 minutes System returned to ROM by power-on (SP by power-on) System restarted at 12:57:31 EDT Mon Mar 15 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055107AS R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 1 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 52 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-100#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC 5 0 Switching Fabric Module-136 (Active) 6 0 Switching Fabric Module-136 (Standby) 7 48 SFM-capable 48-port 10/100 Mbps RJ45 9 16 SFM-capable 16 port 1000mb GBIC Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6548-RJ-45 WS-X6516-GBIC Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.6abc to 0002.7e38.6abd 3.2 6.1(3) 2 0001.6415.b81e to 0001.6415.b81f 3.2 6.1(3) 3 0001.63d3.b4fa to 0001.63d3.b509 1.2 12.1(5r)E1 4 0001.63d4.4c72 to 0001.63d4.4c81 1.2 12.1(5r)E1 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0002.7ee3.f566 to 0002.7ee3.f595 4.3 6.3(1) 9 0001.63d4.3da2 to 0001.63d4.3db1 4.0 6.1(3) Mod --1 1 2 2 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD055106GE SAD0602030E SAD055101LK SAD055101PJ SAD06010302 SAD0552048K SAD062101D7 SAD055204VV Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055004RV 3.0 Ok SAD055107AS 2.0 Ok SAD060204M0 3.0 Ok SAD0552068V 1.3 Ok SAD055102P3 2.0 Ok Cisco IOS Release 12.1(13)E13 67 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 4 Distributed Forwarding Card WS-F6K-DFC 9 Distributed Forwarding Card WS-F6K-DFC SAD060100F7 SAL06489A2Q Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 9 Pass SH1-100# Return to SH1-100, page 54 SH1-101 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-101#term length 0 SH1-101#show config Using 14539 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-101 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console aaa new-model aaa authentication login default enable aaa authentication login sh1-testcase group tacacs+ enable enable secret 5 $1$lGzL$fPcvjf6cuGekcJs87L8q40 ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ip domain-name cisco.com ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check ! redundancy mode rpr-plus Cisco IOS Release 12.1(13)E13 68 2.0 2.5 Ok Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.101 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.102 255.255.255.255 ip pim sparse-mode ! interface Port-channel10 description dista-1 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel14 description sh1-99 po14 ip address 172.31.1.26 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel114 description sh1-100 po14 ip address 172.31.1.42 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-99 g3/2 no ip address channel-group 14 mode on ! interface GigabitEthernet3/2 description sh1-99 g4/2 no ip address channel-group 14 mode on ! interface GigabitEthernet3/3 description sh1-100 g3/4 no ip address channel-group 114 mode on ! interface GigabitEthernet3/4 no ip address shutdown Cisco IOS Release 12.1(13)E13 69 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-99 g3/10 no ip address channel-group 14 mode on ! interface GigabitEthernet3/10 description sh1-99 g4/10 no ip address channel-group 14 mode on ! interface GigabitEthernet3/11 description sh1-100 g4/12 no ip address channel-group 114 mode on ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 description Ix-11/2 ip address 172.31.64.14 255.255.255.0 ip access-group 181 in ip access-group 181 out ip pim sparse-mode shutdown ! interface GigabitEthernet7/1 description dista-1 3/1 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet7/2 Cisco IOS Release 12.1(13)E13 70 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description dista-1 3/2 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 no ip address shutdown ! interface GigabitEthernet7/8 no ip address shutdown ! interface GigabitEthernet7/9 no ip address ip pim sparse-mode shutdown ! interface GigabitEthernet7/10 no ip address shutdown ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 description Ix-12/1 ip address 172.31.201.1 255.255.255.252 ip access-group 181 in ip access-group 181 out Cisco IOS Release 12.1(13)E13 71 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim sparse-mode ! interface FastEthernet8/1 no ip address shutdown ! interface FastEthernet8/2 no ip address shutdown ! interface FastEthernet8/3 no ip address shutdown ! interface FastEthernet8/4 no ip address shutdown ! interface FastEthernet8/5 no ip address shutdown ! interface FastEthernet8/6 no ip address shutdown ! interface FastEthernet8/7 no ip address shutdown ! interface FastEthernet8/8 no ip address shutdown ! interface FastEthernet8/9 no ip address shutdown ! interface FastEthernet8/10 no ip address shutdown ! interface FastEthernet8/11 no ip address shutdown ! interface FastEthernet8/12 no ip address shutdown ! interface FastEthernet8/13 no ip address shutdown ! interface FastEthernet8/14 no ip address shutdown ! interface FastEthernet8/15 no ip address shutdown ! interface FastEthernet8/16 no ip address Cisco IOS Release 12.1(13)E13 72 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet8/17 no ip address shutdown ! interface FastEthernet8/18 no ip address shutdown ! interface FastEthernet8/19 no ip address shutdown ! interface FastEthernet8/20 no ip address shutdown ! interface FastEthernet8/21 no ip address shutdown ! interface FastEthernet8/22 no ip address shutdown ! interface FastEthernet8/23 no ip address shutdown ! interface FastEthernet8/24 description flashnet ip address 10.194.17.101 255.255.255.0 shutdown duplex full ! interface FastEthernet9/1 no ip address ! interface FastEthernet9/2 no ip address ! interface FastEthernet9/3 description IXIA 13/2 no ip address switchport switchport access vlan 201 switchport mode access ! interface FastEthernet9/4 no ip address switchport switchport access vlan 40 switchport mode access ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 description Connected to Ixia 16/8 no ip address speed 100 duplex full Cisco IOS Release 12.1(13)E13 73 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology switchport switchport access vlan 40 switchport mode access ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 74 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.101 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address Cisco IOS Release 12.1(13)E13 75 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address ! interface Vlan40 ip address 172.31.70.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 1 ip 172.31.70.1 standby 1 priority 110 standby 1 preempt standby 2 ip 172.31.70.254 standby 2 priority 90 standby 2 preempt ! interface Vlan41 Cisco IOS Release 12.1(13)E13 76 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip address 172.31.71.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.71.1 standby 2 priority 110 standby 2 preempt standby 3 ip 172.31.71.254 standby 3 priority 90 standby 3 preempt ! interface Vlan42 ip address 172.31.72.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.72.1 standby 3 priority 110 standby 3 preempt standby 4 ip 172.31.72.254 standby 4 priority 90 standby 4 preempt ! interface Vlan43 ip address 172.31.73.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.73.1 standby 4 priority 110 standby 4 preempt standby 5 ip 172.31.73.254 standby 5 priority 90 standby 5 preempt ! interface Vlan44 ip address 172.31.74.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.74.1 standby 5 priority 110 standby 5 preempt standby 6 ip 172.31.74.254 standby 6 priority 90 standby 6 preempt ! interface Vlan45 ip address 172.31.75.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.75.1 standby 6 priority 110 Cisco IOS Release 12.1(13)E13 77 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby standby standby standby 6 7 7 7 preempt ip 172.31.75.254 priority 90 preempt ! interface Vlan46 ip address 172.31.76.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.76.1 standby 7 priority 110 standby 7 preempt standby 8 ip 172.31.76.254 standby 8 priority 90 standby 8 preempt ! interface Vlan47 ip address 172.31.77.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.77.1 standby 8 priority 110 standby 8 preempt standby 9 ip 172.31.77.254 standby 9 priority 90 standby 9 preempt ! interface Vlan48 ip address 172.31.78.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 9 ip 172.31.78.1 standby 9 priority 110 standby 9 preempt standby 10 ip 172.31.78.254 standby 10 priority 90 standby 10 preempt ! interface Vlan49 ip address 172.31.79.14 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 10 ip 172.31.79.1 standby 10 priority 110 standby 10 preempt standby 11 ip 172.31.79.254 standby 11 priority 90 standby 11 preempt ! interface Vlan50 ip address 172.31.80.14 255.255.255.0 no ip redirects Cisco IOS Release 12.1(13)E13 78 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.80.1 standby 11 priority 110 standby 11 preempt standby 12 ip 172.31.80.254 standby 12 priority 90 standby 12 preempt ! interface Vlan150 description Pagent EIGRP VLAN ip address 172.31.150.101 255.255.255.0 no ip redirects ip pim sparse-mode standby ip 172.31.150.1 standby priority 120 standby preempt ! interface Vlan180 no ip address ! interface Vlan201 ip address 172.31.200.5 255.255.255.252 ip pim sparse-mode shutdown ! router eigrp 1320 passive-interface default no passive-interface Vlan40 no passive-interface Vlan150 no passive-interface GigabitEthernet7/16 no passive-interface Port-channel14 no passive-interface Port-channel114 no passive-interface Loopback0 no passive-interface Loopback1 network 172.31.4.0 0.0.0.255 network 172.31.60.0 0.0.1.255 network 172.31.150.0 0.0.0.255 network 172.31.0.0 auto-summary eigrp log-neighbor-changes ! ip classless ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.102 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.102 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 30 deny 172.31.30.0 Cisco IOS Release 12.1(13)E13 79 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list 30 permit any access-list 40 deny 239.1.1.40 access-list 40 permit any access-list 44 deny 239.255.200.50 access-list 100 permit ip any 172.31.41.0 0.0.0.255 access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW snmp-server enable traps casa snmp-server enable traps vtp snmp-server enable traps hsrp snmp-server enable traps config snmp-server enable traps entity snmp-server enable traps bgp snmp-server enable traps rsvp snmp-server enable traps frame-relay snmp-server enable traps syslog snmp-server enable traps rtr snmp-server enable traps dlsw snmp-server enable traps isdn call-information snmp-server enable traps isdn layer2 snmp-server host 172.20.26.12 public ! tacacs-server host 172.18.177.132 alias exec ospf sh run | be router ospf alias exec eigrp sh run | be router eigrp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180013 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-101#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-101 uptime is 2 weeks, 2 days, 19 hours, 15 minutes Time since SH1-101 switched to active is 2 weeks, 2 days, 19 hours, 15 minutes System returned to ROM by power-on (SP by power-on) System restarted at 16:28:23 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205S3 Cisco IOS Release 12.1(13)E13 80 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 15 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 34 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Configuration register is 0x2102 SH1-101#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 3 16 Pure SFM-mode 16 port 1000mb GBIC 5 0 Switching Fabric Module-136 (Active) 6 0 Switching Fabric Module-136 (Standby) 7 16 SFM-capable 16 port 1000mb GBIC 8 24 24 port 100FX Multi mode 9 48 SFM-capable 48-port 10/100 Mbps RJ45 Model -----------------WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6324-100FX-MM WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.b3d2 to 0001.6415.b3d3 3.2 6.1(3) 3 0001.63d3.b59a to 0001.63d3.b5a9 1.2 12.1(5r)E1 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0001.63d4.39f2 to 0001.63d4.3a01 4.0 6.1(3) 8 0008.a430.0ab0 to 0008.a430.0ac7 3.0 5.4(2) 9 000e.3828.55b0 to 000e.3828.55df 5.2 6.3(1) Mod --1 1 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD06010069 SAD055101MR SAD060102Y4 SAD055002UN SAD055204XF SAD055106ZS SAL0745P5VD Sw -----------7.5(0.6)HUB1 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055205B0 3.0 Ok SAD055205S3 1.3 Ok SAD055102PV 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 3 Pass 5 Pass 6 Pass 7 Pass 8 Pass 9 Pass SH1-101# Return to SH1-101, page 68 SH1-102 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-102>enable Cisco IOS Release 12.1(13)E13 81 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Password: SH1-102#term length 0 SH1-102#show config Using 24238 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-102 ! boot system flash sup-bootflash: boot bootldr bootflash: logging buffered 100000 debugging no logging console enable secret 5 $1$S.Ic$tdvvMChZC92pvJtvBCPFf/ ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check ! redundancy mode rpr-plus main-cpu auto-sync startup-config auto-sync running-config auto-sync config-register auto-sync standard ! power redundancy-mode combined ! ! vlan 1 tb-vlan1 1002 tb-vlan2 1003 ! vlan 10,15,40-50,60-61,101-105,122,131,150,200 ! vlan 1002 tb-vlan1 1 tb-vlan2 1003 ! vlan 1003 tb-vlan1 1 tb-vlan2 1002 parent 1005 backupcrf enable ! vlan 1004 Cisco IOS Release 12.1(13)E13 82 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology bridge 1 stp type ibm ! vlan 1005 bridge 1 ! ! interface Loopback0 ip address 172.31.4.102 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.102 255.255.255.255 ip pim sparse-mode ! interface Port-channel10 description dista-1 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel14 no ip address ! interface Port-channel15 description sh1-99 po15 ip address 172.31.1.30 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode ip hold-time eigrp 1000 250 logging event link-status ! interface Port-channel20 no ip address ! interface Port-channel115 description sh1-100 po15 ip address 172.31.1.46 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-100 g3/2 no ip address ip access-group 181 in Cisco IOS Release 12.1(13)E13 83 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology channel-group 115 mode on ! interface GigabitEthernet3/2 description sh1-100 g4/2 no ip address ip access-group 181 in channel-group 115 mode on ! interface GigabitEthernet3/3 description sh1-99 g3/4 no ip address channel-group 15 mode on ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-100 g3/10 no ip address ip access-group 181 in channel-group 115 mode on ! interface GigabitEthernet3/10 description sh1-100 g4/10 no ip address ip access-group 181 in channel-group 115 mode on ! interface GigabitEthernet3/11 description sh1-99 g4/12 no ip address channel-group 15 mode on ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address Cisco IOS Release 12.1(13)E13 84 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet3/16 no ip address ip pim sparse-mode shutdown ! interface FastEthernet4/1 ip address 2.2.2.1 255.255.255.252 ! interface FastEthernet4/2 description IXIA 13/1 no ip address switchport switchport access vlan 200 switchport mode access ! interface FastEthernet4/3 no ip address shutdown ! interface FastEthernet4/4 no ip address ! interface FastEthernet4/5 description Ix-2/4 ip address 172.31.202.1 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode speed 100 duplex full ! interface FastEthernet4/6 no ip address shutdown ! interface FastEthernet4/7 no ip address shutdown ! interface FastEthernet4/8 no ip address shutdown ! interface FastEthernet4/9 no ip address shutdown ! interface FastEthernet4/10 no ip address shutdown ! interface FastEthernet4/11 no ip address shutdown ! interface FastEthernet4/12 no ip address shutdown ! interface FastEthernet4/13 ip address 1.1.1.1 255.255.255.252 Cisco IOS Release 12.1(13)E13 85 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet4/14 ip address 1.1.1.5 255.255.255.252 shutdown ! interface FastEthernet4/15 no ip address shutdown ! interface FastEthernet4/16 no ip address shutdown ! interface FastEthernet4/17 no ip address shutdown ! interface FastEthernet4/18 no ip address shutdown ! interface FastEthernet4/19 no ip address shutdown ! interface FastEthernet4/20 no ip address shutdown ! interface FastEthernet4/21 no ip address shutdown ! interface FastEthernet4/22 no ip address shutdown ! interface FastEthernet4/23 no ip address shutdown ! interface FastEthernet4/24 description flashnet ip address 10.194.17.102 255.255.255.0 speed 100 duplex full ! interface FastEthernet4/25 no ip address shutdown ! interface FastEthernet4/26 no ip address shutdown ! interface FastEthernet4/27 no ip address shutdown ! interface FastEthernet4/28 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 86 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet4/29 no ip address shutdown ! interface FastEthernet4/30 no ip address shutdown ! interface FastEthernet4/31 no ip address shutdown ! interface FastEthernet4/32 no ip address shutdown ! interface FastEthernet4/33 no ip address shutdown ! interface FastEthernet4/34 no ip address shutdown ! interface FastEthernet4/35 no ip address shutdown ! interface FastEthernet4/36 no ip address shutdown ! interface FastEthernet4/37 no ip address shutdown ! interface FastEthernet4/38 no ip address shutdown ! interface FastEthernet4/39 no ip address shutdown ! interface FastEthernet4/40 no ip address shutdown ! interface FastEthernet4/41 no ip address shutdown ! interface FastEthernet4/42 no ip address shutdown ! interface FastEthernet4/43 no ip address shutdown ! interface FastEthernet4/44 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 87 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet4/45 no ip address shutdown ! interface FastEthernet4/46 no ip address shutdown ! interface FastEthernet4/47 no ip address shutdown ! interface FastEthernet4/48 no ip address ! interface GigabitEthernet7/1 no ip address shutdown ! interface GigabitEthernet7/2 no ip address shutdown ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 description dista-1 3/6 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet7/7 no ip address shutdown ! interface GigabitEthernet7/8 description dista-1 3/8 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet7/9 no ip address ip pim sparse-mode shutdown ! interface GigabitEthernet7/10 no ip address shutdown ! interface GigabitEthernet7/11 no ip address Cisco IOS Release 12.1(13)E13 88 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 no ip address shutdown ! interface FastEthernet8/1 no ip address shutdown ! interface FastEthernet8/2 no ip address shutdown ! interface FastEthernet8/3 no ip address shutdown ! interface FastEthernet8/4 no ip address shutdown ! interface FastEthernet8/5 no ip address shutdown ! interface FastEthernet8/6 no ip address shutdown ! interface FastEthernet8/7 no ip address shutdown ! interface FastEthernet8/8 no ip address shutdown ! interface FastEthernet8/9 no ip address shutdown ! interface FastEthernet8/10 no ip address shutdown ! interface FastEthernet8/11 no ip address Cisco IOS Release 12.1(13)E13 89 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet8/12 no ip address shutdown ! interface FastEthernet8/13 no ip address shutdown ! interface FastEthernet8/14 no ip address shutdown ! interface FastEthernet8/15 no ip address shutdown ! interface FastEthernet8/16 no ip address shutdown ! interface FastEthernet8/17 no ip address shutdown ! interface FastEthernet8/18 no ip address shutdown ! interface FastEthernet8/19 no ip address shutdown ! interface FastEthernet8/20 no ip address shutdown ! interface FastEthernet8/21 no ip address shutdown ! interface FastEthernet8/22 no ip address shutdown ! interface FastEthernet8/23 no ip address shutdown ! interface FastEthernet8/24 description flashnet no ip address shutdown duplex full ! interface Vlan1 no ip address shutdown ! interface Vlan40 ip address 172.31.70.15 255.255.255.0 no ip redirects ip directed-broadcast Cisco IOS Release 12.1(13)E13 90 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 1 ip 172.31.70.1 standby 1 priority 90 standby 1 preempt standby 2 ip 172.31.70.254 standby 2 priority 110 standby 2 preempt ! interface Vlan41 ip address 172.31.71.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.71.1 standby 2 priority 90 standby 2 preempt standby 3 ip 172.31.71.254 standby 3 priority 110 standby 3 preempt ! interface Vlan42 ip address 172.31.72.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.72.1 standby 3 priority 90 standby 3 preempt standby 4 ip 172.31.72.254 standby 4 priority 110 standby 4 preempt ! interface Vlan43 ip address 172.31.73.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.73.1 standby 4 priority 90 standby 4 preempt standby 5 ip 172.31.73.254 standby 5 priority 110 standby 5 preempt ! interface Vlan44 ip address 172.31.74.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.74.1 standby 5 priority 90 standby 5 preempt standby 6 ip 172.31.74.254 standby 6 priority 110 Cisco IOS Release 12.1(13)E13 91 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby 6 preempt ! interface Vlan45 ip address 172.31.75.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.75.1 standby 6 priority 90 standby 6 preempt standby 7 ip 172.31.75.254 standby 7 priority 110 standby 7 preempt ! interface Vlan46 ip address 172.31.76.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.76.1 standby 7 priority 90 standby 7 preempt standby 8 ip 172.31.76.254 standby 8 priority 110 standby 8 preempt ! interface Vlan47 ip address 172.31.77.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.77.1 standby 8 priority 90 standby 8 preempt standby 9 ip 172.31.77.254 standby 9 priority 110 standby 9 preempt ! interface Vlan48 ip address 172.31.78.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 9 ip 172.31.78.1 standby 9 priority 90 standby 9 preempt standby 10 ip 172.31.78.254 standby 10 priority 110 standby 10 preempt ! interface Vlan49 ip address 172.31.79.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode Cisco IOS Release 12.1(13)E13 92 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology logging standby standby standby standby standby standby event link-status 10 ip 172.31.79.1 10 priority 90 10 preempt 11 ip 172.31.79.254 11 priority 110 11 preempt ! interface Vlan50 ip address 172.31.80.15 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.80.1 standby 11 priority 90 standby 11 preempt standby 12 ip 172.31.80.254 standby 12 priority 110 standby 12 preempt ! interface Vlan122 description EQ Hosting LAN ip address 61.172.243.2 255.255.255.128 ip access-group 122 out no ip redirects no ip unreachables no ip mroute-cache standby 20 ip 61.172.243.1 standby 20 priority 120 standby 20 preempt standby 20 authentication ubiCN ! interface Vlan131 description Shared Utility LAN ip address 61.172.243.210 255.255.255.240 ip access-group 151 out no ip redirects no ip unreachables no ip mroute-cache standby 30 ip 61.172.243.209 standby 30 priority 120 standby 30 preempt standby 30 authentication ubiCN ! interface Vlan150 description Pagent EIGRP VLAN ip address 172.31.150.102 255.255.255.0 no ip redirects ip pim sparse-mode standby ip 172.31.150.1 standby priority 110 standby preempt ! interface Vlan200 ip address 172.31.200.1 255.255.255.252 ip pim sparse-mode shutdown ! router eigrp 1320 passive-interface default no passive-interface Vlan40 no passive-interface Vlan150 Cisco IOS Release 12.1(13)E13 93 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no passive-interface FastEthernet4/1 no passive-interface FastEthernet4/5 no passive-interface Port-channel15 no passive-interface Port-channel115 network 172.31.4.0 0.0.0.255 network 172.31.60.0 0.0.1.255 network 172.31.150.0 0.0.0.255 network 172.31.0.0 auto-summary eigrp log-neighbor-changes ! router ospf 1 log-adjacency-changes maximum-paths 6 ! ip classless ip route 0.0.0.0 0.0.0.0 1.1.1.6 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.102 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.101 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! ip access-list extended ACLIPsec-DTC deny tcp any any eq sunrpc deny udp any any eq sunrpc deny tcp any any eq 2049 deny udp any any eq 2049 deny tcp any any range 32770 32780 permit icmp any any unreachable permit icmp any any echo-reply permit icmp any any time-exceeded permit icmp any any source-quench permit icmp any any general-parameter-problem permit icmp any any packet-too-big permit ip 64.12.0.0 0.0.255.255 any permit ip 152.163.0.0 0.0.255.255 any permit ip 205.188.0.0 0.0.255.255 any permit ip 172.16.0.0 0.15.255.255 any permit ip 10.0.0.0 0.7.255.255 any permit ip 10.8.0.0 0.0.255.255 any permit ip 10.128.0.0 0.63.255.255 any permit ip 192.168.0.0 0.0.255.255 any permit udp any any eq ntp permit ip 149.174.128.0 0.0.127.255 any permit tcp 64.236.8.208 0.0.0.15 any eq 55535 permit esp host 66.210.240.44 host 205.188.241.145 permit ahp host 66.210.240.44 host 205.188.241.145 permit udp host 66.210.240.44 host 205.188.241.145 eq isakmp permit esp host 216.181.109.46 host 205.188.241.145 permit ahp host 216.181.109.46 host 205.188.241.145 permit udp host 216.181.109.46 host 205.188.241.145 eq isakmp permit esp host 216.181.233.190 host 205.188.241.145 permit ahp host 216.181.233.190 host 205.188.241.145 permit udp host 216.181.233.190 host 205.188.241.145 eq isakmp permit esp host 209.225.187.62 host 205.188.241.145 permit ahp host 209.225.187.62 host 205.188.241.145 permit udp host 209.225.187.62 host 205.188.241.145 eq isakmp permit esp host 216.181.237.54 host 205.188.241.145 Cisco IOS Release 12.1(13)E13 94 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp udp esp ahp host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host host 216.181.237.54 host 205.188.241.145 216.181.237.54 host 205.188.241.145 eq isakmp 209.225.187.38 host 205.188.241.145 209.225.187.38 host 205.188.241.145 209.225.187.38 host 205.188.241.145 eq isakmp 216.181.212.78 host 205.188.241.145 216.181.212.78 host 205.188.241.145 216.181.212.78 host 205.188.241.145 eq isakmp 216.181.219.86 host 205.188.241.145 216.181.219.86 host 205.188.241.145 216.181.219.86 host 205.188.241.145 eq isakmp 216.181.108.182 host 205.188.241.145 216.181.108.182 host 205.188.241.145 216.181.108.182 host 205.188.241.145 eq isakmp 216.181.173.14 host 205.188.241.145 216.181.173.14 host 205.188.241.145 216.181.173.14 host 205.188.241.145 eq isakmp 209.225.190.86 host 205.188.241.145 209.225.190.86 host 205.188.241.145 209.225.190.86 host 205.188.241.145 eq isakmp 216.181.94.206 host 205.188.241.145 216.181.94.206 host 205.188.241.145 216.181.94.206 host 205.188.241.145 eq isakmp 216.181.15.94 host 205.188.241.145 216.181.15.94 host 205.188.241.145 216.181.15.94 host 205.188.241.145 eq isakmp 63.121.105.28 host 205.188.241.145 63.121.105.28 host 205.188.241.145 63.121.105.28 host 205.188.241.145 eq isakmp 216.181.237.142 host 205.188.241.145 216.181.237.142 host 205.188.241.145 216.181.237.142 host 205.188.241.145 eq isakmp 216.181.98.174 host 205.188.241.145 216.181.98.174 host 205.188.241.145 216.181.98.174 host 205.188.241.145 eq isakmp 66.202.67.65 host 205.188.241.145 66.202.67.65 host 205.188.241.145 66.202.67.65 host 205.188.241.145 eq isakmp 209.225.158.94 host 205.188.241.145 209.225.158.94 host 205.188.241.145 209.225.158.94 host 205.188.241.145 eq isakmp 216.181.98.230 host 205.188.241.145 216.181.98.230 host 205.188.241.145 216.181.98.230 host 205.188.241.145 eq isakmp 209.225.176.110 host 205.188.241.145 209.225.176.110 host 205.188.241.145 209.225.176.110 host 205.188.241.145 eq isakmp 209.102.96.201 host 205.188.241.145 209.102.96.201 host 205.188.241.145 209.102.96.201 host 205.188.241.145 eq isakmp 216.181.109.142 host 205.188.241.145 216.181.109.142 host 205.188.241.145 216.181.109.142 host 205.188.241.145 eq isakmp 66.147.140.132 host 205.188.241.145 66.147.140.132 host 205.188.241.145 66.147.140.132 host 205.188.241.145 eq isakmp 63.121.101.44 host 205.188.241.145 63.121.101.44 host 205.188.241.145 63.121.101.44 host 205.188.241.145 eq isakmp 63.113.105.74 host 205.188.241.145 63.113.105.74 host 205.188.241.145 63.113.105.74 host 205.188.241.145 eq isakmp 64.140.48.66 host 205.188.241.145 64.140.48.66 host 205.188.241.145 Cisco IOS Release 12.1(13)E13 95 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit deny deny deny deny deny deny deny udp host 64.140.48.66 host 205.188.241.145 eq isakmp esp host 216.181.252.166 host 205.188.241.145 ahp host 216.181.252.166 host 205.188.241.145 udp host 216.181.252.166 host 205.188.241.145 eq isakmp esp host 209.225.169.78 host 205.188.241.145 ahp host 209.225.169.78 host 205.188.241.145 udp host 209.225.169.78 host 205.188.241.145 eq isakmp esp 172.28.23.0 0.0.0.255 96.20.20.0 0.0.0.255 esp 172.28.20.0 0.0.0.255 96.20.22.0 0.0.0.255 ahp 172.28.23.0 0.0.0.255 96.20.20.0 0.0.0.255 ahp 172.28.20.0 0.0.0.255 96.20.22.0 0.0.0.255 udp 172.28.23.0 0.0.0.255 96.20.20.0 0.0.0.255 eq isakmp udp 172.28.20.0 0.0.0.255 96.20.22.0 0.0.0.255 eq isakmp esp host 206.132.61.7 host 205.188.246.249 ahp host 206.132.61.7 host 205.188.246.249 udp host 206.132.61.7 host 205.188.246.249 eq isakmp esp host 192.245.232.89 host 205.188.246.249 ahp host 192.245.232.89 host 205.188.246.249 udp host 192.245.232.89 host 205.188.246.249 eq isakmp esp host 193.189.238.230 host 205.188.246.249 ahp host 193.189.238.230 host 205.188.246.249 udp host 193.189.238.230 host 205.188.246.249 eq isakmp esp host 64.209.229.179 host 205.188.246.249 ahp host 64.209.229.179 host 205.188.246.249 udp host 64.209.229.179 host 205.188.246.249 eq isakmp esp host 209.251.207.100 host 205.188.246.249 ahp host 209.251.207.100 host 205.188.246.249 udp host 209.251.207.100 host 205.188.246.249 eq isakmp esp host 204.155.122.4 host 205.188.246.249 ahp host 204.155.122.4 host 205.188.246.249 udp host 204.155.122.4 host 205.188.246.249 eq isakmp esp host 64.236.245.211 host 205.188.246.249 ahp host 64.236.245.211 host 205.188.246.249 udp host 64.236.245.211 host 205.188.246.249 eq isakmp esp any host 205.188.241.145 log ahp any host 205.188.241.145 log udp any host 205.188.241.145 eq isakmp log esp any host 205.188.246.249 log ahp any host 205.188.246.249 log udp any host 205.188.246.249 eq isakmp log ip any any ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 40 deny 239.1.1.40 access-list 40 permit any access-list 44 deny 239.255.200.50 access-list 100 permit ip host 172.31.40.10 any access-list 101 permit ip any host 172.31.41.101 access-list 102 permit ip any 172.31.41.0 0.0.0.255 access-list 122 permit icmp any any echo-reply access-list 122 permit icmp any any echo access-list 122 permit icmp any any unreachable access-list 122 permit icmp any any time-exceeded access-list 122 permit tcp any any established access-list 122 permit udp any 61.172.243.0 0.0.0.127 gt 1023 access-list 122 permit ip 61.172.243.184 0.0.0.7 any access-list 122 permit ip 61.172.243.208 0.0.0.15 any access-list 122 permit ip 218.1.112.0 0.0.0.63 any access-list 122 permit ip 10.9.0.0 0.0.255.255 any Cisco IOS Release 12.1(13)E13 96 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list 122 permit ip 64.37.152.0 0.0.3.255 any access-list 122 permit ip 64.37.145.0 0.0.0.255 any access-list 122 permit ip host 64.37.148.135 any access-list 122 deny ip any 61.172.243.0 0.0.0.127 access-list 150 permit ip any host 224.0.0.10 access-list 151 permit icmp any any echo-reply access-list 151 permit icmp any any echo access-list 151 permit icmp any any unreachable access-list 151 permit icmp any any time-exceeded access-list 151 permit udp any eq domain host 61.172.243.214 eq 5353 access-list 151 permit tcp any any established access-list 151 permit ip 61.172.243.0 0.0.0.127 any access-list 151 permit ip 61.172.243.184 0.0.0.7 any access-list 151 permit ip 218.1.112.0 0.0.0.63 any access-list 151 permit ip 10.9.0.0 0.0.255.255 any access-list 151 permit ip 64.37.152.0 0.0.3.255 any access-list 151 permit ip 64.37.145.0 0.0.0.255 any access-list 151 permit ip host 64.37.148.135 any access-list 151 deny ip any 61.172.243.208 0.0.0.15 access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW snmp-server trap-source Loopback0 snmp-server enable traps hsrp snmp-server enable traps config snmp-server enable traps frame-relay snmp-server enable traps isdn call-information snmp-server enable traps isdn layer2 snmp-server host 172.18.112.10 cooler frame-relay isdn config snmp ! tftp-server slot0: tacacs-server host 172.18.112.184 tacacs-server key cisco alias exec ospf sh run | be router ospf alias exec eigrp sh run | be router eigrp ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180054 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-102#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 Cisco IOS Release 12.1(13)E13 97 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ROM: System Bootstrap, Version 12.1(11r)E1, RELEASE SOFTWARE (fc1) SH1-102 uptime is 2 weeks, 2 days, 19 hours, 13 minutes Time since SH1-102 switched to active is 4 days, 21 hours, 39 minutes System returned to ROM by power-on (SP by power-on) System restarted at 16:31:06 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD05070L5Y R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 16 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 36 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 32768K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-102#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Standby) 2 2 Catalyst 6000 supervisor 2 (Active) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 48 48 port 10/100 mb RJ45 5 0 Switching Fabric Module-136 (Standby) 6 0 Switching Fabric Module-136 (Active) 7 16 SFM-capable 16 port 1000mb GBIC 8 24 24 port 100FX Multi mode Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-SUP2-2GE WS-X6816-GBIC WS-X6348-RJ-45 WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6324-100FX-MM Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6477.53bc to 0001.6477.53bd 3.2 6.1(3) 2 0002.7ec1.104e to 0002.7ec1.104f 2.12 6.1(3) 3 0009.11f4.8f70 to 0009.11f4.8f7f 1.5 12.1(11r)E2 4 0001.9754.a660 to 0001.9754.a68f 1.1 5.4(2) 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0001.63d4.2a22 to 0001.63d4.2a31 4.0 6.1(3) 8 0008.a430.05e8 to 0008.a430.05ff 3.0 5.4(2) Mod --1 1 2 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Inline Power Module Mod --1 2 Online Diag Status ------------------Pass Pass Cisco IOS Release 12.1(13)E13 98 Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-PWR Serial No. ----------SAD0601007D SAD05060MPR SAL0707D16Z SAD04340DY4 SAD060102Z7 SAD060102YG SAD055204WM SAD055106XY Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD0552059E 3.0 Ok SAD055205RT 1.3 Ok SAD050601VG 1.6 Ok SAD05070L5Y 1.7 Ok SAL0707D1C2 2.5 Ok 1.0 Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass SH1-102# Return to SH1-102, page 81 SH1-103 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-103#show config Using 13447 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-103 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console enable secret 5 $1$eRg8$lPacqcMDTxV1JKJO.frYL/ ! clock timezone EST -5 clock summer-time EDT recurring udld aggressive udld message time 7 ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing ip cef load-sharing algorithm universal 00000006 mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check errdisable recovery cause udld errdisable recovery cause bpduguard errdisable recovery cause channel-misconfig errdisable recovery cause pagp-flap errdisable recovery cause dtp-flap errdisable recovery cause link-flap errdisable recovery interval 30 ! redundancy mode rpr-plus Cisco IOS Release 12.1(13)E13 99 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.103 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.104 255.255.255.255 ip pim sparse-mode ! interface Port-channel16 description sh1-99 po16 ip address 172.31.1.34 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel68 description sh1-107 po68 ip address 172.31.1.73 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel69 description sh1-108 po69 ip address 172.31.1.77 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel70 description sh1-109 po70 ip address 172.31.1.81 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel71 description sh1-110 po71 ip address 172.31.1.85 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel116 description sh1-100 po16 ip address 172.31.1.50 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! Cisco IOS Release 12.1(13)E13 100 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-99 g3/3 no ip address channel-group 16 mode on ! interface GigabitEthernet3/2 description sh1-100 g4/4 no ip address channel-group 116 mode on ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 description sh1-104 g8/7 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-99 g3/11 no ip address channel-group 16 mode on ! interface GigabitEthernet3/10 no ip address shutdown ! interface GigabitEthernet3/11 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 101 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 no ip address shutdown ! interface GigabitEthernet4/1 description sh1-99 g4/3 no ip address channel-group 16 mode on ! interface GigabitEthernet4/2 no ip address shutdown ! interface GigabitEthernet4/3 no ip address shutdown ! interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 no ip address shutdown ! interface GigabitEthernet4/6 no ip address shutdown ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet4/9 description sh1-99 g4/11 no ip address channel-group 16 mode on ! interface GigabitEthernet4/10 description sh1-100 g3/12 no ip address channel-group 116 mode on ! interface GigabitEthernet4/11 Cisco IOS Release 12.1(13)E13 102 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet4/12 no ip address shutdown ! interface GigabitEthernet4/13 no ip address shutdown ! interface GigabitEthernet4/14 no ip address shutdown ! interface GigabitEthernet4/15 no ip address shutdown ! interface GigabitEthernet4/16 no ip address shutdown ! interface GigabitEthernet7/1 no ip address shutdown ! interface GigabitEthernet7/2 no ip address shutdown ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 description sh1-107 g3/1 no ip address channel-group 68 mode on ! interface GigabitEthernet7/8 description sh1-107 g3/2 no ip address channel-group 68 mode on ! interface GigabitEthernet7/9 description sh1-107 g3/3 no ip address channel-group 68 mode on ! interface GigabitEthernet7/10 description sh1-107 g3/4 Cisco IOS Release 12.1(13)E13 103 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address channel-group 68 mode on ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 description sh1-110 g3/1 no ip address channel-group 71 mode desirable ! interface GigabitEthernet7/14 description sh1-110 g4/1 no ip address channel-group 71 mode desirable ! interface GigabitEthernet7/15 description sh1-109 g3/1 no ip address logging event link-status speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet7/16 description sh1-109 g4/1 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet8/1 no ip address shutdown ! interface GigabitEthernet8/2 no ip address shutdown ! interface GigabitEthernet8/3 no ip address shutdown ! interface GigabitEthernet8/4 no ip address shutdown ! interface GigabitEthernet8/5 no ip address shutdown ! interface GigabitEthernet8/6 no ip address shutdown ! interface GigabitEthernet8/7 description sh1-108 g3/1 no ip address channel-group 69 mode on ! interface GigabitEthernet8/8 Cisco IOS Release 12.1(13)E13 104 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description sh1-108 g3/2 no ip address channel-group 69 mode on ! interface GigabitEthernet8/9 description sh1-108 g3/3 no ip address channel-group 69 mode on ! interface GigabitEthernet8/10 description sh1-108 g3/4 no ip address channel-group 69 mode on ! interface GigabitEthernet8/11 no ip address shutdown ! interface GigabitEthernet8/12 no ip address shutdown ! interface GigabitEthernet8/13 description sh1-110 g7/1 no ip address channel-group 71 mode desirable ! interface GigabitEthernet8/14 description sh1-110 g8/1 no ip address channel-group 71 mode desirable ! interface GigabitEthernet8/15 description sh1-109 g7/1 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet8/16 description sh1-109 g8/1 no ip address speed nonegotiate channel-group 70 mode on ! interface FastEthernet9/1 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/2 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/3 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/4 no ip address Cisco IOS Release 12.1(13)E13 105 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown speed 100 duplex full ! interface FastEthernet9/5 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/6 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/7 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/8 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/9 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/10 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/11 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/12 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/13 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/14 no ip address shutdown speed 100 duplex full ! Cisco IOS Release 12.1(13)E13 106 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/15 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/16 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/17 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/18 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/19 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/20 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/21 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/22 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/23 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/24 description flashnet ip address 10.194.17.103 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown speed 100 Cisco IOS Release 12.1(13)E13 107 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology duplex full ! interface FastEthernet9/26 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/27 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/28 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/29 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/30 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/31 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/32 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/33 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/34 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/35 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/36 no ip address Cisco IOS Release 12.1(13)E13 108 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown speed 100 duplex full ! interface FastEthernet9/37 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/38 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/39 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/40 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/41 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/42 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/43 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/44 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/45 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/46 no ip address shutdown speed 100 duplex full ! Cisco IOS Release 12.1(13)E13 109 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/47 no ip address shutdown speed 100 duplex full ! interface FastEthernet9/48 no ip address shutdown speed 100 ! interface Vlan1 no ip address shutdown ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Port-channel16 no passive-interface Port-channel68 no passive-interface Port-channel69 no passive-interface Port-channel70 no passive-interface Port-channel71 no passive-interface Port-channel116 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.32 0.0.0.3 area 1 network 172.31.1.48 0.0.0.3 area 1 network 172.31.1.64 0.0.0.15 area 1 network 172.31.1.80 0.0.0.7 area 1 network 172.31.1.120 0.0.0.3 area 1 network 172.31.2.32 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 maximum-paths 6 ! ip classless ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.104 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 15 permit 239.255.127.0 0.0.0.255 access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW ! rmon event 1 log trap public description "Rising EventIndex for avgBusy1~%~" owner admin rmon event 2 log trap public description "Falling EventIndex for avgBusy1" owner admin rmon alarm 1 lsystem.57.0 60 absolute rising-threshold 90 1 falling-threshold 70 2 owner admin alias exec ip sh ip int brief | be Port Cisco IOS Release 12.1(13)E13 110 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology alias exec eigrp show run | be router eigrp alias exec mr sh ip mroute 239.255.127.100 alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 timeout login response 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17179912 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-103#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-103 uptime is 2 weeks, 2 days, 19 hours, 12 minutes Time since SH1-103 switched to active is 2 weeks, 2 days, 19 hours, 11 minutes System returned to ROM by power-on (SP by power-on) System restarted at 16:32:18 EST Mon Mar 1 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205T9 R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 1 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 68 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-103#show module Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------ ----------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 SAD060100BX Cisco IOS Release 12.1(13)E13 111 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 2 3 4 5 6 7 8 9 2 16 16 0 0 16 16 48 Catalyst 6000 supervisor 2 (Standby) Pure SFM-mode 16 port 1000mb GBIC Pure SFM-mode 16 port 1000mb GBIC Switching Fabric Module-136 (Standby) Switching Fabric Module-136 (Active) SFM-capable 16 port 1000mb GBIC SFM-capable 16 port 1000mb GBIC SFM-capable 48-port 10/100 Mbps RJ45 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6516-GBIC WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.b422 to 0001.6415.b423 3.2 6.1(3) 2 0001.c9da.e1dc to 0001.c9da.e1dd 3.2 6.1(3) 3 0001.63d3.b7aa to 0001.63d3.b7b9 1.2 12.1(5r)E1 4 0001.63d4.4ca2 to 0001.63d4.4cb1 1.2 12.1(5r)E1 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0001.63d4.2a62 to 0001.63d4.2a71 4.0 6.1(3) 8 0001.63d4.3e42 to 0001.63d4.3e51 4.0 6.1(3) 9 0002.7ee3.7d84 to 0002.7ee3.7db3 4.3 6.3(1) Mod --1 1 2 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Return to SH1-103, page 99 SH1-104 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-104#show config Using 11713 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! Cisco IOS Release 12.1(13)E13 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD05520529 3.0 Ok SAD055205T9 1.3 Ok SAD0552053W 3.0 Ok SAL06090LMV 2.4 Ok SAD055102U3 2.0 Ok SAD060100EV 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass 9 Pass SH1-103# 112 SAD0601004E SAD055101PD SAD055101NL SAD055204C8 SAD060102UV SAD055204MG SAD055204NZ SAD061900DR Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology hostname SH1-104 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console enable secret 5 $1$eAFZ$WrY7KELPyBFWCGR/ZDAKk0 ! clock timezone EST -5 clock summer-time EDT recurring udld enable udld message time 7 ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check errdisable recovery interval 30 ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.104 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.104 255.255.255.255 ip pim sparse-mode ! interface Port-channel17 description sh1-99 po17 ip address 172.31.1.38 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel68 description sh1-107 po168 ip address 172.31.1.101 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel69 description sh1-108 po169 ip address 172.31.1.105 255.255.255.252 ip access-group 181 in Cisco IOS Release 12.1(13)E13 113 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip access-group 181 out ip pim sparse-mode logging event link-status logging event bundle-status ! interface Port-channel70 description sh1-109 po170 ip address 172.31.1.109 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel71 description sh1-110 po171 ip address 172.31.1.113 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel117 description sh1-100 po17 ip address 172.31.1.54 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-100 g3/3 no ip address channel-group 117 mode on ! interface GigabitEthernet3/2 no ip address shutdown ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address Cisco IOS Release 12.1(13)E13 114 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description sh1-100 g3/11 no ip address channel-group 117 mode on ! interface GigabitEthernet3/10 description sh1-99 g3/12 no ip address channel-group 17 mode auto ! interface GigabitEthernet3/11 no ip address shutdown ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 description sh1-110 g3/3 no ip address channel-group 71 mode on ! interface GigabitEthernet3/14 description sh1-110 g3/4 no ip address channel-group 71 mode on ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 no ip address shutdown ! interface GigabitEthernet4/1 description sh1-100 g4/3 no ip address channel-group 117 mode on ! interface GigabitEthernet4/2 description sh1-99 g4/4 no ip address channel-group 17 mode auto ! interface GigabitEthernet4/3 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 115 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 no ip address shutdown ! interface GigabitEthernet4/6 no ip address shutdown ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet4/9 description sh1-100 g4/11 no ip address channel-group 117 mode on ! interface GigabitEthernet4/10 no ip address shutdown ! interface GigabitEthernet4/11 no ip address shutdown ! interface GigabitEthernet4/12 no ip address shutdown ! interface GigabitEthernet4/13 no ip address shutdown ! interface GigabitEthernet4/14 no ip address shutdown ! interface GigabitEthernet4/15 description sh1-109 g3/5 no ip address speed nonegotiate udld port aggressive channel-group 70 mode on ! interface GigabitEthernet4/16 description sh1-109 g3/6 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet7/1 no ip address shutdown ! interface GigabitEthernet7/2 no ip address Cisco IOS Release 12.1(13)E13 116 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet7/3 no ip address shutdown ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 description sh1-107 g3/5 no ip address channel-group 68 mode desirable ! interface GigabitEthernet7/8 description sh1-107 g3/6 no ip address channel-group 68 mode desirable ! interface GigabitEthernet7/9 description sh1-107 g4/5 no ip address channel-group 68 mode desirable ! interface GigabitEthernet7/10 description sh1-107 g4/6 no ip address channel-group 68 mode desirable ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 no ip address shutdown ! interface GigabitEthernet8/1 no ip address Cisco IOS Release 12.1(13)E13 117 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet8/2 no ip address shutdown ! interface GigabitEthernet8/3 no ip address shutdown ! interface GigabitEthernet8/4 no ip address shutdown ! interface GigabitEthernet8/5 no ip address shutdown ! interface GigabitEthernet8/6 no ip address shutdown ! interface GigabitEthernet8/7 description sh1-108 g3/5 no ip address logging event link-status logging event bundle-status channel-group 69 mode on ! interface GigabitEthernet8/8 description sh1-108 g3/6 no ip address logging event link-status logging event bundle-status channel-group 69 mode on ! interface GigabitEthernet8/9 description sh1-108 g4/5 no ip address logging event link-status logging event bundle-status channel-group 69 mode on ! interface GigabitEthernet8/10 description sh1-108 g4/6 no ip address logging event link-status logging event bundle-status channel-group 69 mode on ! interface GigabitEthernet8/11 no ip address shutdown ! interface GigabitEthernet8/12 no ip address shutdown ! interface GigabitEthernet8/13 description sh1-110 g4/3 no ip address channel-group 71 mode on ! interface GigabitEthernet8/14 Cisco IOS Release 12.1(13)E13 118 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description sh1-110 g4/4 no ip address channel-group 71 mode on ! interface GigabitEthernet8/15 description sh1-109 g4/5 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet8/16 description sh1-109 g4/6 no ip address speed nonegotiate channel-group 70 mode on ! interface FastEthernet9/1 no ip address shutdown ! interface FastEthernet9/2 no ip address shutdown ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 119 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.104 255.255.255.0 duplex full ! interface Vlan1 no ip address shutdown ! interface Vlan11 no ip address shutdown ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Port-channel17 no passive-interface Port-channel68 no passive-interface Port-channel69 Cisco IOS Release 12.1(13)E13 120 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no passive-interface Port-channel70 no passive-interface Port-channel71 no passive-interface Port-channel117 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.36 0.0.0.3 area 1 network 172.31.1.52 0.0.0.3 area 1 network 172.31.1.92 0.0.0.3 area 1 network 172.31.1.96 0.0.0.15 area 1 network 172.31.1.112 0.0.0.3 area 1 network 172.31.2.36 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 maximum-paths 6 ! ip classless ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 130.1.1.1 255.255.255.255 Port-channel17 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.103 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 10 deny 172.31.1.102 access-list 20 deny 172.31.1.110 access-list 55 permit 172.31.1.106 access-list 55 deny any access-list 102 permit ip host 172.31.30.132 host 239.100.3.1 access-list 130 permit ip host 172.31.21.101 host 239.255.127.100 access-list 130 permit ip host 172.31.21.101 host 239.255.127.101 access-list 131 permit ip any host 172.31.1.114 access-list 150 permit icmp host 172.18.177.132 host 10.194.17.104 log access-list 181 permit ip any any snmp-server engineID local 543210000000000000000000 snmp-server engineID remote 172.31.1.106 udp-port 161 123450000000000000000000 snmp-server engineID remote 172.31.1.106 123450000000000000000000 snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.31.1.106 cisco snmp-server host 172.18.177.135 public snmp-server host 172.31.1.106 public ! tftp-server slot0: tftp-server slot0:slot0:sh1-99.091802.cfg tacacs-server host 161.44.11.123 alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 Cisco IOS Release 12.1(13)E13 121 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi line vty 5 10 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17179877 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-104#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-104 uptime is 2 days, 16 hours, 55 minutes Time since SH1-104 switched to active is 1 day, 17 hours, 10 minutes System returned to ROM by power-on (SP by power-on) System restarted at 18:49:10 EST Mon Mar 15 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205MJ R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 2 Virtual Ethernet/IEEE 802.3 interface(s) 24 FastEthernet/IEEE 802.3 interface(s) 68 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 458752K/65536K bytes of memory. Configuration register is 0x2102 SH1-104#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Standby) 2 2 Catalyst 6000 supervisor 2 (Active) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 16 SFM-capable 16 port 1000mb GBIC Cisco IOS Release 12.1(13)E13 122 Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6516-GBIC Serial No. ----------SAD0601008Z SAD060100DD SAD055101KK SAD055204TJ Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 5 6 7 8 9 0 0 16 16 24 Switching Fabric Module-136 (Standby) Switching Fabric Module-136 (Active) SFM-capable 16 port 1000mb GBIC SFM-capable 16 port 1000mb GBIC 24 port 100FX Multi mode WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6516-GBIC WS-X6324-100FX-MM Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.70c0 to 0002.7e38.70c1 3.2 6.1(3) 2 0001.c9da.e1bc to 0001.c9da.e1bd 3.2 6.1(3) 3 0001.63d3.b74a to 0001.63d3.b759 1.2 12.1(5r)E1 4 0002.7ee1.4b30 to 0002.7ee1.4b3f 4.0 6.1(3) 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0001.63d4.2ad2 to 0001.63d4.2ae1 4.0 6.1(3) 8 0002.7ee1.4ef0 to 0002.7ee1.4eff 4.0 6.1(3) 9 0003.3287.6852 to 0003.3287.6869 3.0 5.4(2) Mod --1 1 2 2 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC SAD0601031V SAD0552046C SAD055204PB SAD055204XJ SAD055106Y3 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD0552050T 3.0 Ok SAD055206A3 1.3 Ok SAD0552053D 3.0 Ok SAD055205MJ 1.3 Ok SAD055102NP 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass 9 Pass SH1-104# Return to SH1-104, page 112 SH1-105 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-105#show config Using 14265 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-105 ! boot system flash slot0: boot bootldr bootflash: Cisco IOS Release 12.1(13)E13 123 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology enable secret 5 $1$/tZu$AaxbpAkQCPoGHrLVZ9L9.. ! clock timezone EST -5 clock summer-time EDT recurring ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls ip multicast non-rpf netflow mls flow ip destination-source mls flow ipx destination ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync bootvar auto-sync standard ! power redundancy-mode combined ! ! ! interface Loopback0 ip address 172.31.4.105 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.106 255.255.255.255 ip pim sparse-mode ! interface Port-channel20 description dista-2 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel66 description sh1-99 po66 ip address 172.31.1.66 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode logging event link-status ! interface Port-channel166 description sh1-100 po66 ip address 172.31.1.94 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 Cisco IOS Release 12.1(13)E13 124 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address ! interface GigabitEthernet3/1 description sh1-99 g9/1 no ip address no ip unreachables channel-group 66 mode on ! interface GigabitEthernet3/2 description Ix-1/1 ip address 172.31.205.105 255.255.255.0 secondary ip address 172.31.1.57 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 description dista-2 4/4 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode on ! interface GigabitEthernet3/8 description dista-2 4/6 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode on ! interface GigabitEthernet4/1 description sh1-99 g9/2 no ip address no ip unreachables channel-group 66 mode on ! interface GigabitEthernet4/2 no ip address shutdown Cisco IOS Release 12.1(13)E13 125 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet4/3 no ip address shutdown ! interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 no ip address shutdown ! interface GigabitEthernet4/6 no ip address shutdown ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet5/1 description sh1-100 9/1 no ip address no ip unreachables channel-group 166 mode on ! interface GigabitEthernet5/2 no ip address shutdown ! interface GigabitEthernet5/3 no ip address shutdown ! interface GigabitEthernet5/4 no ip address shutdown ! interface GigabitEthernet5/5 no ip address shutdown ! interface GigabitEthernet5/6 no ip address shutdown ! interface GigabitEthernet5/7 no ip address shutdown ! interface GigabitEthernet5/8 no ip address shutdown ! interface GigabitEthernet6/1 description sh1-100 9/2 no ip address no ip unreachables channel-group 166 mode on Cisco IOS Release 12.1(13)E13 126 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet6/2 no ip address shutdown ! interface GigabitEthernet6/3 no ip address shutdown ! interface GigabitEthernet6/4 no ip address shutdown ! interface GigabitEthernet6/5 no ip address shutdown ! interface GigabitEthernet6/6 no ip address shutdown ! interface GigabitEthernet6/7 no ip address shutdown ! interface GigabitEthernet6/8 no ip address shutdown ! interface FastEthernet7/1 description flashnet ip address 10.194.17.105 255.255.255.0 shutdown duplex full ! interface FastEthernet7/2 no ip address shutdown ! interface FastEthernet7/3 no ip address shutdown ! interface FastEthernet7/4 no ip address shutdown ! interface FastEthernet7/5 no ip address shutdown ! interface FastEthernet7/6 no ip address shutdown ! interface FastEthernet7/7 no ip address shutdown ! interface FastEthernet7/8 no ip address shutdown ! interface FastEthernet7/9 Cisco IOS Release 12.1(13)E13 127 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet7/10 no ip address shutdown ! interface FastEthernet7/11 no ip address shutdown ! interface FastEthernet7/12 no ip address shutdown ! interface FastEthernet7/13 no ip address shutdown ! interface FastEthernet7/14 no ip address shutdown ! interface FastEthernet7/15 no ip address shutdown ! interface FastEthernet7/16 no ip address shutdown ! interface FastEthernet7/17 no ip address shutdown ! interface FastEthernet7/18 no ip address shutdown ! interface FastEthernet7/19 no ip address shutdown ! interface FastEthernet7/20 no ip address shutdown ! interface FastEthernet7/21 no ip address shutdown ! interface FastEthernet7/22 no ip address shutdown ! interface FastEthernet7/23 no ip address shutdown ! interface FastEthernet7/24 no ip address shutdown ! interface FastEthernet9/1 Cisco IOS Release 12.1(13)E13 128 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description IXIA 13/4 no ip address switchport switchport access vlan 201 switchport mode access ! interface FastEthernet9/2 no ip address shutdown ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 description Ixia 3/1 - ACL testing ip address 1.1.1.1 255.255.255.252 ! interface FastEthernet9/14 description Ixia 3/2 - ACL testing ip address 1.1.1.5 255.255.255.252 shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 Cisco IOS Release 12.1(13)E13 129 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 ip address 10.194.17.105 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 130 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 131 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/48 no ip address ! interface Vlan1 no ip address shutdown ! interface Vlan40 ip address 172.31.100.66 255.255.255.0 ip helper-address 172.31.4.98 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 1 ip 172.31.100.1 standby 1 priority 110 standby 1 preempt standby 2 ip 172.31.100.254 standby 2 priority 90 standby 2 preempt ! interface Vlan41 ip address 172.31.101.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.101.1 standby 2 priority 110 standby 2 preempt standby 3 ip 172.31.101.254 standby 3 priority 90 standby 3 preempt ! interface Vlan42 ip address 172.31.102.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.102.1 standby 3 priority 110 standby 3 preempt standby 4 ip 172.31.102.254 standby 4 priority 90 standby 4 preempt ! interface Vlan43 ip address 172.31.103.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.103.1 standby 4 priority 110 standby 4 preempt standby 5 ip 172.31.103.254 standby 5 priority 90 standby 5 preempt ! Cisco IOS Release 12.1(13)E13 132 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface Vlan44 ip address 172.31.104.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.104.1 standby 5 priority 110 standby 5 preempt standby 6 ip 172.31.104.254 standby 6 priority 90 standby 6 preempt ! interface Vlan45 ip address 172.31.105.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.105.1 standby 6 priority 110 standby 6 preempt standby 7 ip 172.31.105.254 standby 7 priority 90 standby 7 preempt ! interface Vlan46 ip address 172.31.106.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.106.1 standby 7 priority 110 standby 7 preempt standby 8 ip 172.31.106.254 standby 8 priority 90 standby 8 preempt ! interface Vlan47 ip address 172.31.107.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.107.1 standby 8 priority 110 standby 8 preempt standby 9 ip 172.31.107.254 standby 9 priority 90 standby 9 preempt ! interface Vlan48 ip address 172.31.108.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 9 ip 172.31.108.1 Cisco IOS Release 12.1(13)E13 133 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby standby standby standby standby 9 priority 110 9 preempt 10 ip 172.31.108.254 10 priority 90 10 preempt ! interface Vlan49 ip address 172.31.109.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 10 ip 172.31.109.1 standby 10 priority 110 standby 10 preempt standby 11 ip 172.31.109.254 standby 11 priority 90 standby 11 preempt ! interface Vlan50 ip address 172.31.110.66 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.110.1 standby 11 priority 110 standby 11 preempt standby 12 ip 172.31.110.254 standby 12 priority 90 standby 12 preempt ! interface Vlan170 ip address 172.31.170.105 255.255.255.0 no ip redirects standby ip 172.31.170.1 standby priority 90 ! interface Vlan201 ip address 172.31.200.21 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode ! interface Vlan600 no ip address no ip redirects ip pim query-interval 3 ip pim sparse-mode ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan40 no passive-interface Vlan170 no passive-interface GigabitEthernet3/2 no passive-interface Port-channel66 no passive-interface Port-channel166 network 172.31.1.56 0.0.0.3 area 2 network 172.31.1.64 0.0.0.3 area 2 Cisco IOS Release 12.1(13)E13 134 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology network 172.31.1.92 0.0.0.3 area 2 network 172.31.4.0 0.0.0.255 area 2 network 172.31.60.0 0.0.0.255 area 2 network 172.31.96.0 0.0.31.255 area 2 network 172.31.170.0 0.0.0.255 area 2 network 172.31.0.0 0.0.255.255 area 2 maximum-paths 6 ! ip classless ip route 0.0.0.0 0.0.0.0 1.1.1.6 ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.0 255.255.255.0 10.194.17.254 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.106 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.106 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW ! alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 privilege level 15 line vty 0 4 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi line vty 5 10 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180067 ntp update-calendar ntp server 172.18.177.132 ! monitor session 1 source interface Fa9/1 rx monitor session 1 destination interface Fa9/48 Cisco IOS Release 12.1(13)E13 135 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology end SH1-105#show version Cisco Internetwork Operating System Software IOS (tm) c6sup1_rp Software (c6sup1_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Sun 29-Feb-04 22:37 by Image text-base: 0x60020BC8, data-base: 0x618D8000 ROM: System Bootstrap, Version 12.0(3)XE, RELEASE SOFTWARE BOOTLDR: MSFC Software (C6MSFC-BOOT-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 SH1-105 uptime is 1 week, 2 days, 21 hours, 30 minutes Time since SH1-105 switched to active is 1 week, 2 days, 21 hours, 29 minutes System returned to ROM by power-on (SP by reload) System restarted at 14:13:16 EST Mon Mar 8 2004 System image file is "slot0:c6sup11-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R5000) processor with 114688K/16384K bytes of memory. Processor board ID SAD060203N1 R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 15 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 36 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 4096K bytes of packet SRAM memory. 16384K bytes of Flash internal SIMM (Sector size 256K). Standby is up Standby has 114688K/16384K bytes of memory. Configuration register is 0x2102 SH1-105#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Cat 6k sup 1 Enhanced QoS (Active) 2 2 Cat 6k sup 1 Enhanced QoS (Standby) 3 8 8 port 1000mb GBIC Enhanced QoS 4 8 8 port 1000mb GBIC Enhanced QoS 5 8 8 port 1000mb GBIC Enhanced QoS 6 8 8 port 1000mb GBIC Enhanced QoS 7 24 24 port 100FX Multi mode 9 48 48 port 10/100 mb RJ45 Model -----------------WS-X6K-SUP1A-2GE WS-X6K-SUP1A-2GE WS-X6408A-GBIC WS-X6408A-GBIC WS-X6408A-GBIC WS-X6408A-GBIC WS-X6324-100FX-MM WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.fcbd.b49c to 0002.fcbd.b49d 7.1 5.4(2) 2 0030.b632.6052 to 0030.b632.6053 1.0 5.1(1)CSX 3 0005.7408.6308 to 0005.7408.630f 2.0 5.4(2) 4 0005.740d.5788 to 0005.740d.578f 2.0 5.4(2) 5 0005.7408.6428 to 0005.7408.642f 2.0 5.4(2) 6 0005.7408.6420 to 0005.7408.6427 2.0 5.4(2) 7 0008.a430.08b8 to 0008.a430.08cf 3.0 5.4(2) 9 0005.7463.cff0 to 0005.7463.d01f 5.0 5.4(2) Mod Sub-Module Cisco IOS Release 12.1(13)E13 136 Model Serial Serial No. ----------SAD060203GM SAD03396042 SAL0545E7GX SAL0551FFML SAL0545E6G3 SAL0545E7JA SAD055106XG SAL0544DYR3 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Hw Status ------Ok Ok Ok Ok Ok Ok Ok Ok Status Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology --- --------------------------1 Policy Feature Card 1 MSFC Cat6k daughterboard 2 Policy Feature Card 2 MSFC Cat6k daughterboard 9 Inline Power Module SH1-105# --------------WS-F6K-PFC WS-F6K-MSFC WS-F6K-PFC WS-F6K-MSFC WS-F6K-PWR --------------- ------- ------SAD060100NR 1.1 Ok SAD060203N1 2.1 Ok SAD03397596 1.0 Ok SAD03400578 1.2 Ok 1.0 Ok Return to SH1-105, page 123 SH1-106 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-106#show config Using 15045 out of 391160 bytes ! ! Last configuration change at 17:41:34 EST Tue Mar 16 2004 by baggins ! NVRAM config last updated at 17:41:47 EST Tue Mar 16 2004 by baggins ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-106 ! boot system flash slot0:c6sup11-jk2sv-mz.v121_13_e_throttle.040315 boot bootldr bootflash:c6msfc-boot-mz.v121_13_e_throttle.040229 logging buffered 1000000 debugging no logging console aaa new-model aaa authentication login default enable aaa authentication login sh1-testcase group tacacs+ enable enable secret 5 $1$3VD5$Q7urh.4djlu9tAnoCipsh0 enable password ww ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username vnc ip ftp password rtpsqelab no ip domain-lookup ip domain-name cisco.com ! ip dhcp pool dhcp-test-pool network 172.31.105.0 255.255.255.0 default-router 172.31.105.66 172.31.105.67 172.31.105.1 172.31.105.254 lease 0 1 ! ip multicast-routing ip ssh time-out 120 ip ssh authentication-retries 3 mls aclmerge algorithm odm mls aclmerge odm optimizations Cisco IOS Release 12.1(13)E13 137 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology mls ip multicast consistency-check mls ip multicast non-rpf netflow mls flow ip destination-source mls flow ipx destination ! ! ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync bootvar auto-sync standard ! ! vlan 1 tb-vlan1 1002 tb-vlan2 1003 ! vlan 40-50,170,200 ! vlan 1002 tb-vlan1 1 tb-vlan2 1003 ! vlan 1003 tb-vlan1 1 tb-vlan2 1002 parent 1005 backupcrf enable ! vlan 1004 bridge 1 stp type ibm ! vlan 1005 bridge 1 ! ! interface Loopback0 ip address 172.31.4.106 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.106 255.255.255.255 ip pim sparse-mode ! interface Port-channel20 description dista-2 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel67 description sh1-99 po67 ip address 172.31.1.70 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode logging event link-status ! interface Port-channel167 description sh1-100 po67 Cisco IOS Release 12.1(13)E13 138 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip address 172.31.1.98 255.255.255.252 ip access-group 182 in ip access-group 182 out no ip unreachables ip pim sparse-mode logging event link-status load-interval 30 ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-99 g9/5 no ip address no ip unreachables ip pim sparse-mode channel-group 67 mode on ! interface GigabitEthernet3/2 no ip address shutdown ! interface GigabitEthernet3/3 no ip address ip pim sparse-mode shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 description dista-2 4/9 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode on ! interface GigabitEthernet3/8 description dista-2 4/10 no ip address switchport switchport trunk encapsulation dot1q Cisco IOS Release 12.1(13)E13 139 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology channel-group 20 mode on ! interface GigabitEthernet4/1 description sh1-99 g9/6 no ip address no ip unreachables ip pim sparse-mode channel-group 67 mode on ! interface GigabitEthernet4/2 no ip address shutdown ! interface GigabitEthernet4/3 no ip address shutdown ! interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 no ip address shutdown ! interface GigabitEthernet4/6 no ip address shutdown ! interface GigabitEthernet4/7 no ip address shutdown ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet5/1 description sh1-100 g9/5 no ip address ip access-group 182 in ip access-group 182 out channel-group 167 mode on ! interface GigabitEthernet5/2 no ip address shutdown ! interface GigabitEthernet5/3 no ip address shutdown ! interface GigabitEthernet5/4 no ip address shutdown ! interface GigabitEthernet5/5 no ip address shutdown ! interface GigabitEthernet5/6 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 140 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet5/7 no ip address shutdown ! interface GigabitEthernet5/8 no ip address shutdown ! interface GigabitEthernet6/1 description sh1-100 g9/6 no ip address ip access-group 182 in ip access-group 182 out channel-group 167 mode on ! interface GigabitEthernet6/2 no ip address shutdown ! interface GigabitEthernet6/3 no ip address shutdown ! interface GigabitEthernet6/4 no ip address shutdown ! interface GigabitEthernet6/5 no ip address shutdown ! interface GigabitEthernet6/6 no ip address shutdown ! interface GigabitEthernet6/7 no ip address shutdown ! interface GigabitEthernet6/8 no ip address shutdown ! interface FastEthernet7/1 description flashnet ip address 10.194.17.106 255.255.255.0 shutdown duplex full ! interface FastEthernet7/2 no ip address shutdown ! interface FastEthernet7/3 no ip address shutdown ! interface FastEthernet7/4 no ip address shutdown ! interface FastEthernet7/5 no ip address shutdown Cisco IOS Release 12.1(13)E13 141 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet7/6 no ip address shutdown ! interface FastEthernet7/7 no ip address shutdown ! interface FastEthernet7/8 no ip address shutdown ! interface FastEthernet7/9 no ip address shutdown ! interface FastEthernet7/10 no ip address shutdown ! interface FastEthernet7/11 no ip address shutdown ! interface FastEthernet7/12 no ip address shutdown ! interface FastEthernet7/13 no ip address shutdown ! interface FastEthernet7/14 no ip address shutdown ! interface FastEthernet7/15 no ip address shutdown ! interface FastEthernet7/16 no ip address shutdown ! interface FastEthernet7/17 no ip address shutdown ! interface FastEthernet7/18 no ip address shutdown ! interface FastEthernet7/19 no ip address shutdown ! interface FastEthernet7/20 no ip address shutdown ! interface FastEthernet7/21 no ip address shutdown Cisco IOS Release 12.1(13)E13 142 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet7/22 no ip address shutdown ! interface FastEthernet7/23 no ip address shutdown ! interface FastEthernet7/24 no ip address shutdown ! interface FastEthernet9/1 description IXIA 16/2 ip address 1.1.1.1 255.255.255.252 ! interface FastEthernet9/2 description IXIA 13/3 ip address 2.2.2.1 255.255.255.252 ! interface FastEthernet9/3 no ip address ! interface FastEthernet9/4 no ip address ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address Cisco IOS Release 12.1(13)E13 143 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.106 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 Cisco IOS Release 12.1(13)E13 144 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 Cisco IOS Release 12.1(13)E13 145 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address ! interface Vlan4 no ip address ! interface Vlan40 ip address 172.31.100.67 255.255.255.0 ip helper-address 172.31.4.98 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 1 ip 172.31.100.1 standby 1 priority 90 standby 1 preempt standby 2 ip 172.31.100.254 standby 2 priority 110 standby 2 preempt ! interface Vlan41 ip address 172.31.101.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.101.1 standby 2 priority 90 standby 2 preempt standby 3 ip 172.31.101.254 standby 3 priority 110 standby 3 preempt ! interface Vlan42 ip address 172.31.102.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.102.1 standby 3 priority 90 standby 3 preempt standby 4 ip 172.31.102.254 standby 4 priority 110 standby 4 preempt ! interface Vlan43 ip address 172.31.103.67 255.255.255.0 no ip redirects ip directed-broadcast Cisco IOS Release 12.1(13)E13 146 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.103.1 standby 4 priority 90 standby 4 preempt standby 5 ip 172.31.103.254 standby 5 priority 110 standby 5 preempt ! interface Vlan44 ip address 172.31.104.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.104.1 standby 5 priority 90 standby 5 preempt standby 6 ip 172.31.104.254 standby 6 priority 110 standby 6 preempt ! interface Vlan45 ip address 172.31.105.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.105.1 standby 6 priority 90 standby 6 preempt standby 7 ip 172.31.105.254 standby 7 priority 110 standby 7 preempt ! interface Vlan46 ip address 172.31.106.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.106.1 standby 7 priority 90 standby 7 preempt standby 8 ip 172.31.106.254 standby 8 priority 110 standby 8 preempt ! interface Vlan47 ip address 172.31.107.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.107.1 standby 8 priority 90 standby 8 preempt standby 9 ip 172.31.107.254 standby 9 priority 110 Cisco IOS Release 12.1(13)E13 147 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby 9 preempt ! interface Vlan48 ip address 172.31.108.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 9 ip 172.31.108.1 standby 9 priority 90 standby 9 preempt standby 10 ip 172.31.108.254 standby 10 priority 110 standby 10 preempt ! interface Vlan49 ip address 172.31.109.