Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Version History Version Number Date Notes 1 06/07/2002 This document was created. 2 06/14/2002 The following section was changed: • 3 06/18/2002 The following section was changed: • 4 Enhanced Interior Gateway Routing Protocol— Redistribution Test 07/26/2002 Supervisor Failover Test—In the Test Plan, Step 1 now states reset the active supervisor. Minor editorial changes were made. Executive Summary Cisco IOS Safe Harbor is an initiative, the purpose of which is to provide the Global Financial Services customer with a stable Cisco IOS E version-of-choice. This is accomplished through the regression testing of functionality that is critical to the success of the financial services business. This document describes the Safe Harbor testing environment, the testing plans, expected test results, and a summary of the test results. Device configurations and actual test result logs are not part of this document. This document contains the following sections: • About Cisco IOS Safe Harbor, page 2 • Test Results Summary, page 11 • Feature Sets Testing, page 14 • Hardware Redundancy, page 14 • Layer 2 Features, page 16 • Hardware Forwarding Features, page 26 Cisco IOS Safe Harbor for Financial Enterprise Customers 1 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor • Layer 3 Routing Features, page 45 • Network Management Features, page 53 • Miscellaneous Features, page 55 • Supplementary Information, page 60 About Cisco IOS Safe Harbor The goal of Cisco IOS Safe Harbor is to provide improved network stability, reliability, and performance with respect to Cisco IOS software. Safe Harbor involves testing the feature sets and protocols in a particular Cisco IOS Release E image on certain platforms to provide high quality code for the financial services business. This combination of features, hardware, and image are tested in a laboratory environment that simulates the financial services business network environment. For information on the hardware tested and the network setup of the test environment, see the “Financial Lab Topology” section on page 2. The groups of feature sets that are tested include the following: hardware redundancy, Layer 2 features, hardware forwarding features, Layer 3 routing features, network management features, and several miscellaneous features. Regression tests are conducted to validate existing features and ensure that functionality is maintained. Negative tests are designed and conducted to stress the features and their interoperability. For information on each feature and its testing, see the “Feature Sets Testing” section on page 14. During the testing, the network is placed under loads that are consistent with those in a financial services network. A standard suite of tools (for example, Netcom’s Smartbits or IXIA’s packet generator) is used to generate network traffic. Network testing includes a combination of automated and manual tests. Simple Network Management Protocol (SNMP) is used to poll the network during the tests, and all tests are analyzed. For a summary of the test results, see the “Test Results Summary” section on page 11. Note Safe Harbor testing does not address any issues that might exist in the customer change control and operations processes. Financial Lab Topology Figure 1 shows the base financial lab topology. The financial services network environment configured in the lab includes the following hardware: • Fourteen Catalyst 6500 switches running Cisco Native IOS Release 12.1(8b)E11 (SH1-97 to SH1-110) • Two Catalyst 6500 switches that are running Hybrid CatOS 6.3(4) with no routing (Dist A-1 and Dist A-2) • Pagent test devices to simulate the ISPs and Area 3 and Area 4, injecting BGP, OSPF, and EIGRP routes • IXIA test devices to generate simulated customer traffic Cisco IOS Safe Harbor for Financial Enterprise Customers 2 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Figure 1 Base Topology SH1-101 Distribution block 1 Distribution block 2 Dist A-1 SH1-102 SH1-97 Distribution block 3 SH1-99 SH1-105 User block 1 Dist A-2 SH1-98 SH1-100 SH1-103 SH1-106 SH1-107 User block 2 Dist A-1 SH1-108 SH1-109 72711 SH1-104 User block 3 Dist A-2 SH1-110 The hardware configuration in the financial test lab includes a combination of distributed fabric, fabric-capable, and nonfabric modules. Note The Switch Fabric Module is supported only with the Supervisor Engine 2 in the Catalyst 6500 series switch. Cisco IOS Safe Harbor for Financial Enterprise Customers 3 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Basic Topology: Port Channel Deployment Figure 2 shows the port channel deployment for the Safe Harbor testing. Catalyst 6500 series switches running Native Cisco IOS support both Layer 2 (L2) and Layer 3 (L3) Etherchannels, with up to eight Ethernet interfaces on any module. All interfaces in each Etherchannel must be identically configured (the same speed, all L2 or L3, and so forth). Etherchannel load balancing can use either MAC addresses or IP addresses, and either source or destination or both source and destination addresses. The selected mode applies to all Etherchannels configured on the switch. Etherchannel is a trunking technology that groups together multiple full-duplex 802.3 Ethernet interfaces to provide fault-tolerant high-speed links between switches, routers, and servers. An Etherchannel interface (consisting of up to eight Ethernet interfaces) is treated as a single interface; this is called a port channel. The port channels configured for Safe Harbor testing are Gigabit Etherchannels (GECs). The following types of GEC port channels are configured and tested for Safe Harbor: • Layer 3 GEC distributed forwarding card (DFC) • Layer 3 GEC DFC and non-DFC mixed • Layer 3 GEC using fabric-capable modules, nonfabric modules, and combinations of both • Layer 2 GEC using fabric-capable modules, nonfabric modules, and combinations of both Cisco IOS Safe Harbor for Financial Enterprise Customers 4 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Port Channel Deployment SH1-101 L3 GEC DFC L3 GEC Mixed L3 GEC Non-DFC L2 GEC Distribution block 1 Distribution block 2 Dist A-1 SH1-102 SH1-97 Distribution block 3 SH1-99 SH1-105 User block 1 Dist A-2 SH1-98 SH1-100 SH1-106 SH1-103 SH1-107 User block 2 Dist A-1 SH1-104 SH1-108 SH1-109 User block 3 Dist A-2 SH1-110 72713 Figure 2 Cisco IOS Safe Harbor for Financial Enterprise Customers 5 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Basic Topology: Routing Protocols The following routing protocols are configured for Safe Harbor testing: • Border Gateway Protocol (BGP) – External Border Gateway Protocol (eBGP) – Interior Border Gateway Protocol (iBGP) • External Interior Gateway Routing Protocol (EIGRP) • Open Shortest Path First (OSPF) Figures 3, 4, and 5 show where each routing protocol is configured in the basic test lab topology. Figure 3 shows the eBGP and iBGP routing protocol deployment for the Safe Harbor testing. Figure 3 eBGP and iBGP Routing Protocol Deployment SH1-101 Distribution block 1 Dist A-1 Distribution block 2 eBGP iBGP SH1-102 SH1-97 Distribution block 3 SH1-99 ISP-A SH1-105 User block 1 Dist A-2 ISP-B SH1-98 SH1-106 SH1-100 SH1-103 eBGP SH1-107 User block 2 Dist A-1 SH1-108 SH1-104 SH1-109 User block 3 SH1-110 Cisco IOS Safe Harbor for Financial Enterprise Customers 6 72773 Dist A-2 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Figure 4 shows the EIGRP routing protocol deployment for Safe Harbor testing. Figure 4 EIGRP Routing Protocol Deployment EIGRP SH1-101 Distribution block 1 Dist A-1 Distribution block 2 SH1-102 Distribution block 3 SH1-97 SH1-99 SH1-105 User block 1 Dist A-2 SH1-106 SH1-100 SH1-103 SH1-107 User block 2 Dist A-1 SH1-108 SH1-104 SH1-109 User block 3 Dist A-2 SH1-110 72772 SH1-98 Cisco IOS Safe Harbor for Financial Enterprise Customers 7 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Figures 5, 6, and 7 show the OSPF routing protocol areas configured for Safe Harbor testing. Figure 5 shows OSPF routing protocol Area 0 for Safe Harbor testing. Figure 5 OSPF Routing Protocol Area 0 SH1-101 Distribution block 1 Dist A-1 Distribution block 2 OSPF Area 0 SH1-102 SH1-97 Distribution block 3 SH1-99 SH1-105 User block 1 Dist A-2 SH1-98 SH1-106 SH1-100 SH1-103 SH1-107 Area 3 User block 2 Area 4 Dist A-1 SH1-108 SH1-104 SH1-109 User block 3 SH1-110 Cisco IOS Safe Harbor for Financial Enterprise Customers 8 72774 Dist A-2 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Figure 6 shows OSPF routing protocol Areas 1 and 2. Figure 6 OSPF Routing Protocol Areas 1 and 2 SH1-101 Distribution block 1 Dist A-1 Distribution block 2 SH1-102 SH1-97 Distribution block 3 OSPF Area 2 SH1-99 SH1-105 User block 1 Dist A-2 SH1-98 SH1-106 SH1-100 SH1-103 SH1-107 Area 3 User block 2 Area 4 Dist A-1 SH1-108 SH1-104 SH1-109 User block 3 SH1-110 72775 Dist A-2 OSPF Area 1 Cisco IOS Safe Harbor for Financial Enterprise Customers 9 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 About Cisco IOS Safe Harbor Figure 7 shows OSPF routing protocol Areas 3 and 4. Figure 7 OSPF Routing Protocol Areas 3 and 4 SH1-101 Distribution block 1 Dist A-1 Distribution block 2 SH1-102 SH1-97 Distribution block 3 SH1-99 SH1-105 User block 1 Dist A-2 SH1-98 SH1-106 SH1-100 SH1-103 SH1-107 Area 3 User block 2 Area 4 Dist A-1 OSPF Area 3 SH1-108 OSPF Area 4 SH1-104 SH1-109 User block 3 SH1-110 Cisco IOS Safe Harbor for Financial Enterprise Customers 10 72776 Dist A-2 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Test Results Summary Test Results Summary Table 1 summarizes the results of all the testing that was completed as part of the Cisco IOS Safe Harbor initiative. Table 1 includes the following information—The feature/function tested, the section that describes the feature set to which the feature/function belongs, the results of the feature/function tests (pass/fail), the component tests for each feature/function, and any DDTS found during the Safe Harbor testing. Note Table 1 These test results are specific to the technologies covered and the actual test scenarios in which they were tested. Safe Harbor is designed to cover critical path areas and augment ongoing regression and systems testing. Safe Harbor Test Results Summary Feature/Function Feature Set Section Pass/Fail Border Gateway Protocol Layer 3 Routing Features, page 45 Pass Cisco Group Management Protocol/Internet Group Management Protocol Hardware Forwarding Features, page 26 Enhanced Interior Gateway Routing Protocol Layer 3 Routing Features, page 45 Pass Hardware Redundancy Hardware Redundancy, page 14 Pass Layer 3 Routing Features, page 45 Pass Hardware Forwarding Features, page 26 Pass Hot Standby Routing Protocol IP Unicast Pass Components Tests DDTS • Scale to Ten Neighbors in Core None Test • BGP Neighbor Flap Test • Route Redistribution Test • Basic IGMP/CGMP Functionality Test • IGMP Functionality Test on SUP1/MSFC2 • Summarization Test • Redistribution Test • Supervisor Failover Test • SFM Fabric Flap Test • Basic HSRP Test • HSRP Failover Test • Hardware Shortcut and GEC Load Balancing Test • CEF Distribution Test • Layer 2 GEC Failover Test • Layer 3 GEC Failover Test • ARP Test None None None None None Cisco IOS Safe Harbor for Financial Enterprise Customers 11 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Test Results Summary Table 1 Safe Harbor Test Results Summary (continued) Feature/Function Feature Set Section Pass/Fail IP Multicast Hardware Forwarding Features, page 26 Pass Components Tests DDTS • Basic Multicast and MSDP Test None • Core MSDP Test • Non-RPF Rate Limiting and Multicast Stub Test • GEC failover: Non-dCEF GEC Failover Test • GEC failover: Mixed GEC Failover Test • GEC failover: dCEF GEC Failover Test • SFM Failover Test • GE Module Failover Test • PIM-DR Failover Test • PIM-DR and MSDP Failover Test • Layer 3 Interface GEC Negative Test • Unicast and Multicast Test with 130K Injected IP Routes Network Time Protocol Miscellaneous Features, Pass page 55 • Basic