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 10 ip 172.31.109.1 standby 10 priority 90 standby 10 preempt standby 11 ip 172.31.109.254 standby 11 priority 110 standby 11 preempt ! interface Vlan50 ip address 172.31.110.67 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.110.1 standby 11 priority 90 standby 11 preempt standby 12 ip 172.31.110.254 standby 12 priority 110 standby 12 preempt ! interface Vlan170 description Pagent OSPF VLAN ip address 172.31.170.106 255.255.255.0 no ip redirects standby ip 172.31.170.1 standby priority 110 standby preempt ! interface Vlan200 ip address 172.31.200.17 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode ! interface Vlan600 description IPTV server no ip address no ip redirects ip pim query-interval 3 Cisco IOS Release 12.1(13)E13 148 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim sparse-mode ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan40 no passive-interface Vlan170 no passive-interface FastEthernet9/2 no passive-interface Port-channel67 no passive-interface Port-channel167 network 172.31.1.68 0.0.0.3 area 2 network 172.31.1.96 0.0.0.3 area 2 network 172.31.4.0 0.0.0.255 area 2 network 172.31.60.0 0.0.0.255 area 2 network 172.31.96.0 0.0.31.255 area 2 network 172.31.170.0 0.0.0.255 area 2 network 172.31.0.0 0.0.255.255 area 2 maximum-paths 8 ! ip classless ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.106 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.105 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! logging trap debugging access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 181 permit ip any any access-list 182 permit ip any any snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.18.177.135 public snmp-server host 172.18.177.181 public ! tacacs-server host 172.18.177.132 alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 privilege level 15 line vty 0 4 exec-timeout 0 0 login authentication sh1-testcase length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh line vty 5 10 exec-timeout 0 0 login authentication sh1-testcase length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh ! Cisco IOS Release 12.1(13)E13 149 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology exception protocol ftp exception dump 172.18.177.132 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180103 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer ! monitor session 1 source interface Po20 rx monitor session 1 destination interface Fa9/1 end SH1-106#show version Cisco Internetwork Operating System Software IOS (tm) c6sup1_rp Software (c6sup1_rp-JK2SV-M), Version 12.1(nightly13e.E040315) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 15-Mar-04 21:22 by Image text-base: 0x60020BC8, data-base: 0x61A7E000 ROM: System Bootstrap, Version 12.0(3)XE, RELEASE SOFTWARE BOOTLDR: MSFC Software (C6MSFC-BOOT-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 SH1-106 uptime is 1 day, 18 hours, 31 minutes Time since SH1-106 switched to active is 1 day, 18 hours, 30 minutes System returned to ROM by power-on (SP by power-on) System restarted at 17:44:47 EST Tue Mar 16 2004 System image file is "slot0:c6sup11-jk2sv-mz.v121_13_e_throttle.040315" cisco Catalyst 6000 (R5000) processor with 114688K/16384K bytes of memory. Processor board ID SAD060203M3 R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 16 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 36 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 4096K bytes of packet SRAM memory. 16384K bytes of Flash internal SIMM (Sector size 256K). Standby is up Standby has 114688K/16384K bytes of memory. Configuration register is 0x2102 SH1-106#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Cat 6k sup 1 Enhanced QoS (Active) 2 2 Cat 6k sup 1 Enhanced QoS (Standby) 3 8 8 port 1000mb GBIC Enhanced QoS 4 8 8 port 1000mb GBIC Enhanced QoS 5 8 8 port 1000mb GBIC Enhanced QoS 6 8 8 port 1000mb GBIC Enhanced QoS 7 24 24 port 100FX Multi mode 9 48 48 port 10/100 mb RJ45 Cisco IOS Release 12.1(13)E13 150 Model -----------------WS-X6K-SUP1A-2GE WS-X6K-SUP1A-2GE WS-X6408A-GBIC WS-X6408A-GBIC WS-X6408A-GBIC WS-X6408A-GBIC WS-X6324-100FX-MM WS-X6348-RJ-45 Serial No. ----------SAL0546EC5N SAL0542D559 SAL0545E7J9 SAL0540CTF5 SAL0545E7GY SAL0540CTE7 SAD05510703 SAD042101CV Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0006.d65a.1500 to 0006.d65a.1501 7.1 5.4(2) 2 0006.d659.9940 to 0006.d659.9941 7.1 5.4(2) 3 0005.7408.6418 to 0005.7408.641f 2.0 5.4(2) 4 0007.4f69.c058 to 0007.4f69.c05f 2.0 5.4(2) 5 0005.7408.6328 to 0005.7408.632f 2.0 5.4(2) 6 0005.7460.4440 to 0005.7460.4447 2.0 5.4(2) 7 0008.a430.0870 to 0008.a430.0887 3.0 5.4(2) 9 0001.9728.1050 to 0001.9728.107f 1.1 5.3(1) Mod Sub-Module --- --------------------------1 Policy Feature Card 1 MSFC Cat6k daughterboard 2 Policy Feature Card 2 MSFC Cat6k daughterboard 9 Inline Power Module SH1-106# Model --------------WS-F6K-PFC WS-F6K-MSFC WS-F6K-PFC WS-F6K-MSFC WS-F6K-PWR Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060100LZ 1.1 Ok SAD060203M3 2.1 Ok SAD053202FY 1.1 Ok SAD05280377 1.4 Ok 1.0 Ok Return to SH1-106, page 137 SH1-107 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-107#show config Using 16380 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption ! hostname SH1-107 ! boot system flash slot0: boot bootldr bootflash: enable password cisco ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing ip cef load-sharing algorithm universal 00000004 mls flow ip destination-source mls flow ipx destination mls ip multicast non-rpf netflow ! redundancy Cisco IOS Release 12.1(13)E13 151 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! ! vlan 1 tb-vlan1 1002 tb-vlan2 1003 ! vlan 10-20,40-50,150,500-501,1000 ! vlan 1002 tb-vlan1 1 tb-vlan2 1003 ! vlan 1003 tb-vlan1 1 tb-vlan2 1002 ! vlan 1004 bridge 1 stp type ibm ! ! interface Loopback0 ip address 172.31.4.107 255.255.255.255 ip pim sparse-mode ! interface Port-channel1 ip address 172.31.1.117 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel10 description dista-1 PoCha no ip address switchport switchport trunk encapsulation dot1q switchport mode trunk ! interface Port-channel68 description sh1-103 po68 ip address 172.31.1.74 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel168 description sh1-104 po68 ip address 172.31.1.102 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel171 no ip address ! interface GigabitEthernet1/1 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 152 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-103 g7/7 no ip address channel-group 68 mode on ! interface GigabitEthernet3/2 description sh1-103 g7/8 no ip address channel-group 68 mode on ! interface GigabitEthernet3/3 description sh1-103 g7/9 no ip address channel-group 68 mode on ! interface GigabitEthernet3/4 description sh1-103 g7/10 no ip address channel-group 68 mode on ! interface GigabitEthernet3/5 description sh1-104 g7/7 no ip address channel-group 168 mode auto ! interface GigabitEthernet3/6 description sh1-104 g7/8 no ip address channel-group 168 mode auto ! interface GigabitEthernet3/7 no ip address channel-group 1 mode on ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet4/1 description dista-1 1/1 no ip address switchport switchport trunk encapsulation dot1q switchport mode trunk channel-group 10 mode on ! interface GigabitEthernet4/2 no ip address shutdown ! interface GigabitEthernet4/3 description dista-1 2/1 Cisco IOS Release 12.1(13)E13 153 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address switchport switchport trunk encapsulation dot1q switchport mode trunk channel-group 10 mode on ! interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 description sh1-104 g7/9 no ip address channel-group 168 mode auto ! interface GigabitEthernet4/6 description sh1-104 g7/10 no ip address channel-group 168 mode auto ! interface GigabitEthernet4/7 no ip address channel-group 1 mode on ! interface GigabitEthernet4/8 no ip address shutdown ! interface FastEthernet5/1 description flashnet ip address 10.194.17.107 255.255.255.0 shutdown duplex full ! interface FastEthernet5/2 no ip address shutdown ! interface FastEthernet5/3 no ip address shutdown ! interface FastEthernet5/4 no ip address shutdown ! interface FastEthernet5/5 no ip address shutdown ! interface FastEthernet5/6 no ip address shutdown ! interface FastEthernet5/7 no ip address shutdown ! interface FastEthernet5/8 no ip address shutdown ! interface FastEthernet5/9 no ip address Cisco IOS Release 12.1(13)E13 154 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet5/10 no ip address shutdown ! interface FastEthernet5/11 no ip address shutdown ! interface FastEthernet5/12 no ip address shutdown ! interface FastEthernet5/13 no ip address shutdown ! interface FastEthernet5/14 no ip address shutdown ! interface FastEthernet5/15 no ip address shutdown ! interface FastEthernet5/16 no ip address shutdown ! interface FastEthernet5/17 no ip address shutdown ! interface FastEthernet5/18 no ip address shutdown ! interface FastEthernet5/19 no ip address shutdown ! interface FastEthernet5/20 no ip address shutdown ! interface FastEthernet5/21 no ip address shutdown ! interface FastEthernet5/22 no ip address shutdown ! interface FastEthernet5/23 no ip address shutdown ! interface FastEthernet5/24 no ip address shutdown ! interface FastEthernet9/1 no ip address Cisco IOS Release 12.1(13)E13 155 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/2 no ip address shutdown ! interface FastEthernet9/3 description IXIA 5/3 ip address 172.31.207.1 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode speed 100 duplex full ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 ip address 1.1.1.1 255.255.255.252 ! interface FastEthernet9/14 ip address 1.1.1.5 255.255.255.252 ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown Cisco IOS Release 12.1(13)E13 156 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.107 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 Cisco IOS Release 12.1(13)E13 157 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 Cisco IOS Release 12.1(13)E13 158 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan10 ip address 172.31.10.68 255.255.255.0 ip access-group 135 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 1 ip 172.31.10.1 standby 1 priority 110 standby 1 preempt standby 2 ip 172.31.10.254 standby 2 priority 90 standby 2 preempt ! interface Vlan11 ip address 172.31.11.68 255.255.255.0 ip access-group 136 in ip helper-address 172.31.16.82 no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 2 ip 172.31.11.1 standby 2 priority 110 standby 2 preempt standby 3 ip 172.31.11.254 standby 3 priority 90 standby 3 preempt ! interface Vlan12 ip address 172.31.12.68 255.255.255.0 ip access-group 137 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 3 ip 172.31.12.1 standby 3 priority 110 standby 3 preempt standby 4 ip 172.31.12.254 standby 4 priority 90 standby 4 preempt ! interface Vlan13 ip address 172.31.13.68 255.255.255.0 ip access-group 138 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 4 ip 172.31.13.1 standby 4 priority 110 standby 4 preempt standby 5 ip 172.31.13.254 standby 5 priority 90 standby 5 preempt ! Cisco IOS Release 12.1(13)E13 159 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface Vlan14 ip address 172.31.14.68 255.255.255.0 ip access-group 139 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 5 ip 172.31.14.1 standby 5 priority 110 standby 5 preempt standby 6 ip 172.31.14.254 standby 6 priority 90 standby 6 preempt ! interface Vlan15 ip address 172.31.15.68 255.255.255.0 ip access-group 140 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 6 ip 172.31.15.1 standby 6 priority 110 standby 6 preempt standby 7 ip 172.31.15.254 standby 7 priority 90 standby 7 preempt ! interface Vlan16 ip address 172.31.16.68 255.255.255.0 ip access-group 141 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 7 ip 172.31.16.1 standby 7 priority 110 standby 7 preempt standby 8 ip 172.31.16.254 standby 8 priority 90 standby 8 preempt ! interface Vlan17 ip address 172.31.17.68 255.255.255.0 ip access-group 142 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 8 ip 172.31.17.1 standby 8 priority 110 standby 8 preempt standby 9 ip 172.31.17.254 standby 9 priority 90 standby 9 preempt ! interface Vlan18 ip address 172.31.18.68 255.255.255.0 ip access-group 143 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 9 ip 172.31.18.1 Cisco IOS Release 12.1(13)E13 160 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby standby standby standby standby 9 priority 110 9 preempt 10 ip 172.31.18.254 10 priority 90 10 preempt ! interface Vlan19 ip address 172.31.19.68 255.255.255.0 ip access-group 144 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 10 ip 172.31.19.1 standby 10 priority 110 standby 10 preempt standby 11 ip 172.31.19.254 standby 11 priority 90 standby 11 preempt ! interface Vlan20 ip address 172.31.9.68 255.255.255.0 ip access-group 145 in no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 11 ip 172.31.9.1 standby 11 priority 110 standby 11 preempt standby 12 ip 172.31.9.254 standby 12 priority 90 standby 12 preempt ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan10 no passive-interface FastEthernet9/3 no passive-interface Port-channel1 no passive-interface Port-channel68 no passive-interface Port-channel168 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.72 0.0.0.3 area 1 network 172.31.1.100 0.0.0.3 area 1 network 172.31.1.116 0.0.0.3 area 1 network 172.31.2.48 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 network 172.31.8.0 0.0.7.255 area 1 network 172.31.16.0 0.0.3.255 area 1 network 172.31.50.0 0.0.0.255 area 1 network 172.31.207.0 0.0.0.3 area 1 maximum-paths 6 ! ip classless no ip forward-protocol udp tftp no ip forward-protocol udp nameserver no ip forward-protocol udp domain no ip forward-protocol udp time no ip forward-protocol udp netbios-ns no ip forward-protocol udp netbios-dgm no ip forward-protocol udp tacacs ip route 0.0.0.0 0.0.0.0 1.1.1.6 Cisco IOS Release 12.1(13)E13 161 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ! ! logging trap debugging logging 172.18.112.184 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 101 permit ip host 172.31.10.112 any access-list 101 permit ip any host 172.31.10.112 access-list 102 permit ip host 172.31.21.101 host 239.255.127.100 access-list 102 deny ip any any access-list 135 permit ip 172.31.10.0 0.0.0.255 any access-list 135 permit ip any 224.0.0.0 0.0.0.255 access-list 135 permit ip any 224.0.1.0 0.0.0.255 access-list 135 deny ip any 224.0.0.0 15.255.255.255 access-list 135 permit ip any any access-list 136 permit ip 172.31.11.0 0.0.0.255 any access-list 136 permit ip any 224.0.0.0 0.0.0.255 access-list 136 permit ip any 224.0.1.0 0.0.0.255 access-list 136 deny ip any 224.0.0.0 15.255.255.255 access-list 136 permit ip any any access-list 137 permit ip 172.31.12.0 0.0.0.255 any access-list 137 permit ip any 224.0.0.0 0.0.0.255 access-list 137 permit ip any 224.0.1.0 0.0.0.255 access-list 137 deny ip any 224.0.0.0 15.255.255.255 access-list 137 permit ip any any access-list 138 permit ip 172.31.13.0 0.0.0.255 any access-list 138 permit ip any 224.0.0.0 0.0.0.255 access-list 138 permit ip any 224.0.1.0 0.0.0.255 access-list 138 deny ip any 224.0.0.0 15.255.255.255 access-list 138 permit ip any any access-list 139 permit ip 172.31.14.0 0.0.0.255 any access-list 139 permit ip any 224.0.0.0 0.0.0.255 access-list 139 permit ip any 224.0.1.0 0.0.0.255 access-list 139 deny ip any 224.0.0.0 15.255.255.255 access-list 139 permit ip any any access-list 140 permit ip 172.31.15.0 0.0.0.255 any access-list 140 permit ip any 224.0.0.0 0.0.0.255 access-list 140 permit ip any 224.0.1.0 0.0.0.255 access-list 140 deny ip any 224.0.0.0 15.255.255.255 access-list 140 permit ip any any access-list 141 permit ip 172.31.16.0 0.0.0.255 any access-list 141 permit ip any 224.0.0.0 0.0.0.255 access-list 141 permit ip any 224.0.1.0 0.0.0.255 access-list 141 deny ip any 224.0.0.0 15.255.255.255 access-list 141 permit ip any any access-list 142 permit ip 172.31.17.0 0.0.0.255 any access-list 142 permit ip any 224.0.0.0 0.0.0.255 access-list 142 permit ip any 224.0.1.0 0.0.0.255 access-list 142 deny ip any 224.0.0.0 15.255.255.255 access-list 142 permit ip any any access-list 143 permit ip 172.31.18.0 0.0.0.255 any access-list 143 permit ip any 224.0.0.0 0.0.0.255 access-list 143 permit ip any 224.0.1.0 0.0.0.255 access-list 143 deny ip any 224.0.0.0 15.255.255.255 access-list 143 permit ip any any access-list 144 permit ip 172.31.19.0 0.0.0.255 any Cisco IOS Release 12.1(13)E13 162 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list 144 permit ip any 224.0.0.0 0.0.0.255 access-list 144 permit ip any 224.0.1.0 0.0.0.255 access-list 144 deny ip any 224.0.0.0 15.255.255.255 access-list 144 permit ip any any access-list 145 permit ip 172.31.9.0 0.0.0.255 any access-list 145 permit ip any 224.0.0.0 0.0.0.255 access-list 145 permit ip any 224.0.1.0 0.0.0.255 access-list 145 deny ip any 224.0.0.0 15.255.255.255 access-list 145 permit ip any any access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW ! rmon event 1 log trap public description "Rising EventIndex for avgBusy1~%~" owner admin rmon event 2 log trap public description "Falling EventIndex for avgBusy1" owner admin rmon alarm 1 lsystem.57.0 60 absolute rising-threshold 90 1 falling-threshold 70 2 owner admin alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec mr sh ip mr 239.255.127.100 alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi line vty 5 10 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 ntp clock-period 17180203 ntp update-calendar ntp server 172.18.177.132 end SH1-107#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Sun 29-Feb-04 21:25 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-107 uptime is 1 week, 2 days, 18 hours, 27 minutes Time since SH1-107 switched to active is 1 week, 2 days, 18 hours, 17 minutes System returned to ROM by power-on (SP by power-on) System restarted at 17:15:26 EST Mon Mar 8 2004 System image file is "slot0:c6sup12-jsv-mz.v121_13_e_throttle.040229" Cisco IOS Release 12.1(13)E13 163 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology cisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory. Processor board ID SAL0601FXUF R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 12 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 20 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 32768K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 112640K/18432K bytes of memory. Configuration register is 0x2102 SH1-107#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Cat 6k sup 1 Enhanced QoS (Active) 2 2 Cat 6k sup 1 Enhanced QoS (Standby) 3 8 8 port 1000mb GBIC Enhanced QoS 4 8 8 port 1000mb GBIC Enhanced QoS 5 24 24 port 100FX Multi mode 9 48 SFM-capable 48-port 10/100 Mbps RJ45 Model -----------------WS-X6K-SUP1A-2GE WS-X6K-SUP1A-2GE WS-X6408A-GBIC WS-X6408A-GBIC WS-X6324-100FX-MM WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0006.d65a.4dec to 0006.d65a.4ded 7.1 5.4(2) 2 0006.d65a.4d2c to 0006.d65a.4d2d 7.1 5.4(2) 3 0005.7408.64e0 to 0005.7408.64e7 2.0 5.4(2) 4 0005.7408.6610 to 0005.7408.6617 2.0 5.4(2) 5 0003.3287.686a to 0003.3287.6881 3.0 5.4(2) 9 0009.11f5.2298 to 0009.11f5.22c7 5.2 6.3(1) Mod Sub-Module --- --------------------------1 Policy Feature Card 1 Cat6k MSFC 2 daughterboard 2 Policy Feature Card 2 Cat6k MSFC 2 daughterboard SH1-107# Model --------------WS-F6K-PFC WS-F6K-MSFC2 WS-F6K-PFC WS-F6K-MSFC2 SH1-108 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-108#show config Using 14213 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption Cisco IOS Release 12.1(13)E13 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAL0601FXKX 2.0 Ok SAL0601FXUF 2.0 Ok SAL0601FXD0 2.0 Ok SAL0601FXUC 2.0 Ok Return to SH1-107, page 151 164 Serial No. ----------SAL0601G6BV SAL0501FWA7 SAL0545E7FM SAL0545E6C0 SAD0551070E SAL0708D6TF Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology service internal ! hostname SH1-108 ! boot system flash slot0: boot bootldr bootflash: no logging console aaa new-model aaa authentication login default enable aaa authentication login sh1-testcase group tacacs+ enable enable secret 5 $1$rOL9$PKASr.jRsib8kECraGEjQ. ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username vnc ip ftp password rtpsqelab no ip domain-lookup ip domain-name cisco.com ! ip multicast-routing ip ssh time-out 120 ip ssh authentication-retries 3 mls flow ip destination-source mls flow ipx destination mls aclmerge algorithm odm mls aclmerge odm optimizations mls ip multicast consistency-check mls ip multicast non-rpf netflow ! ! ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync standard ! ! vlan 1 tb-vlan1 1002 tb-vlan2 1003 ! vlan 10-20,40-50,60-61,150,500-501,1000 ! vlan 1002 tb-vlan1 1 tb-vlan2 1003 ! vlan 1003 tb-vlan1 1 tb-vlan2 1002 ! vlan 1004 bridge 1 stp type ibm ! ! interface Loopback0 ip address 172.31.4.108 255.255.255.255 Cisco IOS Release 12.1(13)E13 165 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim sparse-mode ! interface Port-channel1 ip address 172.31.1.118 255.255.255.252 ip pim sparse-mode logging event link-status logging event bundle-status ! interface Port-channel10 description dista-1 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel69 description sh1-103 po69 ip address 172.31.1.78 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel169 description sh1-104 po69 ip address 172.31.1.106 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status logging event bundle-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-103 g8/7 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 69 mode on ! interface GigabitEthernet3/2 description sh1-103 g8/8 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 69 mode on ! interface GigabitEthernet3/3 description sh1-103 g8/9 no ip address Cisco IOS Release 12.1(13)E13 166 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip access-group 182 in ip access-group 182 out logging event link-status channel-group 69 mode on ! interface GigabitEthernet3/4 description sh1-103 g8/10 no ip address ip access-group 182 in ip access-group 182 out logging event link-status channel-group 69 mode on ! interface GigabitEthernet3/5 description sh1-104 g8/7 no ip address logging event link-status logging event bundle-status channel-group 169 mode on ! interface GigabitEthernet3/6 description sh1-104 g8/8 no ip address logging event link-status logging event bundle-status channel-group 169 mode on ! interface GigabitEthernet3/7 no ip address channel-group 1 mode on ! interface GigabitEthernet3/8 description Ix-7/1 ip address 172.31.32.69 255.255.255.0 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode ! interface GigabitEthernet4/1 description dista-1 1/2 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet4/2 description dista-1 2/2 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet4/3 description dista-1 2/3 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet4/4 description dista-1 2/4 no ip address switchport Cisco IOS Release 12.1(13)E13 167 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet4/5 description sh1-104 g8/9 no ip address logging event link-status logging event bundle-status channel-group 169 mode on ! interface GigabitEthernet4/6 description sh1-104 g8/10 no ip address logging event link-status logging event bundle-status channel-group 169 mode on ! interface GigabitEthernet4/7 no ip address channel-group 1 mode on ! interface GigabitEthernet4/8 description Ix-7/2 ip address 172.31.208.5 255.255.255.252 secondary ip address 172.31.208.1 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip redirects no ip unreachables ip pim sparse-mode logging event link-status ! interface FastEthernet5/1 description flashnet ip address 10.194.17.108 255.255.255.0 duplex full ! interface FastEthernet5/2 no ip address shutdown ! interface FastEthernet5/3 no ip address shutdown ! interface FastEthernet5/4 no ip address shutdown ! interface FastEthernet5/5 no ip address shutdown ! interface FastEthernet5/6 no ip address shutdown ! interface FastEthernet5/7 no ip address shutdown ! interface FastEthernet5/8 no ip address shutdown Cisco IOS Release 12.1(13)E13 168 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet5/9 no ip address shutdown ! interface FastEthernet5/10 no ip address shutdown ! interface FastEthernet5/11 no ip address shutdown ! interface FastEthernet5/12 no ip address shutdown ! interface FastEthernet5/13 no ip address shutdown ! interface FastEthernet5/14 no ip address shutdown ! interface FastEthernet5/15 no ip address shutdown ! interface FastEthernet5/16 no ip address shutdown ! interface FastEthernet5/17 no ip address shutdown ! interface FastEthernet5/18 no ip address shutdown ! interface FastEthernet5/19 no ip address shutdown ! interface FastEthernet5/20 no ip address shutdown ! interface FastEthernet5/21 no ip address shutdown ! interface FastEthernet5/22 no ip address shutdown ! interface FastEthernet5/23 no ip address shutdown ! interface FastEthernet5/24 no ip address shutdown Cisco IOS Release 12.1(13)E13 169 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet9/1 no ip address ! interface FastEthernet9/2 no ip address ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 Cisco IOS Release 12.1(13)E13 170 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 no ip address shutdown ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 Cisco IOS Release 12.1(13)E13 171 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 Cisco IOS Release 12.1(13)E13 172 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address ! interface Vlan10 ip address 172.31.10.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 1 ip 172.31.10.1 standby 1 priority 90 standby 1 preempt standby 2 ip 172.31.10.254 standby 2 priority 110 standby 2 preempt ! interface Vlan11 ip address 172.31.11.69 255.255.255.0 ip helper-address 172.31.16.82 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 2 ip 172.31.11.1 standby 2 priority 90 standby 2 preempt standby 3 ip 172.31.11.254 standby 3 priority 110 standby 3 preempt ! interface Vlan12 ip address 172.31.12.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 3 ip 172.31.12.1 standby 3 priority 90 standby 3 preempt standby 4 ip 172.31.12.254 standby 4 priority 110 standby 4 preempt ! interface Vlan13 ip address 172.31.13.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 4 ip 172.31.13.1 standby 4 priority 90 standby 4 preempt standby 5 ip 172.31.13.254 standby 5 priority 110 standby 5 preempt ! interface Vlan14 ip address 172.31.14.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 5 ip 172.31.14.1 standby 5 priority 90 standby 5 preempt standby 6 ip 172.31.14.254 standby 6 priority 110 standby 6 preempt ! interface Vlan15 Cisco IOS Release 12.1(13)E13 173 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description this in has 2ndary ip 172.31.150.69 ip address 172.31.150.69 255.255.255.0 secondary ip address 172.31.15.69 255.255.255.0 no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 6 ip 172.31.15.1 standby 6 priority 90 standby 6 preempt standby 7 ip 172.31.15.254 standby 7 priority 110 standby 7 preempt ! interface Vlan16 description this in has 2ndary ip 172.31.160.69 ip address 172.31.160.69 255.255.255.0 secondary ip address 172.31.16.69 255.255.255.0 no ip redirects no ip unreachables ip pim query-interval 3 ip pim sparse-mode standby 7 ip 172.31.16.1 standby 7 priority 90 standby 7 preempt standby 8 ip 172.31.16.254 standby 8 priority 110 standby 8 preempt ! interface Vlan17 ip address 172.31.17.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 8 ip 172.31.17.1 standby 8 priority 90 standby 8 preempt standby 9 ip 172.31.17.254 standby 9 priority 110 standby 9 preempt ! interface Vlan18 ip address 172.31.18.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 9 ip 172.31.18.1 standby 9 priority 90 standby 9 preempt standby 10 ip 172.31.18.254 standby 10 priority 110 standby 10 preempt ! interface Vlan19 ip address 172.31.19.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 10 ip 172.31.19.1 standby 10 priority 90 standby 10 preempt standby 11 ip 172.31.19.254 standby 11 priority 110 standby 11 preempt Cisco IOS Release 12.1(13)E13 174 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Vlan20 ip address 172.31.9.69 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 11 ip 172.31.9.1 standby 11 priority 90 standby 11 preempt standby 12 ip 172.31.9.254 standby 12 priority 110 standby 12 preempt ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan10 no passive-interface GigabitEthernet3/8 no passive-interface GigabitEthernet4/8 no passive-interface Port-channel1 no passive-interface Port-channel69 no passive-interface Port-channel169 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.76 0.0.0.3 area 1 network 172.31.1.104 0.0.0.3 area 1 network 172.31.1.116 0.0.0.3 area 1 network 172.31.2.52 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 network 172.31.8.0 0.0.7.255 area 1 network 172.31.16.0 0.0.3.255 area 1 network 172.31.32.0 0.0.0.255 area 1 network 172.31.50.0 0.0.0.255 area 1 network 172.31.208.0 0.0.0.7 area 1 ! ip classless ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ! ! logging trap debugging access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 102 permit ip host 172.31.21.101 host 239.255.127.100 access-list 102 deny ip any any access-list 120 permit ip host 172.31.21.101 host 239.255.127.100 access-list 181 permit ip any any access-list 182 permit ip any any snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.18.177.135 public snmp-server host 172.31.1.105 public ! tacacs-server host 172.18.177.132 alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec mr sh ip mr 239.255.127.100 Cisco IOS Release 12.1(13)E13 175 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 login authentication sh1-testcase history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh line vty 5 10 exec-timeout 0 0 login authentication sh1-testcase history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh ! exception protocol ftp exception dump 172.18.177.132 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180155 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-108#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JK2SV-M), Version 12.1(nightly13e.E040315) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 15-Mar-04 22:18 by Image text-base: 0x40008BF0, data-base: 0x41BF2000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-108 uptime is 1 day, 18 hours, 32 minutes Time since SH1-108 switched to active is 1 day, 18 hours, 32 minutes System returned to ROM by power-on (SP by reload) System restarted at 17:44:08 EST Tue Mar 16 2004 System image file is "slot0:c6sup12-jk2sv-mz.v121_13_e_throttle.040315" cisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory. Processor board ID SAL0601FY7X R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 12 Virtual Ethernet/IEEE 802.3 interface(s) 72 FastEthernet/IEEE 802.3 interface(s) 20 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 112640K/18432K bytes of memory. Configuration register is 0x2102 SH1-108#show module Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------ ----------- Cisco IOS Release 12.1(13)E13 176 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 1 2 3 4 5 9 2 2 8 8 24 48 Cat 6k sup 1 Enhanced QoS (Active) Cat 6k sup 1 Enhanced QoS (Standby) 8 port 1000mb GBIC Enhanced QoS 8 port 1000mb GBIC Enhanced QoS 24 port 100FX Multi mode 48-port 10/100 mb RJ45 WS-X6K-SUP1A-2GE WS-X6K-SUP1A-2GE WS-X6408A-GBIC WS-X6408A-GBIC WS-X6324-100FX-MM WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0006.d65a.4ce8 to 0006.d65a.4ce9 7.1 5.4(2) 2 0006.d65a.4cdc to 0006.d65a.4cdd 7.1 5.4(2) 3 0005.7408.6410 to 0005.7408.6417 2.0 5.4(2) 4 0005.7408.6440 to 0005.7408.6447 2.0 5.4(2) 5 0008.a430.09f0 to 0008.a430.0a07 3.0 5.4(2) 9 000b.4603.b020 to 000b.4603.b04f 1.1 5.4(2) Mod Sub-Module --- --------------------------1 Policy Feature Card 1 Cat6k MSFC 2 daughterboard 2 Policy Feature Card 2 Cat6k MSFC 2 daughterboard SH1-108# Model --------------WS-F6K-PFC WS-F6K-MSFC2 WS-F6K-PFC WS-F6K-MSFC2 SAL0550FAST SAL0601G2HF SAL0545E7GH SAL0545E7FJ SAD055106Z9 SAL064071XV Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAL0601FXM6 2.0 Ok SAL0601FY7X 2.0 Ok SAL0601FXMN 2.0 Ok SAL0601FYB9 2.0 Ok Return to SH1-108, page 164 SH1-109 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-109#show config Using 20026 out of 391160 bytes ! ! version 12.1 service timestamps debug datetime msec localtime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-109 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console enable secret 5 $1$hXKk$4xXFEz6GkYsxdM5MlahSW1 ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent udld enable udld message time 7 ip subnet-zero ! ! ip ftp username safeharbor Cisco IOS Release 12.1(13)E13 177 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip ftp password shshsh no ip domain-lookup ! ip multicast-routing ip multicast cache-headers mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check errdisable recovery cause bpduguard errdisable recovery cause channel-misconfig errdisable recovery cause pagp-flap errdisable recovery cause dtp-flap errdisable recovery cause link-flap errdisable recovery interval 30 ! redundancy mode rpr-plus main-cpu auto-sync startup-config auto-sync running-config auto-sync config-register auto-sync bootvar auto-sync standard ! power redundancy-mode combined ! ! vlan 2-8,10-20,81-83,100,150,190,254,501,1000 ! vlan 1004 bridge 1 ! vlan 1005 bridge 1 ! ! interface Loopback0 ip address 172.31.4.109 255.255.255.255 ip pim sparse-mode ! interface Port-channel1 ip address 172.31.1.201 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel2 description SH1-110 no ip address switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1-9,21-4094 switchport mode trunk ! interface Port-channel20 description dista-2 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel70 description sh1-103 po70 ip address 172.31.1.82 255.255.255.252 ip access-group 181 in ip access-group 181 out Cisco IOS Release 12.1(13)E13 178 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim sparse-mode logging event link-status ! interface Port-channel170 description sh1-104 po70 ip address 172.31.1.110 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel171 no ip address ! interface Port-channel190 description dista-2 no ip address switchport switchport access vlan 190 switchport mode access ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 no ip address switchport switchport access vlan 82 ! interface GigabitEthernet2/2 no ip address switchport switchport access vlan 83 ! interface GigabitEthernet3/1 description sh1-103 g7/15 no ip address logging event link-status speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet3/2 description dista-2 2/1 no ip address switchport switchport access vlan 190 switchport mode access channel-group 190 mode desirable ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 description sh1-104 g4/15 no ip address speed nonegotiate Cisco IOS Release 12.1(13)E13 179 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology channel-group 170 mode on ! interface GigabitEthernet3/6 description sh1-104 g4/16 no ip address speed nonegotiate channel-group 170 mode on ! interface GigabitEthernet3/7 no ip address channel-group 1 mode on ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 ip address 10.194.17.109 255.255.255.0 shutdown ! interface GigabitEthernet3/10 no ip address switchport switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet3/11 description SH1-110 via Po2 no ip address switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1-9,21-4094 switchport mode trunk channel-group 2 mode desirable ! interface GigabitEthernet3/12 no ip address ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 description Ix-9/1 ip address 172.31.249.1 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode load-interval 30 ! interface GigabitEthernet4/1 description sh1-103 g7/16 no ip address speed nonegotiate channel-group 70 mode on Cisco IOS Release 12.1(13)E13 180 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet4/2 description dista-2 2/2 no ip address switchport switchport access vlan 190 switchport mode access channel-group 190 mode desirable ! interface GigabitEthernet4/3 no ip address shutdown ! interface GigabitEthernet4/4 no ip address shutdown ! interface GigabitEthernet4/5 description sh1-104 g8/15 no ip address speed nonegotiate channel-group 170 mode on ! interface GigabitEthernet4/6 description sh1-104 g8/16 no ip address speed nonegotiate channel-group 170 mode on ! interface GigabitEthernet4/7 no ip address channel-group 1 mode on ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet4/9 no ip address shutdown ! interface GigabitEthernet4/10 no ip address shutdown ! interface GigabitEthernet4/11 no ip address shutdown ! interface GigabitEthernet4/12 no ip address shutdown ! interface GigabitEthernet4/13 no ip address shutdown ! interface GigabitEthernet4/14 no ip address shutdown ! interface GigabitEthernet4/15 no ip address shutdown Cisco IOS Release 12.1(13)E13 181 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet4/16 no ip address ! interface GigabitEthernet7/1 description sh1-103 g8/15 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet7/2 no ip address shutdown ! interface GigabitEthernet7/3 description dista-2 1/1 no ip address logging event link-status speed nonegotiate switchport switchport trunk encapsulation dot1q channel-group 20 mode on ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 no ip address shutdown ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 no ip address logging event link-status speed nonegotiate switchport switchport trunk encapsulation dot1q channel-group 20 mode on ! interface GigabitEthernet7/8 no ip address shutdown ! interface GigabitEthernet7/9 no ip address shutdown ! interface GigabitEthernet7/10 no ip address shutdown switchport switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address Cisco IOS Release 12.1(13)E13 182 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 description Ix-9/2 ip address 172.31.35.70 255.255.255.0 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode load-interval 30 ! interface GigabitEthernet8/1 description sh1-103 g8/16 no ip address speed nonegotiate channel-group 70 mode on ! interface GigabitEthernet8/2 no ip address logging event link-status shutdown speed nonegotiate ! interface GigabitEthernet8/3 description dista-2 4/2 no ip address logging event link-status speed nonegotiate switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet8/4 no ip address shutdown ! interface GigabitEthernet8/5 no ip address shutdown ! interface GigabitEthernet8/6 no ip address shutdown ! interface GigabitEthernet8/7 no ip address logging event link-status shutdown speed nonegotiate ! interface GigabitEthernet8/8 no ip address shutdown Cisco IOS Release 12.1(13)E13 183 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet8/9 no ip address shutdown switchport switchport trunk encapsulation ! interface GigabitEthernet8/10 no ip address shutdown switchport switchport trunk encapsulation ! interface GigabitEthernet8/11 no ip address shutdown switchport switchport trunk encapsulation ! interface GigabitEthernet8/12 no ip address shutdown switchport switchport trunk encapsulation ! interface GigabitEthernet8/13 no ip address shutdown ! interface GigabitEthernet8/14 no ip address shutdown ! interface GigabitEthernet8/15 no ip address shutdown ! interface GigabitEthernet8/16 no ip address ! interface FastEthernet9/1 no ip address speed 100 duplex full ! interface FastEthernet9/2 no ip address shutdown ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 Cisco IOS Release 12.1(13)E13 184 dot1q dot1q dot1q dot1q Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 Cisco IOS Release 12.1(13)E13 185 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.109 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address ! interface FastEthernet9/28 no ip address ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown Cisco IOS Release 12.1(13)E13 186 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address ! interface Vlan5 ip address 5.5.5.5 255.255.255.0 ! interface Vlan10 ip address 172.31.20.70 255.255.255.0 ip access-group 135 in ip helper-address 172.31.4.98 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 1 ip 172.31.20.1 standby 1 priority 110 standby 1 preempt standby 2 ip 172.31.20.254 standby 2 priority 90 standby 2 preempt ! interface Vlan11 ip address 172.31.21.70 255.255.255.0 ip access-group 136 in Cisco IOS Release 12.1(13)E13 187 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 2 ip 172.31.21.1 standby 2 priority 110 standby 2 preempt standby 3 ip 172.31.21.254 standby 3 priority 90 standby 3 preempt ! interface Vlan12 ip address 172.31.22.70 255.255.255.0 ip access-group 137 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 3 ip 172.31.22.1 standby 3 priority 110 standby 3 preempt standby 4 ip 172.31.22.254 standby 4 priority 90 standby 4 preempt ! interface Vlan13 ip address 172.31.23.70 255.255.255.0 ip access-group 138 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 4 ip 172.31.23.1 standby 4 priority 110 standby 4 preempt standby 5 ip 172.31.23.254 standby 5 priority 90 standby 5 preempt ! interface Vlan14 ip address 172.31.24.70 255.255.255.0 ip access-group 139 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 5 ip 172.31.24.1 standby 5 priority 110 standby 5 preempt standby 6 ip 172.31.24.254 standby 6 priority 90 standby 6 preempt ! interface Vlan15 ip address 172.31.25.70 255.255.255.0 ip access-group 140 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 6 ip 172.31.25.1 standby 6 priority 110 standby 6 preempt standby 7 ip 172.31.25.254 standby 7 priority 90 standby 7 preempt ! interface Vlan16 ip address 172.31.26.70 255.255.255.0 Cisco IOS Release 12.1(13)E13 188 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip access-group 141 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 7 ip 172.31.26.1 standby 7 priority 110 standby 7 preempt standby 8 ip 172.31.26.254 standby 8 priority 90 standby 8 preempt ! interface Vlan17 ip address 172.31.27.70 255.255.255.0 ip access-group 142 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 8 ip 172.31.27.1 standby 8 priority 110 standby 8 preempt standby 9 ip 172.31.27.254 standby 9 priority 90 standby 9 preempt ! interface Vlan18 ip address 172.31.28.70 255.255.255.0 ip access-group 143 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 9 ip 172.31.28.1 standby 9 priority 110 standby 9 preempt standby 10 ip 172.31.28.254 standby 10 priority 90 standby 10 preempt ! interface Vlan19 ip address 172.31.29.70 255.255.255.0 ip access-group 144 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 10 ip 172.31.29.1 standby 10 priority 110 standby 10 preempt standby 11 ip 172.31.29.254 standby 11 priority 90 standby 11 preempt ! interface Vlan20 ip address 172.31.30.70 255.255.255.0 ip access-group 145 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 11 ip 172.31.30.1 standby 11 priority 110 standby 11 preempt standby 12 ip 172.31.30.254 standby 12 priority 90 standby 12 preempt ! interface Vlan190 Cisco IOS Release 12.1(13)E13 189 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip address 172.31.190.70 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 12 ip 172.31.190.1 standby 12 priority 110 standby 12 preempt standby 13 ip 172.31.190.254 standby 13 priority 90 standby 13 preempt ! interface Vlan501 ip address 172.31.51.2 255.255.255.0 no ip redirects shutdown standby ip 172.31.51.3 standby priority 90 standby preempt ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan10 no passive-interface GigabitEthernet3/16 no passive-interface GigabitEthernet7/16 no passive-interface GigabitEthernet8/5 no passive-interface Port-channel1 no passive-interface Port-channel70 no passive-interface Port-channel170 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.80 0.0.0.3 area 1 network 172.31.1.108 0.0.0.3 area 1 network 172.31.1.140 0.0.0.3 area 1 network 172.31.1.200 0.0.0.3 area 1 network 172.31.2.56 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 network 172.31.20.0 0.0.3.255 area 1 network 172.31.24.0 0.0.7.255 area 1 network 172.31.35.0 0.0.0.255 area 1 network 172.31.51.0 0.0.0.255 area 1 network 172.31.249.0 0.0.0.3 area 1 maximum-paths 6 ! ip classless ip route profile ip route 0.0.0.0 0.0.0.0 172.31.4.99 ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ! ! logging trap debugging logging 172.18.112.184 logging 172.18.177.132 access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 100 remark Temp_ACL for non-RPF traffic access-list 100 permit ip any host 224.0.0.13 Cisco IOS Release 12.1(13)E13 190 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list access-list 100 100 100 100 100 100 100 100 100 101 135 135 135 135 135 136 136 136 136 136 137 137 137 137 137 138 138 138 138 138 139 139 139 139 139 140 140 140 140 140 141 141 141 141 141 142 142 142 142 142 143 143 143 143 143 144 144 144 144 144 145 145 145 145 permit permit permit permit permit permit permit deny permit permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny permit permit permit permit deny ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip ip any host 224.0.0.13 log 172.31.20.0 0.0.0.255 224.0.0.0 172.31.21.0 0.0.0.255 224.0.0.0 172.31.25.0 0.0.0.255 224.0.0.0 172.31.26.0 0.0.0.255 224.0.0.0 any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any any any 172.31.20.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.21.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.22.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.23.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.24.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.25.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.26.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.27.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.28.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.29.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 any any 172.31.30.0 0.0.0.255 any any 224.0.0.0 0.0.0.255 any 224.0.1.0 0.0.0.255 any 224.0.0.0 15.255.255.255 15.255.255.255 15.255.255.255 15.255.255.255 15.255.255.255 Cisco IOS Release 12.1(13)E13 191 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list 145 permit ip any any access-list 181 permit ip any any snmp-server community public RO snmp-server community cisco RW ! alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec mr sh ip mroute 239.255.127.100 alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 line vty 0 4 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi line vty 5 10 exec-timeout 0 0 password cisco login length 0 history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17180103 ntp update-calendar ntp server 172.18.177.132 end SH1-109#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Mon 01-Mar-04 00:11 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-109 uptime is 6 days, 19 hours, 49 minutes Time since SH1-109 switched to active is 6 days, 19 hours, 49 minutes System returned to ROM by power-on (SP by power-on) System restarted at 15:54:35 EST Thu Mar 11 2004 System image file is "sup-bootflash:c6sup22-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 458752K/65536K bytes of memory. Processor board ID SAD055205U3 R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 15 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 68 Gigabit Ethernet/IEEE 802.3 interface(s) Cisco IOS Release 12.1(13)E13 192 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 227328K/34816K bytes of memory. Configuration register is 0x2102 SH1-109#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC 5 0 Switching Fabric Module-136 (Standby) 6 0 Switching Fabric Module-128 (Active) 7 16 SFM-capable 16 port 1000mb GBIC 8 16 Pure SFM-mode 16 port 1000mb GBIC 9 48 SFM-capable 48-port 10/100 Mbps RJ45 Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-C6500-SFM WS-X6516-GBIC WS-X6816-GBIC WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.b3a6 to 0001.6415.b3a7 3.2 6.1(3) 2 0001.c9da.e268 to 0001.c9da.e269 3.2 6.1(3) 3 0002.7ee1.41b8 to 0002.7ee1.41c7 1.2 12.1(5r)E1 4 000d.ed23.8ff8 to 000d.ed23.9007 1.7 12.1(11r)E2 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.3 6.1(3) 7 0001.63d4.21c2 to 0001.63d4.21d1 4.0 6.1(3) 8 0002.7ee1.4f70 to 0002.7ee1.4f7f 1.2 12.1(5r)E1 9 0009.11f6.4930 to 0009.11f6.495f 5.2 6.3(1) Mod --1 1 2 2 3 4 8 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD0551063X SAD060100BR SAD055101NY SAL0741N098 SAD0550031L SAL06111029 SAD055204WV SAD055101M1 SAL0710A4V0 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055205DB 3.0 Ok SAD055205U3 1.3 Ok SAD0552053U 3.0 Ok SAD055205TB 1.3 Ok SAD054904SP 2.0 Ok SAL0744P0BL 2.5 Ok SAD060100G8 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass 9 Pass SH1-109# Return to SH1-109, page 177 SH1-110 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Cisco IOS Release 12.1(13)E13 193 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Go to Test Cases, page 249 SH1-110#show config Using 18232 out of 391160 bytes ! ! version 12.1 no service slave-log service timestamps debug uptime service timestamps log datetime msec localtime no service password-encryption service internal ! hostname SH1-110 ! boot system flash sup-bootflash: boot bootldr bootflash: no logging console aaa new-model aaa authentication login default enable aaa authentication login sh1-testcase group tacacs+ enable enable secret 5 $1$WlAL$Tb0im3WFfGj5wohoInCnn. ! clock timezone EST -5 clock summer-time EDT recurring vtp domain FIN vtp mode transparent udld aggressive ip subnet-zero ! ! ip ftp username vnc ip ftp password rtpsqelab no ip domain-lookup ip domain-name cisco.com ! ip multicast-routing ip multicast cache-headers ip ssh time-out 120 ip ssh authentication-retries 3 mls flow ip destination-source mls flow ipx destination mls aclmerge algorithm odm mls aclmerge odm optimizations mls ip multicast consistency-check ! ! errdisable recovery cause udld errdisable recovery interval 30 ! spanning-tree loopguard default spanning-tree vlan 190 priority 8192 ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync bootvar auto-sync standard ! power redundancy-mode combined ! ! Cisco IOS Release 12.1(13)E13 194 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology vlan 2-8,10-20,22,81-83,100,110,120,150,190,254,501,1000 ! vlan 1004 bridge 1 ! vlan 1005 bridge 1 ! ! interface Loopback0 ip address 172.31.4.110 255.255.255.255 ip pim sparse-mode ! interface Port-channel1 ip address 172.31.1.202 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel2 description SH1-109 no ip address switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1-9,21-4094 switchport mode trunk ! interface Port-channel20 description dista-2 PoCha no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel71 description sh1-103 po71 ip address 172.31.1.86 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel171 description sh1-104 po71 ip address 172.31.1.114 255.255.255.252 ip access-group 181 in ip access-group 181 out ip pim sparse-mode logging event link-status ! interface Port-channel190 description dista-2 no ip address switchport switchport access vlan 190 switchport mode access ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 Cisco IOS Release 12.1(13)E13 195 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet2/2 no ip address shutdown ! interface GigabitEthernet3/1 description sh1-103 g7/13 no ip address channel-group 71 mode auto ! interface GigabitEthernet3/2 description dista-2 2/3 no ip address switchport switchport access vlan 190 switchport mode access channel-group 190 mode desirable ! interface GigabitEthernet3/3 description sh1-104 g3/13 no ip address channel-group 171 mode on ! interface GigabitEthernet3/4 description sh1-104 g3/14 no ip address channel-group 171 mode on ! interface GigabitEthernet3/5 description dista-2 3/2 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode desirable ! interface GigabitEthernet3/6 description dista-2 3/3 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode desirable ! interface GigabitEthernet3/7 no ip address channel-group 1 mode on ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description flashnet ip address 10.194.17.110 255.255.255.0 ! interface GigabitEthernet3/10 no ip address shutdown switchport switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet3/11 Cisco IOS Release 12.1(13)E13 196 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1-9,21-4094 switchport mode trunk channel-group 2 mode desirable ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 no ip address shutdown ! interface GigabitEthernet4/1 description sh1-103 g7/14 no ip address channel-group 71 mode auto ! interface GigabitEthernet4/2 description dista-2 2/4 no ip address switchport switchport access vlan 190 switchport mode access channel-group 190 mode desirable ! interface GigabitEthernet4/3 description sh1-104 g8/13 no ip address channel-group 171 mode on ! interface GigabitEthernet4/4 description sh1-104 g8/14 no ip address channel-group 171 mode on ! interface GigabitEthernet4/5 description dista-2 3/4 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode desirable ! interface GigabitEthernet4/6 description dista-2 3/5 no ip address switchport switchport trunk encapsulation dot1q channel-group 20 mode desirable ! Cisco IOS Release 12.1(13)E13 197 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface GigabitEthernet4/7 no ip address channel-group 1 mode on ! interface GigabitEthernet4/8 no ip address shutdown ! interface GigabitEthernet4/9 no ip address shutdown ! interface GigabitEthernet4/10 no ip address shutdown switchport switchport trunk encapsulation dot1q switchport mode trunk ! interface GigabitEthernet4/11 no ip address shutdown ! interface GigabitEthernet4/12 no ip address shutdown ! interface GigabitEthernet4/13 no ip address shutdown ! interface GigabitEthernet4/14 no ip address shutdown ! interface GigabitEthernet4/15 no ip address shutdown switchport switchport access vlan 16 ! interface GigabitEthernet4/16 description Ix-11/1 ip address 172.31.233.71 255.255.255.0 secondary ip address 172.31.33.71 255.255.255.0 ip access-group 181 in ip access-group 181 out no ip redirects no ip unreachables ip pim sparse-mode logging event link-status load-interval 30 ! interface GigabitEthernet7/1 description sh1-103 g8/13 no ip address channel-group 71 mode auto ! interface GigabitEthernet7/2 no ip address shutdown ! interface GigabitEthernet7/3 description dista-2 1/2 Cisco IOS Release 12.1(13)E13 198 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet7/4 no ip address shutdown ! interface GigabitEthernet7/5 description dista-2 4/12 no ip address shutdown switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet7/6 no ip address shutdown ! interface GigabitEthernet7/7 no ip address shutdown ! interface GigabitEthernet7/8 description dista-2 3/6 no ip address shutdown switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet7/9 no ip address shutdown ! interface GigabitEthernet7/10 no ip address shutdown ! interface GigabitEthernet7/11 no ip address shutdown ! interface GigabitEthernet7/12 no ip address shutdown ! interface GigabitEthernet7/13 no ip address shutdown ! interface GigabitEthernet7/14 no ip address shutdown ! interface GigabitEthernet7/15 no ip address shutdown ! interface GigabitEthernet7/16 no ip address shutdown ! interface GigabitEthernet8/1 Cisco IOS Release 12.1(13)E13 199 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology description sh1-103 g8/14 no ip address channel-group 71 mode auto ! interface GigabitEthernet8/2 no ip address shutdown ! interface GigabitEthernet8/3 description dista-2 4/3 no ip address shutdown switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet8/4 no ip address shutdown ! interface GigabitEthernet8/5 description dista-2 4/13 no ip address shutdown switchport switchport trunk encapsulation dot1q ! interface GigabitEthernet8/6 no ip address shutdown ! interface GigabitEthernet8/7 no ip address shutdown ! interface GigabitEthernet8/8 no ip address shutdown ! interface GigabitEthernet8/9 no ip address shutdown ! interface GigabitEthernet8/10 no ip address shutdown ! interface GigabitEthernet8/11 no ip address shutdown ! interface GigabitEthernet8/12 no ip address shutdown ! interface GigabitEthernet8/13 no ip address shutdown ! interface GigabitEthernet8/14 no ip address shutdown ! interface GigabitEthernet8/15 no ip address Cisco IOS Release 12.1(13)E13 200 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip redirects no ip unreachables ip pim sparse-mode logging event link-status shutdown ! interface GigabitEthernet8/16 description Ix-12/2 ip address 172.31.250.1 255.255.255.252 ip access-group 181 in ip access-group 181 out no ip unreachables ip pim sparse-mode load-interval 30 ! interface FastEthernet9/1 no ip address ! interface FastEthernet9/2 no ip address ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 description IXIA 10/4 no ip address Cisco IOS Release 12.1(13)E13 201 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology speed 100 duplex full switchport switchport access vlan 190 switchport mode access ! interface FastEthernet9/14 description IXIA 10/5 no ip address speed 100 duplex full switchport switchport access vlan 20 switchport mode access ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 no ip address shutdown ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 Cisco IOS Release 12.1(13)E13 202 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 Cisco IOS Release 12.1(13)E13 203 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address ! interface Vlan10 ip address 172.31.20.71 255.255.255.0 ip helper-address 172.31.4.98 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 1 ip 172.31.20.1 standby 1 priority 90 standby 1 preempt standby 2 ip 172.31.20.254 standby 2 priority 110 standby 2 preempt ! interface Vlan11 ip address 172.31.21.71 255.255.255.0 ip access-group 136 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 2 ip 172.31.21.1 standby 2 priority 90 standby 2 preempt standby 3 ip 172.31.21.254 standby 3 priority 110 standby 3 preempt ! interface Vlan12 ip address 172.31.22.71 255.255.255.0 ip access-group 137 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 3 ip 172.31.22.1 standby 3 priority 90 standby 3 preempt standby 4 ip 172.31.22.254 standby 4 priority 110 standby 4 preempt Cisco IOS Release 12.1(13)E13 204 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Vlan13 ip address 172.31.23.71 255.255.255.0 ip access-group 138 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 4 ip 172.31.23.1 standby 4 priority 90 standby 4 preempt standby 5 ip 172.31.23.254 standby 5 priority 110 standby 5 preempt ! interface Vlan14 ip address 172.31.24.71 255.255.255.0 ip access-group 139 in no ip redirects ip pim neighbor-filter 55 ip pim query-interval 3 ip pim sparse-mode standby 5 ip 172.31.24.1 standby 5 priority 90 standby 5 preempt standby 6 ip 172.31.24.254 standby 6 priority 110 standby 6 preempt ! interface Vlan15 ip address 172.31.25.71 255.255.255.0 ip access-group 140 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 6 ip 172.31.25.1 standby 6 priority 90 standby 6 preempt standby 7 ip 172.31.25.254 standby 7 priority 110 standby 7 preempt ! interface Vlan16 ip address 172.31.26.71 255.255.255.0 ip access-group 141 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 7 ip 172.31.26.1 standby 7 priority 90 standby 7 preempt standby 8 ip 172.31.26.254 standby 8 priority 110 standby 8 preempt ! interface Vlan17 ip address 172.31.27.71 255.255.255.0 ip access-group 142 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 8 ip 172.31.27.1 standby 8 priority 90 standby 8 preempt standby 9 ip 172.31.27.254 Cisco IOS Release 12.1(13)E13 205 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby 9 priority 110 standby 9 preempt ! interface Vlan18 ip address 172.31.28.71 255.255.255.0 ip access-group 143 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 9 ip 172.31.28.1 standby 9 priority 90 standby 9 preempt standby 10 ip 172.31.28.254 standby 10 priority 110 standby 10 preempt ! interface Vlan19 ip address 172.31.29.71 255.255.255.0 ip access-group 144 in no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 10 ip 172.31.29.1 standby 10 priority 90 standby 10 preempt standby 11 ip 172.31.29.254 standby 11 priority 110 standby 11 preempt ! interface Vlan20 ip address 172.31.30.71 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 11 ip 172.31.30.1 standby 11 priority 90 standby 11 preempt standby 12 ip 172.31.30.254 standby 12 priority 110 standby 12 preempt ! interface Vlan81 ip address 81.0.0.1 255.255.255.0 shutdown ! interface Vlan82 ip address 82.0.0.1 255.255.255.0 shutdown ! interface Vlan83 ip address 83.0.0.1 255.255.255.0 shutdown ! interface Vlan190 ip address 172.31.190.71 255.255.255.0 no ip redirects ip pim query-interval 3 ip pim sparse-mode standby 12 ip 172.31.190.1 standby 12 priority 90 standby 12 preempt standby 13 ip 172.31.190.254 standby 13 priority 110 standby 13 preempt Cisco IOS Release 12.1(13)E13 206 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Vlan501 ip address 172.31.51.1 255.255.255.0 no ip redirects shutdown standby ip 172.31.51.3 standby priority 110 standby preempt ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan10 no passive-interface GigabitEthernet4/6 no passive-interface GigabitEthernet4/16 no passive-interface GigabitEthernet8/16 no passive-interface Port-channel1 no passive-interface Port-channel71 no passive-interface Port-channel171 network 172.31.0.0 0.0.0.255 area 1 network 172.31.1.84 0.0.0.3 area 1 network 172.31.1.112 0.0.0.3 area 1 network 172.31.1.140 0.0.0.3 area 1 network 172.31.1.200 0.0.0.3 area 1 network 172.31.2.60 0.0.0.3 area 1 network 172.31.4.0 0.0.0.255 area 1 network 172.31.20.0 0.0.3.255 area 1 network 172.31.24.0 0.0.7.255 area 1 network 172.31.33.0 0.0.0.255 area 1 network 172.31.49.0 0.0.0.255 area 1 network 172.31.51.0 0.0.0.255 area 1 network 172.31.190.0 0.0.0.255 area 1 network 172.31.250.0 0.0.0.3 area 1 maximum-paths 6 ! ip classless ip route 172.18.177.128 255.255.255.192 10.194.17.254 ip route 172.18.179.128 255.255.255.192 10.194.17.254 no ip http server ip pim rp-address 172.31.0.104 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ! ! logging trap debugging access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 access-list 20 deny 172.31.1.110 access-list 100 remark Temp_ACL for non-RPF traffic access-list 100 permit ip any host 224.0.0.13 access-list 100 permit ip any host 224.0.0.13 log access-list 100 permit ip 172.31.20.0 0.0.0.255 224.0.0.0 access-list 100 permit ip 172.31.21.0 0.0.0.255 224.0.0.0 access-list 100 permit ip 172.31.25.0 0.0.0.255 224.0.0.0 access-list 100 permit ip 172.31.26.0 0.0.0.255 224.0.0.0 access-list 100 permit ip any 224.0.0.0 0.0.0.255 access-list 100 permit ip any 224.0.1.0 0.0.0.255 access-list 100 deny ip any 224.0.0.0 15.255.255.255 access-list 100 permit ip any any access-list 100 remark Temp_ACL for non-RPF traffic access-list 100 remark Temp_ACL for non-RPF traffic 15.255.255.255 15.255.255.255 15.255.255.255 15.255.255.255 Cisco IOS Release 12.1(13)E13 207 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology access-list 101 permit ip any any access-list 181 permit ip any any access-list 195 permit igmp host 172.31.33.111 any snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.18.177.135 public snmp-server host 172.18.177.181 public ! tacacs-server host 172.18.177.132 alias exec ip sh ip int brief | be Port alias exec eigrp show run | be router eigrp alias exec mr sh ip mroute 239.255.127.100 alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 history size 256 line vty 0 4 exec-timeout 0 0 login authentication sh1-testcase history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh line vty 5 10 exec-timeout 0 0 login authentication sh1-testcase history size 256 transport input lat pad mop telnet rlogin udptn nasi ssh ! exception protocol ftp exception dump 172.18.177.132 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17179925 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-110#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JK2SV-M), Version 12.1(nightly13e.E040315) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Tue 16-Mar-04 00:20 by Image text-base: 0x40008BF0, data-base: 0x41BF2000 ROM: System Bootstrap, Version 12.1(11r)E1, RELEASE SOFTWARE (fc1) SH1-110 uptime is 1 day, 19 hours, 2 minutes Time since SH1-110 switched to active is 1 day, 19 hours, 1 minute System returned to ROM by power-on (SP by power-on) System restarted at 17:17:54 EST Tue Mar 16 2004 System image file is "sup-bootflash:c6sup22-jk2sv-mz.v121_13_e_throttle.040315" cisco Catalyst 6000 (R7000) processor with 227328K/34816K bytes of memory. Processor board ID SAD062803HY R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. Cisco IOS Release 12.1(13)E13 208 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 17 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 68 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 32768K bytes of Flash internal SIMM (Sector size 512K). Standby is up Standby has 227328K/34816K bytes of memory. Configuration register is 0x2102 SH1-110#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Catalyst 6000 supervisor 2 (Active) 2 2 Catalyst 6000 supervisor 2 (Standby) 3 16 Pure SFM-mode 16 port 1000mb GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC 5 0 Switching Fabric Module-136 (Active) 6 0 Switching Fabric Module-136 (Standby) 7 16 SFM-capable 16 port 1000mb GBIC 8 16 SFM-capable 16 port 1000mb GBIC 9 48 48-port 10/100 mb RJ45 Model -----------------WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6516-GBIC WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9db.4bfc to 0001.c9db.4bfd 3.9 6.1(3) 2 0001.c9db.4bd4 to 0001.c9db.4bd5 3.9 6.1(3) 3 0001.63d4.4bd2 to 0001.63d4.4be1 1.2 12.1(5r)E1 4 0001.63d4.4c92 to 0001.63d4.4ca1 1.2 12.1(5r)E1 5 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 6 0001.0002.0003 to 0001.0002.0003 1.1 6.1(3) 7 0001.63d4.3c32 to 0001.63d4.3c41 4.0 6.1(3) 8 0001.6477.53f4 to 0001.6477.5403 4.0 6.1(3) 9 000b.4603.af00 to 000b.4603.af2f 1.1 5.4(2) Mod --1 1 2 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD0627036A SAD0628036D SAD055101JR SAD055101NA SAD05520456 SAD055204FX SAD055204XP SAD055204SV SAL06407314 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 12.1(nightly 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Ok Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD0628029H 3.2 Ok SAD062803HY 2.5 Ok SAD06280281 3.2 Ok SAD062803TF 2.5 Ok SAD060100F2 2.0 Ok SAD060100F0 2.0 Ok Mod Online Diag Status --- ------------------1 Pass 2 Pass 3 Pass 4 Pass 5 Pass 6 Pass 7 Pass 8 Pass 9 Pass SH1-110# Return to SH1-110, page 193 SH1-113 Go to Test Device Configurations, page 17 Cisco IOS Release 12.1(13)E13 209 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-113#show config Using 12124 out of 391160 bytes ! ! version 12.1 service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! hostname SH1-113 ! boot system flash slot0: boot bootldr bootflash: no logging console enable password cisco ! clock timezone EST -5 clock summer-time EDT recurring vtp file bootflash:SH-VTP-config vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check mls ip multicast non-rpf netflow ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync bootvar auto-sync standard ! ! vlan 110-120,140,200 ! ! interface Loopback0 ip address 172.31.4.113 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.114 255.255.255.255 ip pim sparse-mode ! interface Port-channel10 description Dista-1 Port Channel no ip address switchport switchport trunk encapsulation dot1q Cisco IOS Release 12.1(13)E13 210 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Port-channel64 description SH1-99 Po64 ip address 172.31.11.2 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel164 description SH1-100 Po64 ip address 172.31.11.10 255.255.255.252 ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 description SH1-99 g9/7 no ip address channel-group 64 mode on ! interface GigabitEthernet2/2 description SH1-99 g9/8 no ip address channel-group 64 mode on ! interface GigabitEthernet2/3 no ip address shutdown ! interface GigabitEthernet2/4 no ip address shutdown ! interface GigabitEthernet2/5 no ip address shutdown ! interface GigabitEthernet2/6 no ip address shutdown ! interface GigabitEthernet2/7 no ip address shutdown ! interface GigabitEthernet2/8 no ip address shutdown ! interface GigabitEthernet2/9 description SH1-100 g9/7 no ip address channel-group 164 mode on ! interface GigabitEthernet2/10 description SH1-100 g9/8 no ip address channel-group 164 mode on Cisco IOS Release 12.1(13)E13 211 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet2/11 no ip address shutdown ! interface GigabitEthernet2/12 no ip address shutdown ! interface GigabitEthernet2/13 no ip address shutdown ! interface GigabitEthernet2/14 no ip address shutdown ! interface GigabitEthernet2/15 no ip address shutdown ! interface GigabitEthernet2/16 description Dista-1 3/7 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet3/1 description SH1-100 g1/1 no ip address channel-group 164 mode on ! interface GigabitEthernet3/2 description SH1-100 g3/7 no ip address channel-group 164 mode on ! interface GigabitEthernet3/3 no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 no ip address shutdown ! interface GigabitEthernet3/9 description SH1-99 g2/2 Cisco IOS Release 12.1(13)E13 212 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address channel-group 64 mode on ! interface GigabitEthernet3/10 description SH1-99 g4/5 no ip address channel-group 64 mode on ! interface GigabitEthernet3/11 no ip address shutdown ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 description Dista-1 5/7 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface FastEthernet9/1 ip address 10.194.17.113 255.255.255.0 shutdown duplex full ! interface FastEthernet9/2 description Ix-4/6 ip address 172.31.253.1 255.255.255.252 ip pim sparse-mode duplex full ! interface FastEthernet9/3 description IXIA 13/6 no ip address shutdown switchport switchport access vlan 200 switchport mode access ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address Cisco IOS Release 12.1(13)E13 213 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address Cisco IOS Release 12.1(13)E13 214 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.113 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 215 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan110 ip address 172.31.210.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode ip ospf cost 25 logging event link-status standby 1 ip 172.31.210.1 standby 1 priority 110 standby 1 preempt standby 2 ip 172.31.210.254 standby 2 priority 90 standby 2 preempt ! interface Vlan111 Cisco IOS Release 12.1(13)E13 216 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip address 172.31.211.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.211.1 standby 2 priority 110 standby 2 preempt standby 3 ip 172.31.211.254 standby 3 priority 90 standby 3 preempt ! interface Vlan112 ip address 172.31.212.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.212.1 standby 3 priority 110 standby 3 preempt standby 4 ip 172.31.212.254 standby 4 priority 90 standby 4 preempt ! interface Vlan113 ip address 172.31.213.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.213.1 standby 4 priority 110 standby 4 preempt standby 5 ip 172.31.213.254 standby 5 priority 90 standby 5 preempt ! interface Vlan114 ip address 172.31.214.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.214.1 standby 5 priority 110 standby 5 preempt standby 6 ip 172.31.214.254 standby 6 priority 90 standby 6 preempt ! interface Vlan115 ip address 172.31.215.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.215.1 standby 6 priority 110 Cisco IOS Release 12.1(13)E13 217 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby standby standby standby 6 7 7 7 preempt ip 172.31.215.254 priority 90 preempt ! interface Vlan116 ip address 172.31.216.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.216.1 standby 7 priority 110 standby 7 preempt standby 8 ip 172.31.216.254 standby 8 priority 90 standby 8 preempt ! interface Vlan117 ip address 172.31.217.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.217.1 standby 8 priority 110 standby 8 preempt standby 9 ip 172.31.217.254 standby 9 priority 90 standby 9 preempt ! interface Vlan118 ip address 172.31.218.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 9 ip 172.31.218.1 standby 9 priority 110 standby 9 preempt standby 10 ip 172.31.218.254 standby 10 priority 90 standby 10 preempt ! interface Vlan119 ip address 172.31.219.113 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 10 ip 172.31.219.1 standby 10 priority 110 standby 10 preempt standby 11 ip 172.31.219.254 standby 11 priority 90 standby 11 preempt ! interface Vlan120 ip address 172.31.220.113 255.255.255.0 no ip redirects Cisco IOS Release 12.1(13)E13 218 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.220.1 standby 11 priority 110 standby 11 preempt standby 12 ip 172.31.220.254 standby 12 priority 90 standby 12 preempt ! interface Vlan140 ip address 172.31.240.113 255.255.255.0 no ip redirects standby ip 172.31.240.1 standby priority 90 standby preempt ! interface Vlan200 ip address 172.31.200.9 255.255.255.252 ip pim sparse-mode ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan110 no passive-interface Vlan140 no passive-interface Port-channel64 no passive-interface Port-channel164 network 172.31.4.0 0.0.0.255 area 4 network 172.31.11.0 0.0.0.255 area 4 network 172.31.208.0 0.0.15.255 area 4 network 172.31.240.0 0.0.0.255 area 4 network 172.31.0.0 0.0.255.255 area 4 maximum-paths 6 ! ip classless ip route 10.194.17.0 255.255.255.0 10.194.17.254 ip route 172.18.177.0 255.255.255.0 10.194.17.254 no ip http server ip pim rp-address 172.31.0.114 1 override ip pim rp-address 172.31.0.98 2 override ip pim spt-threshold infinity ip msdp peer 172.31.4.114 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.18.177.132 public ! alias exec ospf sh run | be router ospf ! line con 0 exec-timeout 0 0 privilege level 15 password cisco Cisco IOS Release 12.1(13)E13 219 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology login history size 256 line vty 0 4 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 scheduler runtime netinput 300 ntp clock-period 17179962 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-113#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Sun 29-Feb-04 21:25 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(3r)E2, RELEASE SOFTWARE (fc1) SH1-113 uptime is 2 weeks, 2 days, 18 hours, 53 minutes Time since SH1-113 switched to active is 2 weeks, 2 days, 18 hours, 52 minutes System returned to ROM by power-on (SP by reload) System restarted at 16:50:18 EST Mon Mar 1 2004 System image file is "slot0:c6sup12-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 227328K/34816K bytes of memory. Processor board ID SAD050301AU R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). TN3270 Emulation software. 14 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 34 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Configuration register is 0x2102 SH1-113#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Cat 6k sup 1 Enhanced QoS (Active) 2 16 SFM-capable 16 port 1000mb GBIC 3 16 SFM-capable 16 port 1000mb GBIC 9 48 48-port 10/100 mb RJ45 Model -----------------WS-X6K-SUP1A-2GE WS-X6516-GBIC WS-X6516-GBIC WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.972d.5370 to 0001.972d.5371 7.0 5.4(2) 2 0008.7dc8.b67c to 0008.7dc8.b68b 5.3 6.3(1) Cisco IOS Release 12.1(13)E13 220 Serial No. ----------SAD05020FPW SAL0702BKMK SAL0709DHKF SAL0715BR2H Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 3 9 0008.7dc8.b41c to 0008.7dc8.b42b 000c.85e7.37f8 to 000c.85e7.3827 Mod Sub-Module --- --------------------------1 Policy Feature Card 1 Cat6k MSFC 2 daughterboard SH1-113# 5.3 1.2 6.3(1) 5.4(2) Model --------------WS-F6K-PFC WS-F6K-MSFC2 7.5(0.6)HUB1 Ok 7.5(0.6)HUB1 Ok Serial Hw Status --------------- ------- ------SAD05020NVB 1.1 Ok SAD050301AU 1.2 Ok Return to SH1-113, page 209 SH1-114 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 SH1-114#show config Using 12217 out of 391160 bytes ! ! version 12.1 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname SH1-114 ! boot system flash slot0: boot bootldr bootflash: no logging console enable password cisco ! clock timezone EST -5 clock summer-time EDT recurring vtp file bootflash:SH-VTP-config vtp domain FIN vtp mode transparent ip subnet-zero ! ! ip ftp username safeharbor ip ftp password shshsh no ip domain-lookup ! ip multicast-routing mls flow ip destination-source mls flow ipx destination mls ip multicast consistency-check mls ip multicast non-rpf netflow ! redundancy mode rpr-plus main-cpu auto-sync running-config auto-sync bootvar auto-sync standard ! ! vlan 2-199,207-329 ! Cisco IOS Release 12.1(13)E13 221 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology vlan 400 name test_RPR ! vlan 401 name test_vlan ! vlan 500-501,712-747,749-783,785-800,999 ! ! interface Loopback0 ip address 172.31.4.114 255.255.255.255 ip pim sparse-mode ! interface Loopback1 ip address 172.31.0.114 255.255.255.255 ip pim sparse-mode ! interface Port-channel10 description Dista-1 Port Channel no ip address switchport switchport trunk encapsulation dot1q ! interface Port-channel65 description SH1-99 Po65 ip address 172.31.11.6 255.255.255.252 ip pim sparse-mode logging event link-status ! interface Port-channel165 description SH1-100 Po65 ip address 172.31.11.14 255.255.255.252 ip pim sparse-mode logging event link-status ! interface GigabitEthernet1/1 no ip address shutdown ! interface GigabitEthernet1/2 no ip address shutdown ! interface GigabitEthernet2/1 description SH1-99 g9/7 no ip address channel-group 65 mode on ! interface GigabitEthernet2/2 description SH1-99 g9/8 no ip address channel-group 65 mode on ! interface GigabitEthernet2/3 no ip address shutdown ! interface GigabitEthernet2/4 no ip address shutdown ! interface GigabitEthernet2/5 no ip address shutdown Cisco IOS Release 12.1(13)E13 222 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface GigabitEthernet2/6 no ip address shutdown ! interface GigabitEthernet2/7 no ip address shutdown ! interface GigabitEthernet2/8 description Dista-1 3/4 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet2/9 description SH1-100 g4/5 no ip address channel-group 165 mode on ! interface GigabitEthernet2/10 description SH1-100 g4/6 no ip address channel-group 165 mode on ! interface GigabitEthernet2/11 no ip address shutdown ! interface GigabitEthernet2/12 no ip address shutdown ! interface GigabitEthernet2/13 no ip address shutdown ! interface GigabitEthernet2/14 no ip address shutdown ! interface GigabitEthernet2/15 no ip address shutdown ! interface GigabitEthernet2/16 description Dista-1 5/4 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet3/1 description SH1-100 g9/9 no ip address channel-group 165 mode on ! interface GigabitEthernet3/2 description SH1-100 g9/10 no ip address channel-group 165 mode on ! interface GigabitEthernet3/3 Cisco IOS Release 12.1(13)E13 223 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface GigabitEthernet3/4 no ip address shutdown ! interface GigabitEthernet3/5 no ip address shutdown ! interface GigabitEthernet3/6 no ip address shutdown ! interface GigabitEthernet3/7 no ip address shutdown ! interface GigabitEthernet3/8 description Dista-1 3/5 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface GigabitEthernet3/9 description SH1-99 g2/2 no ip address channel-group 65 mode on ! interface GigabitEthernet3/10 description SH1-99 g4/5 no ip address channel-group 65 mode on ! interface GigabitEthernet3/11 no ip address shutdown ! interface GigabitEthernet3/12 no ip address shutdown ! interface GigabitEthernet3/13 no ip address shutdown ! interface GigabitEthernet3/14 no ip address shutdown ! interface GigabitEthernet3/15 no ip address shutdown ! interface GigabitEthernet3/16 description Dista-1 5/5 no ip address switchport switchport trunk encapsulation dot1q channel-group 10 mode on ! interface FastEthernet9/1 Cisco IOS Release 12.1(13)E13 224 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology no ip address shutdown ! interface FastEthernet9/2 description IXIA 13/5 no ip address switchport switchport access vlan 201 switchport mode access ! interface FastEthernet9/3 no ip address shutdown ! interface FastEthernet9/4 no ip address shutdown ! interface FastEthernet9/5 no ip address shutdown ! interface FastEthernet9/6 no ip address shutdown ! interface FastEthernet9/7 no ip address shutdown ! interface FastEthernet9/8 no ip address shutdown ! interface FastEthernet9/9 no ip address shutdown ! interface FastEthernet9/10 no ip address shutdown ! interface FastEthernet9/11 no ip address shutdown ! interface FastEthernet9/12 no ip address shutdown ! interface FastEthernet9/13 no ip address shutdown ! interface FastEthernet9/14 no ip address shutdown ! interface FastEthernet9/15 no ip address shutdown ! interface FastEthernet9/16 no ip address Cisco IOS Release 12.1(13)E13 225 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology shutdown ! interface FastEthernet9/17 no ip address shutdown ! interface FastEthernet9/18 no ip address shutdown ! interface FastEthernet9/19 no ip address shutdown ! interface FastEthernet9/20 no ip address shutdown ! interface FastEthernet9/21 no ip address shutdown ! interface FastEthernet9/22 no ip address shutdown ! interface FastEthernet9/23 no ip address shutdown ! interface FastEthernet9/24 description flashnet ip address 10.194.17.114 255.255.255.0 speed 100 duplex full ! interface FastEthernet9/25 no ip address shutdown ! interface FastEthernet9/26 no ip address shutdown ! interface FastEthernet9/27 no ip address shutdown ! interface FastEthernet9/28 no ip address shutdown ! interface FastEthernet9/29 no ip address shutdown ! interface FastEthernet9/30 no ip address shutdown ! interface FastEthernet9/31 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 226 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/32 no ip address shutdown ! interface FastEthernet9/33 no ip address shutdown ! interface FastEthernet9/34 no ip address shutdown ! interface FastEthernet9/35 no ip address shutdown ! interface FastEthernet9/36 no ip address shutdown ! interface FastEthernet9/37 no ip address shutdown ! interface FastEthernet9/38 no ip address shutdown ! interface FastEthernet9/39 no ip address shutdown ! interface FastEthernet9/40 no ip address shutdown ! interface FastEthernet9/41 no ip address shutdown ! interface FastEthernet9/42 no ip address shutdown ! interface FastEthernet9/43 no ip address shutdown ! interface FastEthernet9/44 no ip address shutdown ! interface FastEthernet9/45 no ip address shutdown ! interface FastEthernet9/46 no ip address shutdown ! interface FastEthernet9/47 no ip address shutdown ! Cisco IOS Release 12.1(13)E13 227 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology interface FastEthernet9/48 no ip address shutdown ! interface Vlan1 no ip address shutdown ! interface Vlan110 ip address 172.31.210.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode ip ospf cost 25 logging event link-status standby 1 ip 172.31.210.1 standby 1 priority 90 standby 1 preempt standby 2 ip 172.31.210.254 standby 2 priority 110 standby 2 preempt ! interface Vlan111 ip address 172.31.211.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 2 ip 172.31.211.1 standby 2 priority 90 standby 2 preempt standby 3 ip 172.31.211.254 standby 3 priority 110 standby 3 preempt ! interface Vlan112 ip address 172.31.212.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 3 ip 172.31.212.1 standby 3 priority 90 standby 3 preempt standby 4 ip 172.31.212.254 standby 4 priority 110 standby 4 preempt ! interface Vlan113 ip address 172.31.213.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 4 ip 172.31.213.1 standby 4 priority 90 standby 4 preempt standby 5 ip 172.31.213.254 standby 5 priority 110 standby 5 preempt Cisco IOS Release 12.1(13)E13 228 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! interface Vlan114 ip address 172.31.214.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 5 ip 172.31.214.1 standby 5 priority 90 standby 5 preempt standby 6 ip 172.31.214.254 standby 6 priority 110 standby 6 preempt ! interface Vlan115 ip address 172.31.215.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 6 ip 172.31.215.1 standby 6 priority 90 standby 6 preempt standby 7 ip 172.31.215.254 standby 7 priority 110 standby 7 preempt ! interface Vlan116 ip address 172.31.216.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 7 ip 172.31.216.1 standby 7 priority 90 standby 7 preempt standby 8 ip 172.31.216.254 standby 8 priority 110 standby 8 preempt ! interface Vlan117 ip address 172.31.217.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 8 ip 172.31.217.1 standby 8 priority 90 standby 8 preempt standby 9 ip 172.31.217.254 standby 9 priority 110 standby 9 preempt ! interface Vlan118 ip address 172.31.218.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status Cisco IOS Release 12.1(13)E13 229 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology standby standby standby standby standby standby 9 ip 172.31.218.1 9 priority 90 9 preempt 10 ip 172.31.218.254 10 priority 110 10 preempt ! interface Vlan119 ip address 172.31.219.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 10 ip 172.31.219.1 standby 10 priority 90 standby 10 preempt standby 11 ip 172.31.219.254 standby 11 priority 110 standby 11 preempt ! interface Vlan120 ip address 172.31.220.114 255.255.255.0 no ip redirects ip directed-broadcast ip pim query-interval 3 ip pim sparse-mode logging event link-status standby 11 ip 172.31.220.1 standby 11 priority 90 standby 11 preempt standby 12 ip 172.31.220.254 standby 12 priority 110 standby 12 preempt ! interface Vlan140 description Pagent OSPF VLAN ip address 172.31.240.114 255.255.255.0 no ip redirects standby ip 172.31.240.1 standby priority 110 standby preempt ! router ospf 1 log-adjacency-changes auto-cost reference-bandwidth 100000 passive-interface default no passive-interface Vlan110 no passive-interface Vlan140 no passive-interface Port-channel65 no passive-interface Port-channel165 network 172.31.4.0 0.0.0.255 area 4 network 172.31.11.0 0.0.0.255 area 4 network 172.31.208.0 0.0.15.255 area 4 network 172.31.240.0 0.0.0.255 area 4 network 172.31.0.0 0.0.255.255 area 4 maximum-paths 6 ! ip classless ip route 10.194.17.0 255.255.255.0 10.194.17.254 ip route 172.18.177.0 255.255.255.0 10.194.17.254 no ip http server ip pim rp-address 172.31.0.114 1 override ip pim rp-address 172.31.0.98 2 override Cisco IOS Release 12.1(13)E13 230 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ip pim spt-threshold infinity ip msdp peer 172.31.4.113 connect-source Loopback0 ip msdp cache-sa-state ip msdp originator-id Loopback0 ! ! access-list 1 permit 239.255.0.0 0.0.255.255 access-list 1 deny any access-list 2 permit 224.0.1.39 access-list 2 permit 224.0.1.40 snmp-server community public RO snmp-server community cisco RW snmp-server enable traps config snmp-server host 172.18.177.132 public ! alias exec ospf show runn | beg router ospf ! line con 0 exec-timeout 0 0 timeout login response 0 privilege level 15 password cisco login history size 256 line vty 0 4 exec-timeout 0 0 password cisco login history size 256 transport input lat pad mop telnet rlogin udptn nasi ! exception protocol ftp exception dump 172.18.177.129 exception memory fragment 200000 exception memory minimum 200000 ntp clock-period 17179793 ntp update-calendar ntp server 172.18.177.131 ntp server 172.18.177.132 prefer end SH1-114#show version Cisco Internetwork Operating System Software IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(nightly13e.E040229) NIGHTLY BUILD, synced to cosmos_e V121_12_5_E1 Copyright (c) 1986-2004 by cisco Systems, Inc. Compiled Sun 29-Feb-04 21:25 by Image text-base: 0x40008BF0, data-base: 0x41A4C000 ROM: System Bootstrap, Version 12.1(4r)E, RELEASE SOFTWARE (fc1) SH1-114 uptime is 2 weeks, 2 days, 18 hours, 52 minutes Time since SH1-114 switched to active is 2 weeks, 2 days, 18 hours, 51 minutes System returned to ROM by power-on (SP by reload) System restarted at 16:51:23 EST Mon Mar 1 2004 System image file is "slot0:c6sup12-jsv-mz.v121_13_e_throttle.040229" cisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory. Processor board ID SAL0603GURM R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache Last reset from power-on Bridging software. X.25 software, Version 3.0.0. SuperLAT software (copyright 1990 by Meridian Technology Corp). Cisco IOS Release 12.1(13)E13 231 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology TN3270 Emulation software. 13 Virtual Ethernet/IEEE 802.3 interface(s) 48 FastEthernet/IEEE 802.3 interface(s) 34 Gigabit Ethernet/IEEE 802.3 interface(s) 381K bytes of non-volatile configuration memory. 16384K bytes of Flash internal SIMM (Sector size 512K). Configuration register is 0x2102 SH1-114#show module Mod Ports Card Type --- ----- -------------------------------------1 2 Cat 6k sup 1 Enhanced QoS (Active) 2 16 SFM-capable 16 port 1000mb GBIC 3 16 SFM-capable 16 port 1000mb GBIC 9 48 48-port 10/100 mb RJ45 Model -----------------WS-X6K-SUP1A-2GE WS-X6516-GBIC WS-X6516-GBIC WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0005.7485.2b18 to 0005.7485.2b19 7.1 5.4(2) 2 0009.11f5.ada8 to 0009.11f5.adb7 5.3 6.3(1) 3 0009.11f5.ad58 to 0009.11f5.ad67 5.3 6.3(1) 9 000c.85cf.d798 to 000c.85cf.d7c7 1.2 5.4(2) Mod Sub-Module --- --------------------------1 Policy Feature Card 1 Cat6k MSFC 2 daughterboard SH1-114# Model --------------WS-F6K-PFC WS-F6K-MSFC2 Serial No. ----------SAL0605HKNZ SAL0709DJFH SAL0708DB24 SAL0715BR1Q Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAL0605HA8Z 2.0 Ok SAL0603GURM 2.0 Ok Return to SH1-114, page 221 Dista-1 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 dista-1> (enable) show config This command shows non-default configurations only. Use 'show config all' to show both default and non-default configurations. ............... .................. .................. .................. .................. .................. .................... .. begin ! # ***** NON-DEFAULT CONFIGURATION ***** ! ! #time: Thu Mar 18 2004, 12:22:10 EST ! #version 6.4(8) ! set password $2$HUVd$Tqn8CBrZKs1Gbc31oxrLD0 Cisco IOS Release 12.1(13)E13 232 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set enablepass $2$fX1D$Lsu41oirUxJkSITgOEn2e. set prompt dista-1> set logout 0 ! #system set system name dista-1 ! #! #vtp set vtp domain FIN set vtp mode transparent set vlan 1 name default type ethernet mtu 1500 said 100001 state active set vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state active set vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state active stp ibm set vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active stp ibm set vlan 10-20,40-50,60-61,110-111,113,115,120,140,150,500-501,1000 set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active mode srb aremaxhop 7 stemaxhop 7 backupcrf off set vlan 1002 translation 1 translation 1003 set vlan 1003 translation 1 translation 1002 ! #ip set interface sc0 1000 10.194.17.111/255.255.255.0 10.194.17.255 set interface sl0 down set ip route 172.18.0.0/255.255.0.0 10.194.17.254 set ip alias default 0.0.0.0 ! #syslog set logging console disable set logging level ip 2 default ! #ntp set ntp client enable set ntp server 172.18.177.132 set ntp server 172.18.177.131 set timezone EST -5 0 set summertime enable EDT ! #set boot command set boot config-register 0x2102 set boot system flash bootflash:cat6000-sup2.6-4-8.bin ! #mmls nonrpf set mmls nonrpf timer 10 ! #port channel set port channel 1/1,2/1 10 set port channel 3/6,3/8 17 set port channel 6/37-40 25 set port channel 1/2,2/2-4 30 set port channel 2/6 61 set port channel 3/1-3 106 set port channel 3/7,5/7 110 set port channel 2/5,2/7-8 248 set port channel 2/9-12 249 set port channel 2/13-16 250 set port channel 4/1-4 251 set port channel 4/5-8 252 set port channel 4/9-12 253 set port channel 4/13-16 254 set port channel 3/4-5,5/4-5 256 set port channel 6/1-4 257 Cisco IOS Release 12.1(13)E13 233 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set port channel 6/5-8 258 set port channel 6/9-12 259 set port channel 6/13-16 260 set port channel 6/17-20 261 set port channel 6/21-24 262 set port channel 6/25-28 263 set port channel 6/29-32 264 set port channel 6/33-36 265 set port channel 6/41-44 267 set port channel 6/45-48 268 ! # default port status is enable ! ! #module 1 : 2-port 1000BaseX Supervisor set module name 1 set port name 1/1 sh1-107 gi4/1 set port name 1/2 sh1-108 gi4/1 clear trunk 1/1 21-499,502-1000,1025-4094 set trunk 1/1 on dot1q 1-20,500-501,1001-1005 clear trunk 1/2 21-499,502-1000 set trunk 1/2 on dot1q 1-20,500-501,1001-1005,1025-4094 set port channel 1/1-2 mode on ! #module 2 : 16-port 1000BaseSX Ethernet set module name 2 set vlan 60 2/5 set vlan 61 2/6 set port name 2/1 sh1-107 gi4/3 set port name 2/3 sh1-108 gi4/3 set port name 2/4 sh1-108 gi4/4 clear trunk 2/1 21-499,502-1000,1025-4094 set trunk 2/1 on dot1q 1-20,500-501,1001-1005 clear trunk 2/2 21-499,502-1000 set trunk 2/2 on dot1q 1-20,500-501,1001-1005,1025-4094 clear trunk 2/3 21-499,502-1000 set trunk 2/3 on dot1q 1-20,500-501,1001-1005,1025-4094 clear trunk 2/4 21-499,502-1000 set trunk 2/4 on dot1q 1-20,500-501,1001-1005,1025-4094 clear trunk 2/6 21-1000 set trunk 2/6 auto negotiate 1-20,1001-1005,1025-4094 set spantree portfast 2/5,2/10 enable set port channel 2/1-4 mode on ! #module 3 : 8-port 1000BaseX Ethernet set module name 3 set port name 3/1 sh1-101 gi7/1 set port name 3/2 sh1-101 gi7/2 set port name 3/4 SH1-114 g2/8 set port name 3/5 SH1-114 g3/8 set port name 3/6 sh1-102 gi7/6 set port name 3/7 SH1-113 g2/16 set port name 3/8 sh1-102 gi7/8 set udld enable 3/3 clear trunk 3/1 2-39,51-59,62-149,151-1005,1025-4094 set trunk 3/1 desirable negotiate 1,40-50,60-61,150 clear trunk 3/2 2-39,51-59,62-149,151-1005,1025-4094 set trunk 3/2 desirable negotiate 1,40-50,60-61,150 set trunk 3/4 desirable negotiate 1-1005,1025-4094 set trunk 3/5 desirable negotiate 1-1005,1025-4094 clear trunk 3/6 1-39,51-59,62-149,151-1005 set trunk 3/6 auto negotiate 40-50,60-61,150,1025-4094 clear trunk 3/8 1-39,51-59,62-149,151-1005 set trunk 3/8 auto negotiate 40-50,60-61,150,1025-4094 Cisco IOS Release 12.1(13)E13 234 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set port channel 3/1-2,3/4-8 mode on ! #module 4 : 16-port 1000BaseSX Ethernet set module name 4 set vlan 1000 4/16 set port name 4/16 Backbone set spantree portfast 4/5,4/10 enable ! #module 5 : 8-port 1000BaseX Ethernet set module name 5 set vlan 43 5/1 set port disable 5/2-3,5/6,5/8 set port name 5/1 IXIA 1/2 set port name 5/4 SH1-114 g2/16 set port name 5/5 SH1-114 g3/16 set port name 5/7 SH1-113 g3/16 set trunk 5/4 desirable negotiate 1-1005,1025-4094 set trunk 5/5 desirable negotiate 1-1005,1025-4094 set port channel 5/4-5,5/7 mode on ! #module 6 : 48-port 10/100BaseTX Ethernet set vlan 10 6/12 set vlan 11 6/3 set vlan 16 6/4 set vlan 20 6/11 set vlan 41 6/1 set vlan 43 6/7 set vlan 44 6/6 set vlan 45 6/5 set vlan 110 6/8 set vlan 111 6/10 set vlan 113 6/9 set vlan 115 6/2 set vlan 120 6/13 set vlan 140 6/38 set vlan 150 6/37 set vlan 501 6/14 set vlan 1000 6/24 set port speed 6/1-12,6/24-26,6/30,6/35-36,6/47 set port duplex 6/1-12,6/24-26,6/30,6/35-36,6/47 set port name 6/1 IXIA 2/1 set port name 6/2 IXIA 4/1 set port name 6/3 Ixia 8/1 set port name 6/4 Ixia 8/2 set port name 6/5 IXIA 2/2 set port name 6/6 IXIA 2/8 set port name 6/7 IXIA 2/7 set port name 6/8 IXIA 3/3 set port name 6/9 IXIA 3/4 set port name 6/10 IXIA 5/4 set port name 6/11 Ixia 8/5 set port name 6/13 IXIA 10/1 set port name 6/37 rtp-wbu-te-p5 fa4/1 set port name 6/38 rtp-st-te-p4 fa2/0 set port name 6/48 rtp-wbu-knx1 eth0 clear trunk 6/5 2-44,46-59,61-1005,1025-4094 set trunk 6/5 on dot1q 1,45,60 clear trunk 6/6 2-43,45-60,62-1005,1025-4094 set trunk 6/6 on dot1q 1,44,61 set trunk 6/47 off negotiate 1-1005,1025-4094 clear trunk 6/48 1-9,11-39,41-109,111-1005,1025-4094 set trunk 6/48 on dot1q 10,40,110 set spantree portfast 6/1-48 enable 100 full Cisco IOS Release 12.1(13)E13 235 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology ! #module 15 empty ! #module 16 empty ! #switch port analyzer set span 6/6 6/17 tx inpkts disable learning enable multicast enable create end dista-1> (enable) show version WS-C6506 Software, Version NmpSW: 6.4(8) Copyright (c) 1995-2004 by Cisco Systems NMP S/W compiled on Jan 6 2004, 15:03:09 System Bootstrap Version: 6.1(3) Hardware Version: 2.0 PS1 Model: WS-C6506 Module: WS-CAC-1300W Serial #: TBA03310431 Serial #: ACP03470662 Mod Port Model Serial # Versions --- ---- ------------------- ----------- -------------------------------------1 2 WS-X6K-SUP2-2GE SAD0508096C Hw : 2.2 Fw : 6.1(3) Fw1: 6.1(3) Sw : 6.4(8) Sw1: 6.4(8) WS-F6K-PFC2 SAD05060T6K Hw : 1.3 2 16 WS-X6416-GE-MT SAD03441864 Hw : 1.0 Fw : 5.3(1) Sw : 6.4(8) 3 8 WS-X6408A-GBIC SAD042902PR Hw : 1.3 Fw : 5.4(2) Sw : 6.4(8) 4 16 WS-X6416-GE-MT SAD04030BMY Hw : 1.0 Fw : 5.3(1) Sw : 6.4(8) 5 8 WS-X6408-GBIC SAD03070639 Hw : 1.4 Fw : 4.2(0.24)VAI78 Sw : 6.4(8) 6 48 WS-X6248-RJ-45 SAD03151603 Hw : 1.1 Fw : 4.2(0.24)VAI78 Sw : 6.4(8) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free ------ ------- ------- ------- ------- ------- ------- ----- ----- ----1 131072K 64456K 66616K 32768K 24644K 8124K 512K 298K 214K Uptime is 37 days, 19 hours, 29 minutes dista-1> (enable) show module Mod Slot Ports Module-Type --- ---- ----- ------------------------1 1 2 1000BaseX Supervisor 2 2 16 1000BaseSX Ethernet 3 3 8 1000BaseX Ethernet 4 4 16 1000BaseSX Ethernet 5 5 8 1000BaseX Ethernet 6 6 48 10/100BaseTX Ethernet Mod Module-Name --- -------------------1 2 3 Cisco IOS Release 12.1(13)E13 236 Serial-Num ----------SAD0508096C SAD03441864 SAD042902PR Model ------------------WS-X6K-SUP2-2GE WS-X6416-GE-MT WS-X6408A-GBIC WS-X6416-GE-MT WS-X6408-GBIC WS-X6248-RJ-45 Sub --yes no no no no no Status -------ok ok ok ok ok ok Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 4 5 6 SAD04030BMY SAD03070639 SAD03151603 Mod MAC-Address(es) --- -------------------------------------1 00-02-7e-27-78-3a to 00-02-7e-27-78-3b 00-02-7e-27-78-38 to 00-02-7e-27-78-39 00-d0-97-f0-2c-00 to 00-d0-97-f0-2f-ff 2 00-30-b6-d4-0e-8c to 00-30-b6-d4-0e-9b 3 00-01-64-11-f4-f8 to 00-01-64-11-f4-ff 4 00-d0-d3-9d-da-cc to 00-d0-d3-9d-da-db 5 00-50-54-6c-90-58 to 00-50-54-6c-90-5f 6 00-d0-58-e9-9a-bc to 00-d0-58-e9-9a-eb Hw Fw Sw ------ ---------- ----------------2.2 6.1(3) 6.4(8) 1.0 1.3 1.0 1.4 1.1 5.3(1) 5.4(2) 5.3(1) 4.2(0.24)V 4.2(0.24)V 6.4(8) 6.4(8) 6.4(8) 6.4(8) 6.4(8) Mod Sub-Type Sub-Model Sub-Serial Sub-Hw --- ----------------------- ------------------- ----------- -----1 L3 Switching Engine II WS-F6K-PFC2 SAD05060T6K 1.3 dista-1> (enable) Return to Dista-1, page 232 Dista-2 Go to Test Device Configurations, page 17 Go to Financial Lab Topology, page 2 Go to Test Cases, page 249 dista-2> (enable) show config This command shows non-default configurations only. Use 'show config all' to show both default and non-default configurations. ............... .................. .................. .................. .................. .................. .................... .. begin ! # ***** NON-DEFAULT CONFIGURATION ***** ! ! #time: Thu Mar 18 2004, 12:23:29 EST ! #version 6.4(8) ! set password $2$HdPF$ky0W54iah7rSH2NHCoDzs1 set enablepass $2$WHuS$8gNVDrC94NAzIlsdH32ic. set prompt dista-2> set logout 0 ! #system set system name ! #! #vtp dista-2 Cisco IOS Release 12.1(13)E13 237 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set set set set set set set set set srb ! #ip set vtp domain FIN vtp mode transparent vlan 1 name default type ethernet mtu 1500 said 100001 state active vlan 97 rspan name VLAN0097 state active vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state active vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state active stp ieee vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active stp ibm vlan 10-21,40-50,100,110,120,150,170,190,254,294,501,600,1000 vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active mode aremaxhop 0 stemaxhop 0 backupcrf off interface sc0 1000 10.194.17.112/255.255.255.0 10.194.17.255 set ip route 172.18.0.0/255.255.0.0 10.194.17.254 set ip alias default 0.0.0.0 ! #syslog set logging console disable set logging level ip 2 default ! #ntp set ntp client enable set ntp server 172.18.177.132 set ntp server 172.18.177.131 set timezone EST -5 0 set summertime enable EDT ! #set boot command set boot config-register 0x2102 set boot system flash bootflash:cat6000-sup2.6-4-8.bin ! #udld set udld enable set udld interval 7 ! #port channel set port channel 6/41-44 31 set port channel 6/1-4 32 set port channel 4/2,4/15 120 set port channel 2/5-8 129 set port channel 4/7-8 163 set port channel 4/9-11 164 set port channel 2/3-4 191 set port channel 6/17 192 set port channel 2/1-2 199 set port channel 1/2,4/3,4/12-13 213 set port channel 1/1,4/14 683 set port channel 4/4,4/6 771 set port channel 3/2-5 868 set port channel 3/6-8 869 set port channel 4/5 940 set port channel 3/1 942 ! #errdisable timeout set errdisable-timeout enable udld set errdisable-timeout interval 30 ! # default port status is enable ! ! #module 1 : 2-port 1000BaseX Supervisor set module name 1 set port name 1/1 sh1-109 g7/3 Cisco IOS Release 12.1(13)E13 238 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set port name 1/2 sh1-110 g7/3 set port negotiation 1/1 disable set udld aggressive-mode enable 1/1-2 clear trunk 1/1 190,1000 set trunk 1/1 auto negotiate 1-189,191-999,1001-1005,1025-4094 clear trunk 1/2 1000 set trunk 1/2 auto negotiate 1-999,1001-1005,1025-4094 set port channel 1/1 mode on ! #module 2 : 16-port 1000BaseX Ethernet set module name 2 set vlan 190 2/1-4 set port disable 2/5-8 set port name 2/1 SH1-109 g3/2 set port name 2/2 SH1-109 g4/2 set port name 2/3 SH1-110 g3/2 set port name 2/4 SH1-110 g4/2 set udld enable 2/5-16 clear trunk 2/1 190 set trunk 2/1 off negotiate 1-189,191-1005,1025-4094 clear trunk 2/2 190 set trunk 2/2 off negotiate 1-189,191-1005,1025-4094 clear trunk 2/3 190 set trunk 2/3 off negotiate 1-189,191-1005,1025-4094 clear trunk 2/4 190 set trunk 2/4 off negotiate 1-189,191-1005,1025-4094 clear trunk 2/5 1-39,51-1005 set trunk 2/5 off negotiate 40-50,1025-4094 clear trunk 2/6 1-39,51-1005 set trunk 2/6 off negotiate 40-50,1025-4094 set port channel 2/5-8 mode off ! #module 3 : 8-port 1000BaseX Ethernet set module name 3 set vlan 1000 3/1,3/7-8 set port name 3/2 SH1-110 g3/5 set port name 3/3 SH1-110 g3/6 set port name 3/4 SH1-110 g4/5 set port name 3/5 SH1-110 g4/6 set port name 3/7 SH1-109 flash set port name 3/8 SH1-110 flash clear trunk 3/2 190 set trunk 3/2 auto negotiate 1-189,191-1005,1025-4094 clear trunk 3/3 190 set trunk 3/3 auto negotiate 1-189,191-1005,1025-4094 clear trunk 3/4 190 set trunk 3/4 auto negotiate 1-189,191-1005,1025-4094 clear trunk 3/5 190 set trunk 3/5 auto negotiate 1-189,191-1005,1025-4094 ! #module 4 : 16-port 1000BaseSX Ethernet set module name 4 set vlan 1000 4/16 set port disable 4/5 set set set set set set set set port port port port port port port port name name name name name name name name 4/3 4/4 4/5 4/6 4/9 4/10 4/12 4/13 sh1-110 g8/3 SH1-105 g3/7 BAD PORT sh1-105 g3/8 sh1-106 g3/7 sh1-106 3/8 sh1-110 g7/5 sh1-110 g8/5 Cisco IOS Release 12.1(13)E13 239 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set port name 4/14 sh1-109 g6/3 set port name 4/16 dista-1 4/16 set port negotiation 4/2,4/14-15 disable set udld aggressive-mode enable 4/1-16 clear trunk 4/2 1000 set trunk 4/2 auto negotiate 1-999,1001-1005,1025-4094 clear trunk 4/3 1000 set trunk 4/3 auto negotiate 1-999,1001-1005,1025-4094 clear trunk 4/4 1-39,51-169,171-599,601-1005 set trunk 4/4 auto negotiate 40-50,170,600,1025-4094 clear trunk 4/5 1-39,51-169,171-599,601-1005 set trunk 4/5 auto negotiate 40-50,170,600,1025-4094 clear trunk 4/6 1-39,51-169,171-599,601-1005 set trunk 4/6 auto negotiate 40-50,170,600,1025-4094 clear trunk 4/9 1-39,51-169,171-599,601-1005 set trunk 4/9 auto negotiate 40-50,170,600,1025-4094 clear trunk 4/10 1-39,51-169,171-599,601-1005 set trunk 4/10 auto negotiate 40-50,170,600,1025-4094 clear trunk 4/12 1000 set trunk 4/12 auto negotiate 1-999,1001-1005,1025-4094 clear trunk 4/13 1000 set trunk 4/13 auto negotiate 1-999,1001-1005,1025-4094 clear trunk 4/14 190,1000 set trunk 4/14 auto negotiate 1-189,191-999,1001-1005,1025-4094 clear trunk 4/15 1000 set trunk 4/15 auto negotiate 1-999,1001-1005,1025-4094 set spantree portfast 4/4-10 enable set port channel 4/4,4/6,4/9-10,4/14 mode on set port channel 4/2,4/5 mode off ! #module 5 : 24-port 100BaseFX MM Ethernet set vlan 1000 5/1-24 set port duplex 5/1-24 full set port name 5/1 sh1-97 flash set port name 5/2 sh1-98 flash set port name 5/5 sh1-101 flash set port name 5/6 sh1-102 flash set port name 5/8 sh1-104 flash set port name 5/19 sh1-106 flash set port name 5/20 sh1-105 flash set port name 5/21 sh1-108 flash set port name 5/22 sh1-114 flash set port name 5/23 sh1-107 flash set port name 5/24 SH1-105-7/1 set spantree portfast 5/1,5/9 enable ! #module 6 : 48-port 10/100BaseTX Ethernet set vlan 10 6/14 set vlan 11 6/8 set vlan 16 6/9,6/20 set vlan 17 6/5 set vlan 18 6/45 set vlan 19 6/4 set vlan 20 6/6,6/10 set vlan 40 6/1,6/21-22 set vlan 41 6/2 set vlan 45 6/25 set vlan 47 6/7 set vlan 49 6/3 set vlan 50 6/11-12,6/15 set vlan 170 6/47 set vlan 190 6/17 set vlan 1000 6/13,6/23-24,6/43-44,6/46 set port speed 6/1-10,6/13-14,6/16,6/20-21,6/23-26,6/35-36,6/43-44,6/47 Cisco IOS Release 12.1(13)E13 240 100 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology set port duplex 6/1-10,6/13-14,6/16,6/20-21,6/23-24,6/26,6/35-36,6/43-44,6/47 set port name 6/1 IXIA 2/5 set port name 6/2 IXIA 5/2 set port name 6/3 IXIA 4/2 set port name 6/4 IXIA 5/2 set port name 6/5 IXIA 5/1 set port name 6/6 rtp-st-ipc1 set port name 6/7 IXIA 2/3 set port name 6/8 Ixia 8/3 set port name 6/9 Ixia 8/4 set port name 6/10 Ixia 8/6 set port name 6/12 IXIA 10/2 set port name 6/13 sh1-100 flash set port name 6/14 IXIA 10/3 set port name 6/15 rtp-st-ips1 set port name 6/16 Ixia 10/6 set port name 6/17 Ixia 10/6 set port name 6/21 IXIA 10/7 DHCP set port name 6/22 IXIA 10/8 DHCP set port name 6/23 SH1-113 flashnet set port name 6/24 SH1-114 flashnet set port name 6/36 SH1-97 Fa8/44 set port name 6/43 sh1-109 flash set port name 6/44 sh1-110 flash set port name 6/45 rtp-st-ipc2 set port name 6/46 sh1-103 flash set port name 6/47 rtp-wbu-te-p4 fa3/0 set port name 6/48 rtp-wbu-knx1 eth1 clear trunk 6/16 1-9,11-39,41-1005,1025-4094 set trunk 6/16 on dot1q 10,40 set trunk 6/25 off negotiate 1-1005,1025-4094 clear trunk 6/48 1-9,11-39,41-96,98-1005,1025-4094 set trunk 6/48 on dot1q 10,40,97 set spantree portfast 6/1-48 enable ! #module 15 empty ! #module 16 empty ! #switch port analyzer set rspan source 6/36 97 both multicast enable create end dista-2> (enable) show version WS-C6506 Software, Version NmpSW: 6.4(8) Copyright (c) 1995-2004 by Cisco Systems NMP S/W compiled on Jan 6 2004, 15:03:09 full System Bootstrap Version: 6.1(3) Hardware Version: 2.0 PS1 Model: WS-C6506 Module: WS-CAC-1300W Serial #: TBA03310403 Serial #: ACP03300280 Mod Port Model Serial # Versions --- ---- ------------------- ----------- -------------------------------------1 2 WS-X6K-SUP2-2GE SAD05080H4J Hw : 2.2 Fw : 6.1(3) Fw1: 6.1(3) Sw : 6.4(8) Sw1: 6.4(8) WS-F6K-PFC2 SAD05080LLD Hw : 1.3 2 16 WS-X6416-GBIC SAL0745PD34 Hw : 2.5 Fw : 5.4(2) Sw : 6.4(8) Cisco IOS Release 12.1(13)E13 241 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Financial Lab Topology 3 8 WS-X6408A-GBIC 4 16 WS-X6416-GE-MT 5 24 WS-X6324-100FX-MM 6 48 WS-X6248A-RJ-45 SAD043500H1 Hw Fw Sw SAD03441943 Hw Fw Sw SAD0551070A Hw Fw Sw SAD03406770 Hw Fw Sw : : : : : : : : : : : : 1.3 5.4(2) 6.4(8) 1.0 5.3(1) 6.4(8) 3.0 5.4(2) 6.4(8) 1.1 5.1(1)CSX 6.4(8) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free ------ ------- ------- ------- ------- ------- ------- ----- ----- ----1 131072K 64348K 66724K 32768K 25082K 7686K 512K 306K 206K Uptime is 37 days, 19 hours, 4 minutes dista-2> (enable) show module Mod Slot Ports Module-Type --- ---- ----- ------------------------1 1 2 1000BaseX Supervisor 2 2 16 1000BaseX Ethernet 3 3 8 1000BaseX Ethernet 4 4 16 1000BaseSX Ethernet 5 5 24 100BaseFX MM Ethernet 6 6 48 10/100BaseTX Ethernet Mod Module-Name --- -------------------1 2 3 4 5 6 Model ------------------WS-X6K-SUP2-2GE WS-X6416-GBIC WS-X6408A-GBIC WS-X6416-GE-MT WS-X6324-100FX-MM WS-X6248A-RJ-45 Sub --yes no no no no no Status -------ok ok ok ok ok ok Serial-Num ----------SAD05080H4J SAL0745PD34 SAD043500H1 SAD03441943 SAD0551070A SAD03406770 Mod MAC-Address(es) --- -------------------------------------1 00-d0-c0-d4-9e-32 to 00-d0-c0-d4-9e-33 00-d0-c0-d4-9e-30 to 00-d0-c0-d4-9e-31 00-d0-d3-07-f8-00 to 00-d0-d3-07-fb-ff 2 00-0e-38-4b-18-28 to 00-0e-38-4b-18-37 3 00-30-b6-3e-fc-c0 to 00-30-b6-3e-fc-c7 4 00-30-96-2b-0a-28 to 00-30-96-2b-0a-37 5 00-08-a4-30-0a-f8 to 00-08-a4-30-0b-0f 6 00-d0-d3-28-bd-50 to 00-d0-d3-28-bd-7f Hw Fw Sw ------ ---------- ----------------2.2 6.1(3) 6.4(8) 2.5 1.3 1.0 3.0 1.1 5.4(2) 5.4(2) 5.3(1) 5.4(2) 5.1(1)CSX 6.4(8) 6.4(8) 6.4(8) 6.4(8) 6.4(8) Mod Sub-Type Sub-Model Sub-Serial Sub-Hw --- ----------------------- ------------------- ----------- -----1 L3 Switching Engine II WS-F6K-PFC2 SAD05080LLD 1.3 dista-2> (enable) Return to Dista-2, page 237 Cisco IOS Release 12.1(13)E13 242 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Results Summary Test Results Summary Table 1 summarizes the tests to be executed as part of the Cisco IOS Safe Harbor initiative. Table 1 includes the feature or function tested, the section that describes the feature set the feature or function belongs to, the component tests for each feature or function, and whether the test is new in this iteration of Safe Harbor testing. Table 1 Safe Harbor Test Plan Summary Test Suites Feature/Function Tests Results Memory Leak Memory Leak, page 249 Repeated Telnet to Supervisor 11 Pass Repeated Telnet to Supervisor 12 Repeated Telnet to Supervisor 22 Repeated SSH to Supervisor 11 CSCeb55703 Repeated SSH to Supervisor 12 Repeated SSH to Supervisor 22 Multicast Flap Memory Hardware Redundancy Hardware Redundancy, page 255 Switch Fabric Module Failover Pass Supervisor 1 Failover Supervisor 2 Failover Power Supply Failure—Supervisor 1 Power Supply Failure—Supervisor 2 RPR+: Supervisor Hot Insert Layer 2 Features Unidirectional Link Detection-Aggressive Mode, page 262 Basic UDLD on Layer 2 Link Trunking, page 264 Sup 1 Configuration and Failure Recovery Pass Basic UDLD on Layer 3 Link Pass Sup 2 Configuration and Failure Recovery Port Aggregation Protocol (Channeling), page 267 Basic Layer 2 Channeling Configuration Pass Basic Layer 3 Channeling Configuration Layer 2 EtherChannel Load Balancing Layer 3 EtherChannel Load Balancing Layer 2 EtherChannel Failure and Recovery—Supervisor 1 Layer 3 EtherChannel Failure and Recovery—Supervisor 1 Layer 2 EtherChannel Failure and Recovery—Supervisor 2 Layer 3 EtherChannel Failure and Recovery—Supervisor 2 Gigabit Ethernet Module Reset—Sup 1 Gigabit Ethernet Module Reset—Sup 2 Cisco IOS Release 12.1(13)E13 243 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Results Summary Table 1 Safe Harbor Test Plan Summary (continued) Test Suites Feature/Function Tests Results Layer 2 Features VLAN Trunking Protocol, page 282 Basic VLAN Trunking Protocol Configuration Pass Layer 3 Routing Features IP Multicast, page 285 Last-Hop Router Functionality Pass First-Hop Router Functionality Basic Static RP Functionality—Supervisor 11 CSCea21798 Basic Static RP Functionality—Supervisor 22 CSCed73091 Basic Auto RP Functionality—Supervisor 22 Auto PIM RP Failover—First Hop Router Impact—Supervisor 11 Auto PIM RP Failover—First Hop Router Impact—Supervisor 12 Auto PIM RP Failover—First Hop Router Impact—Supervisor 22 Auto PIM RP Failover—Traffic Impact—Supervisor 22 Static PIM-RP Failover—Supervisor 11 Static PIM-RP Failover—Supervisor 22—RP Impact Static PIM-RP Failover—Supervisor 22—First-Hop Router Impact Static PIM-RP Failover—Supervisor 22—Traffic Impact Basic IGMP Functionality IGMP Leave/Join Functionality Non-RPF Rate Limiting and Multicast Stub—Supervisor 1 Non-RPF Rate Limiting and Multicast Stub—Supervisor 2 Layer 2 GEC Failover—SH1-110 to Dista-2 Layer 2 GEC Failover—SH1-108 to Dista-1 Layer 2 GEC Failover—SH1-114 to Dista-1 Layer 2 GEC Failover—SH1-106 to Dista-2 Layer 2 GEC Failover—SH1-102 to Dista-1 Layer 3 GEC Failover—SH1-104 to SH1-110 Layer 3 GEC Failover—SH1-104 to SH1-109 Layer 3 GEC Failover—SH1-104 to SH1-108 Layer 3 GEC Failover—SH1-104 to SH1-107 Layer 3 GEC Failover—SH1-100 to SH1-104 Layer 3 GEC Failover—SH1-100 to SH1-113 Cisco IOS Release 12.1(13)E13 244 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Results Summary Table 1 Safe Harbor Test Plan Summary (continued) Test Suites Feature/Function Tests Results Layer 3 Routing Features IP Multicast, page 285 Layer 3 GEC Failover—SH1-100 to SH1-106 Pass Layer 3 GEC Failover—SH1-100 to SH1-105 Layer 3 GEC Failover—SH1-100 to SH1-102 Layer 3 GEC Failover—SH1-100 to SH1-101 Layer 3 GEC Failover—SH1-100 to SH1-97 Switch Fabric Module Failover—Supervisor 22 GEM Failover—Supervisor 11 as First-Hop Router GEM Failover—Supervisor 11 as Last-Hop Router GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface GEM Failover—Supervisor 22 as First-Hop Router GEM Failover—Supervisor 22 as Last-Hop Router GEM Failover—Supervisor 22 as Static RP GEM Failover—Supervisor 22 as Auto RP GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface Protocol Independent Module-Designated Router Failover—Supervisor 11 Protocol Independent Module-Designated Router Failover—Supervisor 22 Auto-RP Failover—RP Impact Cisco Express Forwarding, page 396 CEF Packet Switching Pass CEF Route Entries on DFC CEF Many-to-One Distribution Load Balance CEF Many-to-Many Distribution with Polarization Load Balance Open Shortest Path First, page 405 OSPF Autocost Pass OSPF Passive Interface OSPF Filtering OSPF Redistribution OSPF Topology Database Verification Cisco IOS Release 12.1(13)E13 245 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Results Summary Table 1 Safe Harbor Test Plan Summary (continued) Test Suites Feature/Function Tests Results Layer 3 Routing Features Border Gateway Protocol, page 414 Add 120,000 Routes Pass Redistribution OSPF into BGP Redistribution EIGRP into BGP Redistribution OSPF and EIGRP into BGP BGP Neighbor Flap BGP Neighbor Flap—With Dampening BGP Neighbor Flap—No Dampening Hot Standby Routing Protocol, page 424 HSRP Failover with Default Timers—Supervisor 11 Pass HSRP Failover with Default Timers—Sup 22—Compact Switching Mode HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode HSRP Failover with Fast Timers—Supervisor 11 HSRP Failover with Fast Timers—Supervisor 22 Impact of HSRP Traffic on CPU HSRP Maximum Group Limit GEM Failover with Attached HSRP Groups Network Management Features Enhanced Interior Gateway Routing Protocol, page 437 EIGRP Summarization Simple Network Management Protocol, page 442 Basic Functionality Shut/No Shut Interface—Supervisor 11 Pass EIGRP Redistribution Pass Basic Functionality Shut/No Shut Interface—Supervisor 22 Protos Negative Request Application TACACS, page 445 User Authentication—Supervisor 11 Pass User Authentication—Supervisor 22 Miscellaneous Features Dynamic Host Control Protocol, page 447 Basic DHCP—Supervisor 11 Switched Port Analyzer, page 450 SPAN Basic Functionality Pass Access Control Lists, page 452 ACL 110 Supervisor 11 Pass Basic DHCP—Supervisor 22 ACL 110 Supervisor 12 ACL 110 Supervisor 22 ACL 131 Supervisor 11 ACL 131 Supervisor 12 ACL 131 Supervisor 22 Cisco IOS Release 12.1(13)E13 246 Pass Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Results Summary Table 1 Safe Harbor Test Plan Summary (continued) Test Suites Feature/Function Tests Results Miscellaneous Features Parser, page 458 Show-All Script via Telnet Supervisor 11 Pass Show-All Script via Telnet Supervisor 12 Show-All Script via Telnet Supervisor 22 Show-All Script via SSH Supervisor 11 Show-All Script via SSH Supervisor 12 Show-All Script via SSH Supervisor 22 Network Address Translation, page 463 Static 2 Hosts Pass Static 40 Hosts Static 40 Hosts Extended Static 2 Networks Static Inside Dynamic Outside Dynamic Inside Static Outside Addition/Removal of NAT Statements Static 40 Hosts Overnight Network Time Protocol, page 472 Increment Inside Random Outside with Match-Host New Basic NTP Functionality—Supervisor 1 Pass Basic NTP Functionality—Supervisor 2 NTP Failover—Supervisor 1 and Supervisor 2 Syslog, page 476 Basic Syslog Functionality—Supervisor 1 Pass Basic Syslog Functionality—Supervisor 2 User Datagram Protocol Broadcast Flooding, page 477 UDP Broadcast Flooding Pass System Upgrade, page 480 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11 Pass Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22 Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11 Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 12 Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22 Secure Shell, page 485 SSH Server Vulnerability Pass Cisco IOS Release 12.1(13)E13 247 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers DDTS Summary DDTS Summary Table 2 lists Development Defect Tracking System (DDTS) software bugs, descriptions, and comments filed by the Safe Harbor testing team during Cisco Native IOS Release 12.1(13)E13 testing. Table 3 lists DDTS and descriptions encountered during Cisco Native IOS Release 12.1(13)E13 testing. Table 2 Summary of DDTS Filed During Cisco Safe Harbor Native IOS 12.1(13)E13 Testing DDTS Description CSCeb55703 Externally found moderate defect: More (M). Cannot ssh to router - crc comparison failed. CSCea21798 Internally found moderate defect: Duplicate (D). Packet loadbalancing is inconsistent between 12.1E and 12.2S CSCed73091 Internally found moderate defect: Awaiting Info (I). Spurious memory access during reload - bgp. Table 3 DDTS Summary of DDTS Encountered During Cisco Safe Harbor Native IOS 12.1(13)E13 Testing Description CSCec58642 Spurious access: Traceback in pm_fc_print_fc_of_idb. Fixed in Const2 (CSCdz24826) and cosmos_e (CSCeb12301) Cisco IOS Release 12.1(13)E13 248 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Test Cases Test Cases Functionality critical to the global financial service business tested for the Cisco IOS Safe Harbor release is described in the following sections: Note • Memory Leak, page 249 • Hardware Redundancy, page 255 • Layer 2 Features, page 262 • Layer 3 Routing Features, page 285 • Network Management Features, page 442 • Miscellaneous Features, page 447 For a compete list of Cisco IOS commands and usage, refer to: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/index.htm Memory Leak Testing for memory leaks occurred each evening of a regular workday. The last regular test of the day that is performed was repeated throughout the night, with the memory being recorded for each device in the network. The duration of each memory leak test is approximately 16 hours, or from 5 p.m. to 9 a.m. the next morning. On weekends, the test was run for the entire weekend, or approximately 64 hours, from 5 p.m. Friday evening until 9 a.m. Monday morning. The testing that occurred for this iteration was a repetition of the EIGRP route summarization test. Summarization was configured on devices SH1-99 and SH1-100, followed by a 5-minute sleep period. Then summarization was removed from the same devices, followed by another 5-minute sleep period. This cycle was repeated overnight. SNMP polls were taken every 5 minutes and the results for the Memory Free for each device displayed. Whenever a fault was encountered, the redundant module took over the functions of the failed hardware module. Memory leak testing for Safe Harbor involved performing various failover scenarios to verify that internal hardware redundancy failed over as expected. The following tests were performed: • Repeated Telnet to Supervisor 11, page 249 • Repeated Telnet to Supervisor 12, page 250 • Repeated Telnet to Supervisor 22, page 251 • Repeated SSH to Supervisor 11, page 251 • Repeated SSH to Supervisor 12, page 252 • Repeated SSH to Supervisor 22, page 253 • Multicast Flap Memory, page 253 Repeated Telnet to Supervisor 11 This test verified that repeated Telnets to supervisor 11 did not impact memory or system stability. Devices under test: SH1-105 (sup 11). Cisco IOS Release 12.1(13)E13 249 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Memory Leak Test Procedure The procedure used to perform the Repeated Telnet to Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into each DUT repeatedly (2500 times into SH1-105). Step 5 Display the log for error messages. Step 6 Verify that memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Results Table 4 Repeated Telnet to Supervisor 11 Test Results Test Result Repeated Telnet to Supervisor 11 Pass Repeated Telnet to Supervisor 12 This test verified that repeated Telnets to supervisor 12 did not impact memory or system stability. Devices under test: SH1-107 (sup 12). Test Procedure The procedure used to perform the Repeated Telnet to Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into the DUT repeatedly (2500 times into SH1-107). Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Cisco IOS Release 12.1(13)E13 250 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Memory Leak Results Table 5 Repeated Telnet to Supervisor 12 Test Results Test Result Repeated Telnet to Supervisor 12 Pass Repeated Telnet to Supervisor 22 This test verified that repeated Telnets to supervisor 22 did not impact memory or system stability. Devices under test: SH1-109 (sup 22). Test Procedure The procedure used to perform the Repeated Telnet to Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into each DUT repeatedly (1000 times into SH1-109). Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Results Table 6 Repeated Telnet to Supervisor 22 Test Results Test Result Repeated Telnet to Supervisor 22 Pass Repeated SSH to Supervisor 11 This test verified that repeated SSH to supervisor 11 did not impact memory or system stability. Devices under est: SH1-106 (sup 11). Test Procedure The procedure used to perform the Repeated SSH to Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Cisco IOS Release 12.1(13)E13 251 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Memory Leak Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into each DUT repeatedly (1000 times into SH1-106). Step 5 Display the log for error messages. Step 6 Verify that memory and the CPU did not suffer severe, sustained, or unacceptable impact. Note The polling occurred over a 5-hour period of time. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Results Table 7 Repeated SSH to Supervisor 11 Test Results Test Result Repeated SSH to Supervisor 11 Pass with exception CSCeb55703 Repeated SSH to Supervisor 12 This test verified that repeated SSH to supervisor 12 did not impact memory or system stability. Devices under test:SH1-108 (sup 12). Test Procedure The procedure used to perform the Repeated SSH to Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into each DUT repeatedly (1000 times into SH1-108). Step 5 Display the log for error messages. Step 6 Verify that memory and the CPU did not suffer severe, sustained, or unacceptable impact. Note The polling occurred over a 60-hour period of time. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Cisco IOS Release 12.1(13)E13 252 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Memory Leak Results Table 8 Repeated SSH to Supervisor 12 Test Results Test Result Repeated SSH to Supervisor 12 Pass with exception CSCeb55703 Repeated SSH to Supervisor 22 This test verified that repeated SSH to supervisor 22 did not impact memory or system stability. Devices under test: SH1-109 (sup 22). Test Procedure The procedure used to perform the Repeated SSH to Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Telnet into each DUT repeatedly (1000 times into SH1-109). Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the DUT does not become unresponsive or leak memory. Results Table 9 Repeated SSH to Supervisor 22 Test Results Test Result Repeated SSH to Supervisor 22 Pass Multicast Flap Memory This test tracked the effects on memory utilization of the continuous addition and removal of mroutes on a given device. There were three sets of multicast traffic used, one for each platform: Sup11, Sup12, and Sup22. In each case, a Layer 2 switch is the first-hop device. For the 500 groups 239.100.[1,11].[1-250], SH1-114 and SH1-113 are PIM neighbors on the traffic source VLAN. SH1-114 is the first-hop router and maintains (*, G) and (S, G) entries for each of the 250 groups. An automated script shuts down the Layer 2 link (portchannel 10) to the L2 switch (Dusty-1) for a period of 15 minutes. SH1-113 becomes the first-hop router at this point, building (*, G) and (S, G) states for the 250 groups. The 15-minute time period is long enough for all group mroute states to time out and be deleted on Cisco IOS Release 12.1(13)E13 253 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Memory Leak SH1-114. After 15 minutes, the Layer 2 link is brought back up, SH1-114 will rebuild the mroute entries for each group. This link will remain up for another 15 minutes, long enough for all entries on SH1-113 to time out and be deleted. SH1-114 and SH1-113 are Supervisor1/MSFC2 devices. The same pattern was created for Supervisor11 and Supervisor22 devices, as well. SH1-106 and SH1-105 were the Sup11 first-hop routers for groups 239.100.[2,12].[1-250]. SH1-110 and SH1-109 were the Sup22 first-hop routers for groups 239.100.[3,13].[1-250]. At the same time as the mroute entries are being created/deleted on the three pairs of devices, the following is taking place on other devices in the network: • SH1-102 connectivity is being broken to the rest of the network, causing any traffic to go through SH1-101. • SH1-100 connectivity is being broken to the rest of the network, causing SH1-99 to become the primary PIM-RP for 1500+ mcast groups. • A clear ip mroute * command is being issued on SH1-104 every 6 minutes. • A clear ip route * command is being issued on SH1-98 every 5 minutes. • A clear ip route * command is being issued on SH1-101 every 5 minutes. • Interface FastEthernet8/14 on SH1-97 is being flapped every 10 minutes, removing the 5000 OSPF routes being supplied by the Pagent test tool. • BGP peer flapping is configured to run as it did in the BGP Neighbor Flap test. A summary of the plan of action for this test is here: mem_leaks/mcast_flap_mem/plan_of_action.txt Test Procedure The procedure used to perform the Multicast Flap Memory test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. This script will also begin the SNMP polling for CPU and memory usage for all Native IOS devices in the SH1 network. Step 2 Gather an initial snapshot of all memory processes for all devices in the network. Step 3 Alter the IXIA stream/receiver configuration so that the three sources are sending to 500 groups, from a single IP source address, and the receivers are joining 500 groups. Step 4 Begin the flap test. Let this test run over a weekend, at the least. Step 5 Stop the flap test. Step 6 Gather a final snapshot of all memory processes for all devices in the network. Step 7 Verify that there has been no memory degradation from the initial snapshot to the final snapshot. Step 8 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Note The polling occurred over a 63-hour period of time. Cisco IOS Release 12.1(13)E13 254 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Expected Results • We expect that the memory free and memory largest free values would trend steady over the duration of the test for each respective device. Results Table 10 Multicast Flap Memory Test Results Test Result Multicast Flap Memory Pass Hardware Redundancy Whenever a fault was encountered, the redundant module took over the functions of the failed hardware module. Testing hardware redundancy for Safe Harbor involved performing various failover scenarios to verify that internal hardware redundancy failed over as expected. The following tests were performed: Note • Switch Fabric Module Failover, page 255 • Supervisor 1 Failover, page 257 • Supervisor 2 Failover, page 258 • Power Supply Failure—Supervisor 1, page 259 • Power Supply Failure—Supervisor 2, page 260 • RPR+: Supervisor Hot Insert, page 261 For this iteration, and all subsequent iterations of testing, the total number of OSPF routes fed into the network was reduced to 10,000. This change better reflected recommendations established and outlined in Cisco IOS Release Notes for release 12.1 E at http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/12_1e/ol_2310.htm#62683 for use with RPs that have 128 MB of memory. Many devices in the Safe Harbor network have only 128 MB of memory, limiting total routes to 20,000, using fixed-length masks. Switch Fabric Module Failover This test verified multicast functionality during Switch Fabric Module (SFM) failover. Unicast traffic was sourced from IXIA and transits through SH1-102. The traffic was switched using the crossbar fabric. This test performed a series of resets on the active SFM and measure traffic loss at each iteration. In several of the following steps, verification that the traffic was using the SFM was requested. Examine how the Medusa ASIC was handling traffic. The Medusa ASIC interfaces were between the line card local bus and the backplane of the Catalyst 6500. If traffic was using the SFM (no legacy, or nonfabric-enabled cards present), the Medusa mode was “Compact” for all line cards, indicating that it was sending a compact header on the backplane for the switching decision. Cisco IOS Release 12.1(13)E13 255 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Note Any WS-X6816 modules were always in "Compact" mode, because they were fabric-only cards. More on the switching modes involving the SFM can be found at the Cisco Catalyst 6500 Series Switches site: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter0918 6a008007fb2a.html Goals • Verify that the router is using the crossbar fabric to switch the traffic prior to SFM failover. • Verify that the router is using the crossbar fabric to switch the traffic after the SFM failover. • Verify that failover times are within acceptable parameters. Primary Devices Used • SH1-102: Supervisor 22; first hop router for unicast test traffic stream Primary IXIA Ports Used 2/8, 5/1 Test Procedure The procedure used to perform the Switch Fabric Module Failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-102 is receiving unicast traffic on portchannel 10 and transmitting the traffic on portchannels 15 and 115. Step 5 Verify that portchannels 10, 15, and 115 consist of interfaces on fabric-enabled line cards. Portchannels 10, 15, and 115 are comprised of interfaces from modules 7 and 3. Module 7 (WS-X6516-GBIC) is a fabric-enabled module. Module 3 (WS-X6816-GBIC) is a pure fabric module. So both should be using the fabric to switch traffic. Step 6 Verify that all fabric-enabled modules are using the crossbar fabric to switch the traffic. Modules 3 and 7 are not in bus mode, so they are using the fabric to switch traffic. Step 7 Start the test script that will failover the active fabric module on SH1-102 50 times while running traffic. Step 8 Analyze the results from the script and verify that failover times are within tolerances. Step 9 Display the log for error messages. Step 10 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect failovers to occur within an acceptable amount of time and that traffic loss due to fabric failure should be minimal. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 256 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Results Table 11 Switch Fabric Module Failover Test Results Test Result Switch Fabric Module Failover Pass Supervisor 1 Failover This test verified the proper operation of redundant supervisors during a series of 20 continual resets. This test verified that the box fails between the supervisors as designed, recovers, and forwards traffic. This test further verified that failure operations are within the design guidelines for the applicable hardware and software versions under test. Although this test measures time, it is by no means a measure of the speed at which failover can take place, which as this is dependent upon the configuration and line cards in the system. Supervisor Engine 2s are covered in this test. The device under test is SH1-107. A traffic stream was sent from Dista-1 to Dista-2 a a fixed rate. The amount of traffic loss during device resets was used to determine the recovery time (failover time). Test Procedure The procedure used to perform the Supervisor 1 Failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Display some of the factors that may contribute to reload times. Such factors may include configuration size, memory used, size of IP routing table. Step 5 Shutdown interface portchannel 10 on device SH1-108. This will ensure that the test traffic has to go through SH1-107 to get to its destination. Step 6 Begin the IXIA background unicast traffic stream #1. This will send traffic at a rate of 10,000pps from Dista-1 to SH1-99. Send a 5-minute burst of traffic. Step 7 Perform a forced switchover on SH1-107. Step 8 Show how much traffic was received out of 3,000,000 packets sent. Measure the time that the switch was down. Step 9 Repeat the switchover sequence four more times, each time gathering statistics on traffic loss. Step 10 Give the average time it took for the device to switch over, over the five iterations. Step 11 Display the log for error messages. Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all resets of the supervisor to fall within the 1-2 min range. Cisco IOS Release 12.1(13)E13 257 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Note This time differs from the results in 12.1(8b)E15 testing as RPR+ is now the redundancy feature, allowing for faster switchover times. • We expect the supervisors to come back online without any manual intervention. Results Table 12 Supervisor 1 Failover Test Results Test Result Supervisor 1 Failover Pass Supervisor 2 Failover This test verified the proper operation of redundant supervisors during a series of 20 continual resets. This test verified that the box fails between the supervisors as designed, recovers, and forwards traffic. This test further verified that failure operations are within the design guidelines for the applicable hardware and software versions under test. Although this test measures time, it is by no means a measure of the speed at which failover can take place, which is dependent upon the configuration and line cards in the system. Supervisor Engine 2s are covered in this test. The device under test is SH1-110. A traffic stream was sent from Dista-1 to Dista-2 a a fixed rate. The amount of traffic loss during device resets was used to determine the recovery time (failover time). Test Procedure The procedure used to perform the Supervisor 2 Failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Display some of the factors that may contribute to reload times. Such factors may include configuration size, memory used, size of IP routing table. Step 5 Shutdown interface portchannel 20 on device SH1-109. This will ensure that the test traffic has to go through SH1-110 to get to its destination. Step 6 Begin the IXIA background unicast traffic stream #3. This will send traffic at a rate of 10,000pps from Dista-2 to Dista-1. Send a 5-minute burst of traffic. Step 7 Perform a redundancy force-switchover on SH1-110. Step 8 Show how much traffic was received out of 3,000,000 packets sent. Measure the time that the switch was down. Step 9 Repeat the switchover sequence four more times, each time gathering statistics on traffic loss. Step 10 Give the average time it took for the device to switch over, over the five iterations. Step 11 Display the log for error messages. Cisco IOS Release 12.1(13)E13 258 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all resets of the supervisor to fall within the 1-2 min range. • We expect supervisors to come back online without any manual intervention. Results Table 13 Supervisor 2 Failover Test Results Test Result Supervisor 2 Failover Pass Power Supply Failure—Supervisor 1 This test verified the failure of a power supply in a supervisor 1-based system. The power supply was failed via removal of the power module. Test Procedure The procedure used to perform the Power Supply Failure—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the power supplies of SH1-106 are operating in redundant mode and that the capacity of each individual power supply is sufficient to meet the needs of the device. Step 5 Begin sending a test traffic stream through SH1-106. In this case it will be background unicast stream # 5. Step 6 Simulate a power supply failure. Step 7 Verify that the system is still operational with only one power supply. Step 8 Measure any traffic loss that occurred as a result of the simulated power supply failure. Step 9 Begin sending a test traffic stream through SH1-106. Step 10 Re-insert the power supply in SH1-106. Step 11 Verify that the second power supply has come back online. Step 12 Measure any traffic loss that occurred as a result of the power supply re-insertion. Step 13 Display the log for error messages. Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 259 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Expected Results • We expect no line card failures due to the removal or insertion of the power supply. • We expect no packet loss due to the removal or insertion of the power supply. Results Table 14 Power Supply Failure—Supervisor 1 Test Results Test Result Power Supply Failure—Supervisor 1 Pass Power Supply Failure—Supervisor 2 This test verified the failure of a power supply in a Supervisor 2-based system. The power supply was failed via removal of the power module. Test Procedure The procedure used to perform the Power Supply Failure—Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the power supplies of SH1-101 are operating in redundant mode and that the capacity of each individual power supply is sufficient to meet the needs of the device. Step 5 Begin sending a test traffic stream through SH1-101. In this case it will be multicast test traffic stream A (210,000 packets at 1000 pps), for which SH1-101 has a directly connected Layer 3 receiver. Step 6 Simulate a power supply failure. Step 7 Verify that the system is still operational with only one power supply. Step 8 Measure any traffic loss that occurred as a result of the simulated power supply failure. Step 9 Begin sending a test traffic stream through SH1-101. Step 10 Re-insert the power supply in SH1-101. Step 11 Verify that the second power supply has come back online. Step 12 Measure any traffic loss that occurred as a result of the power supply re-insertion. Step 13 Display the log for error messages. Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no line card failures due to the removal or insertion of the power supply. • We expect no packet loss due to the removal or insertion of the power supply. Cisco IOS Release 12.1(13)E13 260 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Hardware Redundancy Results Table 15 Power Supply Failure—Supervisor 2 Test Results Test Result Power Supply Failure—Supervisor 2 Pass RPR+: Supervisor Hot Insert This test verified the ability of an unconfigured supervisor to be inserted as redundant into a device and be loaded with the system configuration. Test Procedure The procedure used to perform the RPR+: Supervisor Hot Insert test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Remove the redundant supervisor of device SH1-110. Step 5 Perform a write erase/reload sequence on SH1-110 to erase any configuration. Step 6 Wait for reload to complete. Remove the unconfigured supervisor and re-insert the configured supervisor. Step 7 Wait for reload to complete. Hot-insert the unconfigured supervisor. Step 8 Having verified the new supervisor comes online, force a switchover to verify that the redundant supervisor has a full configuration. Step 9 Display the log for error messages. Step 10 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the blank (unconfigured) supervisor to come online and obtain a copy of the configuration from the active supervisor. • We expect the standby supervisor to have the correct configuration in the event it becomes active. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 16 RPR+: Supervisor Hot Insert Test Results Test Result RPR+: Supervisor Hot Insert Pass Cisco IOS Release 12.1(13)E13 261 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Layer 2 Features Layer 2 feature testing for Safe Harbor involves the features: • Unidirectional Link Detection-Aggressive Mode, page 262 • Trunking, page 264 • Port Aggregation Protocol (Channeling), page 267 • VLAN Trunking Protocol, page 282 Unidirectional Link Detection-Aggressive Mode The Unidirectional Link Detection (UDLD) protocol allows devices connected through fiber-optic or copper Ethernet cables (for example, Category 5 cabling) to monitor the physical status of the cables and detect when a unidirectional link exists. When a unidirectional link is detected, UDLD shuts down the affected port and alerts the user. Unidirectional links can cause a variety of problems, including spanning-tree topology loops and erroneous Layer 3 routing. In a bidirectional relationship, the UDLD-AM (aggressive mode) protocol disables the port at the end of a link-up sequence if no reply is received. However, UDLD goes into an undetermined state. The lowest value of a UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 seconds. Note The lowest value of UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 sec. By default, the HSRP hello timer is 3 sec. and the hold down timer is 10 sec. When the link becomes unidirectional, before the UDLD-AM can shut down the port, the HSRP will flap. After UDLD-AM shuts down the unidirectional port, the HSRP will stay up and be stable. Note The lowest value of UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 sec. By default, EIGRP hello timer is 5 sec. and hold down timer is 15 sec. When the link becomes unidirectional, before the UDLD-AM can shut down the port, the EIGRP neighbor will flap. After UDLD-AM shuts down the unidirectional port, the EIGRP neighbor will stay up and be stable. Note If UDLD mode or UDLD-AM are enabled globally on Layer 3 switches, the interface shows the UDLD message interval is 7 sec which is actually "running message interval." Once the UDLD neighbor is established, the message interval changed to 60 sec. See CSCdv74001, which is integrated in Herschel 8EX and will be in Cisco IOS Release 13E but not Cisco IOS Release 8E. The following tests were performed: • Basic UDLD on Layer 2 Link, page 262 • Basic UDLD on Layer 3 Link, page 263 Basic UDLD on Layer 2 Link This test created a unidirectional link between SH1-109 (DUT) and Dista-2. Console messages are logged during the mock failure, and port states are recorded. Cisco IOS Release 12.1(13)E13 262 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Test Procedure The procedure used to perform the Basic UDLD on Layer 2 Link test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that UDLD is configured globally on the DUT and that UDLD Aggressive Mode is configured locally on the interface g7/3. Step 5 With terminal monitoring configured, pull the receive fiber from port 1/1 on Dista-2. Log any messages on the DUT. Confirm the interface state of g7/3 on the DUT. Step 6 Reconnect the transmit fiber. Record any log messages on the DUT and confirm the interface state. Issue the udld reset command on the DUT, if the interface g7/3 does not return to up/up state. Note The udld reset command is needed as automatic error-recovery for udld is no longer configured. This feature would only attempt to recover a port in udld state one time and the timing of the recovery attempt could not be synchronized with our test. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the UDLD to err-disable the port when the fiber is pulled. • We expect the port to recover when fiber is plugged back in. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 17 Basic UDLD on Layer 2 Link Test Results Test Result Basic UDLD on Layer 2 Link Pass Basic UDLD on Layer 3 Link This test emulated a unidirectional link on a Layer 3 interface. Console messages are logged, and interface states throughout the process. Devices under test: SH1-104, and SH1-109. Test Procedure The procedure used to perform the Basic UDLD on Layer 3 Link test follows: Cisco IOS Release 12.1(13)E13 263 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that UDLD is configured globally on both DUTs and that UDLD Aggressive Mode is configured locally on the interfaces g4/15 of SH1-104 and g3/5 of SH1-109. Also ensure terminal monitoring is active on this session. Step 5 Once it has been verified that the interfaces connecting the DUTs are in state up/up, pull the transmit side of the g3/5 interface on SH1-109. Record logging messages from both DUTs and their interface states as well. Step 6 Reconnect the fiber pulled out in Step 5. Use the udld reset command to make sure the interfaces are again up/up. Note The udld reset command is needed as automatic error-recovery for udld is no longer configured. This feature would attempt to recover a port in udld state one time and the timing of the recovery attempt could not be synchronized with our test. Step 7 Pull out the receive side of the g3/5 interface on SH1-109, record all messages and the interface states from both DUTs. Step 8 Reconnect the fiber pulled out in Step 7. Use the "udld reset" command to make sure the interfaces are again up/up (see note in Step 6). Step 9 Display the log for error messages. Step 10 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the UDLD to err-disable the port when the fiber was pulled. • We expect the port to recover when the fiber is plugged back in. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 18 Basic UDLD on Layer 3 Link Test Results Test Result Basic UDLD on Layer 3 Link Pass Trunking A trunk is a point-to-point link between one or more switch ports and another networking device such as a router or a switch. Trunks carry the traffic of multiple VLANs over a single link and allow VLANs to be extended across an entire network. Table 19 lists and describes the five modes of trunking on Cisco switches. Cisco IOS Release 12.1(13)E13 264 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Table 19 Trunking Modes on Cisco Switches Mode Description On Local interface trunks. Sends Dynamic Trunking Protocol (DTP) packets. Puts the port into permanent trunking mode and negotiates to convert the link to a trunk link. The port becomes a trunk port even if the neighboring port does not agree to the change. Off Local interface does not trunk. Puts the port into nontrunking mode and negotiates to convert the link into a nontrunk link. The port becomes a nontrunk port even if the neighboring port does not agree to the change. Auto Local interface trunks if it receives DTP packets. Enables the port to convert the link to a trunk link. The port becomes a trunk port if the neighboring port is set to on or desirable mode. This is the default mode for Fast Ethernet and Gigabit Ethernet ports. Desirable Local interface sends DTP packets. Makes the port actively attempt to convert the link to a trunk line. The port becomes a trunk port if the neighboring port is set to on, desirable, or auto mode. Nonnegotiate Local interface forms a trunk and does not send DTP packets. Puts the port into permanent trunking mode, but prevents the port from generating DTP frames. You must configure the neighboring port normally as a trunk port to establish a trunk link. The following trunking tests were performed: • Sup 1 Configuration and Failure Recovery, page 265 • Sup 2 Configuration and Failure Recovery, page 266 Sup 1 Configuration and Failure Recovery In this procedure tested the configuration of both static and dynamically formed trunks, the recovery of both static and dynamic trunks, and trunk links that exist between SH1-107 and dista-1. These links were configured, then failed and recovered to verify that trunking is reestablished. Test Procedure The procedure used to perform the Sup 1 Configuration and Failure Recovery test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 The standard configuration for this link in the SafeHarbor network is both sides configured for static trunking. Confirm this is the current configuration and the trunk is currently working. Step 5 Change the configuration on both sides to dynamic trunking, and confirm the ports begin trunking again. Step 6 Fail one of the trunking links on SH1-107 and confirm it is down. Step 7 Bring the port back up, and confirm the port begins trunking again. Step 8 Change the configuration on both sides back to static trunking, and confirm the ports begin trunking again. Cisco IOS Release 12.1(13)E13 265 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Note You do not need to explicitly "set trunk 2/1 on" because the port channel will change it automatically after trunk 1/1 is changed. Step 9 Fail one of the trunking links on SH1-107 and confirm its down. Step 10 Bring the port back up, and confirm the port begins trunking again. Step 11 Display the log for error messages. Step 12 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the DUT to trunk in both static and dynamic mode. • We expect the trunk port to recover from a port failure. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 20 Sup 1 Configuration and Failure Recovery Test Results Test Result Sup 1 Configuration and Failure Recovery Pass Sup 2 Configuration and Failure Recovery In this procedure tested the configuration of both static and dynamically formed trunks, the recovery of both static and dynamic trunks, and trunk links that exist between SH1-109 and dista-1. These links were configured, then failed and recovered to verify that trunking is reestablished. Test Procedure The procedure used to perform the Sup 2 Configuration and Failure Recovery test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 The standard configuration for this link in the Safe Harbor network is both sides configured for dynamic trunking. Confirm this is the current configuration and the trunk is currently working. Note The lack of 'switchport mode' configuration implies the port is configured as desirable. Step 5 Change the configuration on both sides to static trunking, and confirm the ports begin trunking again. Step 6 Fail one of the trunking links on SH1-109 and confirm its down. Step 7 Bring the port back up, and confirm the port begins trunking again. Cisco IOS Release 12.1(13)E13 266 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 8 Change the configuration on both sides back to dynamic trunking, and confirm the ports begin trunking again. Step 9 Fail one of the trunking links on SH1-109 and confirm its down. Step 10 Bring the port back up, and confirm the port begins trunking again. Step 11 Display the log for error messages. Step 12 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the DUT to trunk in both static and dynamic mode. • We expect the trunk port to recover from a port failure. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 21 Sup 2 Configuration and Failure Recovery Test Results Test Result Sup 2 Configuration and Failure Recovery Pass Port Aggregation Protocol (Channeling) The port aggregation protocol (PAgP) facilitates the automatic creation of EtherChannels by exchanging packets between Ethernet ports. PAgP packets are exchanged only between ports in auto and desirable modes. Ports configured in on or off mode do not exchange PAgP packets. The protocol learns the capabilities of port groups dynamically and informs the other ports. Once PAgP identifies correctly matched EtherChannel links, it groups the ports into an EtherChannel. The EtherChannel is then added to the spanning tree as a single bridge port. EtherChannel includes four user-configurable modes: on, off, auto, and desirable. Only auto and desirable are PAgP modes. The auto and desirable modes can be modified with the silent and non-silent keywords. By default, ports are in auto silent mode. An EtherChannel distributes frames across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. EtherChannel frame distribution is based on a Cisco-proprietary hashing algorithm. The algorithm is deterministic; given the same addresses and session information, you always hash to the same port in the channel, preventing out-of-order packet delivery. The following tests were performed: • Basic Layer 2 Channeling Configuration, page 268 • Basic Layer 3 Channeling Configuration, page 269 • Layer 2 EtherChannel Load Balancing, page 271 • Layer 3 EtherChannel Load Balancing, page 272 • Layer 2 EtherChannel Failure and Recovery—Supervisor 1, page 273 • Layer 3 EtherChannel Failure and Recovery—Supervisor 1, page 275 Cisco IOS Release 12.1(13)E13 267 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features • Layer 3 EtherChannel Failure and Recovery—Supervisor 2, page 278 • Layer 3 EtherChannel Failure and Recovery—Supervisor 2, page 278 • Gigabit Ethernet Module Reset—Sup 1, page 279 • Gigabit Ethernet Module Reset—Sup 2, page 281 Basic Layer 2 Channeling Configuration In Native IOS, a portchannel interface is created, and then individual interfaces are joined to that portchannel interface. The configuration of the individual interfaces determines whether the channel is static or dynamic. This test verified the basic aspects of Layer 2 PAgP configuration to verify that the basic functionality worked correctly. A set of links between SH1-107 and Dista-1 was given a configuration for static channeling. Dynamic channeling was tested in the bundling of links between SH1-110 and Dista-2. In Native IOS, a portchannel interface is created, and then individual interfaces are joined to that portchannel interface. The configuration of those individual interfaces determines whether the channel is static or dynamic. Figure 13 shows the topology for PAgP Basic Layer 2 channeling configuration. Figure 13 PAgP Basic Layer 2 Channeling Topology Devices under test: SH1-107, and SH1-110. Test Procedure The procedure used to perform the Basic Layer 2 Channeling Configuration test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the channel between devices SH1-107 and Dista-1 is configured as a static channel. Step 5 Verify that the channel between devices SH1-110 and Dista-1 is configured as a dynamic channel. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 268 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Expected Results • We expect the Layer 2 channels to form with their respective static and dynamic configurations. Results Table 22 Basic Layer 2 Channeling Configuration Test Results Test Result Basic Layer 2 Channeling Configuration Pass Basic Layer 3 Channeling Configuration This test verified Layer 3 portchannel functionality. This test verified static and dynamic channel configurations for each of the following combinations: dCEF::dCEF channels, non-dCEF::non-dCEF channels, and mixed::mixed (involving both non-dCEF and dCEF modules). Table 23 maps each of the six steps to the combination covered. Table 23 Basic Layer 3 Channeling Configuration Matrix Devices dCEF? Channeling? 