NTP Functionality Test None Open Shortest Path First Layer 3 Routing Features, page 45 • Autocost Test None • Passive Interface Test • Filtering Test • Redistribution Test • OSPF Topology Database Test • Basic Layer 2 Channeling Configuration Test • Basic Layer 3 Channeling Configuration Test • Etherchannel Load Balance Test • Layer 3 Etherchannel Load Balance Tests (1, 2) • Gigabit Ethernet Module Reset Test Port Aggregation Protocol (Channeling) Layer 2 Features, page 16 Pass Pass None Simple Network Management Protocol Network Management Features, page 53 Pass • Basic Functionality Shut/No Shut Interface Test None Spanning Tree Protocol Layer 2 Features, page 16 Pass • Basic SPT Configuration Test None Cisco IOS Safe Harbor for Financial Enterprise Customers 12 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Test Results Summary Table 1 Safe Harbor Test Results Summary (continued) Feature/Function Feature Set Section Syslog Miscellaneous Features, Pass page 55 • Basic Syslog Functionality Test None System Upgrading Miscellaneous Features, Pass page 55 • Basic Procedure Test Terminal Access Controller Access Control System Network Management Features, page 53 Pass • Verify User Authentication Test None Trunking Layer 2 Features, page 16 Pass • Basic Trunking Test • Failure and Recovery Test Layer 2 Features, page 16 Pass • Basic UDLD Test on Layer 2 Link • Basic UDLD Test on Layer 3 Link Unidirectional Link Detection-Aggressive Mode Pass/Fail Components Tests DDTS None None CSCdv74001 User Data Protocol Broadcast Flooding Miscellaneous Features, Pass page 55 • UDP Broadcast Flooding Test None VLAN Trunking Protocol Layer 2 Features, page 16 • Basic VTP Configuration Test None Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 13 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Feature Sets Testing Feature Sets Testing Functionality critical to the global financial service business tested for the Cisco IOS Safe Harbor release includes the following: • Hardware Redundancy, page 14 • Layer 2 Features, page 16 • Hardware Forwarding Features, page 26 • Layer 3 Routing Features, page 45 • Network Management Features, page 53 • Miscellaneous Features, page 55 Hardware Redundancy Whenever a fault is encountered, the redundant module takes over the functions of the failed hardware module. Testing hardware redundancy for Safe Harbor involves performing various failover scenarios to verify internal hardware redundancy fails over as expected. Verifying hardware redundancy involves the following tests: • Supervisor Failover Test, page 14 • Switch Fabric Module Fabric Flap Test, page 15 Supervisor Failover Test The Supervisor Failover test verifies the proper operation of redundant supervisors during a series of continual resets. The test measures time, but the test is not necessarily a measure of the speed at which failover can take place because this is dependent on configuration and line cards in the system. The time is a measure of the delta from when the reset is issued to the time all line cards come back online and are ready and able to forward traffic. Test Plan Perform the following steps: Step 1 Reset the active supervisor six times (three times per module). Step 2 Record the time measured from the reset to the time required for all line cards to come back online. Step 3 Compare the supervisor failover times to design guidelines for the particular hardware and software. Expected Results We expect that failure operations are within the design guidelines for the given hardware and software versions under test with no configuration or functionality loss. Cisco IOS Safe Harbor for Financial Enterprise Customers 14 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Redundancy Results Table 2 shows the Supervisor Failover test results. Table 2 Supervisor Failover Test Results Component Pass/Fail Supervisor Failover Test Pass Switch Fabric Module Fabric Flap Test The Switch Fabric Module (SFM) Fabric Flap test involves resetting the active SFM in the system. This test verifies that SFM failover operates as designed. Test Plan Perform the following steps: Step 1 Flap the active SFM (forcing the redundant SFM to become active) continuously for several hours. Step 2 Verify that failover operations are within the design guidelines for the particular hardware and software versions under test. Step 3 Verify memory allocation and CPU usage during the test. Expected Results We expect that failover operations are within the design guidelines for the hardware and software versions being tested. Results Table 3 shows the Switch Fabric Module Fabric Flap test results. Table 3 Switch Fabric Module Fabric Flap Test Results Component Pass/Fail Switch Fabric Module Fabric Flap Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 15 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Layer 2 Features Layer 2 feature testing for Safe Harbor involves these features: • VLAN Trunking Protocol, page 16 • Spanning Tree Protocol, page 17 • Unidirectional Link Detection-Aggressive Mode, page 18 • Trunking, page 21 • Port Aggregation Protocol (Channeling), page 23 VLAN Trunking Protocol VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can result in a number of problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations. You can use VTP to manage VLANs 1 to 1005 in your network. (Note that VTP does not support VLANs 1025 to 4094.) With VTP, you can make configuration changes centrally on one switch and have those changes automatically communicated to all other switches in the network. Test Plan VTP testing for Safe Harbor includes the Basic VLAN Trunking Protocol Configuration Test. Basic VLAN Trunking Protocol Configuration Test Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Configure all switches for VTP transparent mode. Step 3 Configure trunks between SH1-107 and Dist A-1. Step 4 Analyze the following commands on SH1-107: SH1-107# show vtp status SH1-107# show interface port-id trunk SH1-107# show spanning-tree vlan vlan-number brief Step 5 Analyze the following commands on Dist A-1: Dist A-1 (enable) show vtp domain Dist A-1 (enable) show trunk Dist A-1 (enable) show spantree vlan-number Dist A-1 (enable) show cdp neighbors Step 6 Configure SH1-107 for VTP mode server and add VLAN 200 to the VLAN database on SH1-107. Repeat Steps 4 and 5, confirming that VLAN 200 is not added to the database on Dist A-1. Cisco IOS Safe Harbor for Financial Enterprise Customers 16 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Step 7 With SH1-107 in VTP server mode and Dist A-1 in VTP transparent mode, add VLAN 201 to the VLAN database of Dist A-1. Repeat Steps 4 and 5, confirming that VLAN 201 was not added to the VLAN database on SH1-107. Step 8 Configure Dist A-1 for VTP mode client and add VLAN 202 to the VLAN database on SH1-107. Repeat Steps 4 and 5, confirming that VLAN 202 is not added to the database on Dist A-1. Step 9 With SH1-107 in VTP server mode and Dist A-1 in VTP client mode, add VLAN 203 to VLAN database on Dist A-1. Repeat Steps 4 and 5, confirming that VLAN 203 is not added to the VLAN database of Dist A-1. Step 10 Configure Dist A-1 for VTP server mode and add VLAN 204 to the VLAN database of SH1-107. Repeat Steps 4 and 5, confirming that VLAN 204 was successfully added to the VLAN database of Dist A-1. Step 11 Configure both SH1-107 and Dist A-1 for VTP transparent mode and remove VLANs 200 to 204 from the VLAN databases of each. Expected Results We expect that VTP functions correctly. Results Table 4 shows the VLAN Trunking Protocol test results. Table 4 VLAN Trunking Protocol Test Results Component Test Pass/Fail Basic VLAN Trunking Protocol Configuration Test Pass Spanning Tree Protocol Spanning Tree Protocol (STP) algorithms provide path redundancy by defining a tree that spans all the switches in an extended network and forces certain redundant data paths into a standby (blocked) state. At regular intervals, the switches in the network send and receive spanning tree packets that they use to identify the path to the root. If one network segment becomes unreachable, or if spanning tree costs change, the spanning tree algorithm reconfigures the spanning tree topology and reestablishes the link by activating the blocked path. Test Plan STP testing for Safe Harbor includes the Basic Spanning Tree Protocol Configuration Test. Cisco IOS Safe Harbor for Financial Enterprise Customers 17 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Basic Spanning Tree Protocol Configuration Test Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1-109 is running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-2 is running Hybrid CatOS 6.3(4). • Trunks are configured between SH1-109 and Dist A-2. Step 2 Verify timers. Step 3 Verify convergence. Step 4 Verify CPU load. Step 5 Confirm that the spanning tree properly converges. Note The spanning tree algorithm is not used in many customer networks; therefore, testing on spanning tree is limited. Expected Results Spanning-tree recalculation occurs in an expected time frame. This value depends on the parameters of the spanning-tree domain. Results Table 5 shows the Spanning Tree Protocol test results. Table 5 Spanning Tree Protocol Test Results Component Test Pass/Fail Basic Spanning Tree Protocol Configuration Test Pass Unidirectional Link Detection-Aggressive Mode The Unidirectional Link Detection (UDLD) protocol allows devices connected through fiber-optic or copper Ethernet cables (for example, Category 5 cabling) to monitor the physical status of the cables and detect when a unidirectional link exists. When a unidirectional link is detected, UDLD shuts down the affected port and alerts the user. Unidirectional links can cause a variety of problems, including spanning-tree topology loops and erroneous Layer 3 routing. In a bidirectional relationship, the UDLD-AM (aggressive mode) protocol disables the port at the end of a link-up sequence if no reply is received. However, UDLD goes into an undetermined state. Cisco IOS Safe Harbor for Financial Enterprise Customers 18 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Note The lowest value of a UDLD-AM message interval can be only 7 seconds, and the holddown time can be 21 seconds. By default, the HSRP hello timer is 3 seconds and holddown timer is 10 seconds. If the link becomes unidirectional before the UDLD-AM can shut down the port, the HSRP will flap. After UDLD-AM shuts down the unidirectional port, the HSRP stays up and remains stable. By default, the EIGRP hello timer is 5 seconds and holddown timer is 15 seconds. When the link becomes unidirectional before the UDLD-AM can shut down the port, the EIGRP neighbor will flap. After UDLD-AM shuts down the unidirectional port, the EIGRP neighbor stays up and remains stable. Note If we enabled UDLD mode or UDLD-AM globally on SH1 switches, the interface shows the UDLD message interval is 7 seconds, which is actually the running message interval. Once the UDLD neighbor is established, the message interval changes to 15 seconds. Test Plan Perform the following steps: Step 1 Verify that UDLD detects link failure and shuts down the port. Step 2 Verify that the port can pass traffic after port reset. Step 3 Cause link over-subscription. Step 4 Enable QoS and reverify previous procedures. Step 5 Execute failure and recovery scenarios. . The following tests are part of the UDLD testing for Safe Harbor: • Basic UDLD Test on Layer 2 Link, page 19 • Basic UDLD Test on Layer 3 Link, page 20 Basic UDLD Test on Layer 2 Link Test Plan For UDLD testing on the Layer 2 link, perform the following steps: Step 1 Configure UDLD-AM globally and on the interface. Step 2 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-2 is running Hybrid CatOS 6.3(4). • Trunks/channels with UDLD-AM are enabled on the GEC ports between SH1 switches and Dist A-2. Cisco IOS Safe Harbor for Financial Enterprise Customers 19 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Step 3 Set up the GEC nonnegotiation ports