103-99 Yes Static 104-99 Yes Dynamic 103-109 Mixed Static 103-110 Mixed Dynamic 103-107 No Static 104-107 No Dynamic Figure 14 and Figure 15 show the topologies for PAgP basic Layer 3 channeling configuration. Figure 14 PAgP Basic Layer 3 Channeling Topology Cisco IOS Release 12.1(13)E13 269 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Figure 15 PAgP Basic Layer 3 Channeling Topology Devices under test: SH1-103, SH1-99, SH1-104, SH1-107, SH1-109, and SH1-110. Test Procedure The procedure used to perform the Basic Layer 3 Channeling Configuration test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 The portchannel (4 ports) between SH1-103 (Po16) and SH1-99 (Po16) resides on dCEF-only modules. Verify that it is configured for static channeling and that it is functioning correctly. Step 5 Step 6 Step 7 Step 8 • Verify that the Status for Po16 on both SH1-99 and SH1-103 is connected. • Verify that the EC state for Po16 on both SH1-99 and SH1-103 is on. The portchannel (4 ports) between SH1-104 (Po17) and SH1-99 (Po17) resides on dCEF-only modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. • Verify that the Status for Po17 on both SH1-99 and SH1-104 is connected. • Verify that the EC state for Po17 on SH1-99 is "Desirable-sl." • Verify that the EC state for Po17 on SH1-104 is "Automatic-sl." The portchannel (4 ports) between SH1-103 (Po70) and SH1-109 (Po70) resides on mixed modules. Verify that it is configured for static channeling and that it is functioning correctly. • Verify that the Status for Po70 on both SH1-109 and SH1-103 is connected. • Verify that the EC state for Po70 on both SH1-109 and SH1-103 is on. The portchannel (4 ports) between SH1-103 (Po71) and SH1-110 (Po71) resides on mixed modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. • Verify that the Status for Po71 on both SH1-110 and SH1-103 is connected. • Verify that the EC state for Po71 on SH1-110 is "Automatic-sl." • Verify that the EC state for Po71 on SH1-103 is "Desirable-sl." The portchannel (4 ports) between SH1-103 (Po68) and SH1-107 (Po68) resides on non-dCEF modules. Verify that it is configured for static channeling and that it is functioning correctly. Cisco IOS Release 12.1(13)E13 270 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 9 • Verify that the Status for Po68 on both SH1-107 and SH1-103 is connected. • Verify that the EC state for Po68 on both SH1-107 and SH1-103 is on. The portchannel (4 ports) between SH1-104 (Po68) and SH1-107 (Po168) resides on non-dCEF modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. • Verify that the Status for Po68 on SH1-104 and Po168 on SH1-107 is connected. • Verify that the EC state for Po68 on SH1-104 is "Desirable-sl." • Verify that the EC state for Po168 on SH1-107 is "Automatic-sl." Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the portchannels to form correctly in each configuration and line card combination. Results Table 24 Basic Layer 3 Channeling Configuration Test Results Test Result Basic Layer 3 Channeling Configuration Pass Layer 2 EtherChannel Load Balancing This test verified that load distribution took place across the individual interfaces in a Layer 2 Etherchannel. An IXIA traffic stream was generated, sending traffic from 20 emulated sources to a single destination. This traffic was sent from one side of the SH1 network to the other, passing through the Layer 2 GEC between SH1-110 and Dista-2 and the Layer 2 GEC between SH1-114 and Dista-1. Load distribution was verified by examining the traffic statistics on individual interfaces. All traffic sent from the multiple sources was received on the other end of the network, though balanced across many interfaces. Traffic (300,000 packets) was sent at a rate of 1,000 pps from IXIA port 5/1 to IXIA port 3/4. SH1-114 is a Supervisor 1 and SH1-110 is a Supervisor 2. Test Procedure The procedure used to perform the Layer 2 EtherChannel Load Balancing test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that portchannel 20 on SH1-110 and portchannel 10 on SH1-114 are Layer 2 etherchannels. Step 5 Verify that the load-balance algorithm on the SP indicates that traffic should be passed out all four interfaces of portchannel 10 on SH1-114. Step 6 Clear the counters on SH1-110 and SH1-114. Cisco IOS Release 12.1(13)E13 271 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 7 Make certain all other background unicast traffic is stopped. Begin the test traffic stream of 300,000 packets. Step 8 After the stream has finished transmitting, verify that all the interfaces in portchannels 20 and 10 on SH1-110 and SH1-114, respectively, have passed some traffic. Step 9 Verify that all traffic that was sent was received. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that all traffic sent from the multiple sources was received on the other end of the network, though balanced across many interfaces. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 25 Layer 2 EtherChannel Load Balancing Test Results Test Result Layer 2 EtherChannel Load Balancing Pass Layer 3 EtherChannel Load Balancing This test verified that load distribution took place across the individual interfaces in a Layer 3 Etherchannel. Two IXIA traffic streams were used, each sending traffic from 20 emulated sources to a single destination. The first traffic stream used has SH1-110 as the first-hop router. SH1-110 should balance the traffic to the next-hop routers over the interfaces of portchannels 71 and 171. The second traffic stream used has SH1-114 as the first-hop router. SH1-114 should balance the traffic to the next-hop routers over the interfaces of portchannels 65 and 165.All traffic sent from the multiple sources was received on the other end of the network, though balanced across many interfaces. Traffic (300,000 packets) was sent at a rate of 1,000 pps from IXIA port 5/1 to IXIA port 3/4 (first stream) and from IXIA port 5/4 to IXIA port 5/1. SH1-114 is a Supervisor 1 and SH1-110 is a Supervisor 2. Test Procedure The procedure used to perform the Layer 3 EtherChannel Load Balancing test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that portchannels 71 and 171 on SH1-110 are Layer 3 etherchannels. Step 5 Verify that SH1-110 knows multiple paths to the destination. Step 6 Verify that portchannels 65 and 165 on SH1-114 are Layer 3 etherchannels. Cisco IOS Release 12.1(13)E13 272 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 7 Verify that SH1-114 knows multiple paths to the destination. Step 8 Clear the counters on SH1-110 and SH1-114. Step 9 Begin the test traffic streams of 300,000 packets. Step 10 After the stream has finished transmitting, verify that all the interfaces in portchannels 20 and 10 on SH1-110 and SH1-114, respectively, have passed some traffic. Step 11 Verify that all traffic that was sent was received. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect SH1-110 to balance the traffic to the next-hop routers over the interfaces of portchannels 71 and 171. The second traffic stream used has SH1-114 as the first-hop router. SH1-114 should balance the traffic to the next-hop routers over the interfaces of portchannels 65 and 165. All traffic sent from the multiple sources was received on the other end of the network, though balanced across many interfaces. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 26 Layer 3 EtherChannel Load Balancing Test Results Test Result Layer 3 EtherChannel Load Balancing Pass Layer 2 EtherChannel Failure and Recovery—Supervisor 1 This test verified the ability of Layer 2 etherchannels to handle software cycling. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-108. Interfaces GigabitEthernet4/1-4, bundled into Layer 2 etherchannel portchannel 10, connect SH1-108 to Dista-1. The next-hop router is out Layer 3 interface portchannel 69, which consists of bundled interfaces GigabitEthernet3/1-4. First, portchannel 10 will be shutdown and brought back up. Then, portchannel69 will be brought down and back up. In each case it is verified that the Layer 2 and Layer 3 etherchannels are re-formed correctly, and that traffic is passing across all the bundled interfaces. Figure 16 showsthe Layer 2 EtherChannel failure and recovery supervisor 1 topology. Cisco IOS Release 12.1(13)E13 273 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Figure 16 Layer 2 EtherChannel Failure and Recovery—Supervisor 1 Topology Devices under test: SH1-108 Test Procedure The procedure used to perform the Layer 2 EtherChannel Failure and Recovery—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannel 10 of device SH1-108. Step 5 Shutdown interface portchannel 10 of SH1-108. Step 6 Bring interface portchannel 10 of SH1-108 back online. Step 7 Verify that the channel re-forms correctly after the interface comes back online and that those interfaces on module 4 which were passing traffic before are again passing traffic. Step 8 Verify that the CBL values are all correct for the affected interfaces on all eleven VLANs that are being trunked by portchannel 10. Step 9 Shutdown the four interfaces that make up portchannel 10. Step 10 Bring those four interfaces back online. Step 11 Verify that the channel re-forms correctly after the interfaces comes back online and that those interfaces on module 4 which were passing traffic before are again passing traffic. Unicast traffic is correctly coming in on all four interfaces of portchannel 10: Step 12 Verify that the CBL values are all correct for the affected interfaces on all eleven VLANs that are being trunked by portchannel 10. Step 13 Display the log for error messages. Note Port, portchannel and module flapping tests were occurring at the the same time by another tester on SH1-103, SH1-104,SH1-110 and SH1-109 as seen in the log. It had no effect on this test. Cisco IOS Release 12.1(13)E13 274 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 27 Layer 2 EtherChannel Failure and Recovery—Supervisor 1 Test Results Test Result Layer 2 EtherChannel Failure and Recovery—Supervisor 1 Pass Layer 3 EtherChannel Failure and Recovery—Supervisor 1 This test verified the ability of a Layer 3 etherchannel to handle software cycling. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-108. Interfaces GigabitEthernet3/1-4, bundled into Layer 3 etherchannel portchannel 69, connect SH1-108 to SH1-104. Portchannel 69 will be brought down and back up. It is verified that the Layer 3 etherchannel is re-formed correctly, and that traffic is passing across all the bundled interfaces. Figure 17 showsthe Layer 3 EtherChannel failure and recovery supervisor 1 topology. Figure 17 Layer 3 EtherChannel Failure and Recovery—Supervisor 1 Topology Devices under test: SH1-108 Test Procedure The procedure used to perform the Layer 3 EtherChannel Failure and Recovery—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Cisco IOS Release 12.1(13)E13 275 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannel 10 of device SH1-108. Step 5 Shutdown interface portchannel 69 of SH1-108. Step 6 Bring interface portchannel 69 of SH1-108 back online. Step 7 Verify that the channel re-forms correctly after the interface comes back online and that those interfaces on module 3 which were passing traffic before are again passing traffic. Step 8 Shutdown the four interfaces that make up portchannel 69. Step 9 Bring those four interfaces back online. Step 10 Verify that the channel re-forms correctly after the interfaces come back online and that those interfaces on module 3 which were passing traffic before are again passing traffic. Step 11 Display the log for error messages. Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 28 Layer 3 EtherChannel Failure and Recovery—Supervisor 1 Test Results Test Result Layer 3 EtherChannel Failure and Recovery—Supervisor 1 Pass Layer 2 EtherChannel Failure and Recovery—Supervisor 2 This test verified the ability of Layer 2 etherchannels to handle software cycling. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-110. Interfaces GigabitEthernet7/3,5 and GigabitEthernet8/3,5, bundled into Layer 2 etherchannel portchannel 20, connect SH1-110 to Dista-2. Portchannel 20 will be shutdown and brought back up. It is verified that the Layer 2 etherchannel is re-formed correctly, and that traffic is passing across all the bundled interfaces. Figure 18 showsthe Layer 2 EtherChannel failure and recovery supervisor 2 topology. Cisco IOS Release 12.1(13)E13 276 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Figure 18 Layer 2 EtherChannel Failure and Recovery—Supervisor 2 Topology Devices under test: SH1-110 Test Procedure The procedure used to perform the Layer 2 EtherChannel Failure and Recovery—Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannel 20 of device SH1-110. Step 5 Shutdown interface portchannel 20 of SH1-110. Step 6 Bring interface portchannel 20 of SH1-110 back online. Step 7 Verify that the channel re-forms correctly after the interface comes back online and that those interfaces on modules 7 and 8 which were passing traffic before are again passing traffic. Unicast traffic is correctly coming in on all four interfaces of portchannel 10: Step 8 Verify that the CBL values on the SP are all correct for the affected interfaces on all eleven VLANs that are being trunked by portchannel 20. Step 9 Shut down the four interfaces that make up portchannel 20. Step 10 Bring those four interfaces back online. Step 11 Verify that the channel re-forms correctly after the interfaces comes back online and that those interfaces on module 4 which were passing traffic before are again passing traffic. Step 12 Verify that the CBL values on the SP are all correct for the affected interfaces on all eleven VLANs that are being trunked by portchannel 20. Step 13 Display the log for error messages. Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 277 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 29 Layer 2 EtherChannel Failure and Recovery—Supervisor 2 Test Results Test Result Layer 2 EtherChannel Failure and Recovery—Supervisor 2 Pass Layer 3 EtherChannel Failure and Recovery—Supervisor 2 This test verified the ability of a Layer 3 etherchannel to handle software cycling. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-110. Interfaces GigabitEthernet3/3-4 and GigabitEthernet4/3-4, bundled into Layer 3 etherchannel portchannel 69, connect SH1-110 to SH1-104. Portchannel171 will be brought down and back up. It is verified that the Layer 3 etherchannel is re-formed correctly, and that traffic is passing across all the bundled interfaces. Figure 19 showsthe Layer 3 EtherChannel failure and recovery supervisor 2 topology. Figure 19 Layer 3 EtherChannel Failure and Recovery—Supervisor 2 Topology Devices under test: SH1-110 Test Procedure The procedure used to perform the Layer 3 EtherChannel Failure and Recovery—Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Cisco IOS Release 12.1(13)E13 278 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 4 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannel 171 of device SH1-110. Step 5 Shutdown interface portchannel 171 of SH1-110. Step 6 Bring interface portchannel 171 of SH1-110 back online. Step 7 Verify that the channel re-forms correctly after the interface comes back online and that those interfaces on module 3 which were passing traffic before are again passing traffic. Step 8 Shutdown the four interfaces that make up portchannel 171. Step 9 Bring those four interfaces back online. Step 10 Verify that the channel re-forms correctly after the interfaces comes back online and that those interfaces on modulea 3 and 4 which were passing traffic before are again passing traffic. Step 11 Display the log for error messages. Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 30 Layer 3 EtherChannel Failure and Recovery—Supervisor 2 Test Results Test Result Layer 3 EtherChannel Failure and Recovery—Supervisor 2 Pass Gigabit Ethernet Module Reset—Sup 1 This test verified the ability of Layer 2 and Layer 3 EtherChannels to handle module resets and failures. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-108. Interfaces GigabitEthernet 4/1-4, bundled into Layer 2 etherchannel portchannel 10, connect SH1-108 to Dista-1. The next-hop router is out Layer 3 interface portchannel 69, which consists of bundled interfaces GigabitEthernet3/1-4. A test stream is sent first while module 4 is reset. The same test stream is sent again, this time resetting module 3. In each case it is verified that the Layer 2 and Layer 3 etherchannels are re-formed correctly. Traffic loss was measured for each case. Figure 20 showsthe GEM reset supervisor 1 topology. Cisco IOS Release 12.1(13)E13 279 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Figure 20 GEM Reset—Supervisor 1 Topology Devices under test: SH1-108 Test Procedure The procedure used to perform the Gigabit Ethernet Module Reset—Sup 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannels 10 and 69 of device SH1-108.Begin monitoring memory and CPU utilization for the devices under test. Step 4 Start the test traffic stream, sending 300 seconds worth of traffic at 1000pps rate. Step 5 Reset module 4 of SH1-108. Step 6 Verify that the channel re-forms correctly after the module comes back online and that those interfaces on module 4 which were passing traffic before are again passing traffic. Step 7 Determine the amount of traffic loss. Step 8 Start the test traffic stream, sending 300 seconds worth of traffic at 1000pps rate. Step 9 Reset module 3 of SH1-108. Step 10 Verify that the interfaces on module 3 are aggregated back into portchannel 69 correctly, and that they are again passing traffic. Step 11 Determine the amount of traffic loss. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 280 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Results Table 31 Gigabit Ethernet Module Reset—Sup 1 Test Results Test Result Gigabit Ethernet Module Reset—Sup 1 Pass Gigabit Ethernet Module Reset—Sup 2 This test verified the ability of Layer 2 and Layer 3 EtherChannels to handle module resets and failures. IXIA unicast traffic was sent from 20 incrementing IP addresses to a single IP destination. The first-hop router is SH1-110. Interfaces GigabitEthernet3/5-6,4/5-6, bundled into Layer 2 etherchannel portchannel 20, connect SH1-110 to Dista-2. The next-hop router is out Layer 3 interface portchannel 171, which consists of bundled interfaces GigabitEthernet3/3-3/4,4/3-4/4. A test stream is sent first while module 4 is reset. The same test stream is sent again, this time resetting module 3. In each case it is verified that the Layer 2 and Layer 3 etherchannels are re-formed correctly. Traffic loss was measured for each case as well. A diagram of the relevant topology is below, but the ports assignments do not reflect the current configuration as described above. To test failure to Dista-2 (i.e. portchannel 20) separately from failure to outgoing portchannel 170, SH1-109 must be used instead of SH1-110. To enable the traffic to flow over SH1-109, portchannels 20, 70, and 171 on SH1-110 must be shutdown first. Figure 21 showsthe GEM reset supervisor 2 topology. Figure 21 GEM Reset—Supervisor 2 Topology Devices under test: SH1-109 Test Procedure The procedure used to perform the Gigabit Ethernet Module Reset—Sup 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Deactivate portchannels 20, 71, and 171 on SH1-110 from the console port. Cisco IOS Release 12.1(13)E13 281 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 5 Start the test traffic stream, sending 300 seconds worth of traffic at 1000pps rate. Step 6 Verify that the traffic is being load-balanced across all the aggregated interfaces of portchannels 20 and 170 of device SH1-109. Step 7 Reset module 7 of SH1-109. Step 8 While unicast traffic is still flowing, verify that the portchannel 20 re-forms correctly after the module comes back online and that those interfaces on module 7 which were passing traffic before are again passing traffic. Step 9 Determine the amount of traffic loss. Step 10 Start the test traffic stream, sending 300 seconds worth of traffic at 1000pps rate. Step 11 Reset modules 3 and 4 of SH1-109. Step 12 While unicast traffic is still flowing, verify that the interfaces on modules 3 and 4 are aggregated back into portchannel 170 correctly, and that they are again passing traffic. The modules are online and the Status=Ok. The interfaces from modules 3 and 4 have been aggregated back into portchannel 170. Step 13 Determine the amount of traffic loss. Step 14 Activate portchannels 20, 71, and 171 on SH1-110. Step 15 Verify portchannels 20, 71, and 171 are back online on SH1-110. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, following the reset of the module, the interfaces on that module will be re-aggregated back into their respective portchannels and will again pass traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 32 Gigabit Ethernet Module Reset—Sup 2 Test Results Test Result Gigabit Ethernet Module Reset—Sup 2 Pass VLAN Trunking Protocol VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can result in a number of problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations. You can use VTP to manage VLANs 1 to 1005 in your network. (Note that VTP does not support VLANs 1025 to 4094.) With VTP, you can make configuration changes centrally on one switch and have those changes automatically communicated to all the other switches in the network. Cisco IOS Release 12.1(13)E13 282 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features The following test was performed: • Basic VLAN Trunking Protocol Configuration, page 283 • Layer 3 Routing Features, page 285 Basic VLAN Trunking Protocol Configuration This procedure tests the various combinations of VTP client, server, and transparent modes between devices SH1-107 and Dista-1. With each combination that is tested, VLANs are configured and behavior is checked for normalcy. Device under test: SH1-107. Test Procedure The procedure used to perform the Basic VLAN Trunking Protocol Configuration test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that SH1-107 and Dista-1 are in VTP transparent mode and that both devices are in the domain named FIN. • Step 5 Step 6 Step 7 Verify that each device, SH1-107 and Dista-1, has the domain of "FIN" and is in VTP transparent mode. Confirm that a trunk link is configured between SH1-107 (g4/1, g4/3) and Dista-1 (1/1, 2/1). • Verify that the status of Po10 on SH1-107 is trunking. • Verify that each of the ports on Dista-1 in the port channel connecting to SH1-107 are trunking. Run the script that will execute the following tasks. • Test1: With both SH1-107 and Dista-1 in Transparent mode, configure VLAN 200 on SH1-107. Confirm that VLAN 200 is created on SH1-107 but not on Dista-1. • Test2: Configure SH1-107 for VTP server mode (Dista-1 still in Transparent mode) and add VLAN 201 to the VLAN database of SH1-107. Confirm that VLAN 201 is created on SH1-107 but not on Dista-1. • Test3: Configure Dista-1 for VTP mode Client (SH1-107 is Server) and add VLAN 202 to the VLAN database on SH1-107. Confirm that VLAN 202 was added to both SH1-107 and Dista-1. • Test4: Configure Dista-1 for VTP Server mode (SH1-107 in Server mode), add VLAN 203 to SH1-107. Confirm that VLAN 203 is created on both SH1-107 and Dista-1. • Test5: With SH1-107 and Dista-1 both in Server mode, enable VTP Version 2 on Dista-1 (VTP V2 disabled on SH1-107). Configure VLAN 204 on SH1-107. Confirm that VLAN 204 is created on both SH1-107 and Dista-1. • Test6: With the same VTP configurations as in Step 10, create VLAN 205 on Dista-1. Confirm that VLAN 205 is created on both SH1-107 and Dista-1. • Test7: With SH1-107 in Server mode, configure Dista-1 for VTP Transparent mode and SH1-108 for VTP Client mode. Configure VLAN 206 on SH1-107. Confirm that VLAN 206 is not created on Dista-1, but is created on SH1-108. Check the output of the script, to make sure both cases passed. Cisco IOS Release 12.1(13)E13 283 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 2 Features Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that when a switch is in VTP transparent mode, it should not accept any vlan changes from a VTP server but should still forward the changes to other VTP switches in the domain. Locally created vlans should not be propgated to other VTP clients or VTP servers. • We expect that when a switch is in VTP client mode, it should accept vlan changes from a VTP server, but no changes should be allowed locally. • We expect that when a switch is in VTP server mode, local vlan changes should be propagated to other VTP servers and vtVTP p clients. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 33 Basic VLAN Trunking Protocol Configuration Test Results Test Result Basic VLAN Trunking Protocol Configuration Pass Cisco IOS Release 12.1(13)E13 284 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Layer 3 Routing Features Layer 3 routing feature testing for Safe Harbor involves these features: • IP Multicast, page 285 • Cisco Express Forwarding, page 396 • Open Shortest Path First, page 405 • Border Gateway Protocol, page 414 • Hot Standby Routing Protocol, page 424 • Enhanced Interior Gateway Routing Protocol, page 437 IP Multicast Traditional IP communication allows a host to send packets to a single host (unicast transmission) or to all hosts (broadcast transmission). IP multicast provides a third scheme, allowing a host to send packets to a subset of all hosts (group transmission). These hosts are known as group members. Packets delivered to group members are identified by a single multicast group address. Multicast packets are delivered to a group using best-effort reliability, just like IP unicast packets. The multicast environment consists of senders and receivers. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. A multicast address is chosen for the receivers in a multicast group. Senders use that address as the destination address of a datagram to reach all members of the group. Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on the location or number of members in a multicast group. A host can be a member of more than one multicast group at a time. Note On PFC1, the (*, G) can only be software switched. If the ip pim spt-threshold infinity command is used on PFC1, there may be high CPU usage, and multicast packets might be lost under heavy traffic. Note All tests have been run with the mls ip multicast consistency-checker command enabled. Note The C flag is not set on the (S, G) as it was in 12.1(8b)E16. This change was made by CSCdw13674 PIM scalability/convergence enhancement post 12.1(10)E, and is the intended behavior. The following tests were performed: • Last-Hop Router Functionality, page 287 • First-Hop Router Functionality, page 289 • Basic Static RP Functionality—Supervisor 11, page 291 • Basic Static RP Functionality—Supervisor 22, page 293 • Basic Auto RP Functionality—Supervisor 22, page 296 • Auto PIM RP Failover—First Hop Router Impact—Supervisor 11, page 299 Cisco IOS Release 12.1(13)E13 285 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • Auto PIM RP Failover—First Hop Router Impact—Supervisor 22, page 302 • Auto PIM RP Failover—Traffic Impact—Supervisor 22, page 304 • Static PIM-RP Failover—Supervisor 11, page 305 • Basic IGMP Functionality, page 311 • IGMP Leave/Join Functionality, page 313 • Non-RPF Rate Limiting and Multicast Stub—Supervisor 1, page 317 • Non-RPF Rate Limiting and Multicast Stub—Supervisor 2, page 319 • Layer 2 GEC Failover—SH1-110 to Dista-2, page 322 • Layer 2 GEC Failover—SH1-108 to Dista-1, page 324 • Layer 2 GEC Failover—SH1-114 to Dista-1, page 326 • Layer 2 GEC Failover—SH1-106 to Dista-2, page 329 • Layer 2 GEC Failover—SH1-102 to Dista-1, page 331 • Layer 3 GEC Failover—SH1-104 to SH1-110, page 333 • Layer 3 GEC Failover—SH1-104 to SH1-109, page 337 • Layer 3 GEC Failover—SH1-104 to SH1-108, page 341 • Layer 3 GEC Failover—SH1-104 to SH1-107, page 344 • Layer 3 GEC Failover—SH1-100 to SH1-104, page 347 • Layer 3 GEC Failover—SH1-100 to SH1-113, page 351 • Layer 3 GEC Failover—SH1-100 to SH1-106, page 355 • Layer 3 GEC Failover—SH1-100 to SH1-105, page 359 • Layer 3 GEC Failover—SH1-100 to SH1-102, page 362 • Layer 3 GEC Failover—SH1-100 to SH1-101, page 367 • Layer 3 GEC Failover—SH1-100 to SH1-97, page 371 • Switch Fabric Module Failover—Supervisor 22, page 374 • GEM Failover—Supervisor 11 as First-Hop Router, page 376 • GEM Failover—Supervisor 11 as Last-Hop Router, page 377 • GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface, page 379 • GEM Failover—Supervisor 22 as First-Hop Router, page 381 • GEM Failover—Supervisor 22 as Last-Hop Router, page 382 • GEM Failover—Supervisor 22 as Static RP, page 384 • GEM Failover—Supervisor 22 as Auto RP, page 386 • GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface, page 388 • Protocol Independent Module-Designated Router Failover—Supervisor 11, page 391 • Protocol Independent Module-Designated Router Failover—Supervisor 22, page 393 • Auto-RP Failover—RP Impact, page 394 Cisco IOS Release 12.1(13)E13 286 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Last-Hop Router Functionality This test verified basic multicast functionality on the last-hop router, including the creation of hardware shortcuts for multicast entries. Goals: • Verify that the correct mroute entries are created on the correct devices. • Verify that the correct flags are set for the mroute entries. • Verify that traffic is being hardware-switched where appropriate. Primary Devices Used: • SH1-105: Sup11; directly attached L3 receiver on secondary subnet; backup PIM-DR; groups 239.100.1.[1-10] • SH1-113: Sup12; RP-on-a-stick scenario; directly attached L3 receiver on primary subnet; groups 239.100.1.[1-10] • SH1-110: Sup22; directly attached L3 receiver on secondary subnet; primary PIM-DR; groups 239.100.2.[1-10] • SH1-102: Sup22; receivers are VLANs on primary subnets; primary PIM-DR; groups 239.100.[1-3].[1-10] Primary IXIA Ports Used: • 1/1, 4/6, 11/1, 2/1, 1/2, 2/7 Test Procedure The procedure used to perform the Last-Hop Router Functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the correct mroute entries and flags are created on SH1-105 for groups 239.100.1.[1-10], and that this traffic is being hardware-switched. For each group with SH1-105 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. There are no MMLS entries for any of these groups on SH1-105 because SH1-105 is a Supervisor 1-based system, which software-switches (*, G) traffic. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-105. For each group, the Incoming Interface should be Portchannel 166 (from SH1-100, the primary PIM-RP). The Outgoing Interface List (OIL) should contain the appropriate interface GigabitEthernet3/2, which goes to the IXIA receiver port. It should be noted that the receiver GigabitEthernet3/2 is on a secondary subnet. Step 5 Verify that the correct mroute entries and flags are created on SH1-113 for groups 239.100.2.[1-10], and that this traffic is being hardware-switched. For each group with SH1-113 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. There are no MMLS entries for any of these groups on SH1-113 because SH1-113 is a Supervisor 1-based system, which software-switches (*, G) traffic. Also, verify that the correct flags are Cisco IOS Release 12.1(13)E13 287 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-113. For each group, the Incoming Interface should be portchannel 164 (from SH1-100, the primary PIM-RP). The Outgoing Interface List (OIL) should contain the appropriate interface FastEthernet9/2, which goes to the IXIA receiver port. Step 6 Verify that the correct mroute entries and flags are created on SH1-110 for groups 239.100.2.[1-10], and that this traffic is being hardware-switched. For each group with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). The Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. Step 7 Verify that the correct mroute entries and flags are created on SH1-102 for groups 239.100.1.[1-10], 239.100.2.[1-10], 239.100.3.[1-10], and that this traffic is being hardware-switched. For each group 239.100.1.[1-10] with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). The Outgoing Interface List (OIL) should contain a single interface: VLAN 41. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. For each group 239.100.2.[1-10] with SH1-102 being the last-hop router, look for a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). The Outgoing Interface List (OIL) should contain a single interface: VLAN 43. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. For each group 239.100.3.[1-10] with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receivers are directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). The Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. Each should have an H-flag next to it, indicating that they are being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 288 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Expected Results • We expect that, for each receiver looked at during this test, proper mroute entries and flags have been installed. • We expect that the test multicast groups are being hardware-switched, where appropriate. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 34 Last-Hop Router Functionality Test Results Test Result Last-Hop Router Functionality Pass First-Hop Router Functionality This test verified basic multicast functionality on the first-hop router, including the creation of hardware shortcuts for multicast entries. Goals: • Verify that the correct mroute entries are created in the correct devices. • Verify that the correct flags are set for the mroute entries. • Verify that traffic is being hardware-switched, where appropriate. Primary Devices Used: • SH1-114: Sup12; Sender is connected to Dista-1 on VLAN 110; groups 239.100.1.[1-10] • SH1-106: Sup11; Sender is connected to Dista-2 on VLAN 49; groups 239.100.2.[1-10] • SH1-110: Sup22; Sender is connected to Dista-2 on VLAN 20; groups 239.100.3.[1-10] Primary IXIA Ports Used: • 3/3, 4/2, 13/2 Test Procedure The procedure used to perform the First-Hop Router Functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Verify that the supervisor is running the IOS version under test. Verify the uptime and that the box hasn't reloaded unnecessarily. Verify that there is not any process spiking the CPU when the test begins. Step 2 Display the log for error messages, and then clear it. Display the log buffer to verify that there are no erroneous log messages. Then clear the log to verify that error messages have not appeared during the test. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Show which device SH1-114 considers to be the primary PIM-RP for test groups 239.100.1.[1-10]. Cisco IOS Release 12.1(13)E13 289 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each of the groups 239.100.1.[1-10], SH1-114 should show the RP as being 172.31.0.100. The address 172.31.0.100 is an Anycast RP address, shared by SH1-100 and SH1-99. SH1-114 should show that it knows the RP address to be advertised by SH1-100 (the RPF interface should be portchannel 165). Step 5 Verify that the correct mroute entries and flags are created on SH1-114 for groups 239.100.1.[1-10], and that this traffic is being hardware-switched. SH1-114 is the first-hop router for traffic groups 239.100.1.[1-10]. As such, it should be registered with the RP, 172.31.0.100. The first-hop router, and all routers up to and including the RP, will have an (S, G) entry for a given group, as per the rules of Sparse-mode PIM. SH1-114 should have the (S, G) entry for each group in the test range. It should also have the F- and T-flags set for this (S, G) entry. The F-flag is set because the source is registered with the RP. The T-flag is set because a Shortest-Path Tree (SPT) is formed from the source to the RP. The Incoming interface is VLAN 110. The outgoing interface is portchannel 165, as this is directly connected to SH1-100, the primary PIM-RP. The outgoing interface should also have the H-flag set, indicating that it is being hardware-switched. Each group should have an MMLS entry with the (S, G) entry. This (S, G) in the MMLS entry should have incoming and outgoing interfaces listed that are consistent with the mroute (S, G) entry. On this device, there should be only one MMLS entry, for the (S,G), because (*, G) flows are not hardware-switched on Supervisor 1-based systems. Step 6 Show which device SH1-106 considers to be the primary PIM-RP for test groups 239.100.2.[1-10]. For each of the groups 239.100.2.[1-10], SH1-106 should show the RP as being 172.31.0.100. The address 172.31.0.100 is an Anycast RP address, shared by SH1-100 and SH1-99. SH1-106 should show that it knows the RP address to be advertised by SH1-100 (the RPF interface should be portchannel 167). Step 7 Verify that the correct mroute entries and flags are created on SH1-106 for groups 239.100.2.[1-10], and that this traffic is being hardware-switched. SH1-106 is the first-hop router for traffic groups 239.100.2.[1-10]. As such, it should be registered with the RP, 172.31.0.100. The first-hop router, and all routers up to and including the RP, will have an (S, G) entry for a given group, as per the rules of Sparse-mode PIM. SH1-106 should have the (S, G) entry for each group in the test range. It should also have the F- and T-flags set for this (S, G) entry. The F-flag is set because the source is registered with the RP. The T-flag is set because a Shortest-Path Tree (SPT) is formed from the source to the RP. The Incoming interface should be VLAN 49. The outgoing interface should be portchannel 167, as this is directly connected to SH1-100, the primary PIM-RP. The outgoing interface should have the H-flag set, indicating that it is being hardware-switched. Each group should have an MMLS entry with the (S, G) entry. This (S, G) in the MMLS entry should have incoming and outgoing interfaces listed that are consistent with the mroute (S, G) entry. There should be only one MMLS entry, for the (S,G), because (*, G) flows are not hardware-switched on Supervisor 1 systems. Step 8 Show which device SH1-110 considers to be the primary PIM-RP for test groups 239.100.3.[1-10]. For each of the groups 239.100.3.[1-10], SH1-110 should show the RP as being 172.31.0.100. The address 172.31.0.100 is an Anycast RP address, shared by SH1-100 and SH1-99. While the output from SH1-110 cannot specifically show SH1-100 to be the primary PIM-RP (SH1-100 and SH1-99 are more than one hop away), it should show that it knows of it via portchannel 171 (the RPF interface towards SH1-104). Step 9 Verify that the correct mroute entries and flags are created on SH1-110 for groups 239.100.3.[1-10], and that this traffic is being hardware-switched. SH1-110 is the first-hop router for traffic groups 239.100.3.[1-10]. As such, it should be registered with the RP, 172.31.0.100. The first-hop router, and all routers up to and including the RP, will have an (S, G) entry for a given group, as per the rules of Sparse-mode PIM. SH1-110 should have the (S, G) entry for each group in the test range. It should also have the F- and T-flags set for this (S, G) entry. The F-flag is set because the source is registered with the RP. The T-flag is set because a Shortest-Path Tree (SPT) is Cisco IOS Release 12.1(13)E13 290 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features formed from the source to the RP. The Incoming interface listed should be VLAN 20. The outgoing interface should be portchannel 171, as this leads towards the RP with address 172.31.0.100. The outgoing interface should also have the H-flag set, indicating that it is being hardware-switched. Each group should have an MMLS entry with the (S, G) entry. This (S, G) in the MMLS entry should have incoming and outgoing interfaces listed that are consistent with the mroute (S, G) entry. Both the (S, G) and the (*, G) flows should have MMLS entries because both are hardware-switched on Supervisor 2 systems. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, for each receiver looked at during this test, proper mroute entries and flags have been installed. • We expect that the test multicast groups are being hardware-switched, where appropriate. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 35 First-Hop Router Functionality Test Results Test Result First-Hop Router Functionality Pass Basic Static RP Functionality—Supervisor 11 This test verified basic static RP functionality using the Supervisor 11 engine. Goals: • Verify the RP configuration on all rendezvous points. • Verify the static RP configuration on any downstream devices. • Verify that the static RPs have the correct mroute entries and flags for the given traffic groups.Verify that downstream devices, if any, know of the correct RP for the given traffic groups. • Verify that the static RPs have MMLS entries consistent with the mroute table and are hardware forwarding the test traffic. Primary Devices Used: • SH1-105 and SH1-106: Sup11; static RPs for groups 239.255.50.[1-10] Primary IXIA Ports Used: • Note 2/3, 2/5 In the Safe Harbor topology, there are no routers downstream from SH1-105 and SH1-106. These two routers act in the role of PIM-RPs running Anycast Static RP with MSDP, and in the role of PIM-DR and non-PIM-DR (NDR) for the VLAN segments to which they're connected. Cisco IOS Release 12.1(13)E13 291 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the Basic Static RP Functionality—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the static RP configuration on SH1-105 and SH1-106. Step 5 Step 6 Step 7 • Both SH1-105 and SH1-106 share the same IP address for the Loopback 1 interface: 172.31.0.106/32. This is the Anycast address. • Both SH1-105 and SH1-106 have two static RP configurations. 172.31.0.106 is used for all groups that meet the ACL 1 parameters. 172.31.0.98 is used for all groups that meet the ACL 2 parameters. • Access-list 1 limits the scope of multicast addresses to those within 239.255.0.0/16. • SH1-105 and SH1-106 are the Anycast routers for multicast groups 239.255.0.0/16. Verify that SH1-105 and SH1-106 see the proper device as the static RP for the appropriate group range. • For the ten test groups, 239.255.50.[1-10], SH1-105 and SH1-106 list the RP as 172.31.0.106, the Anycast IP address shared by the two routers. • Each of the two routers, SH1-105 and SH1-106, shows the RPF interface for the RP to be Loopback1 and that it is directly connected. Verify that SH1-106 is the PIM-DR on the networks shared with SH1-105. • SH1-105 have a PIM neighbor relationship on those subnets that they share, specifically VLANs 40-50. • SH1-106 shows that it sees SH1-106 as the DR on these subnets. Verify that SH1-106 has the correct mroute entries and flags for all test traffic and that that traffic is being hardware switched. SH1-106 is the primary PIM-RP for the test multicast groups 239.255.50.[1-10]. It therefore has the following for each group: Step 8 • Both a (*, G) and an (S, G) entry, in the mroute table. • An (S,G), only, in the MMLS table, as (*, G) flows are software-switched on Sup1 platforms. • A T-flag on the (S, G) entry, indicating that the Shortest Path Tree bit is set and the SPT is being used. • An A-flag on the (S, G) entry, indicating that the entry is advertised via MSDP to the appropriate neighbor(s). • An RPF-MFD tag on the incoming interface of the (S, G) listed in the mroute entry. • An H-flag on each outgoing interface of the (S, G) listed in the mroute entry. • An incoming interface of VLAN 47 on both the mroute entry and the MMLS entry of the (S,G), for both the mroute entry and the MMLS entry. • An outgoing interface list in the (S, G) of the mroute and MMLS entries containing only VLAN 40. • An "RPF-MFD installed" indicator in the (S, G) of the MMLS entries. Display the log for error messages. Cisco IOS Release 12.1(13)E13 292 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the primary PIM-RP will have the proper mroute entries and flags set for all test groups. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 36 Basic Static RP Functionality—Supervisor 11 Test Results Test Result Basic Static RP Functionality—Supervisor 11 Pass, exceptionCSCea21798. Basic Static RP Functionality—Supervisor 22 This test verified basic static RP functionality using the Supervisor 22 engine. Goals: • Verify the RP configuration on all rendezvous points. • Verify the static RP configuration on any downstream devices. • Verify that downstream devices, if any, know of the correct RP for the given traffic groups. • Verify that the static RPs have the correct mroute entries and flags for the given traffic groups. • Verify that the static RPs have MMLS entries consistent with the mroute table and are hardware forwarding the test traffic. Primary Devices Used: • SH1-103 and SH1-104: Sup22; static RPs for groups 239.255.[50-51].[1-10] • SH1-107 and SH1-108: Sup12; routers downstream from SH1-103 and SH1-104 • SH1-109 and SH1-110: Sup22; routers downstream from SH1-103 and SH1-104 Primary IXIA Ports Used: • 5/1, 5/2, 8/2, 13/1 Test Procedure The procedure used to perform the Basic Static RP Functionality—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the static RP configuration on SH1-103 and SH1-104. Cisco IOS Release 12.1(13)E13 293 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 5 Step 6 Step 7 Step 8 Step 9 • SH1-103 and SH1-104 share the same IP address for the Loopback1 interface. This is the Anycast address. • Both SH1-103 and SH1-104 have two static RP configuration lines. The first shows the RP as 172.31.0.104 for all groups matching ACL 1. The second shows the RP as 172.31.0.98 for all groups matching ACL 2. • Access-list 1 restrains the scope of matching IP addresses to 239.255.0.0/16. • SH1-103 and SH1-104 are Anycast RPs for multicast groups 239.255.0.0/16. Verify the static RP configuration on SH1-107, SH1-108, SH1-109, and SH1-110. • SH1-107, SH1-108, SH1-109, and SH1-110 have the same two RP configuration lines as SH1-103 and SH1-104. • These four routers see the RP for groups 239.255.0.0/16 as being the router with address 172.31.0.104. Verify that SH1-110 is the PIM-DR on the networks shared with SH1-109. • SH1-109 and SH1-110 have a PIM neighbor relationship on those subnets that they share between them, specifically VLANs 10-20. • SH1-109 sees SH1-110 as being the PIM-DR for all of these VLANs. Verify that SH1-108 is the PIM-DR on the networks shared with SH1-107. • SH1-107 and SH1-108 have a PIM neighbor relationship on those subnets that they share between them, specifically VLANs 10-20. • SH1-107 sees SH1-108 as being the PIM-DR for all of these VLANs. Verify that SH1-108 and SH1-110, the PIM-DRs see the proper device as the static RP for the appropriate group range. • SH1-108 and SH1-110 both see the router with address 172.31.0.104 as being the RP for groups 239.255.[50-51].[1-10]. • SH1-108 shows its RPF interface towards this RP as being portchannel 169. This is connected to SH1-104, the primary PIM-RP. • SH1-110 shows its RPF interface towards this RP as being portchannel 171. This is connected to SH1-104, the primary PIM-RP. Verify that SH1-110 has the correct mroute entries for all test traffic and that traffic is being hardware switched. SH1-110 is the last-hop router for groups 239.255.50.[1-10]. As such, it has the following: • A (*, G) for each of the ten groups, as the SPT-threshold is set to infinity. • An S-flag for each (*, G) mroute entry. • A C-flag for each (*, G) mroute entry. • An incoming interface of portchannel 171 for both the mroute and MMLS entries. • An outgoing interface of VLAN 17 for both the mroute and MMLS entries. • An RPF-MFD tag on the incoming interface of each (*, G) mroute entry. • An H-flag for the outgoing interface of each (*, G) mroute entry. SH1-110 is the first-hop router for groups 239.255.51.[1-10]. As such, it has the following: • Both an (S, G) and a (*, G) entry in the mroute table and the MMLS table for each group. • An F-flag and a T-flag set for each (S, G) entry in the mroute table. Cisco IOS Release 12.1(13)E13 294 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • An H-flag set for each outgoing interface of the (S, G) in the mroute table. • An incoming interface of VLAN 19 for each (S, G) in the mroute and MMLS tables. • Two outgoing interfaces, portchannel 171 and VLAN 17, for each (S, G) in the mroute and MMLS tables. • An RPF-MFD tag for each of the (S, G) entries in the mroute table. Note The packets switched was shown as 0 (as seen in the output below) but the traffic was flowing. This was just a cosmetic defect. Step 10 Verify that SH1-108 has the correct mroute entries for all test traffic and that traffic is being hardware switched. SH1-108 is the first-hop router for groups 239.255.50.[1-10]. As such, it has the following: • Both an (S, G) and a (*, G) entry in the mroute table • An (S, G) only in the MMLS table for each group. • An F-flag and a T-flag set for each (S, G) entry in the mroute table. • An H-flag set for each outgoing interface of the (S, G) in the mroute table. • An incoming interface of VLAN 20 for each (S, G) in the mroute and MMLS tables. • Two outgoing interfaces, portchannel 169 and VLAN 16, for each (S, G) in the mroute and MMLS tables. • An RPF-MFD tag for each of the (S, G) entries in the mroute table. SH1-108 is the last-hop router for groups 239.255.51.[1-10]. As such, it has the following: Step 11 • A (*, G) for each of the ten groups, as the SPT-threshold is set to infinity. • No MMLS entries for these ten groups. (*, G) flows are software-switched on Sup1 platforms. • An S-flag and a C-flag for each (*, G) mroute entry. • An incoming interface of portchannel 169 for the mroute entries. • An outgoing interface of VLAN 16 for the mroute entries. Verify that SH1-104 (the PIM-RP) has the correct mroute entries and flags for the test traffic groups and that traffic is being hardware switched. SH1-104 is the RP for all groups 239.255.50.[1-10] and 239.255.51.[1-10]. It, therefore, shows the following: • An (S, G) for each entry in both the mroute and MMLS tables. • A (*, G) for each entry in the mroute table. • An incoming interface of portchannel 69 for groups 239.255.50.[1-10] in the mroute and MMLS tables. • An outgoing interface of portchannel 71 for groups 239.255.50.[1-10] in the mroute and MMLS tables. • An incoming interface of portchannel 71 for groups 239.255.51.[1-10] in the mroute and MMLS tables. • An outgoing interface of portchannel 69 for groups 239.255.51.[1-10] in the mroute and MMLS tables. • A T-flag and an A-flag for each entry in the mroute table. Cisco IOS Release 12.1(13)E13 295 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • An H-flag for each outgoing interface in the mroute table. • An RPF-MFD tag for each mroute table (S, G) entry. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that all downstream routers will know the correct device as the RP for the twenty multicast test groups. • We expect that the PIM-DRs will have the proper mroute entries and flags set for groups for which they are the last-hop router. • We expect that the PIM-DRs will have the proper mroute entries and flags set for groups for which they are the first-hop router. • We expect that the primary PIM-RP will have the proper mroute entries and flags set for all test groups. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 37 Basic Static RP Functionality—Supervisor 22 Test Results Test Result Basic Static RP Functionality—Supervisor 22 Pass Basic Auto RP Functionality—Supervisor 22 This test verified basic auto-RP functionality using the Supervisor 22 engine. Goals: • Verify the auto-RP configuration on all RP candidates. • Verify the auto-RP configuration on the downstream devices SH1-106 (Sup11) and SH1-110 (Sup22). • Verify that downstream devices know of the correct RP for the given traffic groups. • Verify that the first-hop router has the correct mroute entries and flags for the given multicast test groups. • Verify that the first-hop router has MMLS entries consistent with the mroute table and is hardware forwarding the test traffic. • Verify that the elected RP has the correct mroute entries and flags for the given traffic groups. • Verify that the elected RP has MMLS entries consistent with the mroute table and is hardware forwarding the test traffic. Primary Devices Used: • SH1-99 and SH1-100: Sup22; auto-RP candidates for groups 239.100.[1-3].[1-10] Cisco IOS Release 12.1(13)E13 296 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • SH1-106: Sup11; first-hop router for groups 239.100.2.[1-10] • SH1-110: Sup22; first-hop router for groups 239.100.3.[1-10] Primary IXIA Ports Used: • 4/2, 13/2 Test Procedure The procedure used to perform the Basic Auto RP Functionality—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the auto-RP configuration on SH1-99 and SH1-100. For the Auto-RP candidate SH1-99, there are three lines of configuration for the RP information: 1. A static configuration naming the anycast address 172.31.0.98 as the RP for groups defined by access-list 3. ACL 3 defines two groups, 224.0.1.39 and 224.0.1.40, which are Auto-RP control groups. 224.0.1.39 is the group on which candidate RPs announce themselves and mapping agents listen. Once an RP is elected, the group 224.0.1.40 is used for other routers in the network, which join this group at startup (by default), to learn of the elected RP address and the groups for which that is the RP. 2. SH1-99 is also configured as a PIM Mapping Agent. A Mapping Agent will listen to group 224.0.1.39 for all candidate RPs. It will then elect an RP based on the highest IP address (in the case of SH1-99 and SH1-100, SH1-100 is selected because its Loopback 1 interface address is higher). Once it has elected an RP, it will cache RP-to-group mapping information, and send it out periodically to 224.0.1.40, through which all other routers in the network learn the RP-to-group information.All auto-RPs candidates are configured to send RP announce messages (to group 224.0.1.39). SH1-99 is announcing its candidacy for those groups defined by access-list 1. ACL 1 includes groups 239.100.0.0 through 239.100.255.255. So SH1-99 is saying "I am an RP candidate for groups 239.100.x.x/16." The configuration of SH1-100 is identical to that of SH1-99. SH1-100, by virtue of its higher Loopback 0 interface IP address, is the elected RP for groups 239.100.x.x/16. Step 5 Verify the auto-RP configuration on downstream devices SH1-106 (Sup11) and SH1-110 (Sup22). SH1-106 and SH1-110 have identical, and minimal, RP configurations. There are two lines for each: Step 6 1. The first line statically defines the RP for the local multicast range of groups 239.255.x.x/16. For SH1-106, this RP is anycast address 172.31.0.106. For SH1-110, this RP is anycast address 172.31.0.104. The group range is defined in access-list 1. 2. The second line statically defines the RP for the two auto-RP control groups (224.0.1.39 and 224.0.1.40) as being the anycast 172.31.0.98, with the two groups being defined in ACL 2. Verify that SH1-106 and SH1-110, the first-hop routers, see the proper device as the elected RP for the appropriate group ranges. SH1-106 and SH1-110 obtained this mapping information by listening to group 239.0.1.40. It shows that for groups 239.98.0.0/16 the RP is 172.31.0.98 and for groups 239.100.0.0/16 the RP is 172.31.0.100. It got this information from source 172.31.0.100, a Mapping Agent. The output also shows that both RPs Cisco IOS Release 12.1(13)E13 297 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features in the cache are in use. The output from show ip pim rp is consistent with what is expected. All groups in the range 239.100.0.0/16 are using 172.31.0.100 as the RP and all groups in the range 239.98.0.0/16 are using 172.31.0.98 as the RP. This is the case for both SH1-106 and SH1-110. Since the elected RP for groups 239.100.0.0/16 is SH1-100, SH1-106 should show its RPF interface to the anycast address as being that interface connected to SH1-100. It does, in interface portchannel 167. With SH1-100 being the elected RP for groups 239.100.0.0/16, SH1-110 should have its RPF interface for the anycast IP address 172.31.0.100 pointing back to SH1-100. With SH1-100 two hops away from SH1-110, the output does not prove anything. Step 7 Verify that SH1-106, the first-hop router for groups 239.100.2.[1-10], has the correct mroute entries for all test traffic and that that traffic is being hardware switched. Being the first-hop router, SH1-106 has an (S, G) entry for each of the ten groups for which it is the first-hop router with the correct interfaces listed (incoming interface of VLAN 49, outgoing interface is portchannel 167. SH1-106 also has the correct flags set for the (S,G): an F-flag indicating that the source is registered with the RP, and a T-flag indicating that it has joined the Shortest Path Tree (SPT). The H-flag is also set on the outgoing interface, indicating that the flow is hardware-switched. The MMLS entry information (incoming and outgoing interfaces) is consistent with the mroute entry. Step 8 Verify that SH1-110, the first-hop router for groups 239.100.3.[1-10], has the correct mroute entries for all test traffic and that traffic is being hardware switched. Being the first-hop router, SH1-110 has an (S, G) entry for each of the ten groups for which it is the first-hop router and the correct interfaces listed (incoming interface VLAN 20 and outgoing interface portchannel 171). SH1-110 also has the correct flags set for the (S,G): an F-flag indicating that the source is registered with the RP, and a T-flag indicating that it has joined the Shortest Path Tree (SPT). The H-flag is also set, indicating that the flow is hardware-switched. The MMLS entry information (incoming and outgoing interfaces) is consistent with the mroute entry. Step 9 Verify that SH1-100 (the elected PIM-RP) has the correct mroute entries and flags for the test traffic groups and that traffic is being hardware switched. SH1-100 is the RP for the all groups 239.100.0.0/16. As the RP, it has an (S, G) entry in its mroute table for each. It also has the T-flag set, prompting the (S, G) creation. Also, the H-flag is set correctly for each outgoing interface, as the (S, G) flows are hardware-switched. The interfaces listed in the MMLS entries for each group are consistent with the respective mroute entries. The A-flag for the (S, G) entries should be set for all groups on the RP. This flag tells the router to advertise that (S, G) entry to the MSDP peer with each SA message. The A-flag, however, is not set consistently for each group listed below. This is due to the behavior of load-balancing packets sourced from the RP in 12.1E on the 6500. Because of OSPF equal-cost paths from the source to each Anycast RP, SH1-99 and SH1-100, some sources are registered with SH1-99 and some with SH1-100. SH1-100 is always used, though, to forward the multicast traffic, as it is the elected PIM-RP. So, for some groups, SH1-100 will not advertise certain (S, G)’s in SA messages. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the first-hop routers will learn the correct (elected) RP and RP-to-group mapping information. • We expect that the first-hop routers will have the correct (S, G) entries and flags set for each group. • We expect that the elected RP will have the correct (S, G) entries and flags set for each group. Cisco IOS Release 12.1(13)E13 298 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 38 Basic Auto RP Functionality—Supervisor 22 Test Results Test Result Basic Auto RP Functionality—Supervisor 22 Pass Auto PIM RP Failover—First Hop Router Impact—Supervisor 11 This test verified multicast functionality on the first-hop router during an auto PIM-RP failover on a Supervisor 11 platform. SH1-100 is the elected PIM-RP for thirty multicast test groups: 239.100.[1-3].[1-10]. SH1-106 is the Sup11 first-hop router for groups 239.100.2.[1-10]. SH1-100 was reloaded, and the correct changes in the mroute and MMLS tables of SH1-106 were verified. Once SH1-100 came back online, it was verified that SH1-106 reverted back to its initial state. Goals: • Verify that the first-hop router has the correct mroute entries, flags and MMLS entries for all ten test groups. • Verify that the first-hop router uses the new RP (SH1-99) for each of the ten test groups when SH1-100 is failed over. • Verify that the first-hop router builds correct state again, sending traffic to the original PIM-RP for all ten test groups, when it is back online. Primary Devices Used: • SH1-106: Sup11; first-hop router for groups 239.255.2.[1-10] Primary IXIA Ports Used: • 12/1, 2/1, 1/2, 2/7, 2/4, 1/1, 2/6, 4/2, 4/6, 3/3, 5/3, 8/1, 7/2, 7/1, 9/1, 9/2, 10/1, 10/2, 13/2, 11/1, 12/2 Test Procedure The procedure used to perform the Auto PIM RP Failover—First Hop Router Impact—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the first-hop router, SH1-106, knows SH1-100 as the elected PIM-RP for the groups 239.100.2.[1-10]. According to the RP-to-group mapping on the first-hop router, SH1-106, the RP with address 172.31.0.100 is the elected PIM-RP for all groups 239.100.0.0/16. This address is an anycast address shared by SH1-99 and SH1-100. Due to the higher IP address of its advertising interface, SH1-100 should be the elected PIM-RP. For each group in the range 239.100.0.0/16, SH1-106 lists the RP with address 172.31.0.100 as the PIM-RP. Cisco IOS Release 12.1(13)E13 299 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features SH1-106 shows the reverse-path to the address 172.31.0.100 as being out interface portchannel 167. This goes to device SH1-100. This indicates that SH1-100 is the elected RP for groups 239.100.0.0/16. Step 5 Verify that the first-hop router, SH1-106, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.2.[1-10]. SH1-106 has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The outgoing interface is portchannel 167, which is connected to SH1-100, the elected PIM-RP. For each group, the MMLS entry is consistent with the respective mroute entry. Step 6 Reload SH1-100. Step 7 Verify that the first-hop router, SH1-106, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.2.[1-10] while SH1-100 is offline. SH1-106 still has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry still has the F- and T-flags set, as well as the H-flag on each outgoing interface. This time, though, the outgoing interface is given as portchannel 67, which is connected to SH1-99. This is because SH1-99 is now the elected PIM-RP, as SH1-100 is down. For each group, the MMLS entry is consistent with the respective mroute entry. Step 8 Once SH1-100 comes back online, verify that the first-hop router, SH1-106, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.2.[1-10]. After SH1-100 has come back online and has begun forwarding traffic again, the outgoing interface is again given as portchannel 167, which is connected to SH1-100. This is because SH1-100 is again the elected PIM-RP. For each group, the MMLS entry is consistent with the respective mroute entry. Step 9 Display the log for error messages. Step 10 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that prior to the failover, SH1-106, the first-hop router for groups 239.100.2.[1-10], should have all the correct mroute entries and flags for those ten groups. • We expect SH1-106 to have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect that after the failover, SH1-106 should adjust its mroute and MMLS entries to reflect the RP change. • We expect that once the original RP is back online and forwarding traffic, SH1-106 should return its mroute and MMLS entries to their original state. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 39 Auto PIM RP Failover—First Hop Router Impact—Supervisor 11 Test Results Test Result Auto PIM RP Failover—First Hop Router Impact—Supervisor 11 Pass Cisco IOS Release 12.1(13)E13 300 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Auto PIM RP Failover—First Hop Router Impact—Supervisor 12 This test verified multicast functionality on the first-hop router during an auto PIM-RP failover on a Supervisor 12 platform. SH1-100 is the elected PIM-RP for thirty multicast test groups: 239.100.[1-3].[1-10]. SH1-114 is the Sup12 first-hop router for groups 239.100.1.[1-10]. SH1-100 was reloaded, and the correct changes in the mroute and MMLS tables of SH1-114 were verified. Once SH1-100 came back online, it was verified that SH1-114 reverts back to its initial state. Goals: • Verify that the first-hop router has the correct mroute entries, flags and MMLS entries for all ten test groups. • Verify that the first-hop router uses the new RP (SH1-99) for each of the ten test groups when SH1-100 is failed over. • Verify that the first-hop router builds correct state again, sending traffic to the original PIM-RP for all ten test groups, when it is back online. Primary Devices Used: • SH1-114: Sup12; first-hop router for groups 239.255.1.[1-10] Primary IXIA Ports Used: • 12/1, 2/1, 1/2, 2/7, 2/4, 1/1, 2/6, 4/2, 4/6, 3/3, 5/3, 8/1, 7/2, 7/1, 9/1, 9/2, 10/1, 10/2, 13/2, 11/1, 12/2 Test Procedure The procedure used to perform the Auto PIM RP Failover—First Hop Router Impact—Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the first-hop router, SH1-114, knows SH1-100 as the elected PIM-RP for the groups 239.100.2.[1-10]. According to the RP-to-group mapping on the first-hop router, SH1-114, the RP with address 172.31.0.100 is the elected PIM-RP for all groups 239.100.0.0/16. This address is an anycast address shared by SH1-99 and SH1-100. Due to the higher IP address of its advertising interface, SH1-100 should be the elected PIM-RP. For each group in the range 239.100.0.0/16, SH1-114 lists the RP with address 172.31.0.100 as the PIM-RP. SH1-114 shows the reverse-path to the address 172.31.0.100 as being out interface portchannel 165. This goes to device SH1-100. This indicates that SH1-100 is the elected RP for groups 239.100.0.0/16. Step 5 Verify that the first-hop router, SH1-114, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.1.[1-10]. SH1-114 has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree Cisco IOS Release 12.1(13)E13 301 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The outgoing interface is portchannel 165, which is connected to SH1-100, the elected PIM-RP. For each group, the MMLS entry is consistent with the respective mroute entry. Step 6 Reload SH1-100. Step 7 Verify that the first-hop router, SH1-114, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.1.[1-10] while SH1-100 is offline SH1-114 still has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry still has the F- and T-flags set, as well as the H-flag on each outgoing interface. This time, though, the outgoing interface is given as portchannel 65, which is connected to SH1-99. This is because SH1-99 is now the elected PIM-RP, as SH1-100 is down. For each group, the MMLS entry is consistent with the respective mroute entry. Step 8 Once SH1-100 comes back online, verify that the first-hop router, SH1-114, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.1.[1-10]. After SH1-100 has come back online and has begun forwarding traffic again, the outgoing interface is again given as portchannel 165, which is connected to SH1-100. This is because SH1-100 is again the elected PIM-RP. For each group, the MMLS entry is consistent with the respective mroute entry. Step 9 Display the log for error messages. Step 10 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that prior to the failover, SH1-114, the first-hop router for groups 239.100.1.[1-10], should have all the correct mroute entries and flags for those ten groups. • We expect SH1-114 to have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect that after the failover, SH1-114 should adjust its mroute and MMLS entries to reflect the RP change. • We expect that once the original RP is back online and forwarding traffic, SH1-114 should return its mroute and MMLS entries to their original state. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 40 Auto PIM RP Failover—First Hop Router Impact—Supervisor 12 Test Results Test Result Auto PIM RP Failover—First Hop Router Impact—Supervisor 12 Pass Auto PIM RP Failover—First Hop Router Impact—Supervisor 22 This test verified multicast functionality on the first-hop router during an auto PIM-RP failover on a Supervisor 22 platform. SH1-100 is the elected PIM-RP for thirty multicast test groups: 239.100.[1-3].[1-10]. SH1-110 is the Sup22 first-hop router for groups 239.100.3.[1-10]. SH1-100 was reloaded, and the correct changes in the mroute and MMLS tables of SH1-110 were verified. Once SH1-100 came back online, it was verified that SH1-110 reverts back to its initial state. Cisco IOS Release 12.1(13)E13 302 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Goals: • Verify that the first-hop router has the correct mroute entries, flags and MMLS entries for all ten test groups. • Verify that the first-hop router uses the new RP (SH1-99) for each of the ten test groups when SH1-100 is failed over. • Verify that the first-hop router builds correct state again, sending traffic to the original PIM-RP for all ten test groups, when it is back online. Primary Devices Used: • SH1-110: Sup11; first-hop router for groups 239.255.3.[1-10] Primary IXIA Ports Used: • 12/1, 2/1, 1/2, 2/7, 2/4, 1/1, 2/6, 4/2, 4/6, 3/3, 5/3, 8/1, 7/2, 7/1, 9/1, 9/2, 10/1, 10/2, 13/2, 11/1, 12/2 Test Procedure The procedure used to perform the Auto PIM RP Failover—First Hop Router Impact—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the first-hop router, SH1-110, knows SH1-100 as the elected PIM-RP for the groups 239.100.2.[1-10]. According to the RP-to-group mapping on the first-hop router, SH1-110, the RP with address 172.31.0.100 is the elected PIM-RP for all groups 239.100.0.0/16. This address is an anycast address shared by SH1-99 and SH1-100. Due to the higher IP address of its advertising interface, SH1-100 should be the elected PIM-RP. Step 5 Verify that the first-hop router, SH1-110, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.3.[1-10]. SH1-110 has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The outgoing interface is portchannel 171, which is connected to SH1-104. For each group, the MMLS entry is consistent with the respective mroute entry. Step 6 Reload SH1-100. Step 7 Verify that the first-hop router, SH1-110, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.3.[1-10] while SH1-100 is offline. SH1-110 still has an (S, G) entry in its mroute table for each of the ten groups for which it is the first-hop router. Each (S, G) entry still has the F- and T-flags set, as well as the H-flag on each outgoing interface. This time, though, the outgoing interface is given as portchannel 71, which is connected to SH1-103, which represents the best path to SH1-99, the newly elected PIM-RP, as SH1-100 is down. For each group, the MMLS entry is consistent with the respective mroute entry. Step 8 Once SH1-100 comes back online, verify that the first-hop router, SH1-110, has the proper mroute and MMLS entries, with the correct flags for the groups 239.100.3.[1-10]. Cisco IOS Release 12.1(13)E13 303 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features After SH1-100 has come back online and has begun forwarding traffic again, the outgoing interface is again given as portchannel 171, which leads to SH1-100. This is because SH1-100 is again the elected PIM-RP. For each group, the MMLS entry is consistent with the respective mroute entry. Step 9 Display the log for error messages. Step 10 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that prior to the failover, SH1-110, the first-hop router for groups 239.100.3.[1-10], should have all the correct mroute entries and flags for those ten groups. • We expect SH1-110 to have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect that after the failover, SH1-110 should adjust its mroute and MMLS entries to reflect the RP change. • We expect that once the original RP is back online and forwarding traffic, SH1-110 should return its mroute and MMLS entries to their original state. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 41 Auto PIM RP Failover—First Hop Router Impact—Supervisor 22 Test Results Test Result Auto PIM RP Failover—First Hop Router Impact—Supervisor 22 Pass Auto PIM RP Failover—Traffic Impact—Supervisor 22 This test verified the impact on the traffic during a PIM-RP failover on a Supervisor 22 platform. SH1-100 is the elected PIM-RP for thirty multicast test groups: 239.255.[1-3].[1-10]. SH1-100 was reloaded, and the traffic impact was measured. Goals: • Verify that the impact to the traffic from a PIM-RP failover is acceptable. Primary Devices Used: • SH1-100: Sup22 Primary IXIA Ports Used: • 12/1, 2/1, 1/2, 2/7, 2/4, 1/1, 2/6, 4/2, 4/6, 3/3, 5/3, 8/1, 7/2, 7/1, 9/1, 9/2, 10/1, 10/2, 13/2, 11/1, 12/2 Test Procedure The procedure used to perform the Auto PIM RP Failover—Traffic Impact—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Cisco IOS Release 12.1(13)E13 304 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin sending a fixed stream of traffic Step 5 Force the primary supervisor on SH1-100 to switch to the backup. Step 6 Measure the traffic loss that occurs. Step 7 Repeat the reload sequence four more times, each time measuring traffic loss. Step 8 Determine the average amount of traffic loss. Step 9 Display the log for error messages. Step 10 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the average traffic loss resulting from the failover and recovery of the elected PIM-RP should be acceptable. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 42 Auto PIM RP Failover—Traffic Impact—Supervisor 22 Test Results Test Result Auto PIM RP Failover—Traffic Impact—Supervisor 22 Pass Static PIM-RP Failover—Supervisor 11 This test verified multicast functionality of a Supervisor 11 platform during a static PIM-RP failover. SH1-106 is the primary PIM-RP for ten multicast test groups: 239.255.50.[1-10]. SH1-106 was reloaded, verifying the correct failover of mrouting state to SH1-105 and the reversion of state back to SH1-106, after it came back online. Goals: • Verify that the static RP has the correct mroute entries, flags and MMLS entries for all ten test groups. • Verify that each of the ten test groups fails over to the backup PIM-RP after the failure of the primary, with correct mroute and MMLS state. • Verify that all ten groups build correct state again on the primary PIM-RP when it is back online. Primary Devices Used: • SH1-106: Sup11; static RP for groups 239.255.50.[1-10] Primary IXIA Ports Used: • 2/2, 2/8 Test Procedure The procedure used to perform the Static PIM-RP Failover—Supervisor 11 test follows: Cisco IOS Release 12.1(13)E13 305 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin sending a fixed stream of traffic Step 5 Verify that the primary PIM-RP, SH1-106, has the proper mroute and MMLS entries, with the correct flags for all ten groups. Of the ten groups that SH1-106 is a static RP for, all should be switching using the (S, G) entry. All should have the following flags set, also: T-flag, indicating that the SPT is being used; A-flag, indicating that the (S, G) is being Advertised via MSDP to SH1-105, with the SA messages; H-flag, indicating that traffic is being hardware-switched to the flagged outgoing interface. All three flags are set appropriately on each group (S,G). The MMLS entry for each group is correct and consistent with the respective mroute entry. Step 6 Reload SH1-106. Step 7 Verify that the new primary PIM-RP, SH1-105, has the correct mroute and MMLS entries, with the correct flags set, for all twenty groups. Of the ten groups that SH1-105 is now a static RP for, all should be switching using the (S, G) entry. All should have the following flags set, also: T-flag, indicating that the SPT is being used; A-flag, indicating that the (S, G) is being Advertised via MSDP to SH1-106, with the SA messages; H-flag, indicating that traffic is being hardware-switched to the flagged outgoing interface. All three flags are set appropriately on SH1-105. The MMLS entry for each group is correct and consistent with the respective mroute entry. Step 8 Once SH1-106 comes back online, verify that it is again the RP for all twenty groups and that its mrouting table and MMLS entries are correct. SH1-104 is again the primary PIM-RP. The entries, interfaces and flags are similar to those seen before the failover. Step 9 Determine the amount of traffic loss from the PIM-RP failover. Out of 210,000 packets sent through SH1-106, 8745 were lost for multicast group A, and 9497 were lost for multicast group C during the failover and recovery. Step 10 Repeat the failover sequence, with traffic, four more times, each time determining traffic loss. Step 11 Determine the average amount of traffic loss over the five failovers. Step 12 Display the log for error messages. Step 13 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that prior to the failover, SH1-106, the primary PIM-RP, should have all the correct mroute entries and flags for the twenty groups for which it is the RP. • We expect SH1-106 to have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect SH1-105 to take over the role of primary PIM-RP when SH1-106 is reloaded, and correctly populate its mroute and MMLS entries. Cisco IOS Release 12.1(13)E13 306 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • We expect SH1-106 to resume the role of primary PIM-RP when it is back online and capable of forwarding traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 43 Static PIM-RP Failover—Supervisor 11 Test Results Test Result Static PIM-RP Failover—Supervisor 11 Pass Static PIM-RP Failover—Supervisor 22—RP Impact This test verified multicast functionality on the PIM-RP during a PIM-RP failover on a Supervisor 22 platform. SH1-104 is the primary PIM-RP for groups twenty multicast test groups: 239.255.[50-51].[1-10]. SH1-104 was reloaded, verifying the correct failover of mrouting state to SH1-103 and the reversion of state back to SH1-104, after it came back online. Goals: • Verify that the static RP has the correct mroute entries, flags and MMLS entries for all twenty test groups. • Verify that each of the twenty test groups fails over to the backup PIM-RP after the failure of the primary, with correct mroute and MMLS state. • Verify that all twenty groups build correct state again on the primary PIM-RP when it is back online. Primary Devices Used: • SH1-104: Sup22; static RP for groups 239.255.[50-51].[1-10] Primary IXIA Ports Used: • 5/1, 5/2, 8/2, 13/1 Test Procedure The procedure used to perform the Static PIM-RP Failover—Supervisor 22—RP Impact test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the primary PIM-RP, SH1-104, has the proper mroute and MMLS entries, with the correct flags for all twenty groups. Of the twenty groups that SH1-104 is a static RP for, all should be switching using the (S, G) entry. All should have the following flags set, also: T-flag, indicating that the SPT is being used; A-flag, indicating that the (S, G) is being Advertised via MSDP to SH1-103, with the SA messages; H-flag, indicating that traffic is being hardware-switched to the flagged outgoing interface. The T-flag and the H-flag are set appropriately on all (S, G) entries. The A-flag is set inconsistently on some entries and the M-flag (indicating that the entry was learned via MSDP) is even set on some (S, G) mroute entries The DRs are registering some of the sources with SH1-103 and others with SH1-104, due Cisco IOS Release 12.1(13)E13 307 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-104 and for others on SH1-103. SH1-104 is always used to send multicast traffic on the RP, though, due to the RPF interface being to SH1-104 from the DRs. This problem does not appear to result in any packet loss. The MMLS entry for each group is correct and consistent with the respective mroute entry. Step 5 Reload SH1-104. Step 6 Verify that the new primary PIM-RP, SH1-103, has the correct mroute and MMLS entries, with the correct flags set, for all twenty groups while SH1-104 is offline. Of the twenty groups that SH1-103 is now a static RP for, all should be switching using the (S, G) entry. All should have the following flags set, also: T-flag, indicating that the SPT is being used; A-flag, indicating that the (S, G) is being Advertised via MSDP to SH1-103, with the SA messages; H-flag, indicating that traffic is being hardware-switched to the flagged outgoing interface. The T-flag and the H-flag are set appropriately on all (S, G) entries. The A-flag is set inconsistently on some entries and the M-flag (indicating that the entry was learned via MSDP) is even set on some (S, G) mroute entries. The MMLS entry for each group is correct and consistent with the respective mroute entry. Step 7 Once SH1-104 comes back online, verify that it is again the RP for all twenty groups and that its mrouting table and MMLS entries are correct.Display the log for error messages. Step 8 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that prior to the failover, SH1-104, the primary PIM-RP, should have all the correct mroute entries and flags for the twenty groups for which it is the RP. • We expect SH1-104 to have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect SH1-103 to take over the role of primary PIM-RP when SH1-104 is reloaded, and correctly populate its mroute and MMLS entries. • We expect SH1-104 to resume the role of primary PIM-RP when it is back online and capable of forwarding traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 44 Static PIM-RP Failover—Supervisor 22—RP Impact Test Results Test Result Static PIM-RP Failover—Supervisor 22—RP Impact Pass Static PIM-RP Failover—Supervisor 22—First-Hop Router Impact This test verified multicast functionality on the first-hop router during a static PIM-RP failover on a Supervisor 22 platform. SH1-110 is the first-hop router for ten multicast test groups: 239.255.51.[1-10]. SH1-104 (the primary PIM-RP) was reloaded, and the correct failover of mrouting state to SH1-103 was verified. The reversion of state back to SH1-104, after it is back online, was also verified. Cisco IOS Release 12.1(13)E13 308 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Goals: • Verify that the first-hop router has the correct mroute entries, flags and MMLS entries for all ten test groups. • Verify that each of the ten test groups fails over to the backup PIM-RP after the failure of the primary, with correct mroute and MMLS state. • Verify that all ten groups build correct state again on the primary PIM-RP when it is back online. Primary Devices Used: • SH1-110: Sup22; first-hop router for groups 239.255.51.[1-10] Primary IXIA Ports Used: • 5/2, 4/6 Test Procedure The procedure used to perform the Static PIM-RP Failover—Supervisor 22—First-Hop Router Impact test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the first-hop router SH1-110 (for groups 239.255.51.[1-10]) see SH1-104 as the primary PIM-RP. For the ten groups 239.255.51.[1-10], SH1-110 sees the device with address 172.31.0.104 as the RP. This is an anycast address shared by SH1-104 and SH1-103. The first-hop router SH1-110 sees SH1-104 as the primary PIM-RP. This is verified in that its RPF interface for the anycast address 172.31.0.104 is portchannel 171, which is connected to SH1-104. Step 5 Verify that the first-hop router SH1-110 has the correct mroute and MMLS entries, with the correct flags for groups 239.255.51.[1-10]. As the first-hop router, SH1-110 should have the F-flag and T-flag set for each of the ten groups. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the (S, G) is used to switch the traffic, as should be the case on all first-hop routers in Sparse-mode. The H-flag should also be set for any outgoing interface as the Supervisor 22 should hardware-switch any multicast traffic. Each group does, in fact, have all the correct flags set. Each group also has an MMLS entry that is consistent with the mroute entry for that group. Step 6 Reload SH1-104. Step 7 Verify that the first-hop router now sees SH1-103 as the primary PIM-RP. Portchannel 71, the RPF interface for the anycast IP address, connects SH1-110 to SH1-103, which is now considered to be the primary PIM-RP for the test groups. Step 8 Verify that the first-hop router has updated its mroute and MMLS tables to reflect the RP change. The only thing that should have changed on the first-hop router is the outgoing interface list for each group. As SH1-103 is now the primary PIM-RP, the OIL should reflect that in including portchannel 71 (to SH1-103), and excluding portchannel 171 (to SH1-104). This is indeed the case for each group. Again the MMLS entries are consistent with this change. Cisco IOS Release 12.1(13)E13 309 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 Once SH1-104 comes back online, verify that the first-hop router SH1-110 uses SH1-104 as the primary PIM-RP again. The RPF interface for the anycast IP address is again portchannel 171, indicating that SH1-104 is again the primary PIM-RP. The OIL for each group again has portchannel 171, instead of portchannel 71. The MMLS entries also reflect this change. Step 10 Display the log for error messages. Step 11 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect SH1-110 to have all the correct mroute entries and flags for those groups for which it is the first-hop router. • We expect SH1-110 to be hardware-switching the multicast traffic for the ten test groups. • We expect SH1-110 to properly reflect the change in the primary PIM-RP in its own mroute and MMLS tables, both with the failover and recovery of SH1-104. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 45 Static PIM-RP Failover—Supervisor 22—First-Hop Router Impact Test Results Test Result Static PIM-RP Failover—Supervisor 22—First-Hop Router Impact Pass Static PIM-RP Failover—Supervisor 22—Traffic Impact This test verified the impact on the traffic during a PIM-RP failover on a Supervisor 22 platform. SH1-104 is the primary PIM-RP for groups twenty multicast test groups: 239.255.[50-51].[1-10]. SH1-104 was reloaded, and the traffic impact was measured. Goals: • Verify that the impact to the traffic from a PIM-RP failover is acceptable. Primary Devices Used: • SH1-104: Sup22; static RP for groups 239.255.[50-51].[1-10] Primary IXIA Ports Used: • 5/1, 5/2, 8/2, 13/1 Test Procedure The procedure used to perform the Static PIM-RP Failover—Supervisor 22—Traffic Impact test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Cisco IOS Release 12.1(13)E13 310 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin sending a fixed stream of traffic. Step 5 Reload SH1-104, the primary PIM-RP. Step 6 Measure the traffic loss that occurs. Step 7 Repeat the reload sequence four more times, each time measuring traffic loss. Step 8 Determine the average amount of traffic loss. Step 9 Display the log for error messages. Step 10 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the average traffic loss resulting from the failover and recovery of the primary PIM-RP to be acceptable. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 46 Static PIM-RP Failover—Supervisor 22—Traffic Impact Test Results Test Result Static PIM-RP Failover—Supervisor 22—Traffic Impact Pass Basic IGMP Functionality Internet Group Management Protocol (IGMP) software components run on both the Cisco router and the switch. An IGMP-capable IP multicast router sees all IGMP packets and can inform the switch when specific hosts join or leave IP multicast groups. When the IGMP-capable router receives an IGMP control packet, it creates an IGMP packet that contains the request type (either join or leave), the multicast group address, and the MAC address of the host. The router sends the packet to a well-known address to which all switches listen. When a switch receives the packet, the supervisor engine interprets the packet and modifies the forwarding table automatically. Cisco Group Management Protocol (CGMP) should seamlessly integrate with IGMP and performs the same function. This test verified basic IGMP functionality. Goals: • Verify that IGMP entries are created on the proper devices for both L3 and VLAN interfaces. Primary Devices Used: • SH1-106: Sup11; VLAN 41; groups 239.100.3.[1-10] • SH1-105: Sup11; L3 interface on secondary subnet on non-PIM-DR (NDR); groups 239.100.1.[1-10] Cisco IOS Release 12.1(13)E13 311 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • SH1-110: Sup22; VLAN 11; VLAN 16; L3 interface on secondary subnet on PIM-DR; groups 239.100.[1-2].[1-10] • SH1-102: Sup22; VLAN 43; L3 interface on PIM-DR; groups 239.100.3.[1-10] • SH1-109: Sup22; L3 interface on NDR; groups 239.100.1.[1-10] Primary IXIA Ports Used: • 2/6, 1/1, 10/1, 11/1 Test Procedure The procedure used to perform the Basic IGMP Functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-102 has IGMP entries for groups 239.100.3.[1-10] which contain the correct interfaces. Step 5 Verify that SH1-105 has IGMP entries for groups 239.100.1.[1-10] which contain the correct interfaces. Step 6 Verify that SH1-106 has IGMP entries for groups 239.100.3.[1-10] which contain the correct interfaces. Step 7 Verify that SH1-109 has IGMP entries for groups 239.100.1.[1-10] which contain the correct interfaces. Step 8 Verify that SH1-110 has IGMP entries for groups 239.100.1.[1-10] which contain the correct interfaces. Step 9 Verify that SH1-110 has IGMP entries for groups 239.100.2.[1-10] which contain the correct interfaces. For groups 239.100.2.[1-10], SH1-110 has the correct interfaces joined in VLAN 16 and GigabitEthernet4/16. It should be noted that Gi4/16 is a Layer 3 interface on a secondary subnet. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect IGMP to function correctly on a variety of receiving interfaces, including VLANs, Layer 3 interfaces, and secondary subnets. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 47 Basic IGMP Functionality Test Results Test Result Basic IGMP Functionality Pass Cisco IOS Release 12.1(13)E13 312 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features IGMP Leave/Join Functionality Internet Group Management Protocol (IGMP) software components run on both the Cisco router and the switch. An IGMP-capable IP multicast router sees all IGMP packets and can inform the switch when specific hosts join or leave IP multicast groups. When the IGMP-capable router receives an IGMP control packet, it creates an IGMP packet that contains the request type (either join or leave), the multicast group address, and the MAC address of the host. The router sends the packet to a well-known address to which all switches listen. When a switch receives the packet, the supervisor engine interprets the packet and modifies the forwarding table automatically. Cisco Group Management Protocol (CGMP) should seamlessly integrate with IGMP and performs the same function. This test verified basic IGMP functionality. Goals: • Verify that IGMP leave requests are processed correctly on the router and traffic is stopped. • Verify that IGMP join requests are processed correctly and traffic is restarted. Primary Devices Used: • SH1-105: Sup11; L3 interface on secondary subnet on NDR; groups 239.100.1.[1-10] • SH1-108: Sup12; VLAN 11; groups 239.100.1.[1-10] • SH1-110: Sup22; L3 interface on DR; groups 239.100.2.[1-10] Primary IXIA Ports Used: • 1/1, 8/1, 12/2 Test Procedure The procedure used to perform the IGMP Leave/Join Functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Verify that the supervisor is running the IOS version under test. Verify the uptime and that the box hasn't reloaded unnecessarily. Verify that there is not any process spiking the CPU when the test begins. Step 2 Display the log for error messages, and then clear it. Display the log buffer to verify that there are no erroneous log messages. Then clear the log to verify that error messages have not appeared during the test. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-105 has IGMP entries for groups 239.100.1.[1-10] with interface GigabitEthernet3/2 listed as a receiver. SH1-105 has a record of an IGMP join for interface GigabitEthernet3/2 for all groups, as it should. Step 5 Verify that SH1-105 has mroute entries for the groups 239.100.1.[1-10] and is forwarding traffic out the appropriate interface. SH1-105 has an mroute entry for all groups with GigabitEthernet3/2 in the OIL, as it should. Packets are being forwarded out interface Gi3/2, as they should be. Step 6 Turn on debugging for IGMP on SH1-105. Cisco IOS Release 12.1(13)E13 313 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 7 Stop the IGMP protocol receiver on IXIA port 1/1, recording any debugs and verifying that traffic to the receiver has stopped. For each of the ten mcast test groups, there are the following: • SH1-105 received a Leave group message from the IXIA port (172.31.205.11) for each group • SH1-105 received a Group record for each group from the IXIA port indicating it wishes to receive traffic for that group from 0 sources • SH1-105 lowers the IGMP expiration timer to 1 second for each group on interface GigabitEthernet3/2 and • SH1-105 then sends one more Query for the group to the leaving interface, as per IGMP v2 rules and, further down in the debugs: • SH1-105 sends a second and final Query out the leaving interface for each group, as per IGMP v2 rules • SH1-105 switches to INCLUDE mode for each group for the leaving interface, stopping traffic to that interface SH1-105 is no longer sending traffic to the receiver on interface Gi3/2. Note Step 8 There may me a very small amount of background traffic seen still going to the receiver. It can be ignored for this test. Start the IGMP protocol receiver on IXIA port 1/1, recording any debugs and verifying that traffic is being sent to the receiver again. For each of the ten groups receiving test multicast traffic, there are the following in the debugs: • SH1-105 receives an IGMP v2 Report on the interface attached to the receiver for the test group • SH1-105 receives a Group record from the IXIA receiver for the test group • SH1-105 adds the interface GigabitEthernet3/2 to the list of interfaces to transmit group traffic to • SH1-105 switches to EXCLUDE mode for the group on the interface • The EXCLUDE group timer is updated for the group SH1-105 is again sending traffic to the IXIA receiver out interface GigabitEthernet3/2. Step 9 Turn off all debugging on SH1-105. Step 10 Verify that SH1-108 has IGMP entries for groups 239.100.1.[1-10] with interface VLAN 11 listed as receiver. SH1-108 has a record of an IGMP join for interface VLAN 11 for all groups, as it should. Step 11 Verify that SH1-108 has mroute entries for the groups 239.100.1.[1-10] with VLAN 11 in the OIL, and that the Dista-1 device is forwarding traffic out to the receiver. SH1-108 has an mroute entry for all groups with VLAN 11 in the OIL, as it should. Packets are being forwarded out port 6/3, as they should be. Step 12 Turn on debugging for IGMP on SH1-107 and SH1-108. Step 13 Stop the IGMP protocol receiver on IXIA port 8/1, recording any debugs and verifying that traffic to the receiver has stopped. Cisco IOS Release 12.1(13)E13 314 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Note SH1-107 is the IGMP Querier for VLAN 11, and so will also participate in the leave process for that VLAN . For each of the ten mcast test groups, there are the following: • SH1-107 and SH1-108 received a Leave group message from the IXIA port (172.31.11.81) for each group • SH1-107 and SH1-108 received a Group record for each group from the IXIA port indicating it wishes to receive traffic for that group from 0 sources • SH1-107 and SH1-108 lower the IGMP expiration timer to 1 second for each group on interface VLAN 11 • SH1-107, the IGMP Querier, sends a series of two more group-specific IGMP Queries on VLAN 11 to ensure there are no more receivers on the subnet. and, further down in the debugs: • Both SH1-108 and SH1-107 switch to INCLUDE mode for each group for the leaving interface, stopping traffic to that interface The IXIA port attached to Dista-1 port 6/3is no longer receiving multicast test traffic. Note Step 14 Note There may me a very small amount of background traffic seen still going to the receiver. It can be ignored for this test. Start the IGMP protocol receiver on IXIA port 8/1, recording any debugs and verifying that traffic is being sent to the receiver again. As SH1-107 is the IGMP Querier for VLAN 11, it is very involved in the joining process for the multicast test groups. For each of the ten groups receiving test multicast traffic, there are the following in the debugs: • SH1-107 and SH1-108 receive an IGMP v2 Report on the interface attached to the receiver for the test group • SH1-107 and SH1-108 receive a Group record from the IXIA receiver for the test group • SH1-107 and SH1-108 add the interface VLAN 11 to the list of interfaces to transmit group traffic to • SH1-107 and SH1-108 switch to EXCLUDE mode for the group on the interface • The EXCLUDE group timer is updated for the group Dista-1 is again forwarding traffic out port 4/1 to the IXIA receiver. Step 15 Turn off all debugging on SH1-107 and SH1-108. Step 16 Verify that SH1-110 has IGMP entries for groups 239.100.1.[1-10] with interface GigabitEthernet8/16 listed as a receiver. SH1-110 has a record of an IGMP join for interface GigabitEthernet8/16 for all groups, as it should. Step 17 Verify that SH1-110 has mroute entries for the groups 239.100.1.[1-10] and is forwarding traffic out the appropriate interface, GigabitEthernet8/16. SH1-110 has an mroute entry for all groups with GigabitEthernet8/16 in the OIL, as it should. Packets are being forwarded out interface Gi8/16, as they should be. Cisco IOS Release 12.1(13)E13 315 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 18 Turn on debugging for IGMP on SH1-110. Step 19 Stop the IGMP protocol receiver on IXIA port 12/2, recording any debugs and verifying that traffic to the receiver has stopped. For each of the ten mcast test groups, there are the following: • SH1-110 received a Leave group message from the IXIA port (172.31.250.2) for each group • SH1-110 received a Group record for each group from the IXIA port • SH1-110 lowers the IGMP expiration timer to 1 second for each group on interface GigabitEthernet8/16 and • SH1-110 then sends one more Query for the group to the leaving interface, as per IGMP v2 rules • and, further down in the debugs: • SH1-110 sends a second and final Query out the leaving interface for each group, as per IGMP v2 rules • SH1-110 switches to INCLUDE mode for each group for the leaving interface, stopping traffic to that interface Interface Gi8/16 of SH1-110 is no longer transmitting multicast test traffic to the former receiver. Step 20 Start the IGMP protocol receiver on IXIA port 12/2, recording any debugs and verifying that traffic is being sent to the receiver again. For each of the ten groups receiving test multicast traffic, there are the following in the debugs: • SH1-110 receives an IGMP v2 Report on the interface attached to the receiver for the test group • SH1-110 receives a Group record from the IXIA receiver for the test group • SH1-110 adds the interface GigabitEthernet8/16 to the list of interfaces to transmit group traffic to • SH1-110 switches to EXCLUDE mode for the group on the interface • The EXCLUDE group timer is updated for the group SH1-110 is once again sending test traffic out interface GigabitEthernet8/16 to the IXIA receiver. Step 21 Turn off all debugging on SH1-110. Step 22 Display the log for error messages. Step 23 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the router is expected to cease transmitting traffic to the receiver when the IGMP leaves are received and processed. • We expect that the router is expected to process the new IGMP reports received and begin transmitting traffic to the receiver again. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 316 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 48 IGMP Leave/Join Functionality Test Results Test Result IGMP Leave/Join Functionality Pass Non-RPF Rate Limiting and Multicast Stub—Supervisor 1 Stub multicast routing allows you to configure remote and stub routers as IGMP proxy agents. Instead of fully participating in PIM, these stub routers simply forward IGMP messages from the hosts to the upstream multicast router. This test verified that the multicast stub command worked and that non-Reverse Path Forwarding (RPF) rate limiting functionality worked on Policy Feature Cards (PFC1 and PFC2), and dCEF, including a hardware shortcut. PFC1, PFC2, and the DFCs support ACL-based filtering of RPF failures for sparse mode stub networks. When you enable the ACL-based method of filtering Reverse Path Forwarding failures by entering the mls ip multicast stub command on the redundant router, the ACLs automatically download to the PFC and are applied to the interface you specify. access-list access-list access-list access-list access-list 100 100 100 100 100 permit ip A.B.C.0 0.0.0.255 any permit ip A.B.D.0 0.0.0.255 any permit ip any 224.0.0.0 0.0.0.255 permit ip any 224.0.1.0 0.0.0.255 deny ip any 224.0.0.0 15.255.255.255 The ACLs filter Reverse Path Forwarding failures and drop them in hardware so that they are not forwarded to the router. This test grades multicast stub functionality on the PFC1 (on SH1-107). Multicast traffic was sent from one side of the network to the other (from Dista-2 to Dista-1). As a component of this test, the non-RPF rate-limiting functionality was observed. In this part of the test, SH1-107 was configured to be the multicast stub router. Ten groups of multicast traffic (groups 239.100.1.1 through 239.100.1.10) were sent from Dista-1. Joins for these five groups were sent from Dista-1. The IP address of the remote interface connecting SH1-107 to SH1-104 was configured as the IGMP helper address. The IGMP join packets that were received by SH1-107 were forwarded via this address statement to SH1-104. All ten groups should appear on SH1-104, when the show ip igmp groups command is used. Coupled with the mls ip multicast stub command on SH1-107 is the ip pim neighbor-filter access-list command configured on SH1-104. This configuration blocked PIM neighbor updates coming from SH1-107, and made SH1-107 truly transparent to the rest of multicast functionality. Devices under test: SH1-107, SH1-108, SH1-104. Test Procedure The procedure used to perform the Non-RPF Rate Limiting and Multicast Stub—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Cisco IOS Release 12.1(13)E13 317 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 4 Configure the VLAN 11 interface (source of IGMP joins) on SH1-107 as a multicast stub. Step 5 Configure the IP helper address for SH1-107 VLAN 11, the address on SH1-104 to which SH1-107 will forward the IGMP join packets. With this helper-address configured, SH1-107 will process the IGMP packets itself, and will forward them to SH1-104, as well. Step 6 Configure SH1-104 to filter out IP PIM neighbor updates coming from SH1-107 on the interface portchannel 68. Verify that access list 10 exists and points to the correct IP address of the blocked PIM updates (the IP address of the interface on SH1-107 connected to SH1-104, or 172.31.1.102). SH1-104 will no longer accept PIM updates from SH1-107. This access-list, coupled with the filter configured above, will cause any traffic coming from SH1-107 (IP address 172.31.1.102, the address of the remote side of portchannel 68, which is SH1-104's connection to SH1-107), including PIM neighbor updates, to be denied. Step 7 Begin the IXIA traffic stream. This is multicast test traffic stream A sending from ten incrementing IP sources to ten multicast groups, 230.100.1.[1-10]. It will send 5 minutes of traffic at a rate of 1000pps. Step 8 Verify that the IGMP join messages have been forwarded from SH1-107 to SH1-104 and that SH1-104 does not register SH1-107 as an IP PIM neighbor: SH1-104 is now receiving and processing IGMP packets sent by the IXIA receiver. The non-boldfaced groups shown here are also being sent from the IXIA receiver. SH1-107, which is connected to SH1-104 via portchannel 68, is not listed among SH1-104's PIM neighbors. The filter worked. Step 9 Verify that RPF rate-limiting is done in hardware on the stub router. Rate-limiting of RPF failures is done in hardware. Note that Netflow is used for the hardware processing of RPF failures. This is characteristic of the Supervisor 1. Step 10 Determine the path of traffic to the receiver, starting at SH1-104 (the rendezvous point). For each of the ten multicast groups, SH1-100 has both a (*, G) and an (S, G) entry. The (*, G) entry is not being used, as indicated by the "Null" Incoming Interface List (IIL). The (S, G) entry is being used, because SH1-100 is the RP for the test multicast groups. The (S, G) entry is correct, with portchannel 65 in the IIL, and portchannels 17 in the Outgoing Interface List (OIL). SH1-104 is correctly forwarding traffic out both portchannels 68 and 69, to SH1-107 and SH1-108, respectively. This is because both interfaces are listed in the OILs for the (S, G) entries above. SH1-107 and SH1-108 are PIM neighbors with each other via VLANs 10-20. SH1-107 considers SH1-108 to be the PIM Designated Router (PIM-DR) for each of the VLANs listed. As SH1-108 is the PIM-DR for all traffic for VLANs 10-20, as shown above, SH1-107 should not forward any multicast traffic to the destination. In the mroute table of SH1-107, we can see that the OIL for each group entry is "Null," indicating that no traffic will be forwarded. This is correct. The IIL correctly shows the portchannel 168 interface, as the multicast traffic is coming from SH1-104. Indeed, no traffic is forwarded out portchannel 10 towards the destination. The InMcastPkts counter is increasing because SH1-108 floods the multicast traffic onto VLAN 11, towards the destination. Dista-1, being a Layer 2 device, floods the traffic to all ports in VLAN 11, including the channel to SH1-107. Since SH1-108 is the PIM-DR, it should be forwarding traffic to the destination. Its mroute table indicates that it is. It has portchannel 169 (from SH1-104) in the IIL for each multicast group, and it has VLAN 11 in the OIL for each multicast group. It will therefore forward the traffic out VLAN 11 toward the destination. It is forwarding traffic out the portchannel 10 interface, which carries VLAN 11. Cisco IOS Release 12.1(13)E13 318 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 11 Verify that 100 percent of the multicast traffic that was sent is received on the appropriate port (zero packet loss). Step 12 Negate the commands configured in Step 4 through Step 6. Step 13 Display the log for error messages. Step 14 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that SH1-107 will act as a multicast stub router and forward IGMP packets to its helper-address, on SH1-104. • We expect that SH1-104 will receive and process the IGMP packets sent by SH1-107. • We expect SH1-104 to not have SH1-107 listed in its PIM neighbor table, when the neighbor-filter command is configured. • We expect rate-limiting of non-RPF failures to be done in hardware. • We expect all traffic sent to be received by the appropriate receiver(s), following the correct path. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 49 Non-RPF Rate Limiting and Multicast Stub—Supervisor 1 Test Results Test Result Non-RPF Rate Limiting and Multicast Stub—Supervisor 1 Pass Non-RPF Rate Limiting and Multicast Stub—Supervisor 2 Stub multicast routing allows you to configure remote and stub routers as IGMP proxy agents. Instead of fully participating in PIM, these stub routers simply forward IGMP messages from the hosts to the upstream multicast router. This test verified that the multicast stub command worked and that non-Reverse Path Forwarding (RPF) rate limiting functionality worked on Policy Feature Cards (PFC1 and PFC2), and dCEF, including a hardware shortcut. PFC1, PFC2, and the DFCs support ACL-based filtering of RPF failures for sparse mode stub networks. When you enable the ACL-based method of filtering Reverse Path Forwarding failures by entering the mls ip multicast stub command on the redundant router, the ACLs automatically download to the PFC and are applied to the interface you specify. access-list access-list access-list access-list access-list 100 100 100 100 100 permit ip A.B.C.0 0.0.0.255 any permit ip A.B.D.0 0.0.0.255 any permit ip any 224.0.0.0 0.0.0.255 permit ip any 224.0.1.0 0.0.0.255 deny ip any 224.0.0.0 15.255.255.255 The ACLs filter Reverse Path Forwarding failures and drop them in hardware so that they are not forwarded to the router. Multicast traffic was sent from one side of the network to the other (from Dista-1 to Dista-2). As a component of this test, the non-RPF rate limiting functionality was observed. Cisco IOS Release 12.1(13)E13 319 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features In this part of the test, SH1-109 was configured to be the multicast stub router. Ten groups of multicast traffic (groups 239.100.1.1 through 239.100.1.10) were sent from Dista-1. Joins for these five groups were sent from an IXIA port connected to Dista-2. The IP address of the remote interface connecting SH1-109 to SH1-104 was configured as the IGMP helper address. The IGMP join packets that are received by SH1-109 were forwarded via this address statement to SH1-104. All ten groups should appear on SH1-104, when the show ip igmp groups command is used. Coupled with the mls ip multicast stub command on SH1-109 is the ip pim neighbor-filter access-list command configured on SH1-104. This configuration blocked PIM neighbor updates coming from SH1-109, and made SH1-109 truly transparent to the rest of multicast functionality. Devices under test: SH1-109, SH1-110, SH1-104. Test Procedure The procedure used to perform the Non-RPF Rate Limiting and Multicast Stub—Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Configure the VLAN 11 interface (source of IGMP joins) on SH1-109 as a multicast stub. Step 5 Configure the IP helper address for SH1-109 VLAN 11, the address on SH1-104 to which SH1-109 will forward the IGMP join packets. With this helper-address configured, SH1-109 will process the IGMP packets itself, and will forward them to SH1-104, as well. Step 6 Configure SH1-104 to filter out IP PIM neighbor updates coming from SH1-109 on the interface portchannel 70. Verify that access list 20 exists and points to the correct IP address of the blocked PIM updates (the IP address of the interface on SH1-109 connected to SH1-104, or 172.31.1.110). This access-list will cause any traffic coming from SH1-109 (IP address 172.31.1.110, the address of the remote side of portchannel 70, which is SH1-104's connection to SH1-109), including PIM neighbor updates, to be denied. Step 7 Begin the IXIA traffic stream. This is multicast test traffic stream A sending from ten incrementing IP sources to ten multicast groups, 230.100.1.[1-10]. It will send 5 minutes of traffic at a rate of 1000pps. Step 8 Verify that the IGMP join messages have been forwarded from SH1-109 to SH1-104 and that SH1-104 does not register SH1-109 as an IP PIM neighbor: SH1-104 is now receiving and processing IGMP packets sent by the IXIA receiver. SH1-109, which is connected to SH1-104 via portchannel 70, is not listed among SH1-104's PIM neighbors. The filter worked. Step 9 Verify that RPF rate-limiting is done in hardware on the stub router. Rate-limiting of RPF failures is done in hardware. Note that CEF is used for the hardware processing of RPF failures. This is characteristic of the Supervisor 2. Step 10 Determine the path of traffic to the receiver, starting at SH1-100 (the rendezvous point). Traffic is expected to be sent out portchannel 17 from SH1-100 to SH1-104 and then out both interfaces, portchannels 70 and 71 from SH1-104, to SH1-109 and SH1-110, respectively, because there are IGMP Cisco IOS Release 12.1(13)E13 320 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features joins coming from portchannel 70 (forwarded from SH1-109) and PIM requests coming from portchannel 71 (from SH1-110). The traffic should be forwarded, beyond that, only by SH1-110, because that is the PIM-DR for that segment. SH1-109 should not be forwarding VLAN traffic. For each of the ten multicast groups, SH1-100 has both a (*, G) and an (S, G) entry. The (*, G) entry is not being used, as indicated by the "Null" Incoming Interface List (IIL). The (S, G) entry is being used, because SH1-100 is the RP for the test multicast groups. The (S, G) entry is correct, with portchannel 65 in the IIL, and portchannels 17 in the Outgoing Interface List (OIL). SH1-104 is correctly forwarding traffic out both portchannels 70 and 71, to SH1-109 and SH1-110, respectively. This is because both interfaces are listed in the OILs for the (S, G) entries above. SH1-109 and SH1-110 are PIM neighbors with each other via VLANs 10-20 and portchannel 1. SH1-109 considers SH1-110 to be the PIM Designated Router (PIM-DR) for each of the 11 VLANs listed and portchannel 1. Indeed, no traffic is forwarded out portchannel 20 towards the destination.As SH1-110 is the PIM-DR for all traffic for VLANs 10-20, as shown above, SH1-109 should not forward any multicast VLAN traffic to the destination. In the mroute table of SH1-109, we can see that the OIL for each group entry contains only Gi7/16 and that no VLAN traffic will be forwarded. This is correct. The IIL correctly shows the portchannel 170 interface, as the multicast traffic is coming from SH1-104. Since SH1-110 is the PIM-DR, it should be forwarding traffic to the destination. Its mroute table indicates that it is. It has portchannel 171 (from SH1-104) in the IIL for each multicast group, and it has VLAN 11 in the OIL for each multicast group. It will therefore forward the traffic out VLAN 11 toward the destination. It is forwarding traffic out the portchannel 20 interface, which carries VLAN 11. The high value of this counter is due to background traffic that is also being forwarded by SH1-110. Step 11 Verify that 100 percent of the multicast traffic that was sent is received on the appropriate port (zero packet loss). Step 12 Negate the commands configured in Step 4 through Step 6. Step 13 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 14 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect that SH1-109 will act as a multicast stub router and forward IGMP packets to its helper-address, on SH1-104. • We expect that SH1-104 will receive and process the IGMP packets sent by SH1-109. • We expect SH1-104 to not have SH1-109 listed in its PIM neighbor table, when the neighbor-filter command is configured. • We expect rate-limiting of non-RPF failures to be done in hardware. • We expect all traffic sent to be received by the appropriate receiver(s), following the correct path. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 321 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 50 Non-RPF Rate Limiting and Multicast Stub—Supervisor 2 Test Results Test Result Non-RPF Rate Limiting and Multicast Stub—Supervisor 2 Pass Layer 2 GEC Failover—SH1-110 to Dista-2 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-110 will be failed. It consists of four ports spread evenly over two WS-X6516-GBIC modules. Goals: • Verify that the NDR, SH1-109, builds the correct multicast routing states when the DR, SH1-110, is severed from the Layer 2 device, Dista-2. • Verify that SH1-109 takes over the first-hop router role from SH1-110. • Verify that SH1-110 resumes the first-hop router and PIM-DR roles when the GEC is brought back up. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-110: Sup22; last-hop router for groups 239.100.[1-2].[1-10]; last-hop router (DR) for groups 239.100.3.[1-10] • SH1-109: Sup22; will take over first- and last-hop router roles from SH1-110 for groups above Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 2 GEC Failover—SH1-110 to Dista-2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-110 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x and 239.100.2.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). For 239.100.1.x groups, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet8/16. Cisco IOS Release 12.1(13)E13 322 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For 239.100.2.x groups, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet.For each group (239.100.3.x) with SH1-110 being the first-hop router,SH1-110 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and portchannel 171 which is connected to SH1-104. Step 5 Verify that SH1-110 is passing traffic both ways over all four interfaces in portchannel 20. Step 6 Begin sending a fixed stream of traffic Step 7 Shut down portchannel 20 on SH1-110. Step 8 Verify that SH1-109 builds the correct multicast routing states as the new first- and last-hop router for the various groups. For each group (239.100.1.x and 239.100.2.x) with SH1-109 being the new last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 170 (from SH1-104). For 239.100.1.x groups, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet7/16. For 239.100.2.x groups, the Outgoing Interface List (OIL) should contain one interface: VLAN 16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet.For each group (239.100.3.x) with SH1-110 being the first-hop router,SH1-110 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and GigabitEthernet3/16. Step 9 Measure traffic loss due to the etherchannel failure. Step 10 Bring portchannel 20 of SH1-110 back online. Step 11 With traffic running continuously, verify that SH1-110 again builds the correct multicast routing states for the thirty test groups. For each group (239.100.1.x and 239.100.2.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). For 239.100.1.x groups, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet8/16. For 239.100.2.x groups, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Cisco IOS Release 12.1(13)E13 323 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet.For each group (239.100.3.x) with SH1-110 being the first-hop router,SH1-110 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and portchannel 171 which is connected to SH1-104. Step 12 Verify that all four interfaces in portchannel 20 are passing traffic. Step 13 Verify that the CBL values.for SH1-110 portchannel 20 show forwarding state for all four interfaces. The CBL value for both is 0x0000 0F00. This indicates that port 5 and port 6 of slot3 and port 5 and port 6 of slot 4 are both forwarding as expected. To understand how to interpret the CBL values correctly, please look at Part 6 (Native) of the following document: Step 14 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 15 Determine the average amount of traffic loss over the five failovers. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-109 when portchannel 20 between SH1-110 and Dista-2 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 10-second HSRP dead timer value for local receivers and within 40 second OSPF dead time for remote receivers). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 51 Layer 2 GEC Failover—SH1-110 to Dista-2 Test Results Test Result Layer 2 GEC Failover—SH1-110 to Dista-2 Pass Layer 2 GEC Failover—SH1-108 to Dista-1 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. portchannel 10 on SH1-108 will be failed. It consists of four ports, all on a single WS-X6408-GBIC module. Goals: • Verify that the NDR, SH1-107, builds the correct multicast routing states when the DR, SH1-108, is severed from the Layer 2 device, Dista-1. • Verify that SH1-108 resumes the PIM-DR role when the GEC is brought back up. • Verify that traffic loss is minimal. Cisco IOS Release 12.1(13)E13 324 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Primary Devices Used: • SH1-108: Sup12; last-hop router (DR) for groups 239.100.[1,3].[1-10] • SH1-107: Sup12; will take over last-hop router role from SH1-108 for groups above Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 2 GEC Failover—SH1-108 to Dista-1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-108 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 169 (from SH1-104). There is no H-flag because SUP1 does not hardware switch (*, G) entries. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet4/8. Step 5 Verify that SH1-108 is passing traffic both ways over all four interfaces in portchannel 10. Step 6 Begin sending a fixed stream of traffic. Step 7 Shut down portchannel 10 on SH1-108. Step 8 Verify that SH1-107 builds the correct multicast routing states as the new last-hop router for the various groups. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 168 (from SH1-104). There is no H-flag because SUP1 does not hardware switch (*, G) entries. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain just one interface: VLAN 11 Step 9 Measure traffic loss due to the etherchannel failure. Step 10 Bring portchannel 10 of SH1-108 back online. Step 11 With traffic running continuously, verify that SH1-108 again builds the correct multicast routing states for the ten test groups. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 169 (from SH1-104). There is no H-flag because SUP1 does not hardware switch (*, G) entries. Cisco IOS Release 12.1(13)E13 325 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet4/8. Step 12 Verify that all four interfaces in portchannel 10 are passing traffic. Step 13 Verify that the CBL values for SH1-108 portchannel 10 show forwarding state for all four interfaces. The CBL value for VLAN 11 is 0x00FF. This indicates that ports 1, 2, 3 and 4 of slot4 are all forwarding. To understand how to interpret the CBL values correctly, please look at Part 6 (Native) of the following document: Step 14 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 15 Determine the average amount of traffic loss over the five failovers. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-107 when the portchannel between SH1-108 and SH1-104 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 10-second HSRP dead timer value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 52 Layer 2 GEC Failover—SH1-108 to Dista-1 Test Results Test Result Layer 2 GEC Failover—SH1-108 to Dista-1 Pass Layer 2 GEC Failover—SH1-114 to Dista-1 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 10 on SH1-114 will be failed. It consists of four ports spread evenly over two WS-X6516-GBIC modules. Goals: • Verify that the NDR, SH1-113, builds the correct multicast routing states when the DR, SH1-114, is severed from the Layer 2 device, Dista-1. • Verify that SH1-113 takes over the first-hop router role from SH1-114. • Verify that SH1-114 resumes the first-hop router role when the GEC is brought back up. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-114: Sup12; first-hop router for groups 239.100.1.[1-10] • SH1-113: Sup12; will take over first-hop router role from SH1-110 for groups above Cisco IOS Release 12.1(13)E13 326 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 2 GEC Failover—SH1-114 to Dista-1test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-114 is beginning the procedure with the correct multicast routing states. As the last-hop router for these ten groups, SH1-114 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag, C-flag, and F-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The F-flag indicates that a source is registering with the RP. For mgroup 239.100.1.x the incoming interface list (IIL) is portchannel 165 and the outgoing interface list (OIL) is VLAN 120. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface Also as the first-hop router for these ten groups, SH1-114 should have a (S, G) entry in its mroute table for each group. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 110. The outgoing interface list is VLAN 120 and portchannel 165 which is connected to SH1-100. Step 5 Verify that SH1-114 is passing traffic both ways over all four interfaces in portchannel 10. Step 6 Begin sending a fixed stream of traffic. Step 7 Shut down portchannel 10 on SH1-114. Step 8 Verify that SH1-113 builds the correct multicast routing states as the new first- and last-hop router for the various groups. As the new last-hop router for these ten groups, SH1-113 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag, C-flag, and F-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The F-flag indicates that a source is registering with the RP. For mgroup 239.100.1.x the incoming interface list (IIL) is portchannel 164 and the outgoing interface list (OIL) is VLAN 120. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface Also as the new first-hop router for these ten groups, SH1-113 should have a (S, G) entry in its mroute table for each group. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 110. The outgoing interface list is VLAN 120 and portchannel 164 which is connected to SH1-100. Step 9 Measure traffic loss due to the etherchannel failure. Step 10 Bring portchannel 10 of SH1-114 back online. Step 11 With traffic running continuously, verify that SH1-114 again builds the correct multicast routing states for the thirty test groups. Cisco IOS Release 12.1(13)E13 327 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features As the last-hop router for these ten groups, SH1-114 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag, C-flag, and F-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The F-flag indicates that a source is registering with the RP. For mgroup 239.100.1.x the incoming interface list (IIL) is portchannel 165 and the outgoing interface list (OIL) is VLAN 120. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface Also as the first-hop router for these ten groups, SH1-114 should have a (S, G) entry in its mroute table for each group. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 110. The outgoing interface list is VLAN 120 and portchannel 165 which is connected to SH1-100. Step 12 Verify that all four interfaces in portchannel 10 are passing traffic. Step 13 Verify that the CBL values for SH1-114 portchannel 10 show forwarding state for all four interfaces. The CBL value for both is 0xC000 C000. This indicates that port 8 and port 16 of slot2 and slot 3 are both forwarding. To understand how to interpret the CBL values correctly, please look at Part 6 (Native) of the following document: Step 14 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 15 Determine the average amount of traffic loss over the five failovers. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-113 with the correct multicast routing states when the DR, SH1-114, is severed from the Layer 2 device, Dista-1. • We expect that this failover will take place in a reasonable amount of time (within the 10-second HSRP dead timer value for local receivers and within 40 second OSPF dead time for remote receivers). • We expect that SH1-114 will take over again when the GEC (Po10) is brought back up. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 53 Layer 2 GEC Failover—SH1-114 to Dista-1 Test Results Test Result Layer 2 GEC Failover—SH1-114 to Dista-1 Pass Cisco IOS Release 12.1(13)E13 328 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Layer 2 GEC Failover—SH1-106 to Dista-2 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. portchannel 20 on SH1-106 will be failed. It consists of two ports on a WS-X6408-GBIC module. Goals: • Verify that the NDR, SH1-105, builds the correct multicast routing states when the DR, SH1-106, is severed from the Layer 2 device, Dista-2. • Verify that SH1-105 takes over the first-hop router role from SH1-106. • Verify that SH1-110 resumes the first-hop router and PIM-DR roles when the GEC is brought back up. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-106: Sup11; first-hop router for groups 239.100.2.[1-10]; last-hop router (DR) for groups 239.100.3.[1-10] • SH1-105: Sup11; will take over first- and last-hop router roles from SH1-106 for groups above Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 2 GEC Failover—SH1-106 to Dista-2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-106 is beginning the procedure with the correct multicast routing states. As the last-hop router for these ten groups, SH1-106 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag, C-flag, and F-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The F-flag indicates that a source is registering with the RP. For mgroup 239.100.2.x the incoming interface list (IIL) is vlan49 and the outgoing interface list (OIL) is portchannel 167 and VLAN 50. For mgroup 239.100.3.x the incoming interface list (IIL) is portchannel 167 and the outgoing interface list (OIL) is VLAN 41. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface and any MMLS entries. Step 5 Verify that SH1-106 is passing traffic both ways over both interfaces in portchannel 20. Step 6 Begin sending a fixed stream of traffic. Step 7 Shut down portchannel 20 on SH1-106. Step 8 Verify that SH1-105 builds the correct multicast routing states as the new first- and last-hop router for the various groups. Cisco IOS Release 12.1(13)E13 329 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features When SH1-105 assumes the forwarding role for the ten groups from SH1-106, it should also take on the same mroute and MMLS characteristics that SH1-106 had for each of the groups. This includes the (*, G) entry with its S- and C-flags and the absence of any MMLS entry. For mgroup 239.100.2.x the incoming interface list (IIL) is portchannel 166 and the outgoing interface list (OIL) is VLAN 50. For mgroup 239.100.3.x the incoming interface list (IIL) is portchannel 166 and the outgoing interface list (OIL) is VLAN 41. Step 9 Measure traffic loss due to the etherchannel failure. Step 10 Bring portchannel 20 of SH1-106 back online. Step 11 With traffic running continuously, verify that SH1-106 again builds the correct multicast routing states for the twenty test groups. As the last-hop router for these ten groups, SH1-106 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag, C-flag, and F-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The F-flag indicates that a source is registering with the RP. For mgroup 239.100.2.x the incoming interface list (IIL) is vlan49 and the outgoing interface list (OIL) is portchannel 167 and VLAN 50. For mgroup 239.100.3.x the incoming interface list (IIL) is portchannel 167 and the outgoing interface list (OIL) is VLAN 41. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface and any MMLS entries. Step 12 Verify that both interfaces in portchannel 20 are passing traffic. Step 13 Verify that the CBL values for SH1-106 portchannel 20 show forwarding state for both interfaces. The CBL value for both is 0xF000. This indicates that ports 8 and port 7 of slot3 are both forwarding. To understand how to interpret the CBL values correctly, please look at Part 6 (Native) of the following document: Step 14 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 15 Determine the average amount of traffic loss over the five failovers. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-105 when DR, SH1-106, is severed from the Layer 2 device, Dista-2. • We expect that SH1-106 resumes the PIM-DR role when the GEC (Po20) is brought back up • We expect that this failover will take place in a reasonable amount of time (within the 10-second HSRP dead timer value for local receivers and within 40 second OSPF dead time for remote receivers) • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 330 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 54 Layer 2 GEC Failover—SH1-106 to Dista-2 Test Results Test Result Layer 2 GEC Failover—SH1-106 to Dista-2 Pass Layer 2 GEC Failover—SH1-102 to Dista-1 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 10 on SH1-102 will be failed. It consists of two ports on a WS-X6516-GBIC module. Goals: • Verify that the NDR, SH1-101, builds the correct multicast routing states when the DR, SH1-102, is severed from the Layer 2 device, Dista-2. • Verify that SH1-102 resumes the PIM-DR role when the GEC is brought back up. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-102: Sup22; last-hop router for groups 239.100.[1-3].[1-10] • SH1-101: Sup22; will take over last-hop router role from SH1-102 for groups above Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 2 GEC Failover—SH1-102 to Dista-1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-102 is beginning the procedure with the correct multicast routing states. SH1-102 is the last-hop router for each group, so all entries in the mroute table are (*, G) entries. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface is portchannel 115 (to SH1-100). The Outgoing Interface List (OIL) for multicast group 239.100.1.x is VLAN 41. The OIL for group 239.100.2.x is VLAN 43 and for group 239.100.3.x is VLAN 43 and FastEthernet4/5. Each should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 5 Verify that SH1-102 is passing multicast traffic both ways over both interfaces in portchannel 10. Step 6 Begin sending a fixed stream of traffic. Step 7 Shut down portchannel 10 on SH1-102. Cisco IOS Release 12.1(13)E13 331 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 8 Verify that SH1-101 builds the correct multicast routing states as the new last-hop router for the various groups. SH1-101 is now the last-hop router for each group; all entries in the mroute table are (*, G) entries. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-101. For each group, the Incoming Interface is portchannel 114 (to SH1-100). The Outgoing Interface List (OIL) for multicast group 239.100.1.x is VLAN 41and GigabitEthernet7/16. The OIL for group 239.100.2.x and group 239.100.3.x is VLAN 43. Each should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 9 Measure traffic loss due to the etherchannel failure. Step 10 Bring portchannel 10 of SH1-102 back online. Step 11 With traffic running continuously, verify that SH1-102 again builds the correct multicast routing states for the thirty test groups. SH1-102 is the last-hop router for each group, so all entries in the mroute table are (*, G) entries. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface is portchannel 115 (to SH1-100). The Outgoing Interface List (OIL) for multicast group 239.100.1.x is VLAN 41. The OIL for group 239.100.2.x is VLAN 43 and for group 239.100.3.x is VLAN 43 and FastEthernet4/5. Each should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 12 Verify that both interfaces in portchannel 10 are passing traffic. Step 13 Verify that the CBL values for SH1-102 portchannel 10 show forwarding state for both interfaces. The CBL value for both is 0x0000 CC00. This indicates that port 8 and port 6 of slot7 are both forwarding. To understand how to interpret the CBL values correctly, please look at Part 6 (Native) of the following document: Step 14 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 15 Determine the average amount of traffic loss over the five failovers. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-101 when DR, SH1-102, is severed from the Layer 2 device, Dista-2. • We expect that SH1-102 resumes the PIM-DR role when the GEC (Po10) is brought back up • We expect that this failover will take place in a reasonable amount of time (within the 10-second HSRP dead timer value). • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 332 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 55 Layer 2 GEC Failover—SH1-102 to Dista-1 Test Results Test Result Layer 2 GEC Failover—SH1-102 to Dista-1 Pass Layer 3 GEC Failover—SH1-104 to SH1-110 This test verified the ability of the devices to recover from a Layer 3 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 171 on SH1-110 will be failed. It consists of four ports spread evenly over two WS-X6816-GBIC modules. Goals: • Verify that devices SH1-103, SH1-104, SH1-109, and SH1-110 maintain correct multicast routing states for the various groups during the etherchannel failure and after it is reestablished. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-110: Sup22; first-hop router for groups 239.100.3.[1-10]; last-hop router (DR) for groups 239.100.[1-2].[1-10] • SH1-104: Sup22; transit router for groups 239.100.[1-3].[1-10] • SH1-103: Sup22; new transit router for groups 239.100.[1-3].[1-10] after GEC failover • SH1-109: Sup22; new last-hop router for groups 239.100.[1-2].[1-10] after GEC failover Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-104 to SH1-110 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Verify that the supervisor is running the IOS version under test. Verify the uptime and that the box hasn't reloaded unnecessarily. Verify that there is not any process spiking the CPU when the test begins. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-104 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. Cisco IOS Release 12.1(13)E13 333 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain two interfaces: portchannel 68 and portchannel 71. For 239.100.3.x groups, The Outgoing Interface List (OIL) should contain two interfaces: portchannel 69 and portchannel 117. For each group (239.100.3.x) with SH1-104 being the transient to the first-hop router,SH1-110, there is an (S, G) entry in its mroute table. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 69 and portchannel 117 (to SH1-100 the primary RP). Step 5 Verify that SH1-110 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x and 239.100.2.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet8/16. For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet.For each group (239.100.3.x) with SH1-110 being the first-hop router,SH1-110 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and portchannel 171 which is connected to SH1-104. Step 6 Verify that SH1-110 is passing traffic both ways over all four interfaces in portchannel 171. Step 7 Begin sending a fixed stream of traffic. Step 8 Shut down portchannel 171 on SH1-110. Step 9 Verify that SH1-104 builds the correct multicast routing states. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, the (*, G) Outgoing Interface List (OIL) should contain two interfaces: portchannel 69 and portchannel 70. For 239.100.2.x groups, the (*, G) Outgoing Interface List (OIL) should contain one interface: portchannel 68. For 239.100.3.x groups, the (*, G) Outgoing Interface List (OIL) should contain two interfaces: portchannel 69 and portchannel 70. Cisco IOS Release 12.1(13)E13 334 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group (239.100.3.x) with SH1-104 being the transient to the first-hop router,SH1-110, there is an (S, G) entry in its mroute table. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel70. The outgoing interface list is portchannel69 and portchannel117 (to SH1-100 the primary RP). Step 10 Verify that SH1-110 builds the correct multicast routing states. For each group (239.100.2.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel71 (from SH1-103). For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. Step 11 Verify that SH1-103 builds the correct multicast routing states. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-103 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel16 (from SH1-99 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain one interface: portchanne1 71. For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain one interface: portchannel 71. For 239.100.3.x groups, The Outgoing Interface List (OIL) is Null. Step 12 Verify that SH1-109 builds the correct multicast routing states. For each group (239.100.1.x and 239.100.2.x) with SH1-109 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-109. For each group, the Incoming Interface should be portchannel 170 (from SH1-104). For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain one interface: GigabitEthernet7/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet7/16 is on a secondary subnet.For 239.100.2.x groups, The Outgoing Interface List (OIL) is Null. For each group (239.100.3.x) with SH1-109 being the first-hop router,SH1-109 has an (S, G) entry in its mroute table. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is Gigabit Ethernet 3/16 and portchannel 170 (connected to SH1-104). Cisco IOS Release 12.1(13)E13 335 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Note Although the "J" flag was not set, this is not an error. SPT-threshold is set to infinity so the J flag is not looked at. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 171 of SH1-110 back online. Step 15 Start traffic running continuously Step 16 With traffic running continuously, verify that SH1-104 again builds the correct multicast routing states for the test groups. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain two interfaces: portchannel 68 and portchannel 71. For 239.100.3.x groups, the (*, G) Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70 and portchannel 71. For each group (239.100.3.x) with SH1-104 being the transient to the first-hop router,SH1-110, there is an (S, G) entry in its mroute table. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 69 and portchannel 117 (to SH1-100 the primary RP). Step 17 With traffic running continuously, verify that SH1-110 again builds the correct multicast routing states for the test groups. For each group (239.100.1.x and 239.100.2.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet8/16. For 239.100.2.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 16 and GigabitEthernet4/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet.For each group (239.100.3.x) with SH1-110 being the first-hop router,SH1-110 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and portchannel 171 which is connected to SH1-104. Cisco IOS Release 12.1(13)E13 336 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 18 Verify that all four interfaces in portchannel 171 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-103 when the portchannel between SH1-110 and SH1-104 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second OSPF dead timer value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 56 Layer 3 GEC Failover—SH1-104 to SH1-110 Test Results Test Result Layer 3 GEC Failover—SH1-104 to SH1-110 Pass Layer 3 GEC Failover—SH1-104 to SH1-109 This test verified the ability of the devices to recover from a Layer 3 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 170 on SH1-109 will be failed. It consists of four ports spread evenly over two WS-X6816-GBIC modules. Goals: • Verify that the devices SH1-104, SH1-103, and SH1-109 build the correct multicast routing states when the GEC is failed and brought back up. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-104: Sup22; transit router for groups 239.100.1.[1-10] • SH1-109: Sup22; last-hop router for groups 239.100.[1,3].[1-10] • SH1-103: Sup22; after failover, transit router for groups 239.100.1.[1-10] Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-104 to SH1-109 test follows: Cisco IOS Release 12.1(13)E13 337 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-104 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. Step 5 Verify that SH1-109 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x) with SH1-109 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-109. For each group, the Incoming Interface should be portchannel 170 (from SH1-104). The Outgoing Interface List (OIL) should contain one interface (for the directly attached receiver): GigabitEthernet7/16 with an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. SH1-109 has an (S, G) entry in its mroute table for the 239.100.3.x groups for which it is the first-hop router. In this scenario it is a router-on-a-stick for this group. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is GigabitEthernet3/16. Note There was an error in the script that incorrectly marked the flags as being in error for 239.100.3.1 when they were actually correct. Step 6 Verify that traffic is coming in on all four interfaces in portchannel 170 on SH1-109. Step 7 Begin sending a fixed stream of traffic. Step 8 Shut down portchannel 170 on SH1-109. Step 9 Verify that SH1-104 builds the correct multicast routing states following the GEC failure. For each group (239.100.1.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, the Outgoing Interface List (OIL) should contain only two interfaces: portchannel 69 and portchannel 71 since portchannel 70 on SH1-103 is now the transient for this group to SH1-109. Cisco IOS Release 12.1(13)E13 338 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 Verify that SH1-109 builds the correct multicast routing states following the GEC failure. For each group (239.100.1.x) with SH1-109 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-109. For each group, the Incoming Interface should have changed to be portchannel 70 (from SH1-103). The Outgoing Interface List (OIL) should contain one interface (for the directly attached receiver): GigabitEthernet7/16 with an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. SH1-109 has an (S, G) entry in its mroute table for the 239.100.3.x groups for which it is the first-hop router. In this scenario it is a router-on-a-stick for this group. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is GigabitEthernet3/16. Note Step 11 There was an error in the script that incorrectly marked the flags as being in error for 239.100.3.1 when they were actually correct. Verify that SH1-103 builds the correct multicast routing states following the GEC failure. For each group (239.100.1.x) with SH1-103 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 16 (from SH1-99 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain one interface: portchannel 70. Step 12 Verify that SH1-110 builds the correct multicast routing states following the GEC failure. For each group (239.100.1.x) with SH1-110 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-110. For each group, the Incoming Interface should be portchannel 171 (from SH1-104). The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet8/16. Each should have an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. SH1-110 has an (S, G) entry in its mroute table for each of the ten 239.100.3.x groups for which it is the first-hop router. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is VLAN 10 and portchannel 171 which is connected to SH1-104. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 170 of SH1-109 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-104 again builds the correct multicast routing states for the test groups. Cisco IOS Release 12.1(13)E13 339 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group (239.100.1.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. Step 17 With traffic running continuously, verify that SH1-109 again builds the correct multicast routing states for the twenty test groups. For each group (239.100.1.x) with SH1-109 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-109. For each group, the Incoming Interface should be portchannel 170 (from SH1-104). The Outgoing Interface List (OIL) should contain one interface (for the directly attached receiver): GigabitEthernet7/16 with an H-flag next to it, indicating that it is being Hardware-switched. It should be noted that the receiver interface GigabitEthernet4/16 is on a secondary subnet. SH1-109 has an (S, G) entry in its mroute table for the 239.100.3.x groups for which it is the first-hop router. In this scenario it is a router-on-a-stick for this group. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 20. The outgoing interface list is GigabitEthernet3/16. Step 18 Verify that all four interfaces in portchannel 170 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded by SH1-103 when the portchannel between SH1-109 and SH1-104 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second OSPF dead timer value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 57 Layer 3 GEC Failover—SH1-104 to SH1-109 Test Results Test Result Layer 3 GEC Failover—SH1-104 to SH1-109 Pass Cisco IOS Release 12.1(13)E13 340 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Layer 3 GEC Failover—SH1-104 to SH1-108 This test verified the ability of the devices to recover from a Layer 3 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 169 on SH1-108 will be failed. It consists of four ports spread evenly over two WS-X6408-GBIC modules. Goals: • Verify that devices SH1-108, SH1-104, and SH1-103 build the correct multicast routing states following the GEC failure and recovery. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-108: Sup12; last-hop router for groups 239.100.[1-2].[1-10] • SH1-104: Sup22; transit router for groups 239.100.[1-2].[1-10] • SH1-103: Sup22; new transit router for groups 239.100.[1-2].[1-10] following the GEC failover Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-104 to SH1-108 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-104 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. SH1-104 has an (S, G) entry in its mroute table for each of the ten 239.100.3.x groups for which it is the transient to the first-hop router. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 69 and portchannel 117 (to SH1-100 the primary RP). Step 5 Verify that SH1-108 is beginning the procedure with the correct multicast routing states. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) Cisco IOS Release 12.1(13)E13 341 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 169 (from SH1-104). There is no H-flag because SUP1 does not hardware switch (*, G) entries. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet4/8. For 239.100.3.x groups, The Outgoing Interface List (OIL) should contain one interface: GigabitEthernet3/8. Step 6 Verify that SH1-108 is passing traffic both ways over all four interfaces in portchannel 169. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 169 on SH1-108. Step 9 Verify that SH1-104 has the correct multicast routing states. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: portchannel 70 and portchannel 71. SH1-104 has an (S, G) entry in its mroute table for each of the ten 239.100.3.x groups for which it is the transient to the first-hop router. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 117 (to SH1-100 the primary RP). Step 10 Verify that SH1-108 builds the correct multicast routing states. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should change to be portchannel 69 (from SH1-103). There is no H-flag because SUP1 does not hardware switch (*, G) entries. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet4/8. For 239.100.3.x groups, The Outgoing Interface List (OIL) should contain one interface: GigabitEthernet3/8. Step 11 Verify that SH1-103 builds the correct multicast routing states as the new first- and last-hop router for the various groups. For each group (239.100.1.x) with SH1-103 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 16 (from SH1-99 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain one interface: portchannel 69. Cisco IOS Release 12.1(13)E13 342 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features SH1-103 has an (S, G) entry in its mroute table for each of the 239.100.3.x groups for which it is the new transient to the first-hop router. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 69 since SH10103 is acting as a router-on-a-stick for this group. For each group, the MMLS entry is consistent with the respective mroute entry. Step 12 Verify that SH1-107 has the correct multicast routing states. For each group (239.100.1.x, 239.100.3.x) SH1-107 should have null or no entries. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 169 of SH1-108 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-104 again builds the correct multicast routing states for the test groups. For each group (239.100.1.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 117 (from SH1-100 the primary RP). Each should have an H-flag next to it, indicating that it is being Hardware-switched as all traffic on the Supervisor 2 should be hardware-switched. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. For 239.100.3.x groups, The Outgoing Interface List (OIL) should contain three interfaces: portchannel 69, portchannel 70, and portchannel 71. SH1-104 has an (S, G) entry in its mroute table for each of the ten 239.100.3.x groups for which it is the transient to the first-hop router. Each (S, G) entry has the T-flag set, as well as the H-flag on each outgoing interface. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is portchannel 71. The outgoing interface list is portchannel 69 and portchannel 117 (to SH1-100 the primary RP). For each group, the MMLS entry is consistent with the respective mroute entry. Step 17 With traffic running continuously, verify that SH1-108 again builds the correct multicast routing states for the twenty test groups. For each group (239.100.1.x, 239.100.2.x, 239.100.3.x) with SH1-104 being the transient to the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For each group, the Incoming Interface should be portchannel 169 (from SH1-104). There is no H-flag because SUP1 does not hardware switch (*, G) entries. For 239.100.1.x groups, The Outgoing Interface List (OIL) should contain two interfaces: VLAN 11 and GigabitEthernet4/8. For 239.100.3.x groups, The Outgoing Interface List (OIL) should contain one interface: GigabitEthernet3/8. Step 18 Verify that all four interfaces in portchannel 169 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Cisco IOS Release 12.1(13)E13 343 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-103 when the portchannel between SH1-108 and SH1-104 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 58 Layer 3 GEC Failover—SH1-104 to SH1-108 Test Results Test Result Layer 3 GEC Failover—SH1-104 to SH1-108 Pass Layer 3 GEC Failover—SH1-104 to SH1-107 This test verified the ability of the devices to recover from a Layer 3 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 168 on SH1-107 will be failed. It consists of four ports spread evenly over two WS-X6408-GBIC modules. Goals: • Verify that the devices SH1-107, SH1-104, and SH1-103 build the correct multicast routing states to cope with the failure and recovery. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-107: Sup12; last-hop router for groups 239.100.2.[1-10] • SH1-104: Sup22; transit router for groups 239.100.2.[1-10] • SH1-103: Sup22; new transit router for groups 239.100.2.[1-10] following the GEC failure Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-104 to SH1-107 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-104 is beginning the procedure with the correct multicast routing states. Cisco IOS Release 12.1(13)E13 344 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-104 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.2.x • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain two interfaces: portchannel 68 and portchannel 71. Each should have an H-flag next to it. T Step 5 Verify that SH1-107 is beginning the procedure with the correct multicast routing states. For each group with SH1-107 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For groups 239.100.2.x • Incoming Interface should be portchannel 168 (from SH1-104). • Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/3. This should not have an H-flag next to it, because SH1-107 is a SUP1. Step 6 Verify that SH1-107 is passing traffic both ways over all four interfaces in portchannel 168. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 168 on SH1-107. Step 9 Verify that SH1-104 builds the correct multicast routing states following the GEC failure. For each group with SH1-104 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.2.x • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain one interface: portchannel 71. Each should have an H-flag next to it. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 10 Verify that SH1-107 builds the correct multicast routing states following the GEC failure. For each group with SH1-107 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For groups 239.100.2.x • Incoming Interface should be portchannel 68 (from SH1-103). • Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/3. This should not have an H-flag next to it, because SH1-107 is a SUP1. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 11 Verify that SH1-103 builds the correct multicast routing states following the GEC failure. Cisco IOS Release 12.1(13)E13 345 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-103 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.2.x • Incoming Interface should be portchannel 16 (from SH1-100). • Outgoing Interface List (OIL) should contain a single interface: portchannel 68. It should have an H-flag next to it. Step 12 Verify that SH1-108 builds the correct multicast routing states following the GEC failure. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 168 of SH1-107 back online. Step 15 Strat traffic running continuously. Step 16 Verify that SH1-104 again builds the correct multicast routing states for the test groups. For each group with SH1-104 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.2.x • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain two interfaces: portchannel 68 and portchannel 71. Each should have an H-flag next to it. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 17 With traffic running continuously, verify that SH1-107 again builds the correct multicast routing states for the ten test groups. For each group with SH1-107 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For groups 239.100.2.x • Incoming Interface should be portchannel 168 (from SH1-104). • Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/3. This should not have an H-flag next to it, because SH1-107 is a SUP1. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 18 Verify that all four interfaces in portchannel 168 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 346 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Expected Results • We expect that traffic will failover and be forwarded through RP SH1-103 when the portchannel between SH1-107 and SH1-104 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 59 Layer 3 GEC Failover—SH1-104 to SH1-107 Test Results Test Result Layer 3 GEC Failover—SH1-104 to SH1-107 Pass Layer 3 GEC Failover—SH1-100 to SH1-104 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-104 will be failed. Goals: • Verify that the devices SH1-104, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-104: Sup22; transit router for groups 239.100.[1-3].[1-10] • SH1-100: Sup22; elected RP for groups 239.100.0.0/16 • SH1-99: Sup22; backup RP for groups 239.100.0.0/16 Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-104 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. Cisco IOS Release 12.1(13)E13 347 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 67, RPF nbr 172.31.1.98, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 5 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 67 Verify that SH1-104 is beginning the procedure with the correct multicast routing states. For each group with SH1-104 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.1.x: • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain 4 interfaces: portchannel 68, portchannel 69, portchannel 70, and portchannel 71. For groups 239.100.2.x: • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain 2 interfaces: portchannel 68 and portchannel 71. Each should have an H-flag next to it. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. For each group with SH1-104 being the local PIM-RP verify a (S, G) entry in the mroute table For each (S, G) entry, it should have the T-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The T-flag is correctly set for all groups. For groups 239.100.3.x: • Incoming Interface should be portchannel 71 (from SH1-110). • Outgoing Interface List (OIL) should contain 2 interfaces: portchannel 117, and portchannel 69. Each should have an H-flag next to it. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 6 Verify that SH1-104 is passing traffic both ways over all four interfaces in portchannel 114. Step 7 Begin sending a fixed stream of traffic Cisco IOS Release 12.1(13)E13 348 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 8 Shut down portchannel 117 on SH1-104. Step 9 Verify that SH1-100 builds the correct routing state from SH1-103. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.3.x: Step 10 • Incoming interface: portchannel 16, RPF nbr 172.31.1.50, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 67 Verify that SH1-104 has the correct multicast routing states. All outgoing interfaces lists should be Null. Step 11 Verify that SH1-99 builds the correct routing state down to SH1-103. The newly elected PIM-RP, SH1-99, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 16 For groups 239.100.2.x: Step 12 • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 16 Verify that SH1-103 builds the correct multicast routing state to the backup RP, SH1-99. This is due to the 4 port etherchannel between 103 and 99 having a lower cost than the 2 port etherchannel between 104 and 99. Cisco IOS Release 12.1(13)E13 349 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-103 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.2.x, • Incoming Interface should be portchannel 16 (from SH1-100). • Outgoing Interface List (OIL) should contain a single interface: portchannel 68. It should have an H-flag next to it. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 117 of SH1-104 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-100 again builds the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 67, RPF nbr 172.31.1.98, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 17 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 67 Verify that SH1-104 again builds the correct multicast routing states for the thirty test groups. For each group with SH1-104 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.1.x: • Incoming Interface should be portchannel 117 (from SH1-100). Cisco IOS Release 12.1(13)E13 350 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • Outgoing Interface List (OIL) should contain 4 interfaces: portchannel 68, portchannel 69, portchannel 70, and portchannel 71. For groups 239.100.2.x: • Incoming Interface should be portchannel 117 (from SH1-100). • Outgoing Interface List (OIL) should contain 2 interfaces: portchannel 68 and portchannel 71. Each should have an H-flag next to it. For each group with SH1-104 being the local PIM-RP verify a (S, G) entry in the mroute table. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.100.3.x: • Incoming Interface should be portchannel 71 (from SH1-110). • Outgoing Interface List (OIL) should contain 2 interfaces: portchannel 117, and portchannel 69. Each should have an H-flag next to it. Step 18 Verify that all four interfaces in portchannel 117 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-104 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 60 Layer 3 GEC Failover—SH1-100 to SH1-104 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-104 Pass Layer 3 GEC Failover—SH1-100 to SH1-113 This test verified the ability of the devices to recover from a Layer 2 GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-113 will be failed. Goals: • Verify that the devices SH1-113, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. Cisco IOS Release 12.1(13)E13 351 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • Verify that traffic loss is minimal. Primary Devices Used: • SH1-113: Sup12; last-hop router for groups 239.100.3.[1-10] • SH1-100: Sup22; elected RP for groups 239.100.0.0/16 • SH1-99: Sup22; backup RP for groups 239.100.0.0/16 Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-113 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.2.x: Step 5 • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 Verify that SH1-113 is beginning the procedure with the correct multicast routing states. For each group (239.100.2.x) with SH1-113 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-113. For each group, the Incoming Interface should be portchannel 164 (from SH1-100, the primary PIM-RP). Step 6 For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/2. Verify that SH1-113 is passing traffic both ways over all four interfaces in portchannel 164. Step 7 Begin sending a fixed stream of traffic Cisco IOS Release 12.1(13)E13 352 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 8 Shut down portchannel 164 on SH1-113. Step 9 Verify that SH1-100 has the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.2.x: • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17 Step 10 Verify that SH1-113 builds the correct multicast routing state to the backup RP, SH1-99. Step 11 For each group (239.100.2.x) with SH1-113 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-113. For each group, the Incoming Interface should be portchannel 64 (from SH1-99, the new primary PIM-RP). For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/2. Verify that SH1-99 builds the correct routing state down to SH1-113. The newly elected PIM-RP, SH1-99, should have an (S, G) entry for all ten groups. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-99 to advertise this particular (S, G) entry to the MSDP peer (SH1-100) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.2.x: Step 12 • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 64 Verify that SH1-114 builds the correct multicast routing states following the GEC failure. No IP mroutes are found for any of the 10 multicast groups. Step 13 Measure traffic loss due to the etherchannel failure. Cisco IOS Release 12.1(13)E13 353 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 14 Bring portchannel 164 of SH1-113 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-100 again builds the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.2.x: Step 17 • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 With traffic running continuously, verify that SH1-113 again builds the correct multicast routing states for the ten test groups. For each group (239.100.2.x) with SH1-113 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-113. For each group, the Incoming Interface should be portchannel 164 (from SH1-100, the primary PIM-RP). For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: FastEthernet9/2. Step 18 Verify that both interfaces in portchannel 164 are passing traffic. Step 19 Repeat the failover sequence four times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-113 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 354 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 61 Layer 3 GEC Failover—SH1-100 to SH1-113 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-113 Pass Layer 3 GEC Failover—SH1-100 to SH1-106 This test verified the ability of the devices to recover from a Layer 3GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-106 will be failed. Goals: • Verify that the devices SH1-106, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-106: Sup11; last-hop router for groups 239.100.3.[1-10]; first-hop router for groups 239.100.2.[1-10] • SH1-100: Sup22; elected RP for groups 239.100.1.[1-10] • SH1-99: Sup22; backup RP for groups 239.100.1.[1-10] Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-106 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all twenty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. Cisco IOS Release 12.1(13)E13 355 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For groups 239.100.2.x: • Incoming interface: portchannel 66, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 5 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15 portchannel 67 Verify that SH1-106 is beginning the procedure with the correct multicast routing states. For each group (239.100.3.x) with SH1-106 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-106. For each group, the Incoming Interface should be portchannel 167 (from SH1-100, the primary PIM-RP). For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For each group (239.100.2.x) with SH1-106 being the first-hop router, SH1-106 has an (S, G) entry in its mroute table. In this case, SH1-106 is a router-on-a-stick for these ten groups. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 49. The outgoing interface list is VLAN 50 and portchannel 167 which is connected to SH1-100. Step 6 Verify that SH1-106 is passing traffic both ways over both interfaces in portchannel 167. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 167 on SH1-106. Step 9 Verify that SH1-100 knows SH1-105 as the first-hop router for groups 239.100.2.[1-10] now. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.2.x: Step 10 • Incoming interface: portchannel 66, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 Verify that SH1-106 builds the correct multicast routing state to the backup RP, SH1-99. For each group (239.100.3.x) with SH1-106 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the Cisco IOS Release 12.1(13)E13 356 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-106. For each group, the Incoming Interface should be portchannel 67 (from SH1-99, the new primary PIM-RP). For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. Step 11 Verify that SH1-99 builds the correct routing state down to SH1-106. The newly elected PIM-RP, SH1-99, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-99 to advertise this particular (S, G) entry to the MSDP peer (SH1-100) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.3.x: • Note SH1-99 prefers the path to SH1-103 over SH1-104 because the port channel to SH1-103 has 4 ports instead vs. 2. • Step 12 Incoming interface: portchannel 16, RPF nbr 172.31.11.14, RPF-MFD Outgoing interface list: portchannel 67 Verify that SH1-105 takes over the role of first-hop router for the 239.100.2.x groups. This occurs because of the equal cost paths to SH1-100 from both SH1-105 and SH1-106. This causes SH1-100 to remain the preferred PIM DR through SH1-105 for 239.100.2.x groups rather than use SH1-99 through SH1-106 after portchannel167 on SH1-106 is shut down. For each group (239.100.2.x) with SH1-105 being the new first-hop router for the 239.100.2.x groups., SH1-105 has an (S, G) entry in its mroute table. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 49. The outgoing interface list is portchannel 166 which is connected to SH1-100. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 167 of SH1-106 back online. Note At this point portchannel 167 came up but the OSPF neighbor relationship never came up. The multicast routing source continued to go through SH1-105 (instead of SH1-106) to SH1-100. This occurred even with access-group 181 on the portchannel and the Gig Ethernet interfaces that make it up. As soon as the access-group 181 in was removed from portchannel 167, the OSPF neighbor came up in 1-2 seconds and the multicast routing resumed correctly through portchannel 167 on SH1-106. Step 15 Start traffic running continuously Step 16 Verify that SH1-100 again builds the correct multicast routing states. Cisco IOS Release 12.1(13)E13 357 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. For groups 239.100.2.x: • Incoming interface: portchannel 66, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 17 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15 With traffic running continuously, verify that SH1-106 again builds the correct multicast routing states for the twenty test groups. For each group (239.100.3.x) with SH1-106 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. and a C-flag because the receiver is directly connected to SH1-106. For each group, the Incoming Interface should be portchannel 167 (from SH1-100, the primary PIM-RP). For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For each group (239.100.2.x) with SH1-106 being the first-hop router, SH1-106 has an (S, G) entry in its mroute table. In this case, SH1-106 is a router-on-a-stick for these ten groups. Each (S, G) entry has the F- and T-flags set, as well as the H-flag on each outgoing interface. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the Shortest Path Tree (SPT) is being used. The H-flag indicates that the flow is being hardware-switched. The incoming interface list is VLAN 49. The outgoing interface list is VLAN 50 and portchannel 167 which is connected to SH1-100. Step 18 Verify that both interfaces in portchannel 167 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-106 and SH1-100 is torn down. Cisco IOS Release 12.1(13)E13 358 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 62 Layer 3 GEC Failover—SH1-100 to SH1-106 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-106 Pass Layer 3 GEC Failover—SH1-100 to SH1-105 This test verified the ability of the devices to recover from a Layer 3GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-105 will be failed. Goals: • Verify that the devices SH1-105, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-105: Sup11; last-hop router for groups 239.100.1.[1-10] • SH1-100: Sup22; elected RP for groups 239.100.0.0/16 • SH1-99: Sup22; backup RP for groups 239.100.0.0/16 • SH1-99 and SH1-100 are sharing the RP Anycast address 172.31.0.100; but SH1-100 is the elected RP for groups 239.100.0.0/16 because it has the higher IP address. Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-105 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for Cisco IOS Release 12.1(13)E13 359 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 5 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 Verify that SH1-105 is beginning the procedure with the correct multicast routing states. For each group with SH1-105 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 166 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet3/2. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 6 Verify that SH1-105 is passing traffic both ways over all four interfaces in portchannel 166. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 166 on SH1-105. Step 9 Verify that SH1-100 has the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 10 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17 Verify that SH1-105 builds the correct multicast routing state to the backup RP, SH1-99. Cisco IOS Release 12.1(13)E13 360 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-105 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 66 (from SH1-99, the new primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet3/2. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 11 Verify that SH1-99 builds the correct routing state down to SH1-105. The newly elected PIM-RP, SH1-99, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 12 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 66 Verify that SH1-106 builds the correct multicast routing states following the GEC failure. No IP mroutes are found for any of the 10 multicast groups. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 166 of SH1-105 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-100 again builds the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. Cisco IOS Release 12.1(13)E13 361 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 17 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 With traffic running continuously, verify that SH1-105 again builds the correct multicast routing states for the ten test groups. For each group with SH1-105 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 166 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet3/2. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 18 Verify that both interfaces in portchannel 166 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-105 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 63 Layer 3 GEC Failover—SH1-100 to SH1-105 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-105 Pass Layer 3 GEC Failover—SH1-100 to SH1-102 This test verified the ability of the devices to recover from a Layer 3GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-102 will be failed. Cisco IOS Release 12.1(13)E13 362 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Goals: • Verify that the devices SH1-102, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-102: Sup22; last-hop router for groups 239.100.[1-3].[1-10] • SH1-100: Sup22; elected RP for groups 239.100.0.0/16 • SH1-99: Sup22; backup RP for groups 239.100.0.0/16 Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-102 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 66, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 5 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 67 Verify that SH1-102 is beginning the procedure with the correct multicast routing states. Cisco IOS Release 12.1(13)E13 363 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. This should have an H-flag next to it, indicating that it is being Hardware-switched. Step 6 Verify that SH1-102 is passing traffic both ways over all four interfaces in portchannel 115. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 115 on SH1-102. Step 9 Verify that SH1-100 has the correct multicast routing states. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 17, portchannel 64 For groups 239.100.3.x: Step 10 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 67 Verify that SH1-102 builds the correct multicast routing state to the backup RP, SH1-99. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 15 (from SH1-99, the new primary PIM-RP). Cisco IOS Release 12.1(13)E13 364 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 11 Verify that SH1-99 builds the correct routing state down to SH1-102. The new PIM-RP, SH1-99, should have an (S, G) entry for all thirty groups, and it does. It should also have the T-flag and the A-flag set. The T-flag is correctly set for all groups while, as was seen above, the A-flag is not consistently set for all groups. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 67, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 12 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15 Verify that SH1-101 builds the correct multicast routing state to the backup RP, SH1-99. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 114 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet7/16. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain Null. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain Null. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 115 of SH1-102 back online. Step 15 Start traffic running continuously. Step 16 Verify that SH1-100 again builds the correct multicast routing states. Cisco IOS Release 12.1(13)E13 365 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 For groups 239.100.2.x: • Incoming interface: portchannel 66, RPF nbr 172.31.1.94, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 64 For groups 239.100.3.x: Step 17 • Incoming interface: portchannel 17, RPF nbr 172.31.1.54, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 67 With traffic running continuously, verify that SH1-102 again builds the correct multicast routing states for the thirty test groups. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 18 Verify that all four interfaces in portchannel 115 are passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 366 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-102 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (worst case the 45-second default EIGRP hold time). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 64 Layer 3 GEC Failover—SH1-100 to SH1-102 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-102 Pass Layer 3 GEC Failover—SH1-100 to SH1-101 This test verified the ability of the devices to recover from a Layer 3GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-101 will be failed. Goals: • Verify that the devices SH1-101, SH1-100, and SH1-99 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-101: Sup22; last-hop router for groups 239.100.1.[1-10] • SH1-100: Sup22; elected RP for groups 239.100.1.[1-10] • SH1-99: Sup22; backup RP for groups 239.100.1.[1-10] • SH1-99 and SH1-100 are sharing the RP Anycast address 172.31.0.100; but SH1-100 is the elected RP for groups 239.100.0.0/16 because it has the higher IP address. Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-101 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-100 is beginning with the correct multicast routing states. Cisco IOS Release 12.1(13)E13 367 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 5 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 Verify that SH1-101 is beginning the procedure with the correct multicast routing states. For each group with SH1-101 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 114 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet7/16 This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 6 Verify that SH1-101 is passing traffic over portchannel 114. Step 7 Begin sending a fixed stream of traffic Step 8 Shut down portchannel 114 on SH1-101. Step 9 Verify that SH1-100 builds the correct multicast routing state to the backup RP, SH1-99. The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Cisco IOS Release 12.1(13)E13 368 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 15, portchannel 17, portchannel 66 Verify that SH1-101 builds the correct multicast routing state to the backup RP, SH1-99. For each group with SH1-101 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 14 (from SH1-99, the new primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet7/16 This should have an H-flag next to it, indicating that it is being Hardware-switched. Step 11 Verify that SH1-99 builds the correct routing state down to SH1-101. The newly elected PIM-RP, SH1-99, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.100.1.x: Step 12 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14 Verify that SH1-102 builds the correct multicast routing state to the backup RP, SH1-99. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41 This should have an H-flag next to it, indicating that it is being Hardware-switched. Step 13 Measure traffic loss due to the etherchannel failure. Step 14 Bring portchannel 114 of SH1-101 back online. Step 15 With traffic running continuously, verify that SH1-101 again builds the correct multicast routing states for the ten test groups. Step 16 Verify that SH1-100 again builds the correct multicast routing states. Cisco IOS Release 12.1(13)E13 369 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The elected PIM-RP, SH1-100, should have an (S, G) entry for all ten groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. For groups 239.100.1.x: Step 17 • Incoming interface: portchannel 65, RPF nbr 172.31.11.14, RPF-MFD • Outgoing interface list: portchannel 14, portchannel 15, portchannel 17, portchannel 66 With traffic running continuously, verify that SH1-101 again builds the correct multicast routing states for the ten test groups. For each group with SH1-101 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 114 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: GigabitEthernet7/16 This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 18 Verify that the interface portchannel 114 is passing traffic. Step 19 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 20 Determine the average amount of traffic loss over the five failovers. Step 21 Display the log for error messages. Step 22 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through RP SH1-99 when the portchannel between SH1-101 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 45 second EIGRP hold time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 370 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 65 Layer 3 GEC Failover—SH1-100 to SH1-101 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-101 Pass Layer 3 GEC Failover—SH1-100 to SH1-97 This test verified the ability of the devices to recover from a Layer 3GEC failover, altering multicast routing state in order to minimize traffic loss. Portchannel 20 on SH1-101 will be failed. Goals: • Verify that the devices SH1-100, and SH1-97 maintain the correct multicast routing states during the GEC failover. • Verify that traffic loss is minimal. Primary Devices Used: • SH1-100: Sup22; transit router for groups 239.98.50.[1-10] • SH1-97: Sup22 and SH1-98: Sup22 are sharing the RP Anycast address 172.31.0.98; but SH1-97 is the elected RP for groups 239.98.0.0/16 because it is the RP directly connected to the source. • SH1-99: Sup22; becomes router used for RPF when GEC is failed between SH1-97 and SH1-100. Primary IXIA Ports Used: • All Test Procedure The procedure used to perform the Layer 3 GEC Failover—SH1-100 to SH1-97 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-97 is beginning with the correct multicast routing states. The elected PIM-RP, SH1-97, should have an (S, G) entry for all 10 groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-97 to advertise this particular (S, G) entry to the MSDP peer (SH1-98) with the SA messages. The T-flag is correctly set for all groups. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.98.50.x: Step 5 • Incoming interface: FastEthernet8/11 • Outgoing interface list: portchannel 13 Verify that SH1-100 is beginning the procedure with the correct multicast routing states. Cisco IOS Release 12.1(13)E13 371 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features For each group with SH1-100 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.98.50.1.x: • Incoming Interface should be portchannel 13 (from SH1-97). • Outgoing Interface List (OIL) should contain 4 interfaces: portchannel 65, portchannel 67, portchannel 17, portchannel 15. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 6 Verify that SH1-100 is passing traffic in portchannel 13. There are multicast packets coming in on each interface of portchannel 13. Step 7 Begin sending a fixed stream of traffic. Step 8 Shut down portchannel 13 on SH1-100. The elected PIM-RP, SH1-97, should have an (S, G) entry for all 10 groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-97 to advertise this particular (S, G) entry to the MSDP peer (SH1-98) with the SA messages. The T-flag is correctly set for all groups. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.98.50.x: Step 9 • Incoming interface: FastEthernet8/11 • Outgoing interface list: portchannel 12 (to SH1-99) Verify that SH1-100 builds the correct multicast routing state to the backup RP, SH1-98. For each group with SH1-100 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.98.50.1.x: • Incoming Interface should be portchannel 13 (from SH1-98). • Outgoing Interface List (OIL) should contain 4 interfaces: portchannel 65, portchannel 67, portchannel 17, portchannel 15. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. What we actually see here is that SH1-99 is forwarding the traffic down to the receivers for three of the interfaces, portchannel 67, portchannel 16, and portchannel 65. SH1-99 has portchannel 13 in its OIL, as well, forwarding to SH1-100, which has portchannel 15 in its OIL. So, for three of the four receivers, SH1-99 is forwarding traffic. For one of the receivers SH1-100 is forwarding the traffic. The explanation is that, with the current setup, the cost from SH1-99 to SH1-97 is better than from to SH1-100 to SH1-98 so the path through SH1-99 to SH1-97 would be the preferred one. The lone receiver from SH1-102 to SH1-100 happens to have a better cost path than to SH1-100 than to SH1-99 so it uses the path to SH1-100 as the preferred one. So, the actual results make sense with the current setup. Cisco IOS Release 12.1(13)E13 372 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 Measure traffic loss due to the etherchannel failure. Step 11 Bring portchannel 13 of SH1-100 back online. Step 12 Start traffic running continuously Step 13 Verify that SH1-97 again builds the correct multicast routing states. The elected PIM-RP, SH1-97, should have an (S, G) entry for all 10 groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-97 to advertise this particular (S, G) entry to the MSDP peer (SH1-98) with the SA messages. The T-flag is correctly set for all groups. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. For groups 239.98.50.x: Step 14 • Incoming interface: FastEthernet8/11 • Outgoing interface list: portchannel 13 Verify that SH1-100 again builds the correct multicast routing states for the ten test groups. For each group with SH1-100 being the transit router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flag is set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode. For groups 239.98.50.1.x: • Incoming Interface should be portchannel 13 (from SH1-97). • Outgoing Interface List (OIL) should contain 4 interfaces: portchannel 65, portchannel 67, portchannel 17, portchannel 15. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 15 Verify that the interface portchannel 13 is passing traffic. Step 16 Repeat the failover sequence four more times with a fixed amount of traffic, each time measuring the traffic loss caused by the failover. Step 17 Determine the average amount of traffic loss over the five failovers. Step 18 Display the log for error messages. Step 19 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic will failover and be forwarded through SH1-99 when the portchannel between SH1-97 and SH1-100 is torn down. • We expect that this failover will take place in a reasonable amount of time (within the 40-second default OSPF dead time value). • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 373 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 66 Layer 3 GEC Failover—SH1-100 to SH1-97 Test Results Test Result Layer 3 GEC Failover—SH1-100 to SH1-97 Pass Switch Fabric Module Failover—Supervisor 22 This test verified multicast functionality during Switch Fabric Module (SFM) failover. Multicast traffic is sourced from IXIA and transits through SH1-106. The traffic is switched using the crossbar fabric. This test performed a series of resets on the active SFM and measured traffic loss at each iteration. In several of the following steps, verification that the traffic is using the SFM is requested. How the Medusa ASIC handled traffic was verified. The Medusa ASIC interfaces are between the line card local bus and the backplane of the Catalyst 6500. If traffic is using the SFM (no legacy, or nonfabric-enabled, cards present), the Medusa mode will be compact for all line cards, indicating that it is sending a compact header on the backplane for the switching decision. Note that any WS-X6816 modules are always in compact mode, because they are fabric-only cards. More on the switching modes involving the SFM can be found at the Cisco Catalyst 6500 Series Switches site: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter0 9186a008007fb2a.html Goals: • Verify that the router is using the crossbar fabric to switch the traffic prior to SFM failover. • Verify that the router is using the crossbar fabric to switch the traffic after the SFM failover. • Verify that failover times are within acceptable parameters. Primary Devices Used: • SH1-102: Sup22; last-hop router for groups 239.100.2.[1-10] Primary IXIA Ports Used: • 4/2, 1/2 Test Procedure The procedure used to perform the Switch Fabric Module Failover—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-102 is a last-hop router for test groups 239.100.2.[1-10]. As the last-hop router, SH1-102 should be switching the test traffic using a (*, G) entry (because SPT-threshold is infinity). This is the case, as SH1-102 has a (*, G) entry for each group, and an (S, G) for none. Each group also has the correct flags set: S-flag for Sparse mode; C-flag for the directly Connected receiver; and the H-flag for Hardware switched traffic. Incoming interface: portchannel 115, RPF nbr 172.31.1.45, RPF-MFD Cisco IOS Release 12.1(13)E13 374 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Outgoing interface list: VLAN 43, Forward/Sparse, 04:40:11/00:02:10, H Step 5 Verify that SH1-102 is receiving traffic on portchannel 115 and transmitting traffic on portchannel 10, and that the traffic is being hardware-switched. Multicast traffic is being received on portchannel 115 and transmitted on portchannel 10. There is an MMLS entry for each group, indicating hardware-switching. Each entry shows the Incoming interface as portchannel 115 and the Hardware switched outgoing interface as VLAN 43 (which is carried on the portchannel 10 trunk). Step 6 Verify that portchannels 10 and 115 consist of interfaces on fabric-enabled line cards. portchannel s 10 and 115 are comprised of interfaces from modules 7 and 3, respectively. Module 7 (WS-X6516-GBIC) is a fabric-enabled module. Module 3 (WS-X6816-GBIC) is a pure fabric module. So both should be using the fabric to switch traffic. Step 7 Verify that all fabric-enabled modules are using the crossbar fabric to switch the traffic. Modules 3 and 7 are not in bus mode, so they are using the fabric to switch traffic. Step 8 Start the test script which will failover the active fabric module on SH1-102 500 times while running traffic. Step 9 Analyze the results from the script and verify that failover times are within tolerances. Log output from the test is given in full here: Below there are three rows of data, Active, OIR, and Traffic. The Active row represents the amount of time, in milliseconds, it took for the standby fabric module to come online as active, following the failure of the active module. The OIR value represents the amount of time, in milliseconds, that it took for the failed fabric module to return to an online (standby) state. Lastly, the Traffic value gives the amount of time, in milliseconds, that traffic flow was interrupted. Note There was one iteration of the test that skewed OIR (iteration 390), and 2 iterations that skewed traffic (iterations 391 and 392). I can't explain this anomaly. The mean length of traffic loss was 0.633 seconds, well within tolerances. The fastest and slowest times do not raise alarm either since almost all other times were either 8 or 12 msec. The times for failover and reset of the fabric modules are also acceptable. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that failovers should occur within an acceptable amount of time and that traffic loss due to fabric failure should be minimal. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 375 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 67 Switch Fabric Module Failover—Supervisor 22 Test Results Test Result Switch Fabric Module Failover—Supervisor 22 Pass GEM Failover—Supervisor 11 as First-Hop Router This test verified multicast functionality during Gigabit Ethernet (GE) module failover at the first-hop router. There are four Gigabit Ethernet modules in SH1-106, which is the first-hop router for groups 239.100.2.[1-10]. Three of these were reset with traffic passing through them. Traffic continued to reach the destination and mrouting and MMLS states were consistent with what was expected. Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-106: Sup11; first-hop router for groups 239.255.2.[1-10] Primary IXIA Ports Used: • 4/2, 1/2 Test Procedure The procedure used to perform the GEM Failover—Supervisor 11 as First-Hop Router test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-106 is the first-hop router for groups 239.100.2.[1-10]. A first-hop router should have an (S, G) entry with the F-flag and T-flag set. The F-flag indicates that the source is registered with the RP. The T-flag indicates that the SPT-bit is set and the (S, G) is used. SH1-106 has such an (S, G) entry for each of the ten groups. It is also hardware-forwarding the group traffic out interface portchannel 167, as indicated by the H-flag. Each mroute is coupled with an MMLS entry with consistent interface information. Step 5 Show which modules are used by which etherchannels on SH1-106. portchannel 20, which leads to the traffic source, consists of two interfaces on a WS-X6408-GBIC module (Gi3/7 and Gi3/8). Portchannel 167, attached to the RP, consists of two interfaces, each on a separate WS-X6408-GBIC module (Gi5/1 and Gi6/1). Step 6 Verify that some multicast traffic is passing through the interfaces of each of these modules. As the first-hop router, SH1-106 is receiving traffic on portchannel 20 and transmitting it on portchannel 167. This is confirmed in the Incoming Interface List (IIL) and Outgoing Interface List (OIL) for the groups seen above. Step 7 Reset module 3 on SH1-106. Cisco IOS Release 12.1(13)E13 376 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are the same as in the initial state, with the correct flags and interfaces. Step 9 Verify that the interfaces on module 3 are again passing traffic. As the first-hop router, SH1-106 is receiving traffic on portchannel 20 and transmitting it on portchannel 167. Step 10 Reset module 5 on SH1-106. Step 11 Once module 5 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are the same as in the initial state, with the correct flags and interfaces. Step 12 Verify that the interfaces on module 5 are again passing traffic. Step 13 Reset module 6 on SH1-106. Step 14 Once module 6 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are the same as in the initial state, with the correct flags and interfaces. Step 15 Verify that the interfaces on module 6 are again passing traffic. The interfaces on the reset module are again passing traffic as before. Step 16 Display the log for error messages. Step 17 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect that the mroute and MMLS entries will be restored to their correct states when the reset module and its interfaces are back online. • We expect that the interfaces of the reset module will pass traffic as before, once they come back online. • We expect CPU and memory impact to be within acceptable limits. Results Table 68 GEM Failover—Supervisor 11 as First-Hop Router Test Results Test Result GEM Failover—Supervisor 11 as First-Hop Router Pass GEM Failover—Supervisor 11 as Last-Hop Router This test verified multicast functionality during Gigabit Ethernet (GE) module failover at the last-hop router. There are four Gigabit Ethernet modules in SH1-106, which is the last-hop router for groups 239.100.3.[1-10]. Three of these were reset with traffic passing through them. Traffic continued to reach the destination and mrouting and MMLS states were consistent with what was expected. Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Cisco IOS Release 12.1(13)E13 377 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Primary Devices Used: • SH1-106: Sup11; last-hop router for groups 239.255.3.[1-10] Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 11 as Last-Hop Router test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-106 is the last-hop router for groups 239.100.3.[1-10]. As the last-hop router, SH1-106 should have a (*, G) entry for each group with the following flags set: the S-flag, which indicates that the flow is set up in Sparse mode; the C-flag, indicating that the receiver is directly Connected. SH1-106 has the (*, G) and both flags for each group for which it is the last-hop router. It is not hardware-switching these flows, and therefore has no MMLS entry, as (*, G) flows are software-switched on Supervisor 1 platforms. Step 5 Show which modules are used by which etherchannels on SH1-106. Being the last-hop router for the ten test groups, SH1-106 will have traffic coming in on portchannel 167 (from the RP) and going out portchannel 20 (to the receiver). Portchannel 167 consists of two ports, Gi5/1 and Gi6/1. Portchannel 20 also consists of two ports, Gi3/7 and Gi3/8. The three modules represented in these two etherchannels are all WS-X6408-GBIC modules. Step 6 Verify that some multicast traffic is passing through the interfaces of each of these modules. Traffic should be coming in on the interfaces of portchannel 167 (Gi5/1 and Gi6/1) and going out on the interfaces of portchannel 20 (Gi3/7 and Gi3/8). This is indeed the case. Step 7 Reset module 3 on SH1-106. Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are correct as before, following the reset of module 3. Step 9 Verify that the interfaces on module 3 are again passing traffic. Both interfaces in portchannel 20 are again forwarding traffic. Step 10 Reset module 5 on SH1-106. Step 11 Once module 5 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are correct as before, following the reset of module 5. The (S, G) MMLS entry is created because SH1-105 had become the DR when module 5 was reset on SH1-106. When module 6 came back online, both SH1-105 and SH1-106 were forwarding traffic for a time until SH1-105 determined that SH1-106 was the DR again. As a result of both devices forwarding traffic, each was receiving non-RPF traffic on VLAN 41 (the receiver VLAN). The (S, G) was created as a result of this non-RPF traffic. It is deleted as soon as an assert is sent by SH1-106 on VLAN 41. This capture was taken before this occurred though. Step 12 Verify that the interfaces on module 5 are again passing traffic. The interface in portchannel 167 are again receiving traffic. Step 13 Reset module 6 on SH1-106. Cisco IOS Release 12.1(13)E13 378 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 14 Once module 6 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are correct as before, following the reset of module 6. Step 15 Verify that the interfaces on module 6 are again passing traffic. The interface in portchannel 167 are again receiving traffic. Step 16 Display the log for error messages. Step 17 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect that the proper mroute and MMLS entries will be reinstalled following the reset of the various GE modules. • We expect that the proper interfaces on the reset modules will return to forwarding or receiving traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 69 GEM Failover—Supervisor 11 as Last-Hop Router Test Results Test Result GEM Failover—Supervisor 11 as Last-Hop Router Pass GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface This test determined the effect of resetting a GE module that has a directly connected Layer 3 interface. Module 3 of SH1-105 has a directly connected Layer 3 interface on a secondary subnet. This interface is connected to the receiver for groups 239.100.1.[1-10]. This module was reset, traffic resumed, and mrouting and MMLS states were consistent with what was expected, after the module came back online. Goals: • Verify that the impact on traffic to a Layer 3 receiver due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-105: Sup11; has directly connected Layer 3 receiver for groups 239.255.1.[1-10] on a secondary subnet Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface test follows: Cisco IOS Release 12.1(13)E13 379 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that interface GigabitEthernet3/2 is a Layer 3 interface. Interface GigabitEthernet3/2 is a Layer 3 interface with both a primary and secondary IP address configured. The secondary network is what the receiver is on. Step 5 Verify that SH1-105 has the correct mroute and MMLS entries for groups 239.100.1.[1-10]. SH1-105 has a (*, G) mroute entry for each group being received on the Layer 3 interface. Each (*, G) has the S-flag and C-flag set. The S-flag indicates that Sparse-mode is being used. The C-flag indicates that the receiver is directly Connected. There is no MMLS entry as (*, G) flows are not hardware-switched on the Supervisor 1 platform. Step 6 Verify that interface GigabitEthernet3/2 is passing traffic to the receiver port. The Layer 3 interface is sending traffic to the receiver as it should. Step 7 Reset module 3 Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are the same for all ten groups after module 3 comes back online and the receiver is getting traffic again. Step 9 Verify that interface GigabitEthernet3/2 is again passing traffic. The Layer 3 interface is again transmitting traffic to the receiver. Step 10 Display the log for error messages. Step 11 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect that the mroute and MMLS entries will be restored after the reset of the GE module with the Layer 3 interface on it. • We expect that the Layer 3 interface will again send traffic to the receiver when the module comes back online. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 70 GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface Test Results Test Result GEM Failover—Supervisor 11 with Directly Connected Layer 3 Interface Pass Cisco IOS Release 12.1(13)E13 380 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features GEM Failover—Supervisor 22 as First-Hop Router This test verified multicast functionality during Gigabit Ethernet (GE) module failover at the first-hop router. There are four Gigabit Ethernet modules in SH1-110, which is the first-hop router for groups 239.100.3.[1-10]. All of these were reset with traffic passing through them. Traffic resumed through these modules and mrouting and MMLS states were consistent with what was expected. Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-110: Sup22; first-hop router for groups 239.255.3.[1-10] Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 22 as First-Hop Router test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-110 is the first-hop router for groups 239.100.3.[1-10]. Since SH1-110 is the first-hop router for the ten test groups, it should have an (S, G) for each group. Each (S, G) should have the F-flag set, as it will be registered with the RP. Each (S, G) should also have the T-flag set as it is using the Shortest Path Tree (SPT) from the source to the RP. The outgoing interfaces of each (S, G) should have the H-flag set, as traffic is hardware-switched on the Supervisor 2 platform. For each of the ten groups: There is an (S, G) entry with the F- and T-flags set and each outgoing interface in the (S, G) has the H-flag set. The information in the MMLS entries is consistent with the information in the respective mroute entry. Step 5 Show which modules are used by which etherchannels on SH1-110. Traffic is coming into the first-hop router, SH1-110, on portchannel 20 and being sent to the PIM-RP on portchannel 171. Portchannel 20 has four interfaces, two from module 3 and two from module 4. Both modules 3 and 4 are WS-X6816-GBIC modules. Portchannel 171 also has four interfaces, evenly split between modules 3 and 4. Step 6 Verify that some multicast traffic is passing through the interfaces of each of these modules. Packets are coming in each of the interfaces on portchannel 20 and going out each of the interfaces in portchannel 171. Step 7 Reset module 3 on SH1-110. Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. Following the reset of module 3, part of portchannel 171, the mroute and MMLS entries are correctly as they were before. Step 9 Verify that the interfaces on module 3 are again passing traffic. Cisco IOS Release 12.1(13)E13 381 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The two interfaces in module 3 of portchannel 171 are again forwarding traffic. Step 10 Reset module 4 on SH1-110. Step 11 Once module 4 comes back online, verify that the correct mrouting and MMLS entries are re-installed. Following the reset of module 4, part of portchannel 171, the mroute and MMLS entries are correctly as they were before. Step 12 Verify that the interfaces on module 4 are again passing traffic. The two interfaces in module 4 of portchannel 171 are again forwarding traffic. Step 13 Reset module 7 on SH1-110. Step 14 Once module 7 comes back online, verify that the correct mrouting and MMLS entries are re-installed. Following the reset of module 7, part of portchannel 20, the mroute and MMLS entries are correctly as they were before. Step 15 Verify that the interfaces on module 7 are again passing traffic. The two interfaces in module 7 of portchannel 20 are again receiving traffic. Step 16 Reset module 8 on SH1-110. Step 17 Once module 8 comes back online, verify that the correct mrouting and MMLS entries are re-installed. Following the reset of module 8, part of portchannel 20, the mroute and MMLS entries are correctly as they were before. Step 18 Verify that the interfaces on module 8 are again passing traffic. Step 19 Display the log for error messages. Step 20 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect the mroute and MMLS entries to be correct on SH1-110 after each module reset. • We expect that all the proper interfaces should again pass traffic following each module reset. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 71 GEM Failover—Supervisor 22 as First-Hop Router Test Results Test Result GEM Failover—Supervisor 22 as First-Hop Router Pass GEM Failover—Supervisor 22 as Last-Hop Router This test verified multicast functionality during Gigabit Ethernet (GE) module failover at the first-hop router. There are two Gigabit Ethernet modules in SH1-102, which is the last-hop router for groups 239.100.[1-3].[1-10]. Both of these were reset with traffic passing through them. Traffic resumed through these modules and mrouting and MMLS states were consistent with what was expected. Cisco IOS Release 12.1(13)E13 382 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-102: Sup22; first-hop router for groups 239.255.[1-3].[1-10] Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 22 as Last-Hop Router test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-102 is the last-hop router for groups 239.100.[1-3].[1-10]. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 5 Show which modules are used by which etherchannels on SH1-102. Step 6 Verify that some multicast traffic is passing through the interfaces of each of these modules. Step 7 Reset module 3 on SH1-102. Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. Cisco IOS Release 12.1(13)E13 383 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 9 Verify that the interfaces on module 3 are again passing traffic. Step 10 Reset module 7 on SH1-102. Step 11 Once module 7 comes back online, verify that the correct mrouting and MMLS entries are re-installed. For each group with SH1-102 being the last-hop router, verify a (*, G) entry in the mroute table. There is no (S, G) entry because the SPT threshold is configured to infinity, preventing the creation of an (S, G) entry. Also, verify that the correct flags are set in the (*, G) entry: an S-flag because the traffic is forwarded using Sparse-mode, and a C-flag because the receiver is directly connected to SH1-102. For each group, the Incoming Interface should be portchannel 115 (from SH1-100, the primary PIM-RP). For groups 239.100.1.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 41. For groups 239.100.2.x, the Outgoing Interface List (OIL) should contain a single interface: VLAN 43. For groups 239.100.3.x, the Outgoing Interface List (OIL) should contain two interfaces: VLAN 43 and FastEthernet4/5. Step 12 Verify that the interfaces on module 7 are again passing traffic.This should have an H-flag next to it, indicating that it is being Hardware-switched. The MMLS entries for each group should be consistent with the mroute entries, containing the same Incoming Interface and OIL. Step 13 Display the log for error messages. Step 14 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect traffic to resume correctly when reset module comes back online. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 72 GEM Failover—Supervisor 22 as Last-Hop Router Test Results Test Result GEM Failover—Supervisor 22 as Last-Hop Router Pass GEM Failover—Supervisor 22 as Static RP This test verified multicast functionality during Gigabit Ethernet (GE) module failover on a static PIM-RP. There are four Gigabit Ethernet modules in SH1-104, which is the static RP for groups 239.255.[50-51].[1-10]. Two of these were reset with traffic passing through them.Traffic resumed through these modules and mrouting and MMLS states were consistent with what was expected. Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Cisco IOS Release 12.1(13)E13 384 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Primary Devices Used: • SH1-104: Sup22; static PIM-RP for groups 239.255.[50-51].[1-10] Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 22 as Static RP test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-104 is the static RP for groups 239.255.[50-51].[1-10]. SH1-108 shows the RP for the twenty groups 239.255.[50-51].[1-10] to be the device with IP address 172.31.0.104. This is an anycast address shared by SH1-103 and SH1-104. SH1-108 shows the RPF interface for the anycast address 172.31.0.104 to be portchannel 169, which is connected to SH1-104. So SH1-104 is the primary PIM-RP for the twenty test groups. Like SH1-108, SH1-110 shows the RP for the twenty groups to be the device with the IP address 172.31.0.104. The RPF interface for the anycast address 172.31.0.104 is portchannel 171, which is directly connected to SH1-104. So SH1-110 also sees SH1-104 as the primary PIM-RP for the twenty test groups. Step 5 Verify that SH1-104 has the correct mroute and MMLS entries for the groups 239.255.[50-51].[1-10]. As the primary PIM-RP for the twenty test groups, SH1-104 should have an (S, G) entry for each of the groups. Each (S, G) should have the T-flag set to indicate the use of the Shortest Path Tree (SPT) and the A-flag set so that the (S, G) is Advertised to the MSDP peer with SA messages. Each outgoing interface of the (S, G) entry should have the H-flag set, as all traffic on the Supervisor 2 should be hardware-switched. The incoming and outgoing interfaces in the (S, G) of the MMLS entry should be consistent with the respective entry in the mrouting table. SH1-104 does have an (S, G) for each entry with the T-flag set, and the H-flag set on each outgoing interface of the (S, G)’s. The MMLS entries are consistent with their respective mroute entries. The A-flag is not set consistently on each (S,G), though. This is due to DDTS CSCea21798. Because of OSPF equal-cost paths from the source to each Anycast RP, SH1-103 and SH1-104, some sources are registered with SH1-103 and some with SH1-104. SH1-104 is always used, though, to forward the multicast traffic, as it is the elected PIM-RP. So, for some groups, SH1-104 will not advertise certain (S, G)’s in SA messages. Step 6 Show which modules are used by which etherchannels on SH1-104. Only portchannels 71 and 69 are being used to receive/transmit traffic for these twenty test groups. Portchannel 69 consists of four interfaces from module 8, a WS-X6515-GBIC module. Portchannel 71 consists of two interfaces from module 8 and two from module 3, a WS-X6816-GBIC module. Step 7 Verify that some multicast traffic is passing through the interfaces of each of these modules. Each interface of the two portchannels used is both sending and receiving traffic. Step 8 Reset module 3 on SH1-104. Step 9 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are correct for each of the twenty test groups following the reset of module 3. For groups 239.255.50.[1-10], the outgoing interface will show portchannel 70 until it is deleted. Portchannel 70 was used when module 3 was reset. Cisco IOS Release 12.1(13)E13 385 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 Verify that the interfaces on module 3 are again passing traffic. Again, both interfaces of the reset module are forwarding and receiving traffic. Step 11 Reset module 8 on SH1-104. Step 12 Once module 8 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroute and MMLS entries are correct for each of the twenty test groups following the reset of module 8. For groups 239.255.50.[1-10], the outgoing interface will show portchannel 70 until it is deleted. Portchannel 70 was used when module 3 was reset. The A-flag is not set on any of the twenty groups at this point. This is because all groups had been registered with SH1-103 when it became the primary PIM-RP. Step 13 Verify that the interfaces on module 8 are again passing traffic. Again, all six interfaces of the reset module are forwarding and receiving traffic. Step 14 Display the log for error messages. Step 15 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect the mroute and MMLS entries to be correct on SH1-104 after each module reset. • We expect that all the proper interfaces should again pass traffic following each module reset. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 73 GEM Failover—Supervisor 22 as Static RP Test Results Test Result GEM Failover—Supervisor 22 as Static RP Pass GEM Failover—Supervisor 22 as Auto RP This test verified multicast functionality during Gigabit Ethernet (GE) module failover on an elected RP. There are two Gigabit Ethernet modules in SH1-97, which is the elected RP for groups 239.98.50.[1-10]. One of these was reset with traffic passing through them. The standby and active supervisors were reset, also, as their uplink interfaces were used in the Etherchannels. Traffic resumed through these modules and mrouting and MMLS states were consistent with what was expected. Goals: • Verify that the impact on traffic due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-97: Sup22; elected RP for groups 239.98.50.[1-10] Primary IXIA Ports Used: N/A Cisco IOS Release 12.1(13)E13 386 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the GEM Failover—Supervisor 22 as Auto RP test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-97 is the elected RP for groups 239.98.50.[1-10]. SH1-99 shows that groups 239.98.0.0/16 use the RP with IP address 172.31.0.98. This is an anycast address shared by SH1-97 and SH1-98. SH1-99 knows the IP address for 172.31.0.98, the anycast address for groups 239.98.0.0/16, from portchannel 12, which is directly connected to SH1-98. Therefore, SH1-98 is the elected RP for groups 239.98.0.0/16. Step 5 Verify that SH1-97 has the correct mroute and MMLS entries for groups 239.98.50.[1-10]. As the RP for the ten test groups, SH1-97 should have an (S, G) mroute entry for each of the ten groups. It does, and also has the T-flag and the A-flag set. The T-flag indicates that the Shortest Path Tree (SPT) is being used to the source. The A-flag means that SH1-97 will advertise that (S, G) to its MSDP peer with the next SA message. The H-flag is set on all outgoing interfaces in the (S,G), because the traffic is hardware-switched. There is an MMLS entry for each (S, G) in the mrouting table, and the interface information in the two is consistent. Step 6 Show which modules are used by which etherchannels on SH1-97. Portchannel 13 is the only outgoing interface for the (S, G) flows listed above. It consists of an interface from each of the two supervisors, and two interfaces from module 3, a WS-X6816-GBIC. Step 7 Verify that some multicast traffic is passing through the interfaces of each of these modules on SH1-97. Some multicast traffic is being sent out each of the four interfaces in portchannel 13. Step 8 Reset module 3 on SH1-97. Step 9 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. When module 3 came back online, the mroute and MMLS states were exactly as they were before. Step 10 Verify that the interfaces on module 3 are again passing traffic. The interfaces in module 3 are again sending out traffic. Step 11 Reset the standby supervisor on SH1-97. Step 12 Once the standby supervisor comes back online, verify that the correct mrouting and MMLS entries are re-installed. When the standby supervisor came back online, the mroute and MMLS states were exactly as they were before. Step 13 Verify that the interfaces the supervisors of SH1-97 are still passing traffic. The interfaces in both the standby and the active supervisor are again sending out traffic. Step 14 Reset the active supervisor on SH1-97. Step 15 Once SH1-97 comes back online, verify that the correct mrouting and MMLS entries are re-installed. When SH1-97 came back online, the mroute and MMLS states were exactly as they were before. Step 16 Verify that the interfaces of the supervisors of SH1-97 are still passing traffic. Cisco IOS Release 12.1(13)E13 387 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The interfaces in both the standby and active supervisors are again sending out traffic. Step 17 Display the log for error messages. Step 18 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect the mroute and MMLS entries to be correct on SH1-97 after each module reset. • We expect that all the proper interfaces should again pass traffic following each module reset. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 74 GEM Failover—Supervisor 22 as Auto RP Test Results Test Result GEM Failover—Supervisor 22 as Auto RP Pass GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface This test determined the effect of resetting a Gigabit Ethernet (GE) module (that has a directly connected Layer 3 interface. Modules 4 and 8 of SH1-110, and modules 3 and 7 of SH1-109 each have a directly connected Layer 3 interface. These interfaces are connected to receivers for various multicast groups. These modules were reset. Traffic resumed through these modules and mrouting and MMLS states were consistent with what was expected. after each module came back online. Goals: • Verify that the impact on traffic to a Layer 3 receiver due to a GE module reset is minimal. • Verify that any impact to mrouting and MMLS states are consistent with what it expected. Primary Devices Used: • SH1-109: Sup22; has directly connected Layer 3 receiver on module 3 for groups 239.255.3.[1-10] • SH1-110: Sup22; has directly connected Layer 3 receiver on module 4 for groups 239.255.2.[1-10] on a secondary subnetSH1-109: Sup22; has directly connected Layer 3 receiver on module 7 for groups 239.255.1.[1-10] • SH1-110: Sup22; has directly connected Layer 3 receiver on module 8 for groups 239.255.1.[1-10] Primary IXIA Ports Used: • N/A Test Procedure The procedure used to perform the GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Cisco IOS Release 12.1(13)E13 388 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that interface GigabitEthernet3/16 on SH1-109 is a Layer 3 interface. The interface has an IP address on a primary network. Step 5 Verify that SH1-109 has the correct mroute and MMLS entries for groups 239.100.3.[1-10]. SH1-109 has the correct mroute entries for all ten groups. The interface GigabitEthernet3/16 is listed as the outgoing interface for all ten groups. The S- and C-flags are set on the (*, G) entry, but it is the (S, G) entry that is being used to switch the traffic, as is indicated by the T-flag being set. The H-flag is set for each outgoing interface in the (S, G) mroute entries, as the traffic is being Hardware switched. The (S, G) is installed because we have an RP-on-a-stick scenario here. The MMLS entries are consistent with the mroute entries, with the (S, G) having the same incoming and outgoing interfaces as the respective mroute entry. Step 6 Verify that interface GigabitEthernet3/16 is passing traffic to the receiver port. Step 7 Reset module 3. Step 8 Once module 3 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroutes and MMLS entries are correct after the GE module reset. Step 9 Verify that interface GigabitEthernet3/16 is again passing traffic. Verify that interface GigabitEthernet7/16 on SH1-109 is a Layer 3 interface. The Layer 3 interface is again passing traffic to the receiver. GigabitEthernet7/16 on SH1-109 is a Layer 3 interface. Step 10 Verify that SH1-109 has the correct mroute and MMLS entries for groups 239.100.1.[1-10]. SH1-109 has the correct mroute entries for all ten groups. The interface GigabitEthernet7/16 is listed as the outgoing interface for all ten groups. The S- and C-flags are set on the (*, G) entry, because the traffic is being forwarded in Sparse mode and the receiver is directly Connected. The H-flag is set for each outgoing interface in the (*, G) mroute entries, as the traffic is being Hardware switched. The MMLS entries are consistent with the mroute entries, with the (*, G) having the same incoming and outgoing interfaces as the respective mroute entry. Step 11 Verify that interface GigabitEthernet7/16 is passing traffic to the receiver port. Step 12 Reset module 7. Step 13 Once module 7 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroutes and MMLS entries are correct after the GE module reset. Step 14 Verify that interface GigabitEthernet7/16 of SH1-109 is again passing traffic. The Layer 3 interface is again passing traffic to the receiver. Verify that interfaces GigabitEthernet4/16 and GigabitEthernet8/16 on SH1-110 are Layer 3 interfaces. The interfaces on SH1-110 are Layer 3 interfaces. Interface Gigabit Ethernet 4/16 has a secondary IP address, the subnet of which the receiver is on. Step 15 Verify that SH1-110 has the correct mroute and MMLS entries for groups 239.100.2.[1-10]. SH1-110 has the correct mroute entries for all ten groups. The incoming interface is portchannel 171. The interface GigabitEthernet4/16 is listed as the outgoing interface for all ten groups. The S- and C-flags are set on the (*, G) entry. The H-flag is set for each outgoing interface in the (*, G) mroute entries, as the traffic is being Hardware switched. Cisco IOS Release 12.1(13)E13 389 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The MMLS entries are consistent with the mroute entries, with the (*, G) having the same incoming and outgoing interfaces as the respective mroute entry. Step 16 Verify that interface GigabitEthernet4/16 is passing traffic to the receiver port. Step 17 Reset module 4 on SH1-110. Step 18 Once module 4 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroutes and MMLS entries are correct after the GE module reset. Step 19 Verify that interface GigabitEthernet4/16 is again passing traffic. The Layer 3 interface is again passing traffic to the receiver. Step 20 Verify that SH1-110 has the correct mroute and MMLS entries for groups 239.100.1.[1-10]. SH1-110 has the correct mroute entries for all ten groups. The interface GigabitEthernet8/16 is listed as the outgoing interface for all ten groups. The S- and C-flags are set on the (*, G) entry. The H-flag is set for each outgoing interface in the (*, G) mroute entries, as the traffic is being Hardware switched. The MMLS entries are consistent with the mroute entries, with the (*, G) having the same incoming and outgoing interfaces as the respective mroute entry. Step 21 Verify that interface GigabitEthernet8/16 is passing traffic to the receiver port. The Layer 3 interface is passing traffic to the receiver. Step 22 Reset module 8. Step 23 Once module 8 comes back online, verify that the correct mrouting and MMLS entries are re-installed. The mroutes and MMLS entries are correct after the GE module reset. SH1-110 has the correct mroute entries for all ten groups. The incoming interface is portchannel 171. The interface GigabitEthernet4/16 is listed as the outgoing interface for all ten groups. The S- and C-flags are set on the (*, G) entry. The H-flag is set for each outgoing interface in the (*, G) mroute entries, as the traffic is being Hardware switched. The MMLS entries are consistent with the mroute entries, with the (*, G) having the same incoming and outgoing interfaces as the respective mroute entry. Step 24 Verify that interface GigabitEthernet8/16 is again passing traffic. The Layer 3 interface is again passing traffic to the receiver. Step 25 Display the log for error messages. Step 26 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect that the mroute and MMLS entries will be restored after the reset of the GE module with the Layer 3 interface on it. • We expect that the Layer 3 interface will again send traffic to the receiver when the module comes back online. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 390 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 75 GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface Test Results Test Result GEM Failover—Supervisor 22 with Directly Connected Layer 3 Interface Pass Protocol Independent Module-Designated Router Failover—Supervisor 11 This test verified multicast functionality during designated router (PIM-DR) failover on a Supervisor 11 platform. Traffic for ten multicast groups is routed through the PIM-DR, which is SH1-106 (Sup11). The SH1-105 backup took over the forwarding role when SH1-106 is failed. Goals: • Verify that the proper mroute and MMLS entries are installed on the PIM-DR (SH1-106) before the failover, and after it is recovered. • Verify that the proper mroute and MMLS entries are installed on the backup PIM-DR (SH1-105) when SH1-106 is reloaded. • Verify that the impact to the traffic from a PIM-DR failover is acceptable. Primary Devices Used: • SH1-106: Sup11; PIM-DR for groups 239.255.3.[1-10] • SH1-105: Sup11; backup PIM-DR for groups 239.255.3.[1-10] Primary IXIA Ports Used: • 13/2, 2/6 Test Procedure The procedure used to perform the Protocol Independent Module-Designated Router Failover—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-105 and SH1-106 are PIM neighbors and that SH1-106 is the PIM-DR. SH1-105 and SH1-106 maintain a PIM neighbor relationship across VLANs 40 through 50. For each of these eleven VLANs, SH1-105 indicates that its PIM neighbor, SH1-106, is the Designated Router (DR). Step 5 Verify that the PIM-DR, SH1-106, has the correct mroute and MMLS entries for the groups it is the DR for. As the last-hop router for these ten groups, SH1-106 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag and C-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. There is no hardware-switching of (*, G) flows on the Supervisor 1 platform, hence the absence of the H-flag on the outgoing interface and any MMLS entries. Incoming interface: portchannel 167, RPF nbr 172.31.1.97 Cisco IOS Release 12.1(13)E13 391 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Outgoing interface list: VLAN 41 Step 6 Begin sending a fixed stream of traffic through the PIM-DR SH1-106 Step 7 Force the primary supervisor on PIM-DR SH1-106 to switch to the backup supervisor. This causes the primary PIM-RP to switch from SH1-106 to SH1-105. Step 8 Verify that SH1-105 has assumed the role of PIM-DR and has the proper mroute and MMLS entries. When SH1-105 assumes the forwarding role for the ten groups from SH1-106, it should also take on the same mroute and MMLS characteristics that SH1-106 had for each of the groups. This includes the (*, G) entry with its S- and C-flags and the absence of any MMLS entry. Incoming interface: portchannel 166, RPF nbr 172.31.1.93 Outgoing interface list: VLAN 41 Step 9 Once SH1-106 comes back online, verify that it resumes its role as PIM-DR and recreates proper mroute and MMLS entries. The neighbor relationships between SH1-105 and SH1-106 have been reestablished and, again, SH1-105 sees SH1-106 as the PIM-DR for the eleven VLANs. Having resumed the forwarding role for traffic to the ten test groups, SH1-106 again installs the (*, G) entries with the correct flags. Again, it is not hardware-switching this traffic and has no MMLS entries. Incoming interface: portchannel 167, RPF nbr 172.31.1.97 Outgoing interface list: VLAN 41 Step 10 Determine the amount of traffic that was lost during the PIM-DR failover above. Step 11 Repeat the PIM-DR failover sequence four more times, each time determining the amount of traffic loss. Step 12 Determine the average down time over the five tests. Step 13 Display the log for error messages. Step 14 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the primary PIM-DR (SH1-106) to have the correct mroute and MMLS entries before the reload and after recovery. • We expect the backup PIM-DR (SH1-105) to create the correct mroute and MMLS entries after the reload of SH1-106 and assume the forwarding role for all test groups. • We expect any impact on traffic during the failover process to be minimal and acceptable. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 76 Protocol Independent Module-Designated Router Failover—Supervisor 11 Test Results Test Result Protocol Independent Module-Designated Router Failover—Supervisor 11 Pass Cisco IOS Release 12.1(13)E13 392 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Protocol Independent Module-Designated Router Failover—Supervisor 22 This test verified multicast functionality during designated router (PIM-DR) failover on a Supervisor 22 platform. Traffic for ten multicast groups was routed through the PIM-DR, which is SH1-110. The SH1-109 backup took over the forwarding role when SH1-110 is failed. Goals: • Verify that the proper mroute and MMLS entries are installed on the PIM-DR (SH1-106) before the failover, and after it is recovered. • Verify that the proper mroute and MMLS entries are installed on the backup PIM-DR (SH1-105) when SH1-106 is reloaded. • Verify that the impact to the traffic from a PIM-DR failover is acceptable. Primary Devices Used: • SH1-110: Sup22; LHR and PIM-DR for groups 239.100.[1-2].[1-10] • SH1-109: Sup22; backup PIM-DR for groups 239.100.[1-2].[1-10] after failover Primary IXIA Ports Used: • 4/2, 3/3, 11/1, 12/2, 10/1, 10/2 Test Procedure The procedure used to perform the protocol independent module-designated router failover—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-109 and SH1-110 are PIM neighbors and that SH1-110 is the PIM-DR. SH1-109 and SH1-110 maintain a PIM neighbor relationship across VLANs 10 through 20 and portchannel 1. For each of these eleven VLANs and the etherchannel, SH1-109 indicates that its PIM neighbor, SH1-110, is the Designated Router (DR). Step 5 Verify that the PIM-DR, SH1-110, has the correct mroute and MMLS entries for the groups it is the DR for. As the last-hop router for these twenty groups, SH1-110 should have a (*, G) entry for each group. This is due to the SPT threshold being configured as infinity. Each (*, G) entry correctly has the S-flag and C-flag set. The S-flag indicates that the flow is maintained via Sparse mode. The C-flag indicates that the receiver is directly Connected. The H-flag, correctly set on each of the outgoing interfaces, indicates that the traffic out that interface is being hardware-switched. This is confirmed by the presence of an MMLS entry for each group. The Outgoing interface list for the 239.100.1.x group contains VLAN 11 (for the receiver attached via the Dista-2 switch) and GigabitEthernet8/16 (for the directly attached receiver). The Outgoing interface list for 239.100.2.x group contains VLAN 16 and GigabitEthernet4/16. Step 6 Begin sending a fixed stream of traffic through the PIM-DR SH1-110 Step 7 Force the primary supervisor on PIM-DR SH1-110 to switch to the backup supervisor. This causes the primary PIM-RP to switch from SH1-110 to SH1-109. Cisco IOS Release 12.1(13)E13 393 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 8 Verify that SH1-109 has assumed the role of PIM-DR and has the proper mroute and MMLS entries. When SH1-109 assumes the forwarding role for the twenty groups from SH1-110, it should also take on the same mroute and MMLS characteristics that SH1-110 had for each of the groups. This includes the (*, G) entry with its S- and C-flags set. The Outgoing interface list for the 239.100.1.x group contains VLAN 11 and GigabitEthernet7/16. The Outgoing interface list for 239.100.2.x group contains only VLAN 16 since there are no directly attached receivers. Step 9 Once SH1-110 comes back online, verify that it resumes its role as PIM-DR and recreates proper mroute and MMLS entries. The neighbor relationships between SH1-109 and SH1-110 have been reestablished and, again, SH1-109 sees SH1-110 as the PIM-DR for the eleven VLANs and the etherchannel. Having resumed the forwarding role for traffic to the ten test groups, SH1-110 again installs the (*, G) entries with the correct flags and the correct MMLS entry. Step 10 Determine the amount of traffic that was lost during the PIM-DR failover above. Step 11 Repeat the PIM-DR failover sequence four more times, each time determining the amount of traffic loss. Step 12 Determine the average amount of traffic loss the IXIA receiver over the five test runs. Step 13 Display the log for error messages. Step 14 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect the primary PIM-DR (SH1-110) to have the correct mroute and MMLS entries before the reload and after recovery. • We expect the backup PIM-DR (SH1-109) to create the correct mroute and MMLS entries after the reload of SH1-110 and assume the forwarding role for all test groups. • We expect any impact on traffic during the failover process to be minimal and acceptable. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 77 Protocol Independent Module-Designated Router Failover—Supervisor 22 Test Results Test Result Protocol Independent Module-Designated Router Failover—Supervisor 22 Pass Auto-RP Failover—RP Impact This test verified multicast functionality on the elected PIM-RP during a PIM-RP failover on a Supervisor 22 platform. SH1-100 was the elected PIM-RP for groups thirty multicast test groups: 239.100.[1-3].[1-10]. SH1-100 was reloaded, verifying the correct failover of mrouting state to SH1-99 and the reversion of state back to SH1-100, after it is back online. Goals: • Verify that the elected RP has the correct mroute entries, flags and MMLS entries for all thirty test groups. Cisco IOS Release 12.1(13)E13 394 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • Verify that each of the thirty test groups fails over to the backup PIM-RP after the failure of the primary, with correct mroute and MMLS state. • Verify that all thirty groups build correct state again on the original PIM-RP when it is back online. Primary Devices Used: • SH1-100: Sup22; elected RP for groups 239.255.[1-3].[1-10] Primary IXIA Ports Used: • 12/1, 2/1, 1/2, 2/7, 2/4, 1/1, 2/6, 4/2, 4/6, 3/3, 5/3, 8/1, 7/2, 7/1, 9/1, 9/2, 10/1, 10/2, 13/2, 11/1, 12/2 Test Procedure The procedure used to perform the Auto-RP Failover—RP Impact test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the elected PIM-RP, SH1-100, has the proper mroute and MMLS entries, with the correct flags for all thirty groups. The elected PIM-RP, SH1-100, should have an (S, G) entry for all thirty groups, and it does. For each (S, G) entry, it should have the T-flag and the A-flag set. The T-flag indicated that the SPT-bit is set and the (S, G) entry is used. The A-flag tells SH1-100 to advertise this particular (S, G) entry to the MSDP peer (SH1-99) with the SA messages. The T-flag is correctly set for all groups. The A-flag is not consistently set for all groups. This is due to the DDTS CSCea21798. The first-hop routers are registering some of the sources with SH1-100 and others with SH1-99, due to unicast load-balancing over equal-cost OSPF links. So the A-flag is set for some groups on SH1-100 and for others on SH1-99. SH1-100 is always used to send multicast traffic on the RP, though, due to the RPF interface from the first-hop routers being to SH1-100. This problem does not appear to result in any packet loss. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. The M-flag indicates that the group was learned via the MSDP peer. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. Step 5 Reload SH1-100. A spurious memory access (related to BGP) occurred during the shutdown of SH1-100 and CSCed73091 was opened. Step 6 Verify that the new primary PIM-RP, SH1-99, has the correct mroute and MMLS entries, with the correct flags set, for all thirty groups while SH1-100 is offline. The new PIM-RP, SH1-99, should have an (S, G) entry for all thirty groups, and it does. It should also have the T-flag and the A-flag set. The T-flag is correctly set for all groups while, as was seen above, the A-flag is not consistently set for all groups. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. Step 7 Once SH1-100 comes back online, verify that it is again the RP for all thirty groups and that its mrouting table and MMLS entries are correct. Cisco IOS Release 12.1(13)E13 395 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Being the PIM-RP again, SH1-100 should have an (S, G) entry for all thirty groups, and it does. It should also have the T-flag and the A-flag set. The T-flag is correctly set for all groups while, as was seen above, the A-flag is not consistently set for all groups. Also, due to this DDTS, the M-flag will be set on some (S, G) entries. For each outgoing interface listed in the (S, G) entry, the H-flag is set, indicating hardware-switching. There is always consistency between the mroute entries and the MMLS entries for each group. Step 8 Display the log for error messages. Step 9 Show the results of CPU and memory monitoring of the devices in the SH1 network. Expected Results • We expect prior to the failover, SH1-100, the primary PIM-RP, to have all the correct mroute entries and flags for the thirty groups for which it is the RP. • We expect SH1-100 should have the correct MMLS entries, consistent with the mroute entries, and be hardware-switching traffic. • We expect SH1-99 to take over the role of primary PIM-RP when SH1-100 is reloaded, and correctly populate its mroute and MMLS entries. • We expect SH1-100 to resume the role of primary PIM-RP when it is back online and capable of forwarding traffic. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 78 Auto-RP Failover—RP Impact Test Results Test Result Auto-RP Failover—RP Impact Pass, exception CSCea21798, CSCed73091 Cisco Express Forwarding Cisco Express Forwarding (CEF) evolved to best accommodate the changing network dynamics and traffic characteristics resulting from increasing numbers of short period flows typically associated with web-based applications and interactive type sessions. Existing Layer 3 switching paradigms use a route-cache model to maintain a fast lookup table for destination network prefixes. The route-cache entries are traffic-driven in that the first packet to a new destination was routed via routing table information and, as part of that forwarding operation, a route-cache entry for that destination was then added. This behavior allows subsequent packet flows to that same destination network to be switched based on an efficient route cache match. These entries are periodically aged out to keep the route cache current and can be immediately invalidated if the network topology changes. This "demand-caching" scheme—maintaining a very fast access subset of the routing topology information—is optimized for scenarios whereby the majority of traffic flows are associated with a subset of destinations. However, given that traffic profiles at the core of the Internet (and potentially within some large enterprise networks) are no longer resembling this model, a new switching paradigm was required that would eliminate the increasing cache maintenance resulting from growing numbers of topologically dispersed destinations and dynamic network changes. Cisco IOS Release 12.1(13)E13 396 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features CEF avoids the potential overhead of continuous cache churn by instead using a Forwarding Information Base (FIB) for the destination switching decision that mirrors the entire contents of the IP routing table; that is, that there was a one-to-one correspondence between FIB table entries and routing table prefixes. Therefore, there was no need to maintain a route cache. The following tests were performed: • CEF Packet Switching, page 397 • CEF Route Entries on DFC, page 398 • CEF Many-to-One Distribution Load Balance, page 399 • CEF Many-to-Many Distribution with Polarization Load Balance, page 402 CEF Packet Switching This test verified that IP Unicast traffic was hardware-switched. If traffic was not hardware-switched by the Policy Feature Card (PFC), the traffic would have been fast-switched by the MSFC. Figure 22 shows the topology for the Cisco Express Forwarding Packet-Switching test. Figure 22 Cisco Express Forwarding Packet-Switching Topology A fixed number of ping packets are sent from SH1-104 to SH1-103, across SH1-99. The ping and response totals are compared against the number of MLS CEF Layer 3 packets switched. An extended ping of 500 packets is used to calculate the number of packets hardware-switched across the interim switch, SH1-99. The result should be 1000 FIB switched packets on SH1-99. Devices under test: SH1-104, SH1-99, and SH1-103. Test Procedure The procedure used to perform the CEF Packet Switching test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Shutdown any alternate paths that the ping packets may take through the network from SH1-104 to SH1-103 (on SH1-104, shutdown the Po68, Po69, Po70, and Po71 interfaces). Because these interfaces are shutdown, all traffic sent from SH1-104 to SH1-103 will be switched through SH1-99. Step 5 If there are any background traffic streams running, stop them for this test. They may interfere with the counter statistics observed on SH1-99. Step 6 Show the MLS statistics for Module 3 on SH1-99. This will give a base packet count from which to work. SH1-99 begins the test with 14,311,317,225 packets having been FIB switched. Step 7 Clear out the MLS entries on module 3 of SH1-99 and verify that there are none. Cisco IOS Release 12.1(13)E13 397 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features No MLS flows are registered in module 3. Step 8 Send 500 ping packets from SH1-104 (172.31.1.38) to SH1-103 (172.31.1.34). All 500 ping packets sent received a reply. Step 9 Verify that the 1000 packets (500 from echo request, 500 from echo reply) have been logged in the MLS statistics on SH1-99. After the 500 packet ping stream was sent, SH1-99 now shows 14,311,318,225 packets having been FIB switched. This is an increase of 1000 packets from the value seen above, before the pings were sent. The 1000-packet increment includes the 500 ping packets and the 500 ping-reply packets. Step 10 Verify that MLS entries have been created for the unicast flows. Module 3 of SH1-99 now has two MLS flows established. One for the ping and one for the ping-reply. Step 11 Return the configuration of SH1-104 to default by re-enabling the portchannel interfaces (Po68 to Po71) that were shut down in Step 4. Step 12 Restart any traffic streams that were stopped. Step 13 Display the log for error messages. Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the MLS counters on SH1-99 to increment by 1000 when 500 ping packets are sent from SH1-104 to SH1-103, through SH1-99. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 79 CEF Packet Switching Test Results Test Result CEF Packet Switching Pass CEF Route Entries on DFC This test verified that correct CEF table entries were used to forward IP unicast traffic passing through a switch on a ws-x6816 module (with DFC). Devices SH1-99, SH1-103, and SH1-104 were used for the test. portchannel 16 is used to connect SH1-99 to SH1-103 and portchannel 17 is used to connect SH1-99 to SH1-104. Device under test: SH1-104. Test Procedure The procedure used to perform the CEF Route Entries on DFC test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Cisco IOS Release 12.1(13)E13 398 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 On device SH1-104, show the routing table entries for the networks 172.31.1.32, 172.31.1.36, and 172.31.1.0. The 172.31.1.32 network is one-hop away from SH1-104. The 172.31.1.36 network is directly connected to SH1-104. The 172.31.1.0 network is remote (more than one hop away from) to SH1-104. There are 5 paths to the 172.31.1.32 network. 172.31.1.36 is directly connected to SH1-104. There is only one path to the 172.31.1.0 network. Step 5 Confirm that there are entries in the CEF table on the PFC2 for these networks and any host within them. Each of the five paths shown in the routing table to the 172.31.1.32 network are also in the CEF table. Because SH1-104 is directly connected to the 172.31.1.36 network, its CEF table has entries for the network, hosts, and the broadcast address of that network. SH1-104 has the single entry to the 172.31.1.0 network that was in its routing table. Step 6 Show which module of SH1-104 has the DFC module. Module 3 has the DFC daughter card. Step 7 Verify that the same CEF table entries on the PFC are also on the DFC of Module 3. The DFC card on module 3 has all the CEF entries that the PFC had. Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that there will be corresponding CEF table entries for each routing table entry for networks that are a) directly connected, b) one hop away, and c) more than one hop away. • We expect that the entries that are on the PFC2 are also on the DFC of Module 3. Results Table 80 CEF Route Entries on DFC Test Results Test Result CEF Route Entries on DFC Pass CEF Many-to-One Distribution Load Balance These tests were performed to verify that HW shortcuts and CEF distribution functioned properly with IP unicast traffic. Two tests were performed that monitored unicast traffic streams of "many-to-one" with 20 increment IP addresses sending traffic to a single destination IP address and "many-to-many" with 100 source and 100 destination address pairs. Figure 23 shows the topology for the CEF many-to-one distribution: load balance test. Cisco IOS Release 12.1(13)E13 399 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 23 Note CEF Many-to-One Distribution Load Balance Topology Background traffic was not used in this test because it would have confused the interface traffic counters used to gauge traffic path and delivery. Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Test Procedure The procedure used to perform the CEF Many-to-One Distribution Load Balance test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that all the portchannel interfaces involved in this test are up and that the proper interfaces are bundled in them. Under the Ports column the label "P" indicates that the interface is "in portchannel." Under the portchannel column the Label "R" indicates it is a routed (L3) port channel, and the Label "U" indicates that the portchannel is "in-use." All etherchannels are L3 and up, and all bundled interfaces are in the parent channel. Cisco IOS Release 12.1(13)E13 400 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test One (Many-to-One) Test One used traffic streams with 20 incrementing source IP addresses destined to a single IP address. The destination IP address was 172.31.27.51. The source IP addresses increment from 172.31.16.82 to 172.31.16.101. The traffic source port Ix8/2 connected to switch Dista-1. The destination IP address was IXIA-1 port Ix-5/1 connected to switch Dista-2. Router SH1-108 received the traffic from Dista-1 and distributed it into the test network. One million packets at 10,000 pps were sent. The path of the traffic for this test was as follows: IXIAtx -> Dista-1 -> SH1-108 -> (SH1-103 / SH1-104) -> (SH1-109 / SH1-110) -> Dista-2 -> IXIArx Step 5 Clear the traffic counters on the test devices and begin playing the traffic stream. Step 6 Verify that at all 1 million packets sent were received. There was no packet loss. Step 7 Once the traffic stream has completed, show the interface traffic counters on devices SH1-108, SH1-103, SH1-104, SH1-109, and SH1-110. This will demonstrate that CEF load-balancing did occur along the traffic path. The traffic is load-balanced correctly along each level from the source to the destination. Step 8 Begin a continuous burst traffic stream with the same characteristics of the stream used above (20 source IP addresses to 1 destination IP address). This stream will also be sent out IXIA port 8/2 and enter Dista-1. Traffic counters are not important for this test, that is why we are sending a continuous burst of traffic. Step 9 Look at the MLS entries on each router along the traffic path. There should be a total of 20 entries at each level (i.e. 20 entries on SH1-108; 20 entries on SH1-103 and SH1-104, combined; 20 entries on SH1-109 and SH1-110, combined). Count each entry with a destination IP address (DstIP) of 172.31.27.51. Note In some cases, it may be necessary to look at the MLS entries on the DFC cards of certain modules. There are 20 MLS entries for that destination IP address on SH1-108. Between SH1-103 and SH1-104 there are 20+ MLS entries. This is because SH1-104 has duplicate entries via which a single packet has been switched. Between SH1-109 and SH1-110 there also my be 20+ MLS entries. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic sourced from multiple IP hosts to a single IP host will use multiple paths if they are available. • We expect that traffic sourced from multiple IP hosts to a single IP host will be hardware switched. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 401 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 81 CEF Many-to-One Distribution Load Balance Test Results Test Result CEF Many-to-One Distribution Load Balance Pass CEF Many-to-Many Distribution with Polarization Load Balance This test was performed to verify that HW shortcuts and CEF distribution functioned properly with IP unicast traffic. This test verified unicast traffic streams of "many-to-many" with 100 source and 100 destination address pairs. Figure 24 shows the topology for the CEF many-to-many distribution with polarization. Figure 24 Note CEF Many-to-Many Distribution with Polarization Load Balance Topology Background traffic was not used in this test because it would have confused the interface traffic counters used to gauge traffic path and delivery. Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-110 Cisco IOS Release 12.1(13)E13 402 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the CEF Many-to-Many Distribution with Polarization Load Balance test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that all the portchannel interfaces involved in this test are up and that the proper interfaces are bundled in them. Table 82 lists the devices and which etherchannel IDs to check: Table 82 Device Many-to-Many Port-Channel Interfaces Readied and Bundled Channel ID SH1-103 68, 69, 70, 71 SH1-104 68, 69, 70, 71 SH1-107 68, 168 SH1-108 69, 169 SH1-110 71, 171 Under the Ports column the label "P" indicates that the interface is "in portchannel." Under the portchannel column the Label "R" indicates it is a routed (L3) port channel, and the Label "U" indicates that the portchannel is "in-use." All etherchannels are L3 and up, and all bundled interfaces are in the parent channel. Test Two (Many-to-Many) Test Two uses traffic streams with 100 incrementing source IP addresses destined to 100 incrementing IP addresses. The source IP addresses increment from 172.31.26.102 to 172.31.26.201. The destination IP addresses increment from 172.31.16.82 to 172.31.16.181. The traffic source was IXIA-1 port Ix10/2 connected to switch Dista-2. The destination IP address was IXIA-1 port Ix-8/2 connected to switch Dista-1. Router SH1-110 received the traffic from Dista-2 and distributed it into the test network. A total of 10 million packets at 100,000 pps was sent. The path of the traffic for this test is as follows: IXIAtx -> Dista-2 -> SH1-110 -> (SH1-103 / SH1-104) -> (SH1-107 / SH1-108) -> Dista-1 -> IXIArx Polarization The Sup2/MSFC2 uses the ipSrc, ipDst and pathcount to make frame distribution decisions. Under certain network configurations traffic may not always use all paths available in the CEF table. In the test configuration switches 110, 103 and 104 have the same pathcount. Figure 25 shows a description and illustration of the problem. If traffic B and D will hash to the right path of the two output paths, then that same traffic will hash to a single path even if multiple paths are available. Traffic B and D do not take the separate paths available. This behavior is expected, and is due to the original hash algorithm used by CEF. Cisco IOS Release 12.1(13)E13 403 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 25 Cisco Express Forwarding Packet-Switching with Polarization Topology To address the polarization issue, Native IOS version 12.1(13)E3 allows the configuration of three different CEF distribution algorithms. These are called original, universal (configured by default), and tunnel. These algorithms, however, apply only to traffic that is software-switched; traffic that is hardware-switched in the PFC2 uses the original algorithm. The test uses the default algorithm (universal), but still encounters the polarization problem, due to hardware limits in the PFC2. This problem is addressed with the introduction of the EARL7 ASIC in the coming supervisor 3. Because there are now 100 different SrcIP::DstIP pairs, this test will not look at the MLS entries. Rather it will look only at the traffic to endure that it is load-balanced correctly. Step 5 Clear the traffic counters on the test devices. Begin the IXIA traffic stream sending traffic from Dista-2 to Dista-1. Step 6 Verify that all of the 1 million packets that were sent were received on the proper IXIA port. Step 7 Show the interface traffic counters on devices SH1-110, SH1-103, SH1-104, SH1-107, and SH1-108. This will demonstrate that CEF load-balancing did occur along the traffic path. The traffic is load-balanced correctly along each level from the source to the destination. Step 8 Display the log for error messages. Cisco IOS Release 12.1(13)E13 404 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that traffic sourced from multiple IP hosts to multiple IP hosts will use multiple paths if they are available (with polarization taken into account). • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 83 CEF Many-to-Many Distribution with Polarization Load Balance Test Results Test Result CEF Many-to-Many Distribution with Polarization Load Balance Pass Open Shortest Path First Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) developed by the OSPF working group of the Internet Engineering Task Force (IETF). Designed expressly for IP networks, OSPF supports IP subnetting and tagging of externally derived routing information. OSPF also allows packet authentication and uses IP multicast when sending and receiving packets. The following tests were performed: • OSPF Autocost, page 405 • OSPF Passive Interface, page 407 • OSPF Filtering, page 409 • OSPF Redistribution, page 410 • OSPF Topology Database Verification, page 413 OSPF Autocost This test verified that the auto-cost reference-bandwidth value command functions correctly. OSPF used the interface cost to compute routing matrixes. By default: cost = 100/bandwidth (in Mbps) The lowest cost is 1, which is for 100 Mbps interfaces. In order to let Gigabit Ethernet, GEC, or 10 Gigabit Ethernet, have a cost that will allow comparison of the higher speed connections, use the auto-cost command to set up a higher reference bandwidth other than 100 Mbps. The default autocost reference-bandwidth for the Native IOS Safe Harbor testing is 100,000. Device under test: SH1-97. Test Procedure The procedure used to perform the OSPF Autocost test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Cisco IOS Release 12.1(13)E13 405 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin the test script that will perform Step 5 through Step 9. Step 5 Show the auto-cost configuration for SH1-97. OSPF is running on the networks associated with the interfaces being used, portchannel 11 (172.31.1.0/29) and portchannel 13 (172.31.1.20/30). Step 6 Show the OSPF interface costs for interfaces portchannel 11 and portchannel 13 on SH1-97. Show that portchannel 11 is a two-port channel, and portchannel 13 is a four-port channel. The auto-cost configuration allows the 4-port portchannel to have one-half of the cost of the 2-port portchannel. portchannel 11 is a two-port channel and portchannel 13 is a four-port channel. The OSPF interface cost of the two-port channel is 50. The OSPF interface cost of the four-port channel is 25, exactly 1/2 the value of the two-port channel: Step 7 Reconfigure the reference bandwidth to the default bandwidth 100. Show that both portchannel interfaces now have the same minimum cost of one (in this case, they would be compared equally with a single fast-Ethernet interface). With the reference-bandwidth changed to 100, both the two-port and four-port channels have an OSPF interface cost of 1: Step 8 Change the auto-cost value to 500000, and confirm that the interface costs have changed to 250 and 125 for portchannel 11 and portchannel 13, respectively. With the reference-bandwidth changed to 500,000, the two-port channel has an OSPF interface cost of 250. And the four-port channel has an OSPF interface cost of 125, again 1/2 the cost of the two-port channel: Step 9 Change the auto-cost value back to 100000, and confirm that the interface costs have changed back to their original values. SH1-97 is back at the default configuration, and the default OSPF interface costs, for both portchannels. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the OSPF interface cost will change accordingly with the change in configuration of the auto-cost reference value. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 84 OSPF Autocost Test Results Test Result OSPF Autocost Pass Cisco IOS Release 12.1(13)E13 406 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features OSPF Passive Interface This test verified that the passive-interface command functions correctly. Routers should not send routing updates out passive interfaces. In the case of OSPF, hello packets will not be sent out passive interfaces, so neighbors will not be formed. For this test, SH1-106 is an OSPF neighbor to devices SH1-99 and SH1-100 in OSPF area 2. SH1-100 and SH1-99 are being sent OSPF routes by Pagent. SH1-100 and SH1-106 are connected by the portchannel 67 interface on SH1-100 and the portchannel 167 interface on SH1-106. SH1-99 and SH1-106 are connected by the portchannel 67 interface on SH1-100 and the portchannel 67 interface on SH1-106. The passive-interface command was configured on portchannel 67 on SH1-100 and on portchannel 67 on SH1-99. The neighbor tables on SH1-100 and SH1-99 were checked to verify the command worked (SH1-106 should be removed). SH1-106 should likewise lose about 25,000 OSPF routes out of its routing table (this includes both 15,000 OSPF routes generated by Pagent and 10,000 EIGRP routes redistributed into OSPF by SH1-99 and SH1-100). The passive-interface commands were removed and the neighbor relationships and route table updates were reestablished. Figure 26 shows the topology for the OSPF passive interface test. Figure 26 OSPF Passive Interface Topology Devices under test: SH1-99, SH1-100, and SH1-106. Test Procedure The procedure used to perform the OSPF Passive Interface test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Shutdown the portchannel 20 interface on device SH1-105. This will ensure that SH1-106 will have no secondary way to get the routes from SH1-99 and SH1-100. Step 5 Verify that SH1-99, SH1-100 and SH1-106 are running OSPF (process ID 1) and that both belong to Area 2. portchannel 67 of SH1-99 is on network 172.31.1.68/30. The 172.31.1.64/29 network is running OSPF area 2. portchannel 67 of SH1-100 is on network 172.31.1.96/30. The 172.31.1.96/30 network is running OSPF area 2. portchannel 67 of SH1-106 is on network 172.31.1.68/30. portchannel 167 of SH1-106 is on network 172.31.1.96/30. The 172.31.1.68/30 and 172.31.1.96/30 networks are running OSPF area 2. Cisco IOS Release 12.1(13)E13 407 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 6 Verify the neighbor relationship between SH1-100 and SH1-106 and between SH1-99 and SH1-106. All relevant neighbor relationships are up and FULL. Step 7 Show the number of OSPF routes that SH1-106 has in its routing table. SH1-106 has entries for ~25,000 OSPF routes. Step 8 Configure a passive interface on portchannel 67 of SH1-99 and on portchannel 67 of SH1-100. Step 9 After the Dead Timer expires for the neighbors on SH1-106, verify the neighbor relationship no longer exists between SH1-100 and SH1-106 or between SH1-99 and SH1-106. Confirm that the OSPF routes SH1-106 was receiving from its neighbors are no longer in its routing table. SH1-106 should only have 5000 OSPF routes in its routing table (from another Pagent source connected to Dista-2). SH1-106 no longer knows SH1-99 and SH1-100 as OSPF neighbors. SH1-106 no only knows about 2500 OSPF routes. 2500 of these routes are being generated by the Pagent device connected to Dista-2. Step 10 Remove the passive interfaces configured above. Step 11 Verify that the neighbor relationship between SH1-100/SH1-99 and SH1-106 has been reestablished and confirm that SH1-106 again received routing updates from its neighbors. The OSPF neighbor relationships between SH1-106 and SH1-99/100 are again established and FULL. SH1-106 again has roughly 25,000 OSPF routes in its routing table. Step 12 Bring up the portchannel 20 interface on SH1-105 that was shutdown earlier. Step 13 Display the log for error messages. Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the neighbor relationships between SH1-99, SH1-100 and SH1-106 will be broken down when the passive-interface commands are applied. • We expect that SH1-106 will destroy the ~17,500 routes that it was learning from SH1-99 and SH1-100 when it loses those two devices as neighbors. • We expect that the neighbor relationships will re-form properly when the passive-interface commands are removed. • We expect that SH1-106 will, once again, fully populate its routing table with the new updates from SH1-99 and SH1-100. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 85 OSPF Passive Interface Test Results Test Result OSPF Passive Interface Pass Cisco IOS Release 12.1(13)E13 408 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features OSPF Filtering This procedure tested the capability of OSPF to filter out routes using the distribute-list command. SH1-97, SH1-100, and SH1-106 are connected as such: SH1-97 to SH1-100 to SH1-106. These connections are Layer 3 links (channels). The link between SH1-100 and SH1-106 (Po13) is network 172.31.1.96/30. Figure 27 shows the relevant topology. SH1-97 knows, through OSPF, this network via portchannel 13. SH1-97 was configured with an access list and the distribute-list command, so that SH1-97 no longer knows this route; it is filtered out. Figure 27 OSPF Filtering Topology Devices under test: SH1-97, SH1-100, and SH1-106. Test Procedure The procedure used to perform the OSPF Filtering test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that SH1-97, SH1-100, and SH1-106 are running OSPF and have network statements for their respective connecting networks (Figure 27). SH1-97 is running OSPF area 0 on the 172.31.1.20/30 network. SH1-100 is running OSPF area 0 on the 172.31.1.20/30 and OSPF area 2 172.31.1.96/30 networks. SH1-106 is running OSPF area 2 on the 172.31.1.96/30 network. Step 5 Confirm that SH1-97 knows the route to network 172.31.1.96 via portchannel 13. SH1-97 knows the route to 172.31.1.96 via portchannel 13. Step 6 Confirm that access-list 30 is configured, on SH1-97, to deny network 172.31.1.96. Step 7 Configure the distribute-list command for access-list 30 on SH1-97, OSPF process ID 1. This distribute-list will keep SH1-97 from receiving routing updates from SH1-100. Step 8 Verify that the route to the 172.31.1.96 network is no longer known via Po13 in SH1-97. SH1-97 has connections to other routers running OSPF and, so, should learn the route to that network via another interface. SH1-97 now knows the route to 172.31.1.96 via portchannel 12. Step 9 Remove the distribute-list command configured on SH1-97. Cisco IOS Release 12.1(13)E13 409 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 Verify that the route to the 172.31.1.96 network is, once again, in the routing table of SH1-97, known via portchannel 13. SH1-97 again knows the route to 172.31.1.96 via portchannel 13. Step 11 Display the log for error messages. Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that SH1-97 will not know the route to network 172.31.1.96 out interface portchannel 13 when the filter is applied. • We expect that SH1-97 will re-learn the route to the 172.31.1.96 network out interface portchannel 13 when the filter is removed. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 86 OSPF Filtering Test Results Test Result OSPF Filtering Pass OSPF Redistribution This test verified that the redistribution of EIGRP routes into OSPF functions properly. The baseline configuration for the Safe Harbor Native Cisco IOS testbed includes having all EIGRP routes redistributed into OSPF by devices SH1-99 and SH1-100. This test verified that the EIGRP routes from EIGRP 1320 are known to device SH1-97 via OSPF. The redistribute configuration statements from SH1-99 and SH1-100 is then removed so the routes from EIGRP 1320 should no longer be known by SH1-97. Redistribution on SH1-99 and SH1-100 is then reconfigured and the routes from EIGRP 1320 should, again, be known to SH1-97 via OSPF. Figure 28 shows the topology for the OSPF redistribution test. Cisco IOS Release 12.1(13)E13 410 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 28 OSPF Redistribution Topology Devices under test: SH1-97, SH1-99, SH1-100, and SH1-101. Test Procedure The procedure used to perform the OSPF Redistribution test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin the test script the will perform Step 5 through Step 15. Step 5 • PASSED. SH1-99 and SH1-100 are redistributing EIGRP into OSPF and are running EIGRP 1320 & OSPF process id 1 • PASSED. SH1-101 is running EIGRP AS 1320 • PASSED. SH1-97 is running OSPF process 1 • PASSED. The routes 172.31.1.25 & 172.31.1.42 are known to SH1-97 via OSPF process 1 • PASSED. 20125 subnets are known via OSPF 1 on SH1-97 (minimum 19500 should be known). • PASSED. Routes 172.31.1.25 & 172.31.1.42 are removed from the routing table on SH1-97 • PASSED. SH1-97 has 10102 routes. Should know at least 9625 routes. • PASSED. Redistribution was successfully reconfigured • PASSED. The routes 172.31.1.25 & 172.31.1.42 are known to SH1-97 via OSPF process 1 • PASSED. known_subs is 20125, should_know is 20125. Routing table has been restored.Verify that SH1-99 and SH1-100 are running both OSPF process ID 1 and EIGRP 1320. Cisco IOS Release 12.1(13)E13 411 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Both SH1-99 and SH1-100 are running OSPF and EIGRP processes. Both are also redistributing EIGRP 1320 routes into OSPF 1. Step 6 Confirm that SH1-101 is running EIGRP 1320. SH1-101 is running EIGRP 1320. Step 7 Confirm that SH1-97 is running OSPF process ID 1. SH1-97 is running OSPF 1. Step 8 Confirm that the routes 172.31.1.25 and 172.31.1.42 are known to SH1-97 via OSPF. Both routes are know to SH1-97 via OSPF 1. Further they have been redistributed from EIGRP, indicated by the "type extern 2" tag. Step 9 Show the number of OSPF routes known to SH1-97 (there should be roughly 20,000). SH1-97 knows roughly 20,000 OSPF routes. 10,000 of these are EIGRP routes that have been redistributed. Step 10 Remove the redistribution configuration from both SH1-99 and SH-100. Step 11 See if the route entries seen in are still present on SH1-97. The two routes in the EIGRP domain are no longer known. Step 12 Show the number of OSPF routes known to SH1-97 (there should be only about 10,000 now). SH1-97 now only knows of about 10,000 OSPF routes. The 10,000 EIGRP routes are no longer being redistributed. Step 13 Re-configure redistribution on SH1-99 and SH1-100. Step 14 Confirm that the route entries seen in are once again present on SH1-97. With redistribution reconfigured, the two routes are again known to SH1-97 via OSPF 1. Step 15 Show the number of OSPF routes known to SH1-97 (there should be over 20,000, again). Again, SH1-97 knows of the 10,000 EIGRP routes that have been redistributed, or 20,000 OSPF routes total. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the route entries observed in will no longer be known via OSPF 1 with the removal of the redistribution configuration. • We expect that these route entries will be created again, when redistribution is reconfigured. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 87 OSPF Redistribution Test Results Test Result OSPF Redistribution Pass Cisco IOS Release 12.1(13)E13 412 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features OSPF Topology Database Verification This test verified that the OSPF topology database functions correctly. Each section of the test observes the OSPF database both in the case of no Pagent or IXIA test tools feeding extra routes (Pagent and IXIA interfaces shut down or disabled) and in the case of Pagent and IXIA feeding extra routes. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Procedure The procedure used to perform the OSPF Topology Database Verification test follows: Step 1 From each router in the Safe Harbor network, gather information about the OSPF interfaces and the OSPF processes that are running. Step 2 From each ABR in the Safe Harbor network, gather information about the OSPF database maintained for each area. Step 3 Verify Router LSA. In each area, verify there is one Router LSA in the database for each router in that area. Step 4 Verify Network LSA. For each multi-access network which has more than one OSPF router on it, a DR and BDR are elected and the DR generates a Network LSA for this subnet. However, an OSPF router with an interface on a multi-access network with no other OSPF routers still shows up as DR, but no Network LSA is generated because there is no other OSPF router on the subnet. So, in order to know which multi-access subnets should have a Network LSA generated for them, look for the existence of a BDR on that subnet. In each area, verify that there is one Network LSA for each BDR interface in the output of show ip ospf interface. Step 5 Verify Summary Network LSA. In each area, count the number of DR or Loopback interfaces which are up/up state in the output of show ip ospf interface. Verify that the number of Summary Network LSA's in each area is equal to the sum of the previous counts of all the other areas times the number of ABRs advertising those routes. Step 6 Verify Summary ASBR. An ABR between areas X and Y will generate a Summary ASBR into X for an ASBR which exists in Y. However, an ABR which is an ASBR will not advertise itself. Safe Harbor has a unique topology in that every area has dual ABRs which also happen to be ASBRs. So each ABR/ASBR sees its partner as an ASBR in both areas, and will advertise its partner with a Summary ASBR LSA in both areas. In each area, verify there is a Summary ASBR LSA from each ABR in that area for each ASBR outside this area. Step 7 Verify External LSAs. Verify there is an External LSA for each external route redistributed into OSPF. Results Table 88 OSPF Topology Database Verification Test Results Test Result OSPF Topology Database Verification Pass Cisco IOS Release 12.1(13)E13 413 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Border Gateway Protocol Border Gateway Protocol (BGP) is an exterior gateway protocol designed to exchange network reach ability information with other BGP systems in other autonomous systems. BGP exchanges routing information in the form of routing updates. An update includes a network number, a list of autonomous systems that the routing information has passed through (the autonomous system path), and a list of other path attributes. The following tests were performed: • Add 120,000 Routes, page 414 • Redistribution OSPF into BGP, page 415 • Redistribution EIGRP into BGP, page 417 • Redistribution OSPF and EIGRP into BGP, page 419 • BGP Neighbor Flap, page 421 • BGP Neighbor Flap—With Dampening, page 422 • BGP Neighbor Flap—No Dampening, page 423 Add 120,000 Routes This test ensured that no memory leaks or unexpected CPU load occurs with 8 BGP neighbors in the core (4 core routers and 4 pagent neighbors) and a total of 100,000 BGP routes, 10,000 OSPF routes, and 10,000 EIGRP routes. The test begins with the core routers SH1-97, SH1-98, SH1-99, and SH1-100 having no routes added from the test tools. During the course of this test, OSPF routes were added to the network via the Pagent and IXIA test tools. EIGRP and BGP routes were added via the Pagent test tool. All of the routes were added successively, with no scaling up. The CPU and memory were monitored on the core routers to verify that there were no anomalies. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Procedure The procedure used to perform the Add 120,000 Routes test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 If the routes from the test tools have already been added to the various places in the network, stop them now. Step 5 Show a route summary for the 4 core devices with no test tool routes added. Each of the four core routers has only slightly more than 100 routes, total, in its routing table. Step 6 Add all the BGP routes. Step 7 Confirm that the 100,000 BGP routes are now in the routing tables of the core routers. Each of the four core routers now has about 100,000 BGP routes and about 100,000 total routes in its routing table. Step 8 Add all the OSPF routes. Cisco IOS Release 12.1(13)E13 414 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 Confirm that the 10,000 OSPF routes are now in the routing tables of the core routers. Each of the four core routers now has about 10,000 OSPF routes and about 110,000 total routes in its routing table. Step 10 Add all the EIGRP routes. Step 11 Confirm that the 10,000 EIGRP routes are now in the routing tables of the core routers. Each of the four core routers now has about 10,000 EIGRP routes and about 120,000 total routes in its routing table. The 10,000 EIGRP routes manifest in the routing tables of SH1-97 and SH1-98 as OSPF routes due to the redistribution of the EIGRP routes by SH1-99 and SH1-100. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that all 120,000 routes can be added to the core devices without any unacceptable impact on the CPU or memory utilization. Results Table 89 Add 120,000 Routes Test Results Test Result Add 120,000 Routes Pass Redistribution OSPF into BGP This test verified that route redistribution works correctly between BGP and OSPF. Device SH1-100 is a border router between OSPF and BGP. It is on this router, and its neighbor SH1-99, that the configuration for redistribution was applied. Only a limited number of OSPF routes were redistributed into BGP. Device SH1-97 will be used to check whether the routes have been redistributed. Figure 29 shows the topology for route redistribution OSPF into BGP: Cisco IOS Release 12.1(13)E13 415 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 29 Redistribution OSPF into BGP Topology Devices under test: SH1-97, SH1-99, SH1-100 Test Procedure The procedure used to perform the Redistribution OSPF into BGP test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 On device SH1-97, determine by what protocol the route for 170.1.1.0 is known. The route to 170.1.1.0 is known via OSPF 1. Step 5 Show the default BGP configuration of SH1-99 and SH1-100. Both SH1-99 and SH1-100 are running BGP 100. Step 6 Configure redistribution from BGP into OSPF on both devices SH1-99 and SH1-100. Step 7 Confirm that access-list 16 is configured on SH1-97, and that it denies the 170.1.1.0 network. Step 8 Apply a inbound distribute-list using access-list 16 in the OSPF configuration on SH1-97 to block network 170.1.1.0 from being known by OSPF. This will prohibit SH1-97 from learning about the 170.1.1.0 network via OSPF 1. Step 9 Confirm that the route to 170.1.1.0 is now know via BGP 100 on SH1-97 and has a metric of 100, as configured above. SH1-97 now knows the route to 170.1.1.0 via BGP 100. Step 10 Remove the redistribution from SH1-99 and SH1-100 and the distribute-list command from SH1-97. Verify that the 170.1.1.0 network is known again via OSPF 1. Cisco IOS Release 12.1(13)E13 416 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features With OSPF routes no longer being redistributed into BGP by SH1-99 and SH1-100, and with SH1-97 no longer blocking the route 170.1.1.0 from being learned by OSPF 1, SH1-97 knows the route to 170.1.1.0 via OSPF 1. Step 11 Display the log for error messages. Step 12 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that OSPF routes will be correctly redistributed into BGP. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 90 Redistribution OSPF into BGP Test Results Test Result Redistribution OSPF into BGP Pass Redistribution EIGRP into BGP This test verified that route redistribution works correctly between BGP and EIGRP. Device SH1-100 is a border router between EIGRP and BGP. It is on this router, and its neighbor SH1-99, that the configuration for redistribution was applied. Only a limited number of EIGRP routes were redistributed into BGP. Device SH1-97 will be used to check whether the routes have been redistributed. Figure 30 shows the topology for route redistribution EIGRP into BGP: Figure 30 Redistribution EIGRP into BGP Topology Cisco IOS Release 12.1(13)E13 417 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Devices under test: SH1-97, SH1-99, SH1-100 Test Procedure The procedure used to perform the Redistribution EIGRP into BGP test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that the routes to 180.1.1.0 and 180.1.2.0 are known on SH1-97 via OSPF 1, redistributed from EIGRP (identified by the "type extern 2" label). The routes to 180.1.1.0 and 180.1.2.0 are known to SH1-97 via OSPF 1, having been redistributed from EIGRP. Step 5 Confirm that the access-list 18 exists in SH1-99 and SH1-100 and permits only the even subnets within 180.1.x.x/24. This access-list, configured on SH1-99 and SH1-100, will permit only networks with the last bit of the third octet set to 0. This means it will permit only even networks. Step 6 Confirm that there is a route-map called EIGRP2BGP on SH1-99 and SH1-100 which uses matches IP addresses to access-list 18. The route-maps, configured on SH1-99 and SH1-100, contain a permit sequence, bound by access-list 18. Step 7 Configure redistribution of EIGRP into BGP on SH1-99 and SH1-100 using the route-map EIGRP2BGP, which only allows the even subnets within 180.1.x.x. SH1-99 and SH1-100 will now redistribute the EIGRP routes into BGP with the restriction defined by the EIGRP2BGP route-map. Step 8 Note Remove the redistribution statement from the OSPF configuration on SH1-99 and SH1-100. If this step is not taken, SH1-97 will continue to know the 180.x.x.x networks via OSPF 1, because OSPF has a lower administrative distance than BGP. SH1-99 and SH1-100 will no longer redistribute EIGRP 1320 routes into OSPF 1. Step 9 Confirm that the even networks within 180.1.x.0/24 are known to SH1-97 via BGP 100. SH1-97 knows only the even routes via BGP 100. SH1-99 and SH1-100 have redistributed only the even EIGRP routes into BGP, successfully matching the route-map, EIGRP2BGP. Step 10 Remove the redistribution configurations applied in BGP on devices SH1-99 and SH1-100. SH1-99 and SH1-100 are returned to their default configurations, redistributing neither OSPF 1 nor EIGRP 1320 routes into BGP 100. Step 11 Reapply the EIGRP redistribution configuration in OSPF on SH1-99 and SH1-100 that was deleted. SH1-99 and SH1-100 will again redistribute EIGRP 1320 routes into OSPF 1. Step 12 Confirm that the routes are known, again, via OSPF 1. As was the original case, SH1-97 knows the routes via OSPF 1. Step 13 Display the log for error messages. Cisco IOS Release 12.1(13)E13 418 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 14 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that EIGRP routes will be correctly redistributed into BGP. • We expect that the application of a route-map will correctly alter the rules by which BGP redistributes routes. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 91 Redistribution EIGRP into BGP Test Results Test Result Redistribution EIGRP into BGP Pass Redistribution OSPF and EIGRP into BGP This test verified that route redistribution works correctly between BGP and both OSPF and EIGRP. Device SH1-100 is a border router between OSPF, EIGRP, and BGP. It is on this router, and its neighbor SH1-99, that the configuration for redistribution was applied. OSPF and EIGRP was redistributed into BGP at the same time. Only a limited number of routes were redistributed. Device SH1-97 was used to check whether the routes have been redistributed. Figure 31 shows the topology for route redistribution OSPF and EIGRP into BGP: Figure 31 Redistribution OSPF and EIGRP into BGP Topology Devices under test: SH1-97, SH1-99, SH1-100 Cisco IOS Release 12.1(13)E13 419 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the Redistribution OSPF and EIGRP into BGP test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 On device SH1-97, determine by what protocol the route for 170.1.1.0 is known. The route to 170.1.1.0 is know via OSPF 1. Step 5 Confirm that the routes to 180.1.1.0 and 180.1.2.0 are known on SH1-97 via OSPF 1, redistributed from EIGRP (identified by the "type extern 2" label). The routes to 180.1.1.0 and 180.1.2.0 are known to SH1-97 via OSPF 1, having been redistributed from EIGRP. Step 6 Show the default BGP configuration of SH1-99 and SH1-100. Both SH1-99 and SH1-100 are running BGP 100. Step 7 Configure redistribution from OSPF into BGP on both devices SH1-99 and SH1-100. Step 8 Confirm that access-list 16 is configured on SH1-97, and that it denies the 170.1.1.0 network. Step 9 Apply a inbound distribute-list using access-list 16 in the OSPF configuration on SH1-97 to block network 170.1.1.0 from being known by OSPF. This will prohibit SH1-97 from learning about the 170.1.1.0 network via OSPF 1. Step 10 Confirm that the access-list 18 exists in SH1-99 and SH1-100 and permits only the even subnets within 180.1.x.x/24. This access-list, configured on SH1-99 and SH1-100, will permit only networks with the last bit of the third octet set to 0. This means it will permit only even networks. Step 11 Confirm that there is a route-map called EIGRP2BGP on SH1-99 and SH1-100 which uses matches IP addresses to access-list 18. The route-maps, configured on SH1-99 and SH1-100, contain a permit sequence, bound by access-list 18. Step 12 Configure redistribution of EIGRP into BGP on SH1-99 and SH1-100 using the route-map EIGRP2BGP, which only allows the even subnets within 180.1.x.x. SH1-99 and SH1-100 will now redistribute the EIGRP routes into BGP with the restriction defined by the EIGRP2BGP route-map. Step 13 Note Remove the redistribution statement from the OSPF configuration on SH1-99 and SH1-100. If this step is not taken, SH1-97 will continue to know the 180.x.x.x networks via OSPF 1, because OSPF has a lower administrative distance than BGP. SH1-99 and SH1-100 will no longer redistribute EIGRP 1320 routes into OSPF 1. Step 14 Confirm that the route to 170.1.1.0 is now know via BGP 100 on SH1-97 and has a metric of 100, as configured in Step 5. SH1-97 now knows the route to 170.1.1.0 via BGP 100. Step 15 Confirm that the even networks within 180.1.x.0/24 are known to SH1-97 via BGP 100. Cisco IOS Release 12.1(13)E13 420 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features SH1-97 knows only the even routes from EIGRP. SH1-99 and SH1-100 have redistributed only the even EIGRP routes into BGP, successfully matching the route-map, EIGRP2BGP. Step 16 Reapply the EIGRP redistribution configuration in OSPF on SH1-99 and SH1-100 that was deleted in Step 13. SH1-99 and SH1-100 will again redistribute EIGRP 1320 routes into OSPF 1. Step 17 Remove the redistribution configurations applied in BGP on devices SH1-99 and SH1-100 in Step 7 and Step 12. SH1-99 and SH1-100 are returned to their default configurations, redistributing neither OSPF 1 nor EIGRP 1320 routes into BGP 100. Step 18 Remove the distribute-list from SH1-97, applied in Step 9. Now, SH1-97 can learn the route 170.1.1.0 via OSPF 1 again. Step 19 Confirm that the routes are known, again, via OSPF 1. As was the original case, SH1-97 knows the routes from OSPF and EIGRP via OSPF 1. Step 20 Display the log for error messages. Step 21 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that EIGRP routes will be correctly redistributed into BGP. • We expect that OSPF routes will be correctly redistributed into BGP. • We expect that the application of a route-map will correctly alter the rules by which BGP redistributes routes. • We expect that the redistribution of both OSPF and EIGRP routes into BGP at the same time. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 92 Redistribution OSPF and EIGRP into BGP Test Results Test Result Redistribution OSPF and EIGRP into BGP Pass BGP Neighbor Flap This test verified that a flapping non dampened BGP peer did not cause any memory leaks or prolonged high CPU utilization, and that the DUT functions properly after the peer stops flapping. With BGP routes being fed into devices SH1-97 and SH1-98, this test will simulate constant flapping of those BGP neighbors. Specifically, the Pagent device rtp-wbu-te-p4 is feeding 35,000 BGP routes into SH1-97 from interface fa1/0. The Pagent configuration on this interface was modified to enable flapping and the test was run overnight. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Cisco IOS Release 12.1(13)E13 421 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the BGP Neighbor Flap test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-97 is an eBGP peer with a Pagent router. The Pagent router is sending 35000 route updates from AS 10. Step 5 Log into the Pagent test tool.and configure the lne bgp interface fa2/0 (BGP route feed) to flap every 600 seconds followed by a non-flapping period of 600 seconds. Turn router-flap on and allow this to continue overnight. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that at the completion of this test, the amount of memory free for each device being monitored will be roughly the same, indicating no memory leaks. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 93 BGP Neighbor Flap Test Results Test Result BGP Neighbor Flap Pass BGP Neighbor Flap—With Dampening This test verified that a flapping non dampened BGP peer did not cause any memory leaks or prolonged high CPU utilization, and that the DUT functions properly after the peer stops flapping. With BGP routes being fed into devices SH1-97 and SH1-98, this test will simulate constant flapping of those BGP neighbors. Specifically, the Pagent device rtp-wbu-te-p4 is feeding 35,000 BGP routes into SH1-97 from interface fa1/0. The Pagent configuration on this interface was modified to enable flapping and the test was run overnight. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Procedure The procedure used to perform the BGP Neighbor Flap—With Dampening test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Cisco IOS Release 12.1(13)E13 422 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 4 Verify that SH1-97 is an eBGP peer with a Pagent router. The Pagent router is sending 35000 route updates from AS 10. Step 5 Verify that route-dampening is configured on core devices SH1-97, SH1-98, SH1-99, and SH1-100, which connect to the Pagent test tool running the BGP emulator. Step 6 Log into the Pagent test tool.and configure lne bgp interface fa1/0 (BGP route feed) to withdraw ten routes every 1 second and keep each route withdrawn for ten minutes. Let this test run overnight. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that at the completion of this test, the amount of memory free for each device being monitored will be roughly the same, indicating no memory leaks. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 94 BGP Neighbor Flap—With Dampening Test Results Test Result BGP Neighbor Flap—With Dampening Pass BGP Neighbor Flap—No Dampening This test verified that a flapping non dampened BGP peer did not cause any memory leaks or prolonged high CPU utilization, and that the DUT functions properly after the peer stops flapping. With BGP routes being fed into devices SH1-97 and SH1-98, this test will simulate constant flapping of those BGP neighbors. Specifically, the Pagent device rtp-wbu-te-p4 is feeding 35,000 BGP routes into SH1-97 from interface fa1/0. The Pagent configuration on this interface was modified to enable flapping and the test was run overnight. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Procedure The procedure used to perform the BGP Neighbor Flap—No Dampening test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-97 is an eBGP peer with a Pagent router. The Pagent router is sending 65000 route updates from AS 20. Step 5 Verify that route-dampening is not configured on core devices SH1-97, SH1-98, SH1-99, and SH1-100, which connect to the Pagent test tool running the BGP emulator. Step 6 Log into the Pagent test tool.and configure lne bgp interface fa1/0 (BGP route feed) to withdraw ten routes every 1 second and keep each route withdrawn for ten minutes. Let this test run overnight. Cisco IOS Release 12.1(13)E13 423 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that at the completion of this test, the amount of memory free for each device being monitored will be roughly the same, indicating no memory leaks. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 95 BGP Neighbor Flap—No Dampening Test Results Test Result BGP Neighbor Flap—No Dampening Pass Hot Standby Routing Protocol For IP, the Hot Standby Router Protocol (HSRP) allows one router to automatically assume the function of the second router if the second router fails. HSRP is particularly useful when the users on one subnet require continuous access to resources in the network. The following tests were performed: • HSRP Failover with Default Timers—Supervisor 11, page 424 • HSRP Failover with Default Timers—Sup 22—Compact Switching Mode, page 426 • HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode, page 428 • HSRP Failover with Fast Timers—Supervisor 11, page 430 • HSRP Failover with Fast Timers—Supervisor 22, page 432 • Impact of HSRP Traffic on CPU, page 434 • HSRP Maximum Group Limit, page 435 • GEM Failover with Attached HSRP Groups, page 436 HSRP Failover with Default Timers—Supervisor 11 This test verified HSRP failover when a link was down. This test also verified that the HSRP preempt command worked when the link returned to an up/up state, if the interface was configured with a higher priority than the currently active router interface in the same HSRP group. Figure 32 shows the topology for HSRP failover with Default Timers on Sup 11. Cisco IOS Release 12.1(13)E13 424 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 32 HSRP Failover with Default Timers—Sup 11 Topology Devices under test: SH1-105, SH1-106 Test Procedure The procedure used to perform the HSRP Failover with Default Timers—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the HSRP configurations on devices SH1-105 and SH1-106 for VLANs 40 through 50. Each VLAN is configured to belong to two HSRP groups. That VLAN will then be active for one group and standby for the other on each of the two routers. For example, VLAN 50 has HSRP configured for groups 11 and 12. SH1-105 is active for group 11 and standby for group 12. SH1-106 is standby for group 11 and active for group 12. Step 5 Verify that the links between SH1-105 and Dista-1 and the links between SH1-106 and Dista-1 are trunks and that VLANs 40 to 50 are active within them. portchannel 20 on each of the two devices is a trunk with VLANs 40-50 in spanning tree forwarding state. Step 6 Note Verify that HSRP is active on SH1-106 for VLAN 40 Group 2 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-105 for VLAN 40. The IXIA traffic stream is configured with the MAC address of the default gateway for group 2. SH1-105 is in Standby mode for VLAN 40 Group 2, while SH1-106 is Active for the same group. Step 7 Verify that traffic is being sent to the active HSRP router. SH1-105 is not receiving any incoming unicast packets from IXIA. This is because it is the Standby HSRP router for VLAN 40 Group 2. SH1-106 is receiving incoming unicast packets from IXIA. This is because it is the Active HSRP router for VLAN 40 Group 2. Step 8 Begin the IXIA unicast traffic stream. This stream transmits 300,000 packets at 10,000 pps. Cisco IOS Release 12.1(13)E13 425 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 On SH1-106, shut down the portchannel 20 interface which should force the unicast traffic stream to fail over to SH1-105. Step 10 Verify that the active HSRP router for VLAN 40, group 2 is now SH1-105. SH1-105 is now the Active HSRP router on VLAN 40 Group 2. Step 11 Measure the time (using traffic loss) required for the switchover to occur. Step 12 Bring the portchannel 20 interface back up on SH1-106. Step 13 Verify that HSRP on SH1-106 preempts SH1-105 and once again becomes the active HSRP router. SH1-106 is again the Active HSRP router for VLAN 40 Group 2. Step 14 Perform a series of four more port cycles on the portchannel 20 interface of SH1-106. Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 15 Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 96 HSRP Failover with Default Timers—Supervisor 11 Test Results Test Result HSRP Failover with Default Timers—Supervisor 11 Pass HSRP Failover with Default Timers—Sup 22—Compact Switching Mode This test verified HSRP failover when a link was down. This test also verified that the HSRP preempt command worked when the link returned to an up/up state, if the interface was configured with a higher priority than the currently active router interface in the same HSRP group. Figure 33 shows the CSM topology for HSRP failover with Default Timers on Sup 22. Cisco IOS Release 12.1(13)E13 426 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 33 HSRP Failover with Default Timers—Sup 22—Compact Switching Mode SH1-109 and SH1-110 switch the traffic on the L2 GECs in compact mode. Devices under test: SH1-109, SH1-110 Test Procedure The procedure used to perform the HSRP Failover with Default Timers—Sup 22—Compact Switching Mode test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the HSRP configurations on devices SH1-109 and SH1-110 for VLANs 10 through 20. Step 5 Verify that the links between SH1-109 and Dista-2 and the links between SH1-110 and Dista-2 are trunks and that VLANs 10 to 20 are active within them. portchannel 20 on either box is trunking VLANs 10-20. Step 6 Note Verify that HSRP is active on SH1-110 for VLAN 17 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-109 for VLAN 17. The IXIA traffic stream is configured with the MAC address of the default gateway for group 9. SH1-109 is in Standby mode for VLAN 17 Group 9, while SH1-110 is Active for the same group: Step 7 Verify that the CEF adjacencies for each of the virtual IP addresses of each of the 11 VLANs are punt, and not drop, on SH1-110. The CEF adjacencies for all 11 VLANs are punt adjacencies. Step 8 Verify that traffic is being sent to the active HSRP router. SH1-109 is not receiving any incoming unicast packets from IXIA. This is because it is the Standby HSRP router for VLAN 17 Group 9. SH1-110 is receiving incoming unicast packets from IXIA. This is because it is the Active HSRP router for VLAN 17 Group 9. Step 9 Verify that traffic is being switched in compact mode on the interfaces in portchannel 20. All the modules in SH1-109 are switching in compact mode, while the interfaces of portchannel 20 of SH1-110 (modules 3-4) are in compact mode. Cisco IOS Release 12.1(13)E13 427 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 10 Begin the IXIA unicast traffic stream. This stream transmits 60,000 packets at 1,000 pps. Step 11 On SH1-110, shut down the portchannel 20 interface which should force the unicast traffic stream to fail over to SH1-109. Step 12 Verify that the active HSRP router for VLAN 17, group 9 is now SH1-109. SH1-109 is now the Active HSRP router on VLAN 17 Group 9. Step 13 Measure the time (using traffic loss) required for the switchover to occur. Step 14 Bring the portchannel 20 interface back up on SH1-110. Step 15 Verify that the CEF adjacencies for each of the virtual IP addresses of each of the 11 VLANs are punt, and not drop, on SH1-110. Step 16 Verify that HSRP on SH1-110 preempts SH1-109 and once again becomes the active HSRP router. SH1-110 is again the Active HSRP router for VLAN 17 Group 9. Step 17 Perform a series of four more port cycles on the portchannel 20 interface of SH1-110. Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 18 Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 19 Display the log for error messages. Step 20 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 97 HSRP Failover with Default Timers—Sup 22—Compact Switching Mode Test Results Test Result HSRP Failover with Default Timers—Sup 22—Compact Switching Mode Pass HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode This test verified HSRP failover when a link was down. This test also verified that the HSRP preempt command worked when the link returned to an up/up state, if the interface was configured with a higher priority than the currently active router interface in the same HSRP group. A diagram showing the relevant topology is below:Figure 33 shows the TSM topology for HSRP failover with Default Timers on Sup 22. Cisco IOS Release 12.1(13)E13 428 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 34 HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode Topology SH1-101 and SH1-102 switch the traffic on the L2 GECs in truncated mode. Devices under test: SH1-101, SH1-102 Test Procedure The procedure used to perform the HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the HSRP configurations on devices SH1-101 and SH1-102 for VLANs 40 through 50. Step 5 Verify that the links between SH1-101 and Dista-1 and the links between SH1-102 and Dista-1 are trunks and that VLANs 40 to 50 are active within them. portchannel 10 on either device is trunking VLANs 40-50. Step 6 Note Verify that HSRP is active on SH1-102 for VLAN 44 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-101 for VLAN 44. The IXIA traffic stream is configured with the MAC address of the default gateway for group 6. SH1-101 is in Standby mode for VLAN 44 Group 6, while SH1-102 is Active for the same group. Step 7 Verify that the CEF adjacencies for each of the virtual IP addresses of each of the 11 VLANs are punt, and not drop, on SH1-102. All CEF adjacencies for the 11 VLANs are punt adjacencies. Step 8 Verify that traffic is being sent to the active HSRP router. Begin the IXIA unicast traffic stream. This stream transmits 600,000 packets at 10,000 pps. SH1-101 is not receiving any incoming unicast packets from IXIA. This is because it is the Standby HSRP router for VLAN 44 Group 6. SH1-102 is receiving incoming unicast packets from IXIA. This is because it is the Active HSRP router for VLAN 44 Group 6. Cisco IOS Release 12.1(13)E13 429 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 9 Verify that traffic is being switched in truncated mode on the interfaces in portchannel 10. The modules of portchannel 10 members' interfaces are switching in truncated mode. Step 10 Begin the IXIA unicast traffic stream. This stream transmits 600,000 packets at 10,000 pps. Step 11 On SH1-102, shut down the portchannel 10 interface which should force the unicast traffic stream to fail over to SH1-101. Step 12 Verify that the active HSRP router for VLAN 44, group 6 is now SH1-101. SH1-101 is now the Active HSRP router on VLAN 44 Group 6. Step 13 Measure the time (using traffic loss) required for the switchover to occur. Step 14 Bring the portchannel 10 interface back up on SH1-102. Step 15 Verify that the CEF adjacencies for each of the virtual IP addresses of each of the 11 VLANs are punt, and not drop, on SH1-102. Step 16 Verify that HSRP on SH1-102 preempts SH1-101 and once again becomes the active HSRP router. SH1-102 is again the Active HSRP router for VLAN 44 Group 6. Step 17 Perform a series of four more port cycles on the portchannel 10 interface of SH1-102. Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 18 Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 19 Display the log for error messages. Step 20 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 98 HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode Test Results Test Result HSRP Failover with Default Timers—Sup 22—Truncated Switching Mode Pass HSRP Failover with Fast Timers—Supervisor 11 This test verified HSRP failover when a link was down with fast timers configured on the test VLAN. Fast timers consist of a 1-second hello timer and a 3-second dead timer. The traffic is coming in on VLAN 40. Figure 33 shows the topology for HSRP failover with Fast Timers on Sup 11. Cisco IOS Release 12.1(13)E13 430 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Figure 35 HSRP Failover with Fast Timers—Sup 11 Topology Devices under test: SH1-105, SH1-106 Test Procedure The procedure used to perform the HSRP Failover with Fast Timers—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the HSRP configurations on devices SH1-105 and SH1-106 for VLAN 40. Each VLAN is configured to belong to two HSRP groups. That VLAN will then be active for one group and standby for the other on each of the two routers. For example, VLAN 50 has HSRP configured for groups 11 and 12. SH1-105 is active for group 11 and standby for group 12. SH1-106 is standby for group 11 and active for group 12. Step 5 Note Verify that HSRP is active on SH1-106 for VLAN 40 Group 2 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-105 for the same. The IXIA traffic stream is configured with the MAC address of the default gateway for group 2. SH1-105 is in Standby mode for VLAN 40 Group 2, while SH1-106 is Active for the same group. Step 6 Verify that traffic is being sent to the active HSRP router. SH1-105 is not receiving any incoming unicast packets from IXIA. This is because it is the Standby HSRP router for VLAN 40 Group 2. SH1-106 is receiving incoming unicast packets from IXIA. This is because it is the Active HSRP router for VLAN 40 Group 2. Step 7 Reconfigure Group 2 of VLAN 40 on both SH1-105 and SH1-106 so that the hello and hold timers are 1-second and 3-seconds, respectively. Step 8 Begin the IXIA unicast traffic stream. This stream transmits 300,000 packets at 10,000 pps. Step 9 On SH1-106, shut down the portchannel 20 interface which should force the unicast traffic stream to fail over to SH1-105. Step 10 Measure the time (using traffic loss) required for the switchover to occur. Cisco IOS Release 12.1(13)E13 431 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Of the 300,000 packets sent, only 275,099 were received. This is a packet loss of 24901 packets, or a failover time of 2.49 seconds. Step 11 Bring the portchannel 20 interface back up on SH1-106. Step 12 Perform a series of four more port cycles on the portchannel 20 interface of SH1-106. Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 13 Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 14 Remove the fast timers configuration from VLAN 40 of SH1-105 and SH1-106. Step 15 Display the log for error messages. Step 16 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 99 HSRP Failover with Fast Timers—Supervisor 11 Test Results Test Result HSRP Failover with Fast Timers—Supervisor 11 Pass HSRP Failover with Fast Timers—Supervisor 22 This test verified HSRP failover when a link was down with fast timers configured on the test VLAN. Fast timers consist of a 1-second hello timer and a 3-second hold timer. The traffic is coming in on VLAN 44. Figure 36 shows the topology for the HSRP failover with fast timers—supervisor 22 test: Figure 36 HSRP Failover with Fast Timers—Supervisor 22 Topology Cisco IOS Release 12.1(13)E13 432 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Devices under test: SH1-101, and SH1-102. Test Procedure The procedure used to perform the HSRP Failover with Fast Timers—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify the HSRP configurations on devices SH1-101 and SH1-102 for VLAN 44. Step 5 Verify that HSRP is active on SH1-102 for VLAN 44 Group 6 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-101 for the same. Note The IXIA traffic stream is configured with the MAC address of the default gateway for group 6. SH1-101 is in Standby mode for VLAN 44 Group 6, while SH1-102 is Active for the same group. Step 6 Verify that traffic is being sent to the active HSRP router. SH1-101 is not receiving any incoming unicast packets from IXIA. This is because it is the Standby HSRP router for VLAN 44 Group 6. SH1-102 is receiving incoming unicast packets from IXIA. This is because it is the Active HSRP router for VLAN 44 Group 6. Step 7 Reconfigure Group 6 of VLAN 44 on both SH1-101 and SH1-102 so that the hello and hold timers are 1-second and 3-seconds, respectively. Step 8 Begin the IXIA unicast traffic stream. This stream transmits 300,000 packets at 10,000 pps. Step 9 On SH1-102, shut down the portchannel 10 interface which should force the unicast traffic stream to fail over to SH1-101. Step 10 Measure the time (using traffic loss) required for the switchover to occur. Step 11 Bring the portchannel 10 interface back up on SH1-102. Step 12 Perform a series of four more port cycles on the portchannel 20 interface of SH1-102. Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 13 Measure the average amount of time required for switchover following interface shutdown (include the results from the first run above). Step 14 Remove the fast timers configuration from VLAN 44 of SH1-101 and SH1-102. Step 15 Display the log for error messages. Step 16 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 433 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Results Table 100 HSRP Failover with Fast Timers—Supervisor 22 Test Results Test Result HSRP Failover with Fast Timers—Supervisor 22 Pass Impact of HSRP Traffic on CPU This test measures the impact of traffic on the CPU of the supervisor 22 when traffic is going through a VLAN that has 16 HSRP groups configured on it. VLANs 60 and 61 are configured on SH1-101 and SH1-102; 16 separate HSRP groups (101-116) are configured on each VLAN interface. Traffic is sourced from IXIA, connected to Dista-1, on VLAN 60. The destination is an IXIA port also connected to Dista-1, on VLAN 61. Traffic is sent at increasing rates of 100,000 pps, 250,000 pps, 500,000 pps, and 1 million pps. The CPU and memory utilization is measured. Figure 37 shows the topology for impact of HSRP traffic on CPU. Figure 37 Impact of HSRP Traffic on CPU Topology Devices under test: SH1-101, and SH1-102. Test Procedure The procedure used to perform the Impact of HSRP Traffic on CPU test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Write the running-configuration to memory (NVRAM) so that it can be recalled later. Do this for SH1-101 and SH1-102. Cisco IOS Release 12.1(13)E13 434 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 5 Determine which VLAN interfaces are present on the device. Step 6 Remove any VLANs discovered in for both SH1-101 and SH1-102, with the exception of VLAN 1. Perform this function on each device, for its respective VLANs. Step 7 Configure VLANs 60 and 61 on each device SH1-101 and SH1-102. Each of these VLANs will participate in HSRP with the other device on 16 groups within each VLAN. SH1-101 will be the active HSRP router for the odd groups, while SH1-102 will be active HSRP router for the even groups. Also configure each VLAN to participate in multicast PIM-SM. Make sure VLAN 60 and 61 are configured on Dista-1 Step 8 Verify that the HSRP states on each device, for each VLAN and group, are as they should be. For SH1-101, all odd-numbered groups should be active, and the even-numbered groups should be standby. For SH1-102, all odd groups should be standby and all even groups active. Step 9 Verify that ports 6/5 and 6/6 on Dista-1 are on VLANs 60 and 61, respectively. Step 10 Begin the traffic stream. This stream will run at the following rates (packets per second) for one minute each: 25K, 50K, 75K, 100K, 125K. 22.5 million packets total will be sent, at these varying rates. Step 11 Verify that 100% of the traffic sent was received on the proper port. All packets were received for all traffic rates. Step 12 Remove the VLAN 60 and VLAN 61 configurations from SH1-101 and SH1-102. Step 13 Copy the startup configuration in NVRAM to the running configuration, and bring the vlan interfaces up (VLANs 40-50 and those others removed in Step 6), restoring the default configuration for the devices under test. Step 14 Display the log for error messages. Step 15 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that 100 percent of the traffic sent at the varying rates to be received correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 101 Impact of HSRP Traffic on CPU Test Results Test Result Impact of HSRP Traffic on CPU Pass HSRP Maximum Group Limit The PFC2 and MSFC2 support a maximum of 16 unique HSRP groups. There are concerns, that in recent Cisco IOS code, no warnings are given if more than 16 unique HSRP groups are configured. This test demonstrates that an error message is displayed when an attempt is made to configure the 17th group. Device under test: SH1-103. Test Procedure The procedure used to perform the HSRP Maximum Group Limit test follows: Cisco IOS Release 12.1(13)E13 435 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Configure 16 HSRP groups on VLAN 100 of SH1-103. The 16 HSRP groups are configured without a problem. Step 5 Attempt to configure the 17th HSRP group. An error message occurs when the 17th group is configured. Step 6 Remove VLAN 100 from the configuration on SH2-104. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • We expect an error message to appear on an attempt to configure the 17th HSRP group, and the 17th group should not be configurable. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 102 HSRP Maximum Group Limit Test Results Test Result HSRP Maximum Group Limit Pass GEM Failover with Attached HSRP Groups This test verified the resetting of one or more GE modules to which HSRP groups are attached. The traffic is coming in on VLAN 20. Devices under test: SH1-110 Test Procedure The procedure used to perform the GEM Failover with Attached HSRP Groups test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Start the test traffic stream. This stream is multicast test traffic stream C, sending to ten groups 239.100.3.