so that if the RX or TX fiber is pulled out, the remote-side Gigabit Ethernet interface still stays up/up, which simulates the unidirectional link. Step 4 Establish UDLD neighbors. Step 5 Pull one of the fibers on Dist A-2 port 1/1. Step 6 Reconnect the fibers on Dist A-2 port 1/1. Step 7 Enter the reset udld command to reset all interfaces shut down by UDLD. Basic UDLD Test on Layer 3 Link Test Plan For UDLD testing on the Layer 3 link, perform the following steps: Step 1 Configure UDLD-AM globally and on the appropriate interfaces. Globally, set UDLD message time to 7. Step 2 Verify the following switch and router configurations: • SH1-104 and SH1-109 switches are running Native Cisco IOS Release 12.1(8b)E11. • Trunks/channels with UDLD-AM are enabled on the GEC ports between these two switches. Step 3 Set up the GEC nonnegotiation ports so that if the RX or TX fiber is pulled out, the remote-side Gigabit Ethernet interface still stays up/up, which simulates the unidirectional link. Step 4 Establish UDLD neighbors. Step 5 Pull one of the fibers on SH1-109 Gigabit port 3/5. Step 6 Reconnect the fiber on SH1-109 Gigabit port 3/5. Step 7 Enter the reset udld command to reset all interfaces shut down by UDLD. Expected Results We expect that UDLD-AM will detect a unidirectional Layer 2 or Layer 3 link, shut down the affected port, and alert the user. We also expect that the link is reestablished when physical connectivity is restored and UDLD-disabled ports are reset. Cisco IOS Safe Harbor for Financial Enterprise Customers 20 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Results Table 6 shows UDLD-AM test results. Table 6 Note UDLD-AM Test Results Component Test Pass/Fail Basic UDLD Test on Layer 2 Link Pass Basic UDLD Test on Layer 3 Link Pass A DDTS was found during UDLD testing. Refer to Table 1 for the DDTS number. Trunking A trunk is a point-to-point link between one or more switch ports and another networking device such as a router or a switch. Trunks carry the traffic of multiple VLANs over a single link and allow VLANs to be extended across an entire network. Table 7 lists and describes the five modes of trunking on Cisco switches. Table 7 Trunking Modes on Cisco Switches Mode Description On Local interface trunks and also sends Dynamic Trunking Protocol (DTP) packets. Puts the port into permanent trunking mode and negotiates to convert the link to a trunk link. The port becomes a trunk port even if the neighboring port does not agree to the change. Off Local interface does not trunk. Puts the port into nontrunking mode and negotiates to convert the link into a nontrunk link. The port becomes a nontrunk port even if the neighboring port does not agree to the change. Auto Local interface trunks if it receives DTP packets. Enables the port to convert the link to a trunk link. The port becomes a trunk port if the neighboring port is set to on or desirable mode. This is the default mode for Fast and Gigabit Ethernet ports. Desirable Local interface sends DTP packets. Makes the port actively attempt to convert the link to a trunk line. The port becomes a trunk port if the neighboring port is set to on, desirable, or auto mode. Nonnegotiate Local interface forms a trunk and does not send DTP packets. Puts the port into permanent trunking mode, but prevents the port from generating DTP frames. You must configure the neighboring port normally as a trunk port to establish a trunk link. Test Plan Perform the following steps: Step 1 Add and prune VLANs. Step 2 Verify proper interoperation of various modes: on, off, auto, desirable, and nonnegotiate. Cisco IOS Safe Harbor for Financial Enterprise Customers 21 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Step 3 Test Spanning Tree. Step 4 Create misconfigurations. Step 5 Verify proper operation of counters. Step 6 Ensure that traffic can pass. Step 7 Execute failure and recovery scenarios. The following tests are part of the Trunking Tests for Safe Harbor: • Basic Trunking Tests, page 22 • Failure and Recovery Tests, page 22 Basic Trunking Tests Test Plan For basic trunking tests, perform the following steps: Step 1 Verify the following switch and router configuration: • SH1-107 and SH1-108 are running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-1 is running Hybrid CatOS 6.3(4). Step 2 Configure static trunking between SH1-107 and Dist A-1. Step 3 Configure dynamic trunking between SH1-108 and Dist A-1. Step 4 Analyze output from the show interface interface trunk command on SH1-107, SH1-108 and the show trunk command on Dist A-1. Failure and Recovery Tests Test Plan For failure and recovery tests, perform the following steps: Step 1 Verify the following switch and router configurations: • SH1-107 and SH1-108 are running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-1 is running Hybrid CatOS 6.3(4). Step 2 Configure static trunking between SH1-107 and Dist A-1. Step 3 Configure dynamic trunking between SH1-108 and Dist A-1. Step 4 Establish a trunk. Step 5 Fail the link. Step 6 Reconnect the link. Cisco IOS Safe Harbor for Financial Enterprise Customers 22 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Expected Results We expect trunking to work properly and perform correctly in the failure and recovery scenarios. Results Table 8 shows the Trunking test results. Table 8 Trunking Test Results Component Test Pass/Fail Basic Trunking Tests Pass Failure and Recovery Tests Pass Port Aggregation Protocol (Channeling) The Port Aggregation Protocol (PAgP) facilitates the automatic creation of Etherchannels by exchanging packets between Ethernet ports. PAgP packets are exchanged only between ports in auto and desirable modes. Ports configured in on or off mode do not exchange PAgP packets. The protocol learns the capabilities of port groups dynamically and informs the other ports. Once PAgP identifies correctly matched Etherchannel links, it groups the ports into an Etherchannel. The Etherchannel is then added to the spanning tree as a single bridge port. Etherchannel includes four user-configurable modes: on, off, auto, and desirable. Only auto and desirable are PAgP modes. The auto and desirable modes can be modified with the silent and non-silent keywords. By default, ports are in auto silent mode. An Etherchannel distributes frames across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. Etherchannel frame distribution is based on a Cisco proprietary hashing algorithm. The algorithm is deterministic; given the same addresses and session information, you always hash to the same port in the channel, preventing out-of-order packet delivery. Test Plan Perform the following steps: Step 1 Verify proper load distribution. Step 2 Verify unicast. Step 3 Verify multicast. Step 4 Perform failure scenarios. Step 5 Verify Layer 3 and Layer 2 channels. Step 6 Split Layer 3 channel across multiple cards (both dCEF and non-dCEF). Cisco IOS Safe Harbor for Financial Enterprise Customers 23 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features The following tests are part of the PAgP (channeling) testing for Safe Harbor: • Basic Layer 2 Channeling Configuration Test, page 24 • Basic Layer 3 Channeling Configuration Test, page 24 • Etherchannel Load Balance Test, page 25 • Layer 3 Etherchannel Load Balance Tests (1, 2), page 25 • Gigabit Ethernet Module Reset Test, page 26 Basic Layer 2 Channeling Configuration Test Test Plan To check the Layer 2 channeling functionality, perform the following steps: Step 1 Verify the following switch and router configurations: • SH1-109 and SH1-110 are running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-2 is running Hybrid CatOS 6.3(4). Step 2 Configure static channeling between SH1-109 and Dist A-1. Step 3 Configure dynamic channeling between SH1-110 and Dist A-1. Step 4 Analyze the output from the following commands: SH1-109# show interfaces port etherchannel SH1-110# show interfaces port etherchannel SH1-110# show interface port-channel channel-number etherchannel Dist A-1 (enable) show port channel Basic Layer 3 Channeling Configuration Test Test Plan To check Layer 3 port channeling functionality with different combinations of dCEF and non-dCEF ports, perform the following steps: Step 1 Verify that all SH1 switches are running Native Cisco IOS Release 12.1(8b)E11. Step 2 Configure all channels between SH1-103, SH1-104, SH1-109, SH1-110 switches as Layer 3 channels. Step 3 Analyze the show interface port-channel channel-number etherchannel command output from the following: a. Channels with both dCEF and non-dCEF (mixed) ports. b. Channels with only dCEF ports. c. Channels with only non-dCEF ports. Cisco IOS Safe Harbor for Financial Enterprise Customers 24 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 2 Features Etherchannel Load Balance Test Test Plan To verify Layer 2 and Layer 3 Etherchannel load distribution, perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Set up Layer 2 and Layer 3 Etherchannels. Step 3 Use IXIA to send 20 traffic flows from Dist A-1 to Dist A-2, sourcing from 20 IP addresses to one destination IP address. The traffic path is: Dist A-1(trunk/L2-GEC)—>SH1-108 (L3-GEC)—>SH1-104 (L3-GEC) —>SH1-110(trunk/L2-GEC—>Dist A-2 Step 4 Analyze output from test etherchannel commands on the supervisor (SP). Layer 3 Etherchannel Load Balance Tests (1, 2) These tests verify Layer 3 Gigabit Etherchannel (GEC) load distribution and hash algorithm. Test Plan 1 Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Use IXIA to send 20 traffic flows from Dist A-2 to Dist A-1, sourcing from 20 IP addresses and to 20 destination IP addresses. Source and destination IP addresses increment concurrently. The traffic path is: Dist A-2 (trunk/L2_GEC)—>SH1-109 (4-port GEC) SH1-103—>Dist A-1 Step 3 Analyze output from test etherchannel commands on the SP. Test Plan 2 Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Use IXIA to send traffic flows from Dist A-2 to Dist A-1, sourcing from 20 IP addresses and to 20 destination IP addresses. Source and destination IP addresses increment concurrently. The traffic path is: Dist A-2—>L2 4-port GEC—>SH1-110 (L3 4 port-GEC) SH1-103—>Dist A-1 Step 3 Analyze output from test etherchannel commands on the SP. Cisco IOS Safe Harbor for Financial Enterprise Customers 25 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Gigabit Ethernet Module Reset Test Test Plan To check the Port Aggregation Protocol functionality during reset of a Gigabit Ethernet module, perform the following steps: Step 1 Verify that SH1 switches under test are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 On SH1-110, reset module 3, which includes Layer 3 GEC ports. Verify port channel status and EIGRP neighbor status. SH1-110(config)# hw-module module 3 reset SH1-110# show interface port-channel channel-number etherchannel Step 3 On Dist A-2, reset module 4, which includes Layer 2 GEC ports. Verify port channel status and SH1-109 and SH1-110 HSRP status. Dist A-2 (enable) reset 4 SH1-110# show standby vlan vlan-number Expected Results We expect that Etherchannels transmit and distribute frames across Layer 2 and Layer 3 links properly. We expect that the GEC and GEC ports work properly if the GE module gets reset. Results Table 9 shows the Port Aggregation Protocol (channeling) test results. Table 9 Port Aggregation Protocol (Channeling) Test Results Component Test Pass/Fail Basic Layer 2 Channeling Configuration Test Pass Basic Layer 3 Channeling Configuration Test Pass Etherchannel Load Balance Test Pass Layer 3 Etherchannel Load Balance Tests (1, 2) Pass Gigabit Ethernet Module Reset Test Pass Hardware Forwarding Features Hardware forwarding testing for Safe Harbor involves these features: • IP Unicast, page 27 • IP Multicast, page 31 • Cisco Group Management Protocol/Internet Group Management Protocol, page 43 Cisco IOS Safe Harbor for Financial Enterprise Customers 26 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features IP Unicast The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. IP handles addressing, fragmentation, reassembly, and protocol demultiplexing. It is the foundation on which all other IP protocols (collectively referred to as the IP Protocol suite) are built. A network-layer protocol, IP contains addressing and control information that allows data packets to be routed. The Transmission Control Protocol (TCP) is built upon the IP layer. TCP is a connection-oriented protocol that specifies the format of data and acknowledgments used in the transfer of data. TCP also specifies the procedures that the networking devices use to ensure that the data arrives correctly. TCP allows multiple applications on a system to communicate concurrently because it handles all demultiplexing of the incoming traffic among the application programs. Test Plan IP Unicast tests verify the following: • Hardware shortcuts • RPF rate-limiting • TCP/UDP forwarding • RFC testing Safe Harbor testing includes the following hardware forwarding tests: • Hardware Shortcut and Gigabit Etherchannel Load Balancing Test, page 27 • Cisco Express Forwarding Distribution Test, page 28 • Layer 2 Gigabit Etherchannel Failover Test, page 29 • Layer 3 Gigabit Etherchannel Failover Test, page 30 • Address Resolution Protocol Test, page 30 Hardware Shortcut and Gigabit Etherchannel Load Balancing Test This test verifies IP unicast basic functionality and hardware shortcuts. Test Plan Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Use IXIA to send 20 traffic flows from Dist A-1 to Dist A-2, sourcing from 20 IP addresses to one destination IP address. The traffic path is: Dist A-1(trunk/L2-GEC)—>SH1-108 (L3-GEC)—>SH1-104 (L3-GEC) —>SH1-110(trunk/L2-GEC—>Dist A-2 Step 3 Verify the creation of hardware shortcuts on SH1-108: SH1-108# show mls ip Cisco IOS Safe Harbor for Financial Enterprise Customers 27 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 4 Display output from the following command for each Gigabit Ethernet link to verify that GEC distributed the traffic to each link: SH1-108# show interface gi-port-id | include packets output Display output for GEC port and compare it with output of the four Gigabit Ethernet links: SH1-108# show interface port gec-port-id | include packets output Step 5 Verify the creation of hardware shortcuts for every flow on the non-dCEF module (SH1-104): SH1-104# show mls ip statistics Step 6 Display output from the following command for each Gigabit Ethernet link in the non-dCEF module to verify that GEC distributed the traffic to each link: SH1-104# show interface gi-port-id | include packets output Display output for GEC port and compare it with output of the four Gigabit Ethernet links: SH1-108# show interface port gec-port-id | include packets output Step 7 Verify the creation of hardware shortcuts for every flow on the dCEF module inband (SH1-110): SH1-110-dfcx# show mls ip Step 8 Display output from the following command for each Gigabit Ethernet link in the dCEF module to verify that GEC distributed the traffic to each link: SH1-110# show interface gi-port-id | include packets output Display output for GEC port and compare it with output of the four Gigabit Ethernet links: SH1-108# show interface port gec-port-id | include packets output Expected Results We expect to verify that unicast flows are propagated correctly and that hardware shortcuts are created. Cisco Express Forwarding Distribution Test This test verifies IP unicast hardware shortcut and Cisco Express Forwarding (CEF) distribution functionality. Test Plan Perform the following steps: Step 1 Step 2 Verify the following router and switch configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • SH1-107 and SH1-108 contain the following: Supervisor Engine 1 and MultiLayer Switch Fabric Card 2. • SH1-103, SH1-104, SH1-109, and SH1-110 contain the following: Supervisor Engine 2 and MultiLayer Switch Fabric Card 2. Use IXIA to send 20 traffic flows from Dist A-1 to Dist A-2, sourcing from 20 IP addresses to one destination IP address. The traffic chooses SH1-108 as the first step because SH1-108 is set as the primary router for that HSRP group. Cisco IOS Safe Harbor for Financial Enterprise Customers 28 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 3 Analyze output from the following commands: a. On SH1-103, SH1-104, and SH1-108, enter the following show command for each source and destination address: SH1-108# show ip cef exact-route 172.31.10.112 172.31.20.15 Where: 172.31.10.112 is the source IP address and 172.31.20.15 is the destination IP address. b. On SH1-108, SH1-103, SH1-104, SH1-109, and SH1-110, enter the following commands: SH1-108# show mls ip SH1-108# show interface counters Step 4 Use IXIA to send 100 traffic flows from Dist A-2 to Dist A-1, sourcing from 100 IP addresses to 100 destination IP addresses. The traffic chooses SH1-109 as the first step because SH1-109 is set as the primary router for that HSRP group. Step 5 Analyze output from the following command on SH1-103, SH1-104, and SH1-108: SH1-103# show interface counters | include Po Expected Results We expect that all traffic is forwarded correctly, that it is using the correct path, without drops, and that all counters display accurate packet counts. Layer 2 Gigabit Etherchannel Failover Test This test verifies Layer 2 link failover time by using IP unicast traffic. Test Plan Perform the following steps: Step 1 Verify that SH1 switches under test are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Use IXIA to send 20 traffic flows from Dist A-1 to Dist A-2, sourcing from 20 IP addresses to one destination IP address. The traffic chooses SH1-108 as the first step because SH1-108 is set as the primary router for that HSRP group. Step 3 Fail one link between Dist A-1 and SH1-108, forcing all traffic to go through another link. Step 4 Fail the second link between Dist A-1 and SH1-108, so that HSRP failover forces all traffic to go to SH1-107. Step 5 View the log files for SH1-107 and SH1-108 when both links of the trunk failed. Expected Results We expect Layer 2 failover to function within the limits specified for the hardware device. Cisco IOS Safe Harbor for Financial Enterprise Customers 29 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Layer 3 Gigabit Etherchannel Failover Test This test verifies Layer 3 link failover time by using IP unicast traffic. Test Plan Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Use IXIA to send 20 traffic flows traffic from Dist A-1 to Dist A-2, sourcing from 20 IP addresses to one destination IP address. The traffic chooses SH1-108 as the first step because SH1-108 is set as the primary router for that HSRP group. Step 3 Fail two links of the 4-port non-dCEF GEC between SH1-108 and SH1-103, forcing some traffic to go through two other links. Step 4 Fail the other two links of the GEC between SH1-108 and SH1-103, forcing all traffic to go to SH1-104. Step 5 Bring up all four links, so the traffic moves back to SH1-103. Step 6 View the log files for SH1-108 and SH1-103. Expected Results We expect Layer 3 failover to function within the limits specified for the hardware device. Address Resolution Protocol Test This test verifies Address Resolution Protocol (ARP) functionality when a Catalyst 6500 series switch running Native Cisco IOS connects to an access switch through a 4-port Gigabit Etherchannel (GEC). Test Plan Perform the following steps: Step 1 Verify the following switch configurations: • SH1-108 and SH1-110 switches are running Native Cisco IOS Version 12.1(8b)E11. • Access switch Dist A-1 and Dist A-2 are running Hybrid CatOS 6.3(4). Step 2 Connect IXIA 8/2 and 10/2 to Dist A-1 and Dist A-2. Step 3 Verify that SH1-108 has a 4-port Layer 2 GEC to Dist A-1: a. Verify GEC ports on SH1-108: SH1-108# show interface port-channel channel-number etherchannel b. Verify that the GEC connects SH1-108 with Dist A-1: SH1-108# show cdp neighbors c. Verify that the device can be pinged, entries exist, and ARP functions properly: SH1-108# ping 172.31.16.82 SH1-108# show ip route 172.31.16.0 SH1-108# show ip arp 172.31.16.82 Cisco IOS Safe Harbor for Financial Enterprise Customers 30 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 4 Verify that SH1-110 has a 4-port Layer 2 GEC to Dist A-2: a. Verify GEC ports on SH1-110: SH1-110# show interface port-channel channel-number etherchannel b. Verify that the GEC connects SH1-110 with Dist A-2: SH1-110# show cdp neighbors c. Verify that the device can be pinged, entries exist, and ARP functions properly: SH1-110# ping 172.31.26.102 SH1-110# show ip route 172.31.26.0 SH1-110# show ip arp 172.31.26.102 Expected Results We expect that ARP functions correctly when a Catalyst 6500 series switch running Native Cisco IOS connects to an access switch through a 4-port Gigabit Etherchannel (GEC). Results Table 10 shows the IP Unicast test results. Table 10 IP Unicast Test Results Component Test Pass/Fail Hardware Shortcut and Gigabit Etherchannel Load Balancing Test Pass Cisco Express Forwarding Distribution Test Pass Layer 2 Gigabit Etherchannel Failover Test Pass Layer 3 Gigabit Etherchannel Failover TEst Pass Address Resolution Protocol Test Pass IP Multicast Traditional IP communication allows a host to send packets to a single host (unicast transmission) or to all hosts (broadcast transmission). IP multicast provides a third scheme, allowing a host to send packets to a subset of all hosts (group transmission). These hosts are known as group members. Packets delivered to group members are identified by a single multicast group address. Multicast packets are delivered to a group using best-effort reliability, just like IP unicast packets. The multicast environment consists of senders and receivers. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. Cisco IOS Safe Harbor for Financial Enterprise Customers 31 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features A multicast address is chosen for the receivers in a multicast group. Senders use that address as the destination address of a datagram to reach all members of the group. Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on the location or number of members in a multicast group. A host can be a member of more than one multicast group at a time. Note On PFC1, the (*,G) can only be software switched. If the ip pim spt-threshold infinity command is used on PFC1, there might be high CPU usage and multicast packets might be lost under heavy traffic. Test Plan The following tests compose the IP multicast suite of tests: • Basic Multicast and Multicast Source Discovery Protocol Test, page 32 • Core Multicast Source Discovery Protocol Test, page 33 • Non-Reverse Path Forwarding Rate Limiting and Multicast Stub Test, page 33 • Gigabit Etherchannel Failover: Non-dCEF GEC Failover Test, page 34 • Gigabit Etherchannel Failover: Mixed GEC Failover Test, page 35 • Gigabit Etherchannel Failover: dCEF GEC Failover Test, page 36 • Switch Fabric Module Failover Test, page 37 • Gigabit Ethernet Module Failover Test, page 37 • Protocol Independent Module-Designated Router Failover Test, page 38 • Protocol Independent Module-Designated Router and Multicast Source Discovery Protocol Failover Test, page 39 • Layer 3 Interface Multicast Negative Test, page 40 • Unicast and Multicast Test with 130K Injected IP Routes, page 41 Basic Multicast and Multicast Source Discovery Protocol Test This test verifies multicast and Multicast Source Discovery Protocol (MSDP) basic functionality, including the hardware shortcut. These hardware shortcuts allow the router to forward multicast traffic in millions of packets per second instead of thousands of packets per seconds. Test Plan Perform the following steps: Step 1 Step 2 Verify the following switch configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Distribution routers SH1-107 and SH1-108 are running MSDP Anycast for multicast group 239.255.129.x. Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Cisco IOS Safe Harbor for Financial Enterprise Customers 32 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 3 Use IXIA to send multicast traffic for groups 239.255.129.100 to 239.255.129.104 on SH1-108, VLAN 15. Step 4 Verify that multicast traffic is received by these ports: Dist A-1 VLAN 16, Dist A-1 VLAN 11, and on the SH1-108 L3 port. Expected Results We expect the traffic sent by IXIA to be received by all three ports, with all traffic hardware switched and no impact on CPU. Core Multicast Source Discovery Protocol Test This test verifies multicast and Multicast Source Discovery Protocol (MSDP) basic functionality, including a hardware shortcut. Test Plan Perform the following steps: Step 1 Verify the following switch configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Configure interface Loopback 1 on SH1-103 with ip ospf cost 10, so that SH1-104 is chosen as preferred RP. Step 4 Use IXIA to send traffic for multicast groups 239.255.127.100 to 239.255.127.104 on Dist A-2 VLAN 11. Step 5 Verify that multicast traffic is received on these ports: Dist A-1 VLAN 11 and Dist A-2 VLAN 16. Expected Results We expect the traffic sent by IXIA to be received by all ports, with all traffic HW switched and no impact on CPU. We expect SH1-103 (the MSDP rendezvous point (RP)) to receive the multicast source address (SA) message and SH1-104 to receive the SA cache message and build a cache entry. Non-Reverse Path Forwarding Rate Limiting and Multicast Stub Test This test verifies multicast stub, non-Reverse Path Forwarding (RPF) rate-limiting functionality on Policy Feature Cards (PFC1 and PFC2), and dCEF, including a hardware shortcut. Cisco IOS Safe Harbor for Financial Enterprise Customers 33 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. • Non-Designated Router (DR) routers are configured with the mls ip multicast stub command on all VLANs. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Use IXIA to send multicast traffic to multicast groups 239.255.129.100 to 239.255.129.104 on SH1-108 VLAN 15 and groups 239.255.127.100 to 104 on Dist A-2 VLAN 11. Step 4 Execute the show fm feature command on non-DRs (SH1-107, SH1-109) to ensure that ACL is programmed to block non-RPF traffic. Expected Results We expect all ports to receive the traffic sent by IXIA, with all traffic HW switched and no impact on CPU. We expect that the Policy Feature Cards (PFCs) are programmed correctly and they are not passing non-RPF traffic to the MultiLayer Switch Feature Card (MSFC) CPU. Gigabit Etherchannel Failover: Non-dCEF GEC Failover Test This test verifies multicast and Multicast Source Discovery Protocol (MSDP) functionality during a non-distributed Cisco Express Forwarding (dCEF) Gigabit Etherchannel (GEC) failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-103 as the primary Protocol Independent Multicast rendezvous point (PIM-RP) by using the ip ospf cost 10 command on the loopback 1 interface of SH1-104. Step 4 Set SH1-108 and SH1-109 as the Protocol Independent Multicast designated routers (PIM-DRs) on their respective segments. Step 5 Use IXIA to send multicast traffic to multicast groups 239.255.127.100 to 239.255.127.104 on SH1-108 VLAN 15. The receiving port is on Dist A-2 VLAN 16. Cisco IOS Safe Harbor for Financial Enterprise Customers 34 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 6 Use the test etherchannel load-balance interface port-channel 69 ip command on the supervisor (SP, not RP) to confirm that each link of the GEC passes some multicast flow. a. Fail two links of the 4-port GEC between SH1-103 and SH1-108, forcing some multicast traffic to move to two other links. Verify the multicast frame loss. b. Bring up the two links failed in Step 6a. Verify the multicast frame loss. c. Fail all four links of the GEC between SH1-103 and SH1-108, forcing multicast traffic to go through SH1-107 to get to SH1-103. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is redirected through SH1-107. d. Bring up the four links between SH1-107 and SH1-103. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is once again sent through SH1-108. Expected Results We expect all traffic to be routed and received correctly with an acceptable amount of loss. Gigabit Etherchannel Failover: Mixed GEC Failover Test This test verifies multicast and MSDP functionality during a dCEF and non-dCEF GEC failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-103 as the primary PIM-RP by configuring ip ospf cost 10 on interface loopback 1 of SH1-104. Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 Use IXIA to send multicast traffic to multicast groups 239.255.127.100 to 239.255.127.104 on Dist A-2 VLAN 11. The receiving port is IXIA 8/2 connected to Dist A-1 VLAN 16. Step 6 Use the test etherchannel load-balance interface port-channel 71 ip command on the supervisor (SP) to confirm that each link of the GEC passes some multicast flows. a. Fail links g3/1 and g4/1 (on SH1-110) of the 4-port GEC between SH1-103 and SH1-110, forcing some multicast traffic to move to the other two links. Verify the multicast frame loss. b. Bring up the two links that were failed in Step 6a. Verify the multicast frame loss. c. Fail links g3/1 and g7/1 (on SH1-110) of the 4-port GEC between SH1-103 and SH1-110, forcing some multicast traffic to move to the other two links. Verify the multicast frame loss. Cisco IOS Safe Harbor for Financial Enterprise Customers 35 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features d. Bring up the two links that were failed in Step 6c. Verify the multicast frame loss. e. Fail all four links (g3/1, g4/1, g7/1, and g8/1 of SH1-110) of the GEC between SH1-103 and SH1-110, forcing the multicast traffic to go through router SH1-109 to get to SH1-103. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is successfully redirected through SH1-109. f. Bring up the four links between SH1-110 and SH1-103. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is once again being sent via SH1-110. Expected Results We expect all traffic to be received and routed correctly and links to fail over correctly. We expect an acceptable quantity of traffic loss. Gigabit Etherchannel Failover: dCEF GEC Failover Test This test verifies multicast and MSDP functionality during a dCEF GEC failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-104 as the primary PIM-RP by configuring ip ospf cost 10 on interface loopback 1 of SH1-103. Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 Use IXIA to send multicast traffic to groups 239.255.127.100 to 239.255.127.104 on Dist A-2 VLAN 11. The receiving port is IXIA 8/2 connected to Dist A-1 VLAN 16. Step 6 Use the test etherchannel load-balance interface port-channel 171 ip command on the supervisor (SP) to confirm that each link of the GEC has some multicast flows. a. Fail two links on the same module of the 4-port GEC between SH1-104 and SH1-110, forcing some multicast traffic to move to the other two links. Verify the multicast frame loss. b. Bring up the two links that were failed in Step 6a. Verify the multicast frame loss. c. Fail all four links of the GEC between SH1-104 and SH1-110, forcing the multicast traffic to go through router SH1-109 to get to SH1-104. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is successfully redirected through SH1-109. d. Bring up the four links between SH1-109 and SH1-104. Verify the multicast frame loss. Use the show ip mroute and test etherchannel load-balance commands to confirm that traffic is once again sent through SH1-110. Cisco IOS Safe Harbor for Financial Enterprise Customers 36 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Expected Results We expect all traffic to be received and rerouted correctly and the links to fail over correctly. We expect an acceptable quantity of traffic loss. Switch Fabric Module Failover Test This test verifies multicast and Multicast Source Discovery Protocol (MSDP) functionality during Switch Fabric Module (SFM) failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-103 as the primary PIM-RP by configuring ip ospf cost 10 on the interface loopback 1 of SH1-104. Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 Use IXIA to send multicast traffic to groups 239.255.127.100 to 239.255.127.104 on Dist A-2 VLAN 11. The receiving port is IXIA 8/1 connected to Dist A-1 VLAN 16. Step 6 On SH1-110, do the following: a. Power down the legacy module(s). Verify that multicast traffic passes through correctly. b. Fail over the active SFM. Verify that multicast traffic passes through correctly. c. Power up the legacy module. Verify that multicast traffic passes through correctly. d. Fail over the active SFM. Verify that multicast traffic passes through correctly. e. Repeat Step 6d. Expected Results We expect all traffic to be received and SFM to fail over correctly with an acceptable level of traffic loss. Gigabit Ethernet Module Failover Test This test verifies multicast and Multicast Source Discovery Protocol (MSDP) functionality during Gigabit Ethernet (GE) module failover. Cisco IOS Safe Harbor for Financial Enterprise Customers 37 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-104 as the primary PIM-RP by configuring ip ospf cost 10 on interface loopback 1 of SH1-103. Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 (Test 1) Use IXIA to send multicast traffic to groups 239.255.129.100 to 239.255.129.104 on SH1-108 VLAN 15. The receiving ports are on Dist A-2 VLAN 16, and on SH1-110 VLAN 16 and an L3 port. Then, perform the following steps and verify multicast traffic: Step 6 a. Reset SH1-110 GE module 7. Verify that multicast traffic passes through correctly. b. Reset SH1-110 GE module 8. Verify that multicast traffic passes through correctly. c. Reset SH1-110 GE module 3. Verify that multicast traffic passes through correctly. d. Reset SH1-110 GE module 4. Verify that multicast traffic passes through correctly. e. Reset SH1-108 GE module 3. Verify that multicast traffic passes through correctly. f. Reset SH1-108 GE module 4. Verify that multicast traffic passes through correctly. (Test 2) Use IXIA to send multicast traffic to groups 239.255.129.100 to 239.255.129.104 on Dist A-2 VLAN 11. The receiving ports are on Dist A-1 VLAN 11. On SH1-110, do the following: a. Reset GE module 7. Verify that multicast traffic passes through correctly. b. Reset GE module 8. Verify that multicast traffic passes through correctly. Expected Results All traffic should be received, rerouted, and fails over correctly with an acceptable loss of traffic. Protocol Independent Module-Designated Router Failover Test This test verifies multicast and Internet Group Management Protocol (IGMP) query functionality during designated router (DR) failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-103 as the primary PIM-RP by configuring ip ospf cost 10 on interface loopback 1 of SH1-104. Cisco IOS Safe Harbor for Financial Enterprise Customers 38 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 Use IXIA to send multicast traffic to groups 239.255.127.100 to 239.255.127.104 on SH1-108 VLAN 15. The receiving ports are on Dist A-2 VLAN 16 and VLAN 11. Step 6 (Test 1) Fail SH1-110, so that SH1-109 acts as the DR. Step 7 a. Verify that the multicast DR fails over correctly and that the traffic is routed correctly. b. Verify that the IGMP query and reply are correct and that no problems are found with the multicast data stream. (Test 2) Bring up SH1-110, so SH1-110 becomes the DR. a. Verify the outgoing interface (OIF) on the DR and non-DR by using the show ip mroute command. b. Verify that hardware switching is correct. Expected Results The designated router (DR) should transition during failover and restore correctly. Traffic should be correctly forwarded with an acceptable amount of loss. Protocol Independent Module-Designated Router and Multicast Source Discovery Protocol Failover Test This test verifies multicast Protocol Independent Module (PIM) and Multicast Source Discovery Protocol (MSDP) functionality during PIM-designated router (DR) or MSDP PIM-rendezvous point (RP) failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • Core routers SH1-103 and SH1-104 are running MSDP Anycast for multicast group 239.255.127.x. Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Set SH1-103 as the primary PIM-RP by configuring ip ospf cost 10 on interface loopback 1 of SH1-104. Step 4 Ensure that SH1-108 and SH1-110 are the PIM-DR on their respective segments. Step 5 Use IXIA to send multicast traffic to groups 239.255.127.100 to 239.255.127.104 on SH1-108 VLAN 15. The receiving ports are on Dist A-2 VLAN 16 and SH1-110 VLAN 16. Step 6 (Test 1) Fail SH1-110, so that SH1-109 becomes the DR. Verify that the multicast DR fails over correctly and that the traffic is rerouted correctly. Step 7 (Test 2) Shut down SH1-103 loopback 1, so that SH1-104 becomes the PIM-RP. Step 8 a. Verify the outgoing interface (OIF) on the DR by using the show ip mroute command. b. Verify that the hardware switching is correct. (Test 3) Bring up SH1-103 loopback 1, so that SH1-103 becomes PIM-RP. a. Verify the OIF on the DR by using the show ip mroute command. b. Verify that the hardware switching is correct. Cisco IOS Safe Harbor for Financial Enterprise Customers 39 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 9 Step 10 (Test 4) Shut down the link between SH1-103 and SH1-109, so that SH1-104 becomes the PIM-RP. a. Verify the OIF on DR by using the show ip mroute command. b. Verify that the hardware switching is correct. (Test 5) Bring up link between SH1-103 and SH1-109, so that SH1-103 becomes the PIM-RP. a. Verify the OIF on DR by using the show ip mroute command. b. Verify that the hardware switching is correct. Expected Results We expect the PIM-RP and PIM-DR to switch over when the primary fails, and the PIM-DR and PIM-RP to be restored when each comes back online. We expect an acceptable amount of traffic loss. Layer 3 Interface Multicast Negative Test This test introduces faults into the topology and verifies that multicast functionality remains consistent with functional specifications on Layer 3 ports. We introduce online insertion and removal (OIR) of line cards, resetting individual line cards, reloading the switch, and Supervisor Engine/Switch Fabric Module failover. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1-110 has a Layer 3 Gigabit Ethernet port that is plugged into an IXIA port. • Each IXIA port is configured to simulate multicast receivers for five groups, as well as sending multicast traffic to the five groups configured through an opposite port. • All interfaces are running in PIM sparse-mode (PIM-SM). Step 2 Set the ip pim spt-threshold infinity command on SH1-107 and SH1-108 (Engine Supervisor 1 and MultiLayer Switch Feature Set 2) to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 3 Configure SH1-103 as the RP for the groups by configuring ip ospf 10 on interface loopback 1 of SH1-104. Step 4 Verify that the IXIA port connected to SH1-110 is receiving traffic destined for multicast groups 239.255.129.100 to 239.255.129.104 and is transmitting to multicast groups 239.255.127.100 to 239.255.127.104. Step 5 Verify that the IXIA port connected to SH1-108 is configured exactly the opposite, that it is receiving traffic destined for multicast groups 239.255.127.100 to 239.255.127.104 and transmitting to multicast groups 239.255.129.100 to 239.255.129.104. Step 6 Use the show ip igmp groups, show ip mroute summary, and show interface g4/16 commands to verify correct traffic flow. Step 7 Reload SH1-110 and repeat Step 6. Step 8 Perform OIR on the active supervisor on SH1-110. Repeat Step 6. Step 9 Reset module 4 on SH1-110. Repeat Step 6. Cisco IOS Safe Harbor for Financial Enterprise Customers 40 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 10 Perform OIR on module 4 on SH1-110. Repeat Step 6. Step 11 Fail over the active SFM on SH1-110. Repeat Step 6. Step 12 Cycle interface g4/16 (shut/no shut) on SH1-110. Repeat Step 6. Expected Results We expect all traffic to be forwarded correctly, despite the faults, with an acceptable amount of traffic loss. Unicast and Multicast Test with 130K Injected IP Routes This test verifies that the switch functions correctly when both unicast and multicast traffic are added with 100K BGP, 20K OSPF, and 10K EIGRP routes injected into the network. Test Plan Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Verify that the following are running Multicast Source Discovery Protocol (MSDP) Anycast for the multicast group specified: • SH1-99 and SH1-100—Multicast group 239.255.126.x. • SH1-103 and SH1-104—Multicast group 239.255.127.x. • SH1-107 and SH1-108—Multicast group 239.255.129.x. Step 3 Verify that SH1-102, SH1-106, SH1-108, and SH1-110 are PIM-DR on their respective VLAN segments. Step 4 Send unicast traffic, as follows: Step 5 a. Send 18K packets per second (pps) 64 bytes of unicast traffic from IXIA port 4/2 (V42 in EIGRP 100) to and from IXIA port 5/2 (V41 in OSPF Area 2). b. Send 1000 pps 64 bytes of unicast traffic from IXIA port 11/1 (L3 port on SH1-110) to 130 and 140 networks, generated by Pagent through OSPF Area 3 and Area 4. Send multicast traffic, as follows: a. Use IXIA port 11/2 (L3 port on SH1-101 in EIGRP 100) to send 15K pps 64 bytes of multicast traffic to group 239.255.126.100. The receivers are: IXIA port 4/1 (V41 in EIGRP 100) and IXIA port 5/1 (V40 in OSPF Area 2). b. Use IXIA port 5/1 (V40 in OSPF Area 2) to send 15K pps 64 bytes of multicast traffic to group 239.255.126.101. The receivers are: IXIA port 4/1 (V41 in EIGRP 100) and IXIA port 5/2 (V41 in OSPF Area 2). Cisco IOS Safe Harbor for Financial Enterprise Customers 41 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 6 Step 7 Generate IP routes, as follows: a. Use Pagent 2 to generate 50K BGP routes in AS10. b. Use Pagent 3 to generate 50K BGP routes in AS20. c. Use Pagent 2 to generate 10K OSPF routes in Area 3. d. Use Pagent 2 to generate 10K OSPF routes in Area 4. e. Use Pagent 1 to generate 10K EIGRP routes. Use an SNMP tool to do constant SNMP walks on all routers, one by one. Expected Results We expect all unicast and multicast traffic to be received on each port, that IP routes are propagated correctly to the networks, and that CPU utilization does not increase appreciably on each router. Results Table 11 shows the IP Multicast test results. Table 11 IP Multicast Test Results Test Title Pass/Fail Basic Multicast and Multicast Source Discovery Protocol Test Pass Core Multicast Source Discovery Protocol Test Pass Non-RFF Rate Limiting and Multicast Stub Test Pass Gigabit Etherchannel Failover: Non-dCEF GEC Failover Test Pass Gigabit Etherchannel Failover: Mixed GEC Failover Test Pass Gigabit Etherchannel Failover: dCEF GEC Failover Test Pass Switch Fabric Module Failover Test Pass Gigabit Ethernet Module Failover Test Pass Protocol Independent Module-Designated Router Failover Test Pass Protocol Independent Module-Designated Router and Multicast Source Discovery Protocol Failover Test Pass Layer 3 Interface Multicast Negative Test Pass Unicast and Multicast Test with 130K Injected IP Routes Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 42 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Cisco Group Management Protocol/Internet Group Management Protocol Internet Group Management Protocol (IGMP) software components run on both the Cisco router and the switch. An IGMP-capable IP multicast router sees all IGMP packets and can inform the switch when specific hosts join or leave IP multicast groups. When the IGMP-capable router receives an IGMP control packet, it creates an IGMP packet that contains the request type (either join or leave), the multicast group address, and the MAC address of the host. The router sends the packet to a well-known address to which all switches listen. When a switch receives the packet, the supervisor engine interprets the packet and modifies the forwarding table automatically. Cisco Group Management Protocol (CGMP) should seamlessly integrate with IGMP and perform the same function. Test Plan Hardware forwarding IGMP/CGMP testing for Safe Harbor involves the following: • Basic IGMP/CGMP Functionality Test, page 43 • IGMP Functionality Test on SUP1/MSFC2, page 44 Basic IGMP/CGMP Functionality Test This test verifies IGMP/CGMP basic functionality, including the IGMP/CGMP status and verifies that no multicast traffic is flooded into ports which do not have a multicast client. Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • SH1-107 and SH1-108 are running Multicast Source Discovery Protocol (MSDP) Anycast. Step 2 Use IXIA to send multicast traffic on Dist A-1 VLAN 10. One port on VLAN 15 joins the multicast group. Step 3 On Dist A-1, analyze output from the following commands to view IGMP status: Dist A-1 (enable) show multicast router Dist A-1 (enable) show multicast group Dist A-1 (enable) show igmp statistics 10 Dist A-1 (enable) show igmp statistics 15 Step 4 On SH1-107 (standby-rp), analyze the following commands: SH1-107# show ip mroute SH1-107# show mls ip multicast Cisco IOS Safe Harbor for Financial Enterprise Customers 43 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Hardware Forwarding Features Step 5 On SH1-108 (PIM-RP), analyze the following commands: SH1-108# show ip mroute SH1-108# show mls ip multicast Expected Results We expect that IGMP and CGMP function properly and that ports that do not belong to the multicast group do not receive multicast traffic. IGMP Functionality Test on SUP1/MSFC2 This test verifies IGMP functionality on Supervisor Engine 1/MultiLayer Switch Feature Card 2 (MSFC2). Test Plan Perform the following steps: Step 1 Verify the following switch and router configurations: • SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). • SH1-107 and SH1-108 are running Multicast Source Discovery Protocol (MSDP) Anycast. Step 2 Use IXIA connected to SH1-108 to send multicast traffic. The receivers are on SH1-108 switch port Gi4/8, and Dist A-1 VLAN 15. Step 3 Verify that port Gi4/8 on SH1-108 receives multicast traffic: SH1-108# show ip mroute SH1-108# show mls ip multicast Expected Results We expect IGMP to function correctly with a Catalyst 6000 series router with Supervisor Engine 1 and MSFC2 cards. Results Table 12 shows the IGMP/CGMP test results. Table 12 IGMP/CGMP Test Results Component Test Pass/Fail Basic IGMP/CGMP Functionality Test Pass IGMP Functionality on SUP1/MSFC2 Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 44 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Layer 3 Routing Features Layer 3 routing feature testing for Safe Harbor involves these features: • Open Shortest Path First, page 45 • Border Gateway Protocol, page 48 • Hot Standby Routing Protocol, page 50 • Enhanced Interior Gateway Routing Protocol, page 51 Open Shortest Path First Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) developed by the OSPF working group of the Internet Engineering Task Force (IETF). Designed expressly for IP networks, OSPF supports IP subnetting and tagging of externally derived routing information. OSPF also allows packet authentication and uses IP multicast when sending and receiving packets. Test Plan Layer 3 OSPF routing feature tests include the following: • Autocost Test, page 45 • Passive Interface Test, page 46 • Filtering Test, page 46 • Redistribution Test, page 47 • OSPF Topology Database Test, page 47 Autocost Test This test verifies that the auto-cost reference-bandwidth command functions correctly. Test Plan Perform the following steps: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(8b)E11 and is in OSPF routing process ID 1. Step 2 View output from SH1-101 before executing the auto-cost reference-bandwidth command: SH1-101# show ip ospf interface po4 SH1-101# show ip ospf interface fa8/8 Step 3 Execute the auto-cost reference-bandwidth command on SH1-101, and view the output from the show ip ospf interface commands again. Expected Results We expect that the auto-cost reference-bandwidth command correctly adjusts the default opsp default cost for an interface as its value