[1-10]. This stream will send 1000pps for 60 seconds. Step 5 Verify that SH1-110 is the active HSRP router for VLAN 20 group 12. Step 6 Reset module 3 on SH1-110. Cisco IOS Release 12.1(13)E13 436 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Step 7 Once module 3 comes back online, verify that SH1-110 is still the active HSRP router for VLAN 20 group 12. Step 8 Determine the amount of traffic loss. 605 packets were lost out of the 60,000 sent. Step 9 Start the test traffic stream. Step 10 Verify that SH1-110 is the active HSRP router for VLAN 20 group 12. Step 11 Reset module 4 on SH1-110. Step 12 Verify that SH1-110 is still the active HSRP router for VLAN 20 group 12. Step 13 Determine the amount of traffic loss. 54 packets were lost out of the 60,000 sent. Step 14 Start the test traffic stream. Step 15 Verify that SH1-110 is the active HSRP router for VLAN 20 group 12. Step 16 Reset both modules 3 and 4 on SH1-110. Step 17 Verify that SH1-110 is no longer the standby HSRP router for VLAN 20 group 12. Step 18 Determine the amount of traffic loss. 67 packets were lost out of the 60,000 sent. Step 19 Display the log for error messages. Step 20 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the traffic to quit flowing over Portchannel 20 when Mod 3 is reset because Mod 3 effects Portchannels 20, as well as 1, 70 and 71. So SH1-109 takes over as the FHR due to the greater bandwidth (i.e. more active ports/portchannel). Once the ports on SH1-110 became active again, we expect the traffic to switch back over to SH1-110. • We expect HSRP on SH1-109 to take over when all 4 GE interfaces are failed on portchannel 20 of SH1-110. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 103 GEM Failover with Attached HSRP Groups Test Results Test Result GEM Failover with Attached HSRP Groups Pass Enhanced Interior Gateway Routing Protocol The Enhanced Interior Gateway Routing Protocol (EIGRP) is an enhanced version of the IGRP protocol developed by Cisco Systems. Enhanced IGRP uses the same distance vector algorithm and distance information as IGRP. However, the convergence properties and the operating efficiency of Enhanced IGRP have improved significantly over IGRP. Cisco IOS Release 12.1(13)E13 437 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features The convergence technology is based on research conducted at SRI International and employs an algorithm referred to as the Diffusing Update Algorithm (DUAL). This algorithm guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. The convergence time with DUAL rivals other routing protocol. The following tests were performed: • EIGRP Summarization, page 438 • EIGRP Redistribution, page 439 EIGRP Summarization This test verified manual EIGRP summarization by using the ip summary-address interface configuration command. Several /24 networks are known via EIGRP by device SH1-101 that can be summarized as a single /22 network on the portchannels of devices SH1-99 and SH1-100 (portchannels 14 and 15). This test will involve the summarization of the routes 172.31.20.0/24 to 172.31.23.0/24 into 172.31.20.0/22. Devices under test: SH1-99, SH1-100, and SH1-101. Test Procedure The procedure used to perform the EIGRP Summarization test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Run the test script that will perform Step 5 through Step 9. Step 5 Show that the routes are not summarized and exist as /24 routes on SH1-101. The routing entries for all four networks are shown as /24 networks. Step 6 Configure the ip summary-address eigrp command on the portchannel 14 and portchannel 15 interfaces of SH1-100 and SH1-99. Step 7 Verify that the routes to the networks that were shown in now have an entry on the summary subnet of 172.31.20.0/22. Summarization results in the four networks being known as /22 networks, now. Step 8 Remove the summarization configuration statements applied in Step 4. Step 9 Confirm that the routing entries appear as /24 networks, as they did above. The four networks are again known as /24 networks: Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the /24 networks shown to be correctly summarized as /22 networks. Cisco IOS Release 12.1(13)E13 438 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 104 EIGRP Summarization Test Results Test Result EIGRP Summarization Pass EIGRP Redistribution This test verified that EIGRP route redistribution works correctly, with and without access lists (ACLs) and route map filtering. Figure 38 shows SH1-99 and SH1-100 redistributing OSPF routes into EIGRP 1320 (of which SH1-101 is a member). Figure 38 EIGRP Redistribution The routes examined in this test are OSPF routes for 10,000 networks with a /24 mask, beginning at 160.1.1.0, 160.1.2.0, 160.1.3.0, and so on. These routes are fed directly into device SH1-97 via the Pagent test tool. Because redistribution is a part of the normal configuration in the Safe Harbor topology, the first part of the test was to remove that configuration on devices SH1-99 and SH1-100, and verify that the 160.x.x.x networks are no longer propagated to SH1-101 in the EIGRP domain. Redistribution will then be configured with a route map added, which will allow only the odd-numbered networks to be redistributed (160.1.1.0, 160.1.3.0, 160.1.5.0, and so on). The even-numbered networks will not appear in the routing table of SH1-101. The final part of the test was to reconfigure redistribution as it is in the default setup for this network to allow all 160.x.x.x networks to be redistributed. Devices under test: SH1-97, SH1-99, SH1-100, and SH1-101. Cisco IOS Release 12.1(13)E13 439 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features Test Procedure The procedure used to perform the EIGRP Redistribution test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin the test script that will perform Step 5 through Step 15. Results for /ats/local/tests/SafeHarbor/eigrp/SH1-eigrp_redistribution.tcl run at 2003-12-16-1240 Step 5 • PASSED. SH1-99 and SH1-100 are redistributing OSPF into EIGRP and are running EIGRP 1320 • PASSED. Routes are redistributing properly. • PASSED. 20124 subnets are known via EIGRP 1320 on SH1-101 (minimum 15000 should be known). • PASSED. Routes have been removed from routing table on SH1-101. • PASSED. Route maps and acl's are properly configured on SH1-99, SH1-100. • PASSED. All odd routes are known and all even routes are unknown on SH1-101. • PASSED. SH1-101 has an appropriate number of routes. • PASSED. Routing table has been restored on SH1-101. • SH1-eigrp_redistribution test PASSED! Show the default EIGRP configuration for devices SH1-99 and SH1-100. Both SH1-99 and SH1-100 are running EIGRP 1320 and redistributing OSPF routes into EIGRP as part of the default configuration. Step 6 Show that, with the default EIGRP configuration (allowing redistribution), the 160.x.x.x networks are propagated to SH1-101. SH1-101 knows the two routes via EIGRP 1320, and notes that the routes have been redistributed by EIGRP. Step 7 Show that SH1-101 has a full routing table with ~20,000 total routes (10,000 routes from OSPF 1 and 10,000 routes from EIGRP 1320). Initially, SH1-101 has roughly 20,000 EIGRP routes in its routing table. This includes 10,000 EIGRP routes and 10,000 OSPF routes that have been redistributed into EIGRP. Step 8 Remove the redistribution configuration from devices SH1-99 and SH1-100. WIth the redistribution configurations removed, SH1-99 and SH1-100 should not redistribute OSPF routes into EIGRP any longer. Step 9 Confirm that the routes for the 160.x.x.x networks are no longer present in SH1-101 and that the routing table has been trimmed by ~10,000 routes. It may be several minutes before the old routes time out and are eliminated. SH1-101 no longer knows the routes to the OSPF networks, as redistribution has been removed. SH1-101 only has 10,000 routes in its routing table, now. These are the 10,000 EIGRP routes. Step 10 Show the route-map OSPF2EIGRP-odd and the access-list 22 on SH1-99 and SH1-100. The route-maps configured on SH1-99 and SH1-100 contain two sequences. The first denies any routes matching access-list 22, and the second permits all other routes. Access-list 22 permits 160.x.x.x networks with a 0 set as the last bit in the third octet. This means that the third octet has to be even to Cisco IOS Release 12.1(13)E13 440 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Layer 3 Routing Features pass the access-list. Combined with the route-map, which denies any routes passing access-list 22, only routes with odd third octets will be allowed within the 160.x.x.x network. All other OSPF networks will be allowed, as is determined by the second sequence statement in the route-map. Step 11 Configure redistribution on SH1-99 and SH1-100, applying the route-map OSPF2EIGRP-odd, so that the even networks are blocked from being redistributed. Redistribution is configured with a route-map that allows only routes with an odd third octet. Step 12 Confirm that the only routes for the 160.x.x.x networks that are on SH1-101 are for the odd networks, 160.1.1.0, 160.1.3.0, 160.1.5.0, and so on. SH1-101 knows only those 160.x.x.x routes with an odd third octet. The route-map has correctly filtered the redistribution. Step 13 Show that the number of subnets in the routing table of SH1-101 has been decreased by 5000. SH1-101 now has only about 17,500 EIGRP routes in its routing table. 5,000 160.x.x.x OSPF routes are being generated by the Pagent test tool. Allowing only those routes with an odd third octet filters out 2,500 of those routes. There are 5,000 other routes from OSPF, also, for a total of 7,500 routes. Step 14 Reconfigure the default redistribution configuration that was removed inStep 8. The original redistribution configuration, allowing all OSPF routes to be redistributed, is reapplied. Step 15 Confirm that all of the 160.x.x.x networks are redistributed into SH1-101 (odd and even), and that the routing table on SH1-101 is back to normal status (seen in Step 5). Both odd and even 160.x.x.x routes have been redistributed and are known by SH1-101 again. Again, SH1-101 has a full routing table. Step 16 Display the log for error messages. Step 17 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that, when the default redistribution configuration is removed from SH1-99 and SH1-100, none of the 10,000 OSPF routes will be propagated to SH1-101. • We expect that, when the route-map OSPF2EIGRP-odd is applied, with redistribution, on SH1-99 and SH1-100, only the odd subnets within 160.x.x.x will be propagated to SH1-101. • We expect that, when the default redistribution configuration is re-applied to SH1-99 and SH1-100, all of the routes for the 160.x.x.x networks will be in the routing table of SH1-101 and that the routing table will be populated correctly in its default state. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 105 EIGRP Redistribution Test Results Test Result EIGRP Redistribution Pass Cisco IOS Release 12.1(13)E13 441 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Network Management Features Network Management Features Network management feature testing for Safe Harbor is described in the following sections: • Simple Network Management Protocol, page 442 • TACACS, page 445 Simple Network Management Protocol The Simple Network Management Protocol (SNMP) system consists of an SNMP manager, an SNMP agent, and a MIB. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. Protos tests send exceptional elements to SNMP agents and managers in the form of requests and traps. These elements are designed to provoke undesired behavior of the subject implementation. An exceptional element is an input that might not have been considered properly when implementing the software. The following tests were performed: • Basic Functionality Shut/No Shut Interface—Supervisor 11, page 442 • Basic Functionality Shut/No Shut Interface—Supervisor 22, page 443 • Protos Negative Request Application, page 444 Basic Functionality Shut/No Shut Interface—Supervisor 11 This test verified the basic SNMP functionality of the Supervisor 11. In this procedure, SNMP traps are created by a shut/no shut of an interface on device SH1-108. The logging messages created on the device should be logged to the SNMP trap receiver. Device under test: SH1-106. Test Procedure The procedure used to perform the Basic Functionality Shut/No Shut Interface—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-106 is configured to send SNMP traps generated by configuration messages to the server 172.18.177.135 SH1-106 is configured to generate SNMP traps when configuration mode is entered and to send them to the host 172.18.177.135. Step 5 Enter and leave configuration mode on SH1-106, generating a log message. Step 6 Verify that the traps are received by a machine that is set up as the SNMP trap receiver. View the output from the log files of that machine. Cisco IOS Release 12.1(13)E13 442 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Network Management Features The host has logged an SNMP trap from the device under test, 10.194.17.106. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that SNMP functions according to specifications, generating and sending a trap to the configured host. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 106 Basic Functionality Shut/No Shut Interface—Supervisor 11 Test Results Test Result Basic Functionality Shut/No Shut Interface—Supervisor 11 Pass Basic Functionality Shut/No Shut Interface—Supervisor 22 This test verified the basic SNMP functionality of the supervisor 22. In this procedure, SNMP traps are created by a shut/no shut of an interface on device SH1-110. The logging messages created on the device should be logged to the SNMP trap receiver. Device under test: SH1-110. Test Procedure The procedure used to perform the Basic Functionality Shut/No Shut Interface—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-110 is configured to send SNMP traps generated by configuration messages to the server 172.18.177.135. SH1-110 is configured to generate SNMP traps when configuration mode is entered and to send them to the host 172.18.177.181. Step 5 Enter and leave configuration mode on SH1-110, generating a log message. Step 6 Verify that the traps are received by a machine that is set up as the SNMP trap receiver. View the output from the log files of that machine. The host has logged an SNMP trap from the device under test, 10.194.17.110: Step 7 Display the log for error messages. Step 8 Show the results of CPU and memory monitoring of the devices in the SH1 network. Cisco IOS Release 12.1(13)E13 443 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Network Management Features Expected Results • We expect that SNMP functions according to specifications, generating and sending a trap to the configured host. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 107 Basic Functionality Shut/No Shut Interface—Supervisor 22 Test Results Test Result Basic Functionality Shut/No Shut Interface—Supervisor 22 Pass Protos Negative Request Application This test verified that no SNMP vulnerabilities exist in the Native Cisco IOS code. Protos testing involves sending erroneous SNMP packets to the device under test. These tests are run on all permutations of supervisor and MSFC. This is a negative test, so the only verification is that the DUT was unaffected. Test Procedure The procedure used to perform the Protos Negative Request Application test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Start background unicast and multicast traffic (rate=10,000 pps for unicast traffic and 1000 pps for multicast traffic). Streams need to be configured to play for 5 minutes. Step 5 Verify the SNMP Community String settings default. Step 6 Execute the protos traffic generation scripts. The protos test cases will be sent to each DUT using packetmaster test engine. Note With the options given above, each test takes about 1 min to complete, "delay" and "replywait" are in milliseconds. However, if a router crashes or hangs without providing the information needed to verify this bug the parameters may be adjusted. If detailed information about the SNMP packets is required use the '-showreply -zerocase' options. Running in this manner takes several hours. Step 7 After background traffic is done, verify no packets were lost. Show results. Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all DUTs to not drop any background traffic while running the test. Cisco IOS Release 12.1(13)E13 444 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Network Management Features • We expect all DUTs to not pause indefinitely, reload, or give trace backs while running the test. Results Table 108 Protos Negative Request Application Test Results Test Result Protos Negative Request Application Pass TACACS Terminal Access Controller Access Control System (TACACS) is an authentication protocol that provides remote access authentication and related services, such as event logging. User passwords are administered in a central database rather than in individual routers, providing an easily scalable network security solution. Login authentication increases the security of the system by keeping unauthorized users from guessing the password. The user is limited to a specific number of attempts to successfully log in to the switch. If the user fails to authorize the password, the system delays access and captures the user ID and the IP address of the station in the syslog file and in the SNMP trap. The following test was performed: • User Authentication—Supervisor 11, page 445 • User Authentication—Supervisor 22, page 446 User Authentication—Supervisor 11 This test verified that the TACACS login authentication works correctly on a supervisor 1 on MSFC 1 system. The server 172.18.177.132 is a TACACS server. It was used in this test as the source of user authentication information. Device under test: SH1-106. Test Procedure The procedure used to perform the User Authentication—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-106 has connectivity to the TACACS server 172.18.177.132. The server is reachable. Step 5 Configure SH1-106 to be a TACACS device with 172.18.177.132 as its server. Step 6 Verify that user authentication is necessary on SH1-106. Telnet from SH1-105 to SH1-106. Authentication works as designed. Step 7 Shut down the interface connecting SH1-106 with the TACACS server. Step 8 Verify that SH1-106 no longer has connectivity to the TACACS server. Cisco IOS Release 12.1(13)E13 445 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Network Management Features Step 9 Telnet from SH1-105 to SH1-106 and verify that the login process falls back to IOS default. Step 10 Remove the TACACS configuration from SH1-106. Step 11 Bring the flashnet interface back online. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that TACACS login authentication works correctly. • We expect that when the TACACS server becomes unavailable, the login process will fall back to the IOS default. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 109 User Authentication—Supervisor 11 Test Results Test Result User Authentication—Supervisor 11 Pass User Authentication—Supervisor 22 This test verified that the TACACS login authentication works correctly on a supervisor 2/msfc2 system. The server 172.18.177.132 is a TACACS server. It was used in this test as the source of user authentication information. Devices under test: SH1-110 Note Use console on access server (172.18.177.171 2110) to get to SH1-110, not telnet. Test Procedure The procedure used to perform the User Authentication—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that SH1-110 has connectivity to the TACACS server 172.18.177.132. Step 5 Configure SH1-110 to be a TACACS device with 172.18.177.132 as its server. Step 6 Verify that user authentication is necessary on SH1-110. Telnet from SH1-104 to SH1-110. Step 7 Shut down the interface connecting SH1-110 with the TACACS server. Step 8 Verify that SH1-110 no longer has connectivity to the TACACS server. Step 9 Telnet SH1-104 to SH1-110 from and verify that the login process falls back to IOS default. Cisco IOS Release 12.1(13)E13 446 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 10 Remove the TACACS configuration from SH1-110. Step 11 Bring the flashnet interface back online. Step 12 Display the log for error messages. Step 13 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect the TACACS login authentication to work correctly. • We expect that if the TACACS server becomes unavailable, the login process will fall back to the IOS default. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 110 User Authentication—Supervisor 22 Test Results Test Result User Authentication—Supervisor 22 Pass Miscellaneous Features Miscellaneous features tested for Safe Harbor are described in the following sections: • Dynamic Host Control Protocol, page 447 • Switched Port Analyzer, page 450 • Access Control Lists, page 452 • Parser, page 458 • Show-All Script via SSH Supervisor 11, page 460 • Network Time Protocol, page 472 • Syslog, page 476 • User Datagram Protocol Broadcast Flooding, page 477 • System Upgrade, page 480 • Secure Shell, page 485 Dynamic Host Control Protocol As explained in RFC 2131, Dynamic Host Configuration Protocol, DHCP provides configuration parameters to Internet hosts. DHCP consists of two components: a protocol for delivering host-specific configuration parameters from a DHCP Server to a host and a mechanism for allocating network addresses to hosts. DHCP is built on a client/server model, where designated DHCP Server hosts allocate network addresses and deliver configuration parameters to dynamically configured hosts. The following tests were performed: Cisco IOS Release 12.1(13)E13 447 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features • Basic DHCP—Supervisor 11, page 448 • Basic DHCP—Supervisor 22, page 449 Basic DHCP—Supervisor 11 The diagram below shows the basic steps that occur when a DHCP client requests an IP address from a DHCP Server. The client, Host A, sends a DHCPDISCOVER broadcast message to locate a Cisco IOS DHCP Server. A DHCP Server offers configuration parameters (such as an IP address, a MAC address, a domain name, and a lease for the IP address) to the client in a DHCPOFFER unicast message. Since the DHCPDISCOVER and DHCPREQUEST packets are broadcast, only hosts on the same LAN segment will receive them. If the DHCP server is on a different LAN segment, additional configuration is necessary in order for the server to receive the client's packets. On the router interface which is on a directly connected LAN segment with the client, configure an ip helper-address pointing to the DHCP server. This will enable the forwarding of User Datagram Protocol (UDP) broadcasts, including BOOTP and DHCP, received on that interface to the DHCP server. Figure 39 shows the basic DHCP supervisor 11 topology. Figure 39 Basic DHCP—Sup 11 Topology Test Procedure The procedure used to perform the Basic DHCP—Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the DUT has an ip helper address a configured on the incoming interface. On the incoming interface, verify that the command ip helper address <ip address> is configured, and that the ip address specified is an address on the DHCP server. Note the IP address of this router, and any others addresses in use on this segment. These will need to be excluded from the DHCP address pool. Step 5 Verify that the DHCP server is configured on the device specified by the ip helper address (i.e. SH1-98). Verify that the 'no dhcp server conflict logging' is configured. Verify that all the router ip addresses on the client subnet have been excluded. Verify that a DHCP pool for the client subnet has been configured. Step 6 Clear any previous DHCP server statistics on the DHCP server and enable DHCP debugging (on SH1-98) Verify that the server stats have been zeroed out. Step 7 Launch, configure, and run the script that will initiate a DHCP request from the IXIA test tool. Cisco IOS Release 12.1(13)E13 448 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 8 Verify that the DHCP Discover and Request messages are forwarded by the DUT to the DHCP server. Verify that a DHCPDISCOVER message was received from the script through the DUT as relay. Verify that after the DHCPOFFER is sent, a DHCPREQUEST is received from the same client. Step 9 Turn off DHCP debugging on the DHCP server (SH1-98) Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that all DHCP broadcast messages sent from the IXIA will be forwared to the DHCP server. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 111 Basic DHCP—Supervisor 11 Test Results Test Result Basic DHCP—Supervisor 11 Pass Basic DHCP—Supervisor 22 The diagram below shows the basic steps that occur when a DHCP client requests an IP address from a DHCP Server. The client, Host A, sends a DHCPDISCOVER broadcast message to locate a Cisco IOS DHCP Server. A DHCP Server offers configuration parameters (such as an IP address, a MAC address, a domain name, and a lease for the IP address) to the client in a DHCPOFFER unicast message. Since the DHCPDISCOVER and DHCPREQUEST packets are broadcast, only hosts on the same LAN segment will receive them. If the DHCP server is on a different LAN segment, additional configuration is necessary in order for the server to receive the client's packets. On the router interface which is on a directly connected LAN segment with the client, configure an ip helper-address pointing to the DHCP server. This will enable the forwarding of User Datagram Protocol (UDP) broadcasts, including BOOTP and DHCP, received on that interface to the DHCP server. Figure 40 shows the basic DHCP supervisor 11 topology. Figure 40 Basic DHCP—Sup 22 Topology Cisco IOS Release 12.1(13)E13 449 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Test Procedure The procedure used to perform the Basic DHCP—Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the DUT has an ip helper address a configured on the incoming interface. On the incoming interface, verify that the command ip helper address <ip address> is configured, and that the ip address specified is an address on the DHCP server. Note the ip address of this router, and any others addresses in use on this segment. These will need to be excluded from the DHCP address pool. Step 5 Verify that the DHCP server is configured on the device specified by the ip helper address. Verify that the 'no dhcp server conflict logging' is configured. Verify that all the router ip addresses on the client subnet have been excluded. Verify that a DHCP pool for the client subnet has been configured. Step 6 Clear any previous DHCP server statistics on the DHCP server and enable DHCP debugging. Verify that the server stats have been zeroed out. Step 7 Launch, configure, and run the script that will initiate a DHCP request from the IXIA test tool. Step 8 Verify that the DHCP Discover and Request messages are forwarded by the DUT to the DHCP server. Verify that a DHCPDISCOVER message was received from the script through the DUT as relay. Verify that after the DHCPOFFER is sent, a DHCPREQUEST is received from the same client. Step 9 Turn off DHCP debugging on the DHCP server. Step 10 Display the log for error messages. Step 11 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that all DHCP broadcast messages sent from the IXIA will be forwarded to the DHCP server. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 112 Basic DHCP—Supervisor 22 Test Results Test Result Basic DHCP—Supervisor 22 Pass Switched Port Analyzer Local switched port analyzer (SPAN) selects network traffic to send to a network analyzer such as a switch probe device or other Remote Monitoring (RMON) probe. SPAN does not affect the switching of network traffic on source ports or VLANs. SPAN sends a copy of the packets received or sent by the source ports and VLANs to the destination port. The destination port must be dedicated for SPAN use. Cisco IOS Release 12.1(13)E13 450 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features The following test was performed: • SPAN Basic Functionality, page 451 SPAN Basic Functionality This test verified the basic functionality of the SPAN feature across both the Supervisor 1 and Supervisor 2 platforms, and across a number of different modules. Two multicast streams and six unicast streams with.will be sent into the network at Dista-2. There were six receivers, all on Dista-1. Traffic passed through SH1-110 (Sup22), SH1-108 (Sup12), SH1-106 (Sup11), and SH1-102 (Sup22) along the way to the two destinations. There are six interfaces in these four devices configured to monitor the multicast traffic. These six interfaces are on WS-X6816-GBIC, and WS-X6408-GBIC module. Devices under test:.SH1-102, SH1-106, SH1-108, SH1-110 Test Procedure The procedure used to perform the SPAN Basic Functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Configure the span sessions on SH1-102, SH1-106, SH1-108 and SH1-110 after clearing any existing ones. Step 5 Clear the counters on all four devices. Step 6 Begin an IXIA stream sending 300,000 packets from multiple sources to multiple destinations. The Background Unicast and Test Multicast traffic is used here; the Background Multicast traffic is not used. Step 7 Compare the counters from each monitored interface with the packets reported received by IXIA. Step 8 Remove the SPAN configurations from the devices. Step 9 Display the log for error messages. Step 10 Verify that there were no significant impacts on the CPU or memory of the devices under test. Expected Results • We expect that each of the packets sent in the test traffic stream will be duplicated on each of the four monitor destination interfaces. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 113 SPAN Basic Functionality Test Results Test Result SPAN Basic Functionality Pass Cisco IOS Release 12.1(13)E13 451 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Access Control Lists Access control lists (ACLs) are used to classify traffic and permit or deny forwarding based on this classification. The following tests were performed: • ACL 110 Supervisor 11, page 452 • ACL 110 Supervisor 12, page 453 • ACL 110 Supervisor 22, page 454 • ACL 131 Supervisor 11, page 455 • ACL 131 Supervisor 12, page 456 • ACL 131 Supervisor 22, page 457 ACL 110 Supervisor 11 ACL 110 is a 1404 line access list taken from customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. This script is run against a supervisor 11. Test Procedure The procedure used to perform the ACL 110 Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-105 which will configure ACL 110 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Using the script's output file, verify that all packets were permitted/denied correctly. Verify that the CPU and memory should not suffer severe or sustained impact during the test on the DUT. All packets were permitted or denied correctly. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 452 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Results Table 114 ACL 110 Supervisor 11 Test Results Test Result ACL 110 Supervisor 11 Pass ACL 110 Supervisor 12 ACL 110 is a 1404 line access list taken from customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. This script is run against a supervisor 12. Test Procedure The procedure used to perform the ACL 110 Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-108 which will configure ACL 110 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Using the script's output file, verify that all packets were permitted/denied correctly. Verify that the CPU and memory should not suffer severe or sustained impact during the test on the DUT. All packets were permitted or denied correctly. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 115 ACL 110 Supervisor 12 Test Results Test Result ACL 110 Supervisor 12 Pass Cisco IOS Release 12.1(13)E13 453 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features ACL 110 Supervisor 22 ACL 110 is a 1404 line access list taken from customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. This script is run against a supervisor 22. Test Procedure The procedure used to perform the ACL 110 Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-102 which will configure ACL 110 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Using the script's output file, verify that all packets were permitted/denied correctly. Verify that the CPU and memory should not suffer severe or sustained impact during the test on the DUT. All packets were permitted or denied correctly. Note There was an ACL failure on a single permit ACL because the host portion was denied by a previous ACL. This is expected. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 116 ACL 110 Supervisor 22 Test Results Test Result ACL 110 Supervisor 22 Pass Cisco IOS Release 12.1(13)E13 454 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features ACL 131 Supervisor 11 ACL 131 is a 2985 line access control list taken from a customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. Test Procedure The procedure used to perform the ACL 131 Supervisor 11 test follows: Note To fit this ACL in the TCAM you need to be using the ODM ACL merge algorithm. This feature is not supported until Cisco IOS Release 12.1(11b)E4. Until then we must split the ACL into two ACLs and run them separately. Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-106 which will configure ACL 131 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Verify using script output file that all packets were permitted/denied correctly. All packets were permitted or denied correctly. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 117 ACL 131 Supervisor 11 Test Results Test Result ACL 131 Supervisor 11 Pass Cisco IOS Release 12.1(13)E13 455 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features ACL 131 Supervisor 12 ACL 131 is a 2985 line access control list taken from a customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. Test Procedure The procedure used to perform the ACL 131 Supervisor 12 test follows: Note To fit this ACL in the TCAM you need to be using the ODM ACL merge algorithm. This feature is not supported until Cisco IOS Release 12.1(11b)E4. Until then we must split the ACL into two ACLs and run them separately. Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-108 which will configure ACL 131 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Verify using script output file that all packets were permitted/denied correctly. All packets were permitted or denied correctly. Note All ACL's using 172.31.32.x failed because they matched the port on SH1-108 that directly connected to the IXIA port. This caused this path to be preferred over the routed path that the script was expecting., the expected path had zero packets. This is not an error, just a quirk of the way the script generates IP addresses. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 118 ACL 131 Supervisor 12 Test Results Test Result ACL 131 Supervisor 12 Pass Cisco IOS Release 12.1(13)E13 456 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features ACL 131 Supervisor 22 ACL 131 is a 2985 line access control list taken from a customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. Test Procedure The procedure used to perform the ACL 131 Supervisor 22 test follows: Note To fit this ACL in the TCAM you need to be using the ODM ACL merge algorithm. This feature is not supported until Cisco IOS Release 12.1(11b)E4. Until then we must split the ACL into two ACLs and run them separately. Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin ACL test script on SH1-110 which will configure ACL 131 on the DUT and send traffic against each line of the ACL to verify functionality. Step 5 Verify using script output file that all packets were permitted/denied correctly. All packets were permitted or denied correctly. Step 6 Display the log for error messages. Step 7 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect each DUT will not permit any denied traffic, and will not deny any permitted traffic. • We expect all traffic to be hardware-switched with no permitted packets dropped. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 119 ACL 131 Supervisor 22 Test Results Test Result ACL 131 Supervisor 22 Pass Cisco IOS Release 12.1(13)E13 457 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Parser Parser testing robustly exercises the command-line interface (CLI) of a router. The testing walks the parser tree, executing completed commands and filling in options as it comes to them. Certain branches of the parser tree were left out due to time constraints of the testing (for example, the show tag-switching tdp, and show mpls commands. The following tests were performed: • Show-All Script via Telnet Supervisor 11, page 458 • Show-All Script via Telnet Supervisor 12, page 459 • Show-All Script via Telnet Supervisor 22, page 459 • Show-All Script via SSH Supervisor 11, page 460 • Show-All Script via SSH Supervisor 12, page 461 • Show-All Script via SSH Supervisor 22, page 462 Show-All Script via Telnet Supervisor 11 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 11. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the Show-All Script via Telnet Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin executing show and clear commands on the devices under test. There were no errors during the running of this test. Links to the various output files are provided: SH1-105 Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 120 Show-All Script via Telnet Supervisor 11 Test Results Test Result Show-All Script via Telnet Supervisor 11 Pass Cisco IOS Release 12.1(13)E13 458 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Show-All Script via Telnet Supervisor 12 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 12. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the parser Show-All Script via Telnet Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin executing show and clear commands on the devices under test. There were no errors during the running of this test. Links to the various output files are provided: Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 121 Show-All Script via Telnet Supervisor 12 Test Results Test Result Show-All Script via Telnet Supervisor 12 Pass Show-All Script via Telnet Supervisor 22 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 22. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the Show-All Script via Telnet Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Begin executing show and clear commands on the devices under test. There were no errors during the running of this test. Links to the various output files are provided: Cisco IOS Release 12.1(13)E13 459 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 5 Display the log for error messages. Step 6 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 122 Show-All Script via Telnet Supervisor 22 Test Results Test Result Show-All Script via Telnet Supervisor 22 Pass Show-All Script via SSH Supervisor 11 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 11. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the Show-All Script via SSH Supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test Step 4 Verify DUT is configured with a hostname, domain name, and TACACS authentication on VTY lines. Step 5 Ensure the SSH server on DUT is enabled by generating an RSA key pair. Configure the VTY lines to allow SSH, and verify that each DUT is accepting SSH connections. Note If in the following step you get the error message 'WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!' this means that this device has generated a different key than last time this test was performed. You will need to delete the line which contains the old key in the file ~/.ssh/known_hosts and connect again. Step 6 Begin executing show and clear commands on the devices under test. Step 7 Display the log for error messages. There were no errors during the running of this test. Links to the various output files are provided: Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 460 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 123 Show-All Script via SSH Supervisor 11 Test Results Test Result Show-All Script via SSH Supervisor 11 Pass Show-All Script via SSH Supervisor 12 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 12. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the Show-All Script via SSH Supervisor 12 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify each DUT is configured with a hostname, domain name, and TACACS authentication on VTY lines. Step 5 Ensure the SSH server on each DUT is enabled by generating an RSA key pair. Configure the VTY lines to allow SSH, and verify that each DUT is accepting SSH connections. Note If in the following step you get the error message 'WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!' this means that this device has generated a different key than last time this test was performed. You will need to delete the line which contains the old key in the file ~/.ssh/known_hosts and connect again. Step 6 Begin executing show and clear commands on the devices under test. Step 7 Display the log for error messages. There were no errors during the running of this test. Links to the various output files are provided: Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Cisco IOS Release 12.1(13)E13 461 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Results Table 124 Show-All Script via SSH Supervisor 12 Test Results Test Result Show-All Script via SSH Supervisor 12 Pass Show-All Script via SSH Supervisor 22 An automated script was used to test over 19,000 valid show and clear commands on a supervisor 22. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Procedure The procedure used to perform the parser Show-All Script via SSH Supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify DUT is configured with a hostname, domain name, and TACACS authentication on VTY lines. Step 5 Ensure the SSH server on each DUT is enabled by generating an RSA key pair. Configure the VTY lines to allow SSH, and verify that each DUT is accepting SSH connections. Note If in the following step you get the error message 'WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!' this means that this device has generated a different key than last time this test was performed. You will need to delete the line which contains the old key in the file ~/.ssh/known_hosts and connect again. Step 6 Begin executing show and clear commands on the devices under test. Step 7 Display the log for error messages. There were no errors during the running of this test. Links to the various output files are provided: Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 125 Show-All Script via SSH Supervisor 22 Test Results Test Result Show-All Script via SSH Supervisor 22 Pass Cisco IOS Release 12.1(13)E13 462 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Network Address Translation Two key problems facing the Internet are depletion of IP address space and scaling in routing. Network Address Translation (NAT) is a feature that allows the IP network of an organization to appear from the outside to use different IP address space than what it is actually using. Thus, NAT allows an organization with non globally routable addresses to connect to the Internet by translating those addresses into globally routable address space. NAT also allows a more graceful renumbering strategy for organizations that are changing service providers or voluntarily renumbering into classless interdomain routing (CIDR) blocks. NAT is also described in RFC 1631. The following tests were performed: • Static 2 Hosts, page 463 • Static 40 Hosts, page 464 • Static 40 Hosts Extended, page 465 • Static 2 Networks, page 466 • Static Inside Dynamic Outside, page 467 • Dynamic Inside Static Outside, page 468 • Addition/Removal of NAT Statements, page 469 • Static 40 Hosts Overnight, page 470 • Increment Inside Random Outside with Match-Host, page 471 Static 2 Hosts This test verified the basic functionality of the NAT feature on a supervisor 2 on MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static 2 Hosts test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next-hop routers, and monitor sessions for the inside and outside interfaces setup, but not active. Step 4 Clear statistics and counters, and begin transmitting unicast NAT traffic and multicast background traffic. While traffic is transmitting, turn monitoring on the inside interface, then the outside interface, and capture inbound and outbound packets on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Cisco IOS Release 12.1(13)E13 463 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 5 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status of NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. PASSED. Counted 2500000 packets during the test, and expected 2500000. Step 6 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 126 Static 2 Hosts Test Results Test Result Static 2 Hosts Pass Static 40 Hosts This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static 40 Hosts test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Cisco IOS Release 12.1(13)E13 464 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features From the NAT configuration in Step 4, we know that 10.2.2.X is the inside local and 10.50.50.X is the outside local address. These are the addresses expected as both source and destination on the inside interface. 100.100.100.X is the inside global and 10.2.2.X is the outside global address. These are the addresses expected as both source and destination on the outside interface. Step 6 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show the current status of NAT, the interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. PASSED. Counted 2500000 packets during the test, and expected 2500000. Step 7 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 8 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 127 Static 40 Hosts Test Results Test Result Static 40 Hosts Pass Static 40 Hosts Extended This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 10 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static 40 Hosts Extended test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, arp entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture inbound and outbound packets on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Cisco IOS Release 12.1(13)E13 465 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 4 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show the current status for NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. PASSED. Counted 20500000 packets during the test, and expected 20500000. Step 5 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 6 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 128 Static 40 Hosts Extended Test Results Test Result Static 40 Hosts Extended Pass Static 2 Networks This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static 2 Networks test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 4 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. Cisco IOS Release 12.1(13)E13 466 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 5 PASSED. Counted 2500000 packets during the test, and expected 2500000. Step 6 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 129 Static 2 Networks Test Results Test Result Static 2 Networks Pass Static Inside Dynamic Outside This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static Inside Dynamic Outside test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, arp entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 4 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. • Step 5 PASSED. Counted 2500000 packets during the test, and expected 2500000. Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Cisco IOS Release 12.1(13)E13 467 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 6 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 130 Static Inside Dynamic Outside Test Results Test Result Static Inside Dynamic Outside Pass Dynamic Inside Static Outside This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. The DUT for this test is SH1-97. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Test Procedure The procedure used to perform the Dynamic Inside Static Outside test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, arp entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 4 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. PASSED. Counted 2500000 packets during the test, and expected 2500000. Step 5 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 6 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 468 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 131 Dynamic Inside Static Outside Test Results Test Result Dynamic Inside Static Outside Pass Addition/Removal of NAT Statements This test measured the impact on the CPU from the removal and addition of NAT statements while those translations were in use. There are four NAT statements on switch SH1-97, translating four outside global addresses into four outside local addresses. Traffic is passed with source IP addresses of the four outside global addresses. As traffic is being passed, the NAT statements for those four particular translations are removed, and then readded, while the CPU was being monitored. Test Procedure The procedure used to perform the Addition/Removal of NAT Statements test follows: Step 1 Use the appropriate script to gather preliminary logging and version information. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, arp entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Begin sending unicast NAT traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 4 Remove each of the static NAT statements every 10 seconds and re-add them. Then remove all 4 NAT statements at once, and then re-add them. Finally remove the first two NAT statements 10 seconds apart, followed by removing the last two statements at once. Then re-add all four statements. Step 5 After NAT statements re-added, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 6 After traffic has completed, show current status of NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. Step 7 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 8 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 469 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 132 Addition/Removal of NAT Statements Test Results Test Result Addition/Removal of NAT Statements Pass Static 40 Hosts Overnight This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 400 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Procedure The procedure used to perform the Static 40 Hosts Overnight test follows: Step 1 Begin monitoring the DUT's CPU utilization and memory usage. Step 2 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, arp entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 3 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 4 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. Note Although the script reported the FAILED because it counted 804999999 packets during the test, but expected 805000000, this intermittent anomaly of losing 1 packet is being investigated but is not considered to be a failure of the test. Step 5 Stop the script that collects logging information and SNMP data from the devices in the SH1 network. Step 6 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 470 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 133 Static 40 Hosts Overnight Test Results Test Result Static 40 Hosts Overnight Pass Increment Inside Random Outside with Match-Host This test verified the basic functionality of the NAT feature on a sup2/msfc2. The device under test was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA sent 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA also sent a background multicast stream of 500,000 packets from the inside interface to the outside interface. Device under test: SH1-97 Test Procedure The procedure used to perform the Increment Inside Random Outside with Match-Host test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next-hop routers, and monitor sessions on inside and outside interfaces setup but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. While traffic is sending, turn monitoring on the inside interface, then the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify the packets from the inside interface have the inside local and outside local ip addresses, and the packets from the outside interface have the inside global and outside global ip addresses. Step 6 After traffic has completed, confirm that no packets were lost and stop SNMP data collection. Show current status NAT, interfaces, and buffers on the DUT. Confirm that the memory and CPU did not suffer severe or sustained impact during the test on the DUT. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Cisco IOS Release 12.1(13)E13 471 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • We expect all unicast packets to be translated correctly. • We expect all multicast packets to be forwarded correctly. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 134 Increment Inside Random Outside with Match-Host Test Results Test Result Increment Inside Random Outside with Match-Host Pass Network Time Protocol Network Time Protocol (NTP) synchronizes timekeeping among a set of distributed time servers and clients. This synchronization allows events to be correlated when system logs are created and other time-specific events occur. An NTP server must be accessible by the client switch. NTP runs over User Datagram Protocol (UDP), that runs over IP. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two machines to within a millisecond of one another. NTP testing verified basic functionality. It used a local Sun server (IP address: 172.18.177.132) as the NTP server. SH1-104 was configured as the NTP client. The following tests were performed: • Basic NTP Functionality—Supervisor 1, page 472 • Basic NTP Functionality—Supervisor 2, page 473 • NTP Failover—Supervisor 1 and Supervisor 2, page 474 Basic NTP Functionality—Supervisor 1 This test verified the basic functionality of NTP on the supervisor 1. It used a local Sun server (IP address: 172.18.177.132), and a local Cisco 6500 router running native as NTP servers. SH1-106 was configured as the NTP client. Device under test: SH1-106. Test Procedure The procedure used to perform the Basic NTP Functionality—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that there is one or more servers configured as the NTP server on the DUT. The servers 172.18.177.132 (preferred) and 172.18.177.131 are configured as the NTP server on SH1-106: Cisco IOS Release 12.1(13)E13 472 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 5 Verify that the association between the NTP server and the client is active. Both 172.18.177.131 and 172.18.177.132 are (~) configured as NTP servers on the DUT. Both the configured servers show the same stratum value (st=2), making them equally qualified. The server 172.18.177.132 is the (*) master, and is synced to the DUT, though, because it was configured to be preferred. 172.18.177.131 is shown as (+) selected, because it is qualified to be an NTP server: Step 6 Verify that the NTP status is "synchronized" and that the time and date shown on SH1-104 are the same as those shown on the server (NTP is working). The ntp status on SH1-106 shows that the NTP server and the DUT are synchronized: The times and dates from both the NTP server and the DUT match: Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the test device is synchronized to the configured NTP server and that the clocks on the device and the server are synchronized. Results Table 135 Basic NTP Functionality—Supervisor 1 Test Results Test Result Basic NTP Functionality—Supervisor 1 Pass Basic NTP Functionality—Supervisor 2 This test verified the basic functionality of NTP on the supervisor 2. It used a local Sun server (IP address: 172.18.177.132), and a local Cisco 6500 router running native as NTP servers. SH1-104 was configured as the NTP client. Device under test: SH1-104. Test Procedure The procedure used to perform the Basic NTP Functionality—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Verify that the supervisor is running the IOS version under test. Verify the uptime and that the box hasn't reloaded unnecessarily. Verify that there is not any process spiking the CPU when the test begins. Step 2 Display the log for error messages, and then clear it. Display the log buffer to verify that there are no erroneous log messages. Then clear the log to verify that error messages have not appeared during the test. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that there is one or more servers configured as the NTP server on the DUT. Cisco IOS Release 12.1(13)E13 473 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features The servers 172.18.177.132 (preferred) and 172.18.177.131 are configured as the NTP server on the DUT. Step 5 Verify that the association between the NTP server and the client is active. Both 172.18.177.131 and 172.18.177.132 are (~) configured as NTP servers on the DUT. Both the configured servers show the same stratum value (st=2), making them equally qualified. The server 172.18.177.132 is the (*) master, and is synced to the DUT, though, because it was configured to be preferred. 172.18.177.131 is shown as (+) selected, because it is qualified to be an NTP server: Step 6 Verify that the NTP status is "synchronized" and that the time and date shown on SH1-104 are the same as those shown on the server (NTP is working). The status shows that the NTP server and SH1-104 are synchronized: The times and dates from both the NTP server and the DUT match: Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the test device is synchronized to the configured NTP server and that the clocks on the device and the server are synchronized. Results Table 136 Basic NTP Functionality—Supervisor 2 Test Results Test Result Basic NTP Functionality—Supervisor 2 Pass NTP Failover—Supervisor 1 and Supervisor 2 Two NTP servers are configured on each device in the test network. This test verified the ability of the device to switch over to the backup NTP server if the primary server fails. Devices under test: SH1-106, and SH1-104. Test Procedure The procedure used to perform the NTP Failover—Supervisor 1 and Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that the servers with IP addresses 172.18.177.131 and 172.18.177.132 (preferred) are configured as the NTP servers on SH1-104 and SH1-106 and that 172.18.177.132 is synced to SH1-106 as the master. The two servers are configured on SH1-104. Cisco IOS Release 12.1(13)E13 474 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features On SH1-104, both servers are (~) configured. The server 172.18.177.131 is (+) selected, as it is a qualified NTP server. The server 172.18.177.132 is (*) master (synced). SH1-104 is synchronized to the reference server, 172.18.177.132. The two servers are configured on SH1-106: On SH1-106, both servers are (~) configured. The server 172.18.177.131 is (+) selected, as it is a qualified NTP server. The server 172.18.177.132 is (*) master (synced): SH1-106 is synchronized to the reference server, 172.18.177.132: Step 5 Note Step 6 On the server 172.18.177.132, stop the NTP daemon. You must have root authority. Verify that the server 172.18.177.131 is now the master server for each SH1-104 and SH1-106 and that NTP is functioning again. (This may take a long while, as the timeout interval is very lengthy.) On SH1-104, both servers are (~) configured. The server 172.18.177.131 is now (*) master (synced), while the server 172.18.177.132 is not even (+) selected: SH1-104 is synchronized to the new reference server, 172.18.177.131: On SH1-106, both servers are (~) configured. The server 172.18.177.131 is now (*) master (synced), while the server 172.18.177.132 is not even (+) selected: Note Synchronization required 2+ hours to complete on some devices. SH1-106 is synchronized to the new reference server, 172.18.177.131: Step 7 Start the NTP daemon on the server 172.18.177.132 again and verify that it once again becomes the active master server for SH1-104 and SH1-106. (Again, this may take a long while (e.g. 15 min), as the timeout interval is very lengthy.) Both SH1-104 and SH1-106 again have the original NTP status, with 172.18.177.132 as the NTP server-of-choice: Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that the test device is synchronized to the configured NTP server and that the clocks on the device and the server are synchronized. Results Table 137 NTP Failover—Supervisor 1 and Supervisor 2 Test Results Test Result NTP Failover—Supervisor 1 and Supervisor 2 Pass Cisco IOS Release 12.1(13)E13 475 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Syslog The system log (syslog) protocol provides a transport to allow a machine to send event notification messages across IP networks to event message collectors, that are also known as syslog servers. The following tests were performed: • Basic Syslog Functionality—Supervisor 1, page 476 • Basic Syslog Functionality—Supervisor 2, page 477 Basic Syslog Functionality—Supervisor 1 This test verified syslog functionality. Device under test: SH1-105. Test Procedure The procedure used to perform the Basic Syslog Functionality—Supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that syslog is configured on the DUT and that the designated server is 172.18.177.132. The DUT is configured to send logging messages to server 172.18.177.132. Step 5 Enable the terminal monitor command on the DUT and enable IP PIM debugging for a short time. Debug messages appeared on the terminal before debugging was turned off: Step 6 Display output from the syslog server. Compare it to messages received on the DUT. The syslog server logged the debug messages from SH1-105 (10.17.194.105): Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that each message logged to the VTY session should also be logged to the syslog server. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 138 Basic Syslog Functionality—Supervisor 1 Test Results Test Result Basic Syslog Functionality—Supervisor 1 Pass Cisco IOS Release 12.1(13)E13 476 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Basic Syslog Functionality—Supervisor 2 This test verified syslog functionality. Device under test: SH1-104. Test Procedure The procedure used to perform the Basic Syslog Functionality—Supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Verify that syslog is configured on SH1-104 and that the designated server is 172.18.177.132. SH1-104 is configured to send log messages to the logging server, 172.18.177.132. Step 5 Enable the terminal monitor command on SH1-104 and enable IP PIM debugging for a short time. SH1-104 logged PIM debug messages to the terminal session. Step 6 Display output from the syslog server. Compare it to messages received on SH1-104. The debug messages that were displayed in the terminal session on SH1-104 were logged to the syslog server and appear there. Step 7 Display the log for error messages. Step 8 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that each message logged to the VTY session should also be logged to the syslog server. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 139 Basic Syslog Functionality—Supervisor 2 Test Results Test Result Basic Syslog Functionality—Supervisor 2 Pass User Datagram Protocol Broadcast Flooding A broadcast is a data packet that is destined for multiple hosts. Broadcasts can occur at the data link layer and the network layer. Data-link broadcasts are sent to all hosts attached to a particular physical network. Network layer broadcasts are sent to all hosts attached to a particular logical network. TCP/IP supports the following types of broadcast packets: • All ones—By setting the broadcast address to all ones (255.255.255.255), all hosts on the network receive the broadcast. Cisco IOS Release 12.1(13)E13 477 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features • Network—By setting the broadcast address to a specific network number in the network portion of the IP address and setting all ones in the host portion of the broadcast address, all hosts on the specified network receive the broadcast. For example, when a broadcast packet is sent with the broadcast address of 131.108.255.255, all hosts on network number 131.108 receive the broadcast. • Subnet—By setting the broadcast address to a specific network number and a specific subnet number, all hosts on the specified subnet receive the broadcast. For example, when a broadcast packet is set with the broadcast address of 131.108.4.255, all hosts on subnet 4 of network 131.108 receive the broadcast. Because broadcasts are recognized by all hosts, a significant goal of router configuration is to control unnecessary proliferation of broadcast packets. Cisco routers support two kinds of broadcasts: directed and flooded. A directed broadcast is a packet sent to a specific network or series of networks, whereas a flooded broadcast is a packet sent to every network. In IP internetworks, most broadcasts take the form of UDP broadcasts. The following test was performed: • UDP Broadcast Flooding, page 478 UDP Broadcast Flooding There are several facets to this test. An IXIA broadcast stream is used for each aspect of the procedure. First, the broadcast stream is sent into the network at a single device. It is verified that this device forwards the broadcast out all physical interfaces. Next the device is configured to use an IP helper address, which will cause the IP destination portion of the header, originally a broadcast address, to be replaced by a unicast address, destined for the IP helper address. The IXIA streams that are configured have been done so with UDP port 53 (domain name system, DNS). The next part of the procedure tests the functionality of the no ip forward-protocol command, that is expected to halt the forwarding of any broadcasts using the protocol specified (in this case DNS). Device under test: SH1-101. Test Procedure The procedure used to perform the UDP Broadcast Flooding test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Step 4 Confirm that the ip helper-address command and the no ip forward-protocol commands are not yet configured on the device. Step 5 Begin the broadcast IXIA stream on Ix-16/8 (SH1-101 Fa9/6). The stream should have a length of 74 Bytes and be sent at a rate of 5,000 pps. The broadcast stream has a DMAC of FFFF.FFFF.FFFF and a DIP of 255.255.255.255. This stream will come in on VLAN 40 and should be broadcast out all interfaces carrying VLAN 40. Verify that it is. The broadcasts are coming in on fa9/6 and being forwarded out fa9/4 and Po10. Step 6 Configure an IP helper-address of 172.31.1.25 on the VLAN 40 interface of SH1-101. This IP address belongs to the remote side of portchannel 14, connecting to SH1-99. Step 7 Confirm that the traffic coming in is now being sent out Po14, as unicast traffic. The packets are now being forwarded out gi3/10 of Po14 as unicast packets: Cisco IOS Release 12.1(13)E13 478 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 8 Configure no ip forward-protocol udp domain globally on SH1-101. This will cause the router to stop forwarding any UDP traffic with an L4 port of 53 (DNS). Confirm that traffic stops being sent out Po14. The test packets are no longer being forwarded out gi3/10 of Po14. Allow IP forwarding of DNS packets again, and confirm that unicast traffic is being sent to the IP helper-address again. Again, the test packets are being forwarded out gi3/10 of Po14. Step 9 Remove the ip helper-address configuration from SH1-101 Step 10 Stop the IXIA traffic for about 2 minutes. Reconfigure the IXIA stream to send at a rate of 2500 pps, instead of the previous 5000 pps. The traffic was stopped at 4:07 pm Step 11 Send traffic for about two minutes, enough to get a measure of what halving the traffic rate does for helping CPU utilization. The traffic was started at 4:10 pm. The CPU utilization decreased. Step 12 Note Stop the IXIA traffic for a short period of time. Reconfigure the IXIA stream to send at a rate of 5000 pps, but with a packet size of 500 Bytes (was 74 Bytes previously). The traffic was started at 4:15 pm. The CPU utilization decreased. The packet size was already set to 500, so I changed it to 74. The CPU utilization decreased. Step 13 Send traffic for about two minutes, enough to get a measure of what increasing the packet size does for the CPU utilization. Step 14 Display the log for error messages. Step 15 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect that SH1-101 will forward all broadcast packets on the same VLAN (VLAN 40) on which they come in. • We expect packets to be forwarded to the IP helper-address as unicast packets when configured to do so. • We expect packets will not be forwarded when the DNS protocol is blocked, and should resume when the filter is lifted. • We expect no unacceptable impact on the CPU or memory of the DUT. Results Table 140 UDP Broadcast Flooding Test Results Test Result UDP Broadcast Flooding Pass Cisco IOS Release 12.1(13)E13 479 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features System Upgrade This test measured the basic ability of the code to boot correctly. The boot process was followed in each case from the console and screened for any errors. The output shows three separate sections, one for each supervisor and MSFC combination: supervisor 11, supervisor 12, and supervisor 22. This test verified that the Cisco IOS upgrade process worked correctly. The following tests were performed: • Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11, page 480 • Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12, page 481 • Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22, page 482 • Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11, page 483 • Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 12, page 483 • Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22, page 484 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11 This test verified that the Cisco IOS upgrade process worked correctly. This test measured the basic ability of the code to boot correctly on supervisor 11 for a Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-105 Test Procedure The procedure used to perform the Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11 test follows: Step 1 Record the start time of this test. Step 2 On Sup 11, verify that SH1-105 is running the old Native Cisco IOS image, 12.1(8b)E15. Step 3 Verify that the Sup11 image under test is on the proper file devices. Step 4 Verify that the MSFC1 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Note It should be noted that with the upgrade from 12.1(8b)E to 12.1(13)E, both supervisors need to be upgraded at the same time. The reason is that 12.1(13)E supports the RPR+ redundancy feature, while 12.1(8b)E supports only EHSA mode redundancy. The two are not compatible and the boot-up of whichever supervisor is upgrading to 12.1(13)E will suspend for that reason. Step 7 Verify that both supervisors come online successfully and that the new image is running. Cisco IOS Release 12.1(13)E13 480 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Expected Results • The Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade process should complete without error. Results Table 141 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11 Test Results Test Result Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 11 Pass Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 12 for a Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-107. Test Procedure The procedure used to perform the Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12 test follows: Step 1 Record the start time of this test. Step 2 On Sup 12, verify that SH1-107 is running the old Native Cisco IOS image, 12.1(8b)E15. Step 3 Verify that the Sup12 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Note It should be noted that with the upgrade from 12.1(8b)E to 12.1(13)E, both supervisors need to be upgraded at the same time. The reason is that 12.1(13)E supports the RPR+ redundancy feature, while 12.1(8b)E supports only EHSA mode redundancy. The two are not compatible and the boot-up of whichever supervisor is upgrading to 12.1(13)E will suspend for that reason. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade process should complete without error. Cisco IOS Release 12.1(13)E13 481 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Results Table 142 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12 Test Results Test Result Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 12 Pass Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 22 for a Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-109. Test Procedure The procedure used to perform the Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22 test follows: Step 1 Record the start time of this test. Step 2 On Sup 22, verify that SH1-109 is running the old Native Cisco IOS image, 12.1(8b)E15. Step 3 Verify that the Sup22 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Note It should be noted that with the upgrade from 12.1(8b)E to 12.1(13)E, both supervisors need to be upgraded at the same time. The reason is that 12.1(13)E supports the RPR+ redundancy feature, while 12.1(8b)E supports only EHSA mode redundancy. The two are not compatible and the boot-up of whichever supervisor is upgrading to 12.1(13)E will suspend for that reason. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E15 to 12.1(13)E13 upgrade process should complete without error. Cisco IOS Release 12.1(13)E13 482 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Results Table 143 Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22 Test Results Test Result Cisco IOS 12.1(8b)E15 to 12.1(13)E13 Upgrade—Supervisor 22 Pass Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 11 for a Cisco IOS 12.1(13)E6 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-105. Test Procedure The procedure used to perform the Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11 test follows: Step 1 Record the start time of this test. Step 2 On Sup 11, verify that SH1-105 is running the old Native Cisco IOS image, 12.1(13)E6. Step 3 Verify that the Sup11 image under test is on the proper file devices. Step 4 Verify that the MSFC1 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(13)E6 to 12.1(13)E13 upgrade process should complete without error. Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 12 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 12 for a Cisco IOS 112.1(13)E6 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-107. Test Procedure The procedure used to perform the Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 12 test follows: Cisco IOS Release 12.1(13)E13 483 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 1 Record the start time of this test. Step 2 On Sup 12, verify that SH1-107 is running the old Native Cisco IOS image, 12.1(13)E6. Step 3 Verify that the Sup12 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(13)E6 to 12.1(13)E13 upgrade process should complete without error. Results Table 144 Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11 Test Results Test Result Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 11 Pass Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 22 for a Cisco IOS 12.1(13)E6 to 12.1(13)E13 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-109. Test Procedure The procedure used to perform the Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22 test follows: Step 1 Record the start time of this test. Step 2 On Sup 22, verify that SH1-109 is running the old Native Cisco IOS image, 12.1(13)E6. Step 3 Verify that the Sup22 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Cisco IOS Release 12.1(13)E13 484 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(13)E6 to 12.1(13)E13 upgrade process should complete without error. Results Table 145 Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22 Test Results Test Result Cisco IOS 12.1(13)E6 to 12.1(13)E13 Upgrade—Supervisor 22 Pass Secure Shell Secure Shell (SSH) is an application and a protocol that provide a secure replacement to the Berkeley r-tools. The protocol secures the sessions using standard cryptographic mechanisms, and the application can be used similarly to the Berkeley rexec and RSH tools. Two versions of SSH are available: SSH Version 1 and SSH Version 2. Only SSH Version 1 is implemented in the Cisco IOS software. The SSH Server feature enables a SSH client to make a secure, encrypted connection to a Cisco router. This connection provides functionality that is similar to that of an inbound Telnet connection. Before SSH, security was limited to Telnet security. SSH allows a strong encryption to be used with the Cisco IOS software authentication. The SSH server in Cisco IOS software will work with publicly and commercially available SSH clients. The user authentication mechanisms supported for SSH are RADIUS, TACACS+, and the use of locally stored user names and passwords. The following test was performed: • SSH Server Vulnerability, page 485 SSH Server Vulnerability This test verified that the SSH server built into Cisco IOS crypto images is not susceptible to SSH malformed packet vulnerabilities as described at: • http://www.cisco.com/warp/public/707/ssh-packet-suite-vuln.shtml. The test protocol data units (PDUs) sent to the device were downloaded from: • http://www.rapid7.com/Product-Download.html. Test Procedure The procedure used to perform the SSH Server Vulnerability test follows: Step 1 Record the version, start time, and CPU utilization from DUT. Step 2 Display the log for error messages, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices under test. Cisco IOS Release 12.1(13)E13 485 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Step 4 Ensure SH1-110 is configured with a hostname, domain name, and TACACS authentication on VTY lines. Step 5 Ensure the SSH server on SH1-110 is enabled by generating an RSA key pair. Configure the VTY lines to allow SSH, and verify that SH1-110 is accepting SSH connections. Step 6 Send malformed SSH packets at SH1-110 while monitoring device. Ensure device does not hang, crash or reload. Step 7 Remove configuration added in this test case. The configuration was left on SH1-110 for this iteration of testing. Step 8 Display the log for error messages. Step 9 Verify that the memory and the CPU did not suffer from severe, sustained, or unacceptable impact. Expected Results • We expect SSH vulnerability testing will not cause the router to pause indefinitely, or reload. Results Table 146 SSH Server Vulnerability Test Results Test Result SSH Server Vulnerability Pass Cisco IOS Release 12.1(13)E13 486 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0402R)Copyright © 2003, Cisco Systems, Inc. All rights reserved. Cisco IOS Release 12.1(13)E13 487 Cisco IOS Safe Harbor Release 12.1(13)E13 for Financial Enterprise Customers Miscellaneous Features Cisco IOS Release 12.1(13)E13 488
© Copyright 2025 Paperzz