is changed. Cisco IOS Safe Harbor for Financial Enterprise Customers 45 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Passive Interface Test This test verifies that the passive-interface command functions correctly. Test Plan Perform the following steps: Step 1 Verify that SH1-100 and SH1-106 are running Native Cisco IOS Version 12.1(8b)E11, and that both are in OSPF routing process ID 1. Step 2 Verify the neighbor relationship. Step 3 View neighbor output from SH1-99 and SH1-101 before adding the passive-interface port-channel # command. Step 4 Configure a passive interface on the port-channel between SH1-100 and SH1-106. Step 5 View output from show ip ospf neighbor command on SH1-99 and SH1-101 again. Step 6 Remove the passive-interface command and view output from the show ip ospf neighbor command again. Expected Results We expect the passive-interface command to function correctly. Filtering Test Test Plan Perform the following steps: Step 1 Verify that SH1-97 and SH1-106 are running Native Cisco IOS Release 12.1(8b)E11 and is in OSPF routing process ID 1. Step 2 View output from the following show commands on SH1-97 and SH1-106: SH1-106# show ip route 172.31.1.96 SH1-106# show ip ospf neighbor SH1-97# show ip ospf SH1-97# show ip ospf neighbor Step 3 Filter the 172.31.1.96 route using the distribute-list command with an access list. Step 4 View output from the show ip route commands to show that 172.31.1.96 is no longer in the routing table. Step 5 Remove the distribute-list command. Step 6 Analyze the traffic by entering a show debug command. Step 7 View output from the show ip route commands after removing the distribute-list command. Expected Results We expect OSPF filtering using an access list to function properly. Cisco IOS Safe Harbor for Financial Enterprise Customers 46 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Redistribution Test This test verifies that redistribution of EIGRP into OSPF functions properly. Test Plan Perform the following steps: Step 1 Verify that SH1-100 and SH1-101 are running Native Cisco IOS Release 12.1(8b)E11 and are in OSPF routing process ID 1. Step 2 View output from the routing table of SH1-101 prior to redistribution. Step 3 View output from the EIGRP routing table of SH1-100. Step 4 Redistribute EIGRP routes into OSPF 1 using the redistribute eigrp 1320 subnets command. Step 5 View output from the routing table of SH1-101 after redistribution. Expected Results We expect that EIGRP routes are redistributed into OSPF properly. OSPF Topology Database Test This test verifies that the OSPF Topology database functions correctly. Test Plan Perform the following steps: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(8b)E11 and is in OSPF routing process ID 1. Step 2 Analyze the output from SH1-101 showing the OSPF database using the show ip ospf database command. Expected Results We expect that the OSPF Topology database functions properly. Results Table 13 shows the Open Shortest Path First test results. Table 13 Open Shortest Path First Test Results Component Test Pass/Fail Autocost Test Pass Passive Interface Test Pass Filtering Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 47 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Table 13 Open Shortest Path First Test Results (continued) Component Test Pass/Fail Redistribution Test Pass OSPF Topology Database Test Pass Border Gateway Protocol Border Gateway Protocol (BGP) is an exterior gateway protocol designed to exchange network reachability information with other BGP systems in other autonomous systems. BGP exchanges routing information in the form of routing updates. An update includes a network number, a list of autonomous systems through which the routing information has passed (the AS path), and a list of other path attributes. Test Plan Layer 3 BGP routing feature tests include the following: • Scale to Ten BGP Neighbors in Core Test, page 48 • BGP Neighbor Flap Test, page 48 • Route Redistribution Test, page 49 Scale to Ten BGP Neighbors in Core Test This test ensures that no memory leaks or CPU load occurs with 10 BGP neighbors in the core and a total of 100K BGP routes, 20K OSPF routes, and 10K EIGRP routes. Test Plan Perform the following steps: Step 1 Using Pagent, IXIA and the 4 core switches (SH1-97, SH1-98, SH1-99, and SH1-100), inject 130K routes —100K BGP, 20K OSPF, and 10K EIGRP routes. Step 2 Monitor CPU and memory. Expected Results We expect no memory or CPU issues. BGP Neighbor Flap Test This test verifies that a flapping non-dampened BGP peer does not cause any memory leaks or prolonged high CPU utilization, and that the device under test (DUT) functions properly after the peer stops flapping. Cisco IOS Safe Harbor for Financial Enterprise Customers 48 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Test Plan Perform the following steps: Step 1 Verify that SH1-97 is running Native Cisco IOS Release 12.1(8b)E11 and is an eBGP peer with a Pagent router. The Pagent router is sending 1000 route updates from AS 10. Step 2 Flap the Pagent router up and down every 15 to 30 seconds. Step 3 Check memory and CPU utilization before and after running the flapping test for 8 hours. Expected Results Memory and CPU results before and after should match. Route Redistribution Test This test verifies that the BGP route redistribution function works correctly. Test Plan Perform the following steps: Step 1 Configure redistribution in BGP for OSPF. Step 2 Configure redistribution in BGP for EIGRP. Step 3 Configure redistribution in BGP for both OSPF and EIGRP. Expected Results We expect routes from OSPF and EIGRP to be redistributed and propagated. Results Table 14 shows Border Gateway Protocol test results. Table 14 Border Gateway Protocol Test Results Component Test Pass/Fail Scale to Ten BGP Neighbors in Core Test Pass BGP Neighbor Flap Test Pass Route Redistribution Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 49 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Hot Standby Routing Protocol For IP, the Hot Standby Routing Protocol (HSRP) allows one router to automatically assume the default gateway function for the hosts on a subnet if another router fails. HSRP is particularly useful when the users on one subnet require continuous access to resources in the network. Test Plan The HSRP testing for Safe Harbor includes the following: • Basic HSRP Test, page 50 • HSRP Failover Test, page 50 Basic HSRP Test This test verifies basic HSRP functionality. Test Plan Perform the following steps: Step 1 Verify the following configurations: • SH1-109 and SH1-110 are running Native Cisco IOS Release 12.1(8b)E11. • Access switch Dist A-2 is running Hybrid CatOS 6.3(4). Step 2 Verify that trunking is configured between SH1-109, SH1-110, and Dist A-2. Step 3 Verify that SH1-109 and SH1-110 are running multiple HSRP groups on VLAN 10 through VLAN 20. Expected Results We expect HSRP to show the correct active and standby addresses, that all states are correct on both switches, and all traffic is forwarded correctly. HSRP Failover Test This test verifies HSRP failover when a link is down. This test also verifies that the HSRP preempt command takes over when the link returns to an up/up state, if the interface is configured with a higher priority than the currently active router interface in the same HSRP group. Test Plan Perform the following steps: Step 1 Transmit to Group 1 gateway 172.31.40.251. Ensure that traffic is being routed through the active router, SH1-101. Step 2 Break the link. Check that the traffic destined for the Group 1 gateway fails over to SH1-102. Expected Results We expect HSRP to correctly fail over and that traffic continues to be forwarded. Cisco IOS Safe Harbor for Financial Enterprise Customers 50 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Results Table 15 shows the Hot Standby Routing Protocol test results. Table 15 Hot Standby Routing Protocol Test Results Component Test Pass/Fail Basic HSRP Test Pass HSRP Failover Test Pass Enhanced Interior Gateway Routing Protocol The Enhanced Interior Gateway Routing Protocol (EIGRP) is an enhanced version of the IGRP protocol developed by Cisco Systems. Enhanced IGRP uses the same distance vector algorithm and distance information as IGRP. However, the convergence properties and the operating efficiency of Enhanced IGRP have improved significantly over IGRP. The convergence technology is based on research conducted at SRI International and uses an algorithm referred to as the Diffusing Update Algorithm (DUAL). This algorithm guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. The convergence time with DUAL rivals that of any other existing routing protocol. Test Plan The EIGRP testing for Safe Harbor includes the following: • Summarization Test, page 51 • Redistribution Test, page 52 Summarization Test This test verifies manual EIGRP summarization by using the ip summary-address eigrp AS-number interface configuration command. There are a few /24 networks directly connected to SH1-109 and SH1-110 that can be summarized as /22 or /21 on the port-channel interfaces up to the distribution layer. For example: • 172.31.20.0/24 to 172.31.23.0/24, summarized as 172.31.20.0/22 • 172.31.24.0/24 to 172.31.30.0/24, summarized as 172.31.24.0/21 Test Plan Perform the following steps: Step 1 Step 2 Add the ip summary-address eigrp command on the following ports: • Interface port-channel 71 and port-channel 171 on SH1-110 • Port-channel 70 and port-channel 170 on SH1-109 Verify the output of the show ip route eigrp command on both the distribution and core layer. Cisco IOS Safe Harbor for Financial Enterprise Customers 51 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Layer 3 Routing Features Expected Results We expect routes to be summarized as expected on neighboring routers. Redistribution Test This test verifies that EIGRP route redistribution works correctly, with and without access lists (ACLs) and route map filtering. Test Plan Five /24 loopbacks are directly connected to SH1-97. These loopbacks are to be redistributed into EIGRP. After loopbacks are redistributed into the EIGRP domain, the loopback addresses are filtered to allow only the even subnets. Perform the following steps: Step 1 Configure redistribution from OSPF into EIGRP with no filtering: SH1-100(config)# router eigrp 1320 SH1-100(config-router)# redistribute ospf 1 match internal metric 100000 10 255 1 1500 Step 2 Verify that routes exist in the EIGRP domain: SH1-102# show ip route eigrp Step 3 Configure redistribution from OSPF into EIGRP by using a route map to filter: SH1-100(config)# router eigrp 1320 SH1-100(config-router)# redistribute ospf 1 match internal metric 100000 10 255 1 1500 route-map OSPF2EIGRP Step 4 Verify the contents of route map OSPF2EIGRP: SH1-100# show route-map OSPF2EIGRP route-map OSPF2EIGRP, deny, sequence 10 Match clauses: ip address (access-lists): 17 Set clauses: Policy routing matches: 0 packets, 0 bytes route-map OSPF2EIGRP, permit, sequence 20 Match clauses: Set clauses: Policy routing matches: 0 packets, 0 bytes Step 5 Verify the contents of access list 17: SH1-100# show access-list 17 Standard IP access list 17 permit 1.0.0.0, wildcard bits 254.255.255.255 (56284 matches) check=14069 Step 6 Verify that the correct routing table entries are present after the filtered redistribution test: SH1-102# show ip route eigrp Expected Results We expect all routes to be filtered correctly and seen on neighboring routers. Cisco IOS Safe Harbor for Financial Enterprise Customers 52 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Network Management Features Results Table 16 shows the Enhanced Interior Gateway Routing Protocol test results. Table 16 Enhanced Interior Gateway Routing Protocol Test Results Component Test Pass/Fail Summarization Test Pass Redistribution Test Pass Network Management Features Network management feature testing for Safe Harbor involves the following: • Simple Network Management Protocol, page 53 • Terminal Access Controller Access Control System, page 54 Simple Network Management Protocol The Simple Network Management Protocol (SNMP) system consists of the following three parts: • An SNMP manager • An SNMP agent • A Management Information Base (MIB) SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. Test Plan Perform the following steps: Step 1 Verify that all SH1 switches are running Native IOS Cisco Release 12.1(8b)E11. Step 2 Run SNMP walks on every device in the topology throughout the Safe Harbor testing of the 12.1(8b)E11 image. SNMP testing for Safe Harbor involves a test of the basic SNMP functionality when an interface is shut down and restarted. Cisco IOS Safe Harbor for Financial Enterprise Customers 53 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Network Management Features Basic Functionality Shut/No Shut Interface Test This test verifies that SNMP functionality of the Native Cisco IOS device is according to specification. Test Plan Perform the following steps: Step 1 Verify the SNMP configuration on SH1-101. Step 2 Shut down the interface VLAN 40 on SH1-101 Step 3 Remove the shutdown with the no shut command configured for the interface VLAN 40 on SH1-101. Step 4 Verify that the traps are received by a machine that is set up as the SNMP trap receiver. View the output from the log files of that machine. Expected Results We expect that SNMP functions according to specifications. Results Table 17 shows the Simple Network Management Protocol test results. Table 17 Simple Network Management Protocol Test Results Component Test Pass/Fail Basic Functionality Shut/No Shut Interface Test Pass Terminal Access Controller Access Control System Terminal Access Controller Access Control System (TACACS) is an authentication protocol that provides remote access authentication and related services, such as event logging. User passwords are administered in a central database rather than in individual routers, providing an easily scalable network security solution. Login authentication increases the security of the system by keeping unauthorized users from guessing the password. The user is limited to a specific number of attempts to successfully log in to the switch. If the user fails to authorize the password, the system delays access and captures the user ID and the IP address of the station in the syslog file and in the SNMP trap. Cisco IOS Safe Harbor for Financial Enterprise Customers 54 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Miscellaneous Features Test Plan Testing of the TACACS security protocol for Safe Harbor involves one test: the Verify User Authentication Test. Verify User Authentication Test This test verifies that the TACACS login authentication works correctly. Test Plan Perform the following steps: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(8b)E11, configured with connectivity to a Cisco Secure TACACS server. Step 2 Verify that user authentication works by logging in to SH1-101. Expected Results We expect that TACACS login authentication works correctly. Results Table 18 shows the Terminal Access Controller Access Control System test results. Table 18 Terminal Access Controller Access Control System Test Results Component Test Pass/Fail Verify User Authentication Test Pass Miscellaneous Features Miscellaneous features tested for Safe Harbor are as follows: • Network Time Protocol, page 56 • Syslog, page 57 • User Data Protocol Broadcast Flooding, page 58 • System Upgrading, page 59 Cisco IOS Safe Harbor for Financial Enterprise Customers 55 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Miscellaneous Features Network Time Protocol Network Time Protocol (NTP) synchronizes timekeeping among a set of distributed time servers and clients. This synchronization allows events to be correlated when system logs are created and other time-specific events occur. An NTP server must be accessible by the client switch. Test Plan Perform the following steps: Step 1 Verify that time is synchronized from the source. Step 2 Create flap peers and ensure a return to the baseline. Basic NTP Functionality Test This test verifies the NTP functionality. Test Plan Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Enable NTP on devices and point the NTP server to 10.194.17.254. Step 3 Verify that the clock for a Native switch (SH1-104) is synchronized to the NTP server. Step 4 Show the NTP association details of a Native switch and view the clock time. Step 5 View NTP information on the access switch. Expected Results We expect that NTP functions correctly. Results Table 19 shows the Network Time Protocol test results. Table 19 Network Time Protocol Test Results Component Test Pass/Fail Basic NTP Functionality Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 56 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Miscellaneous Features Syslog The Syslog protocol provides a transport to allow a machine to send event notification messages across IP networks to event message collectors, also known as syslog servers. Test Plan Perform the following steps: Step 1 Identify messages of consequence to a customer’s network. Step 2 Verify that these messages are logged as expected. Basic Syslog Functionality Test This test verifies Syslog functionality. Test Plan Perform the following steps: Step 1 Verify that SH1 switches are running Native Cisco IOS Release 12.1(8b)E11 or CatOS 6.3(4). Step 2 Turn off all debugging on a Native switch. Step 3 View output from Syslog server. Compare to messages received on SH1-110: server% tail messages.local7 | grep 10.194.17.110 Results Table 20 lists the Syslog test results. Table 20 Syslog Test Results Component Test Pass/Fail Basic Syslog Functionality Test Pass Cisco IOS Safe Harbor for Financial Enterprise Customers 57 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Miscellaneous Features User Data Protocol Broadcast Flooding A broadcast is a data packet that is destined for multiple hosts. Broadcasts can occur at the data link layer and the network layer. Data-link broadcasts are sent to all hosts attached to a particular physical network. Network layer broadcasts are sent to all hosts attached to a particular logical network. The Transmission Control Protocol/Internet Protocol (TCP/IP) supports the following types of broadcast packets: • All ones—By setting the broadcast address to all ones (255.255.255.255), all hosts on the network receive the broadcast. • Network—By setting the broadcast address to a specific network number in the network portion of the IP address and setting all ones in the host portion of the broadcast address, all hosts on the specified network receive the broadcast. For example, when a broadcast packet is sent with the broadcast address of 131.108.255.255, all hosts on network number 131.108 receive the broadcast. • Subnet—By setting the broadcast address to a specific network number and a specific subnet number, all hosts on the specified subnet receive the broadcast. For example, when a broadcast packet is set with the broadcast address of 131.108.4.255, all hosts on subnet 4 of network 131.108 receive the broadcast. Because broadcasts are recognized by all hosts, a significant goal of router configuration is to control unnecessary proliferation of broadcast packets. Cisco routers support two kinds of broadcasts: directed and flooded. A directed broadcast is a packet sent to a specific network or series of networks, whereas a flooded broadcast is a packet sent to every network. In IP internetworks, most broadcasts take the form of User Datagram Protocol (UDP) broadcasts. Test Plan Perform the following steps: Step 1 Use the IP helper-address command. Step 2 Do forwarding performance verification. Step 3 Create an excessive load on the CPU and verify proper operation. Step 4 Allow and disallow traffic with the no forward-protocol command to verify proper operation. UDP Broadcast Flooding Test This test verifies that the ip helper-address interface configuration command functions correctly. Test Plan Perform the following steps: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(8b)E11. Step 2 Configure IXIA to send broadcast traffic into VLAN 40, UDP port 53 (DNS). Step 3 Use IXIA to verify that no traffic is being forwarded to the IP-helper address because of the no ip forward-protocol domain global configuration command. Cisco IOS Safe Harbor for Financial Enterprise Customers 58 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Miscellaneous Features Step 4 Reconfigure SH1-101 so that traffic is forwarded to the IP-helper address again. Step 5 Configure IXIA to send 9000 pps of broadcast traffic into VLAN 40 and check performance. Expected Results We expect that the ip helper-address interface configuration command functions correctly. Results Table 21 shows the User Data Protocol Broadcast Flooding test results. Table 21 User Data Protocol Broadcast Flooding Test Results Component Test Pass/Fail UDP Broadcast Flooding Test Pass System Upgrading This test verifies that the Cisco IOS upgrade process works correctly. Test Plan System Upgrading Test Perform the following steps: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(8b)E10. Step 2 Use FTP transfer (because of the 16-MB TFTP limitation) to upgrade to the new version 12.1(8b)E11. Step 3 Configure each DUT first for connectivity to the FTP server, and with “ip ftp username X” and “ip ftp password Y.” Step 4 Format sup-bootflash to make space for the new image. Step 5 Copy ftp sup-bootflash: and copy ftp slavesup-bootflash:. Step 6 Set the boot variable to “boot system bootflash:c6sup22-jsv-mz.121-8b.E11,” which synchronizes to the secondary supervisor module. Step 7 Reload the switch to the new version. Cisco IOS Safe Harbor for Financial Enterprise Customers 59 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Supplementary Information Expected Results We expect the Cisco IOS system upgrade process to work properly. Results Table 22 shows the System Upgrading test results. Table 22 System Upgrading Test Results Component Test Pass/Fail System Upgrading Test Pass Supplementary Information This section contains additional information about Cisco IOS Safe Harbor testing. Device Characteristics Following is a list of devices in the topology used for the Safe Harbor financial testing. The card types, along with their location, number of ports, model and serial numbers, are listed for each device. The sub-modules are also listed with the hardware version, model number, serial number, and status for each device. SH1-97 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 24 24 port 100FX Multi mode WS-X6324-100FX-MM 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod --1 1 2 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD060202WE SAD0602033C SAD055101LP SAD055106YN SAD055204B7 SAD055002UW SAD055204VV SAL0552FQTY Serial Hw Status --------------- ------- ------SAD060204KK 3.0 Ok SAD055205SV 1.3 Ok SAD0552066K 1.3 Ok SAD055102P1 2.0 Ok SH1-98 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 24 24 port 100FX Multi mode WS-X6324-100FX-MM 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Cisco IOS Safe Harbor for Financial Enterprise Customers 60 Serial No. ----------SAD0602034Z SAD055006L4 SAD055101KD SAD055106XK SAD05520493 SAD055204C7 SAD055204T3 SAL0547ESP4 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Supplementary Information Mod --1 1 2 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial Hw Status --------------- ------- ------SAD060204RK 3.0 Ok SAD055205W6 1.3 Ok SAD0552067L 1.3 Ok SAD055102R3 2.0 Ok SH1-99 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 8 24 24 port 100FX Multi mode WS-X6324-100FX-MM 9 16 16 port 1000mb GBIC ethernet WS-X6416-GBIC Mod --1 1 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD06020371 SAD060100AY SAD055101KC SAD055101P1 SAD0552044G SAD055204EZ SAL0552FQW3 SAD055106Y1 SAD04310BGC Serial Hw Status --------------- ------- ------SAD060204MJ 3.0 Ok SAD055205S7 1.3 Ok SAD055205VK 1.3 Ok SAD055102T4 2.0 Ok SAD055102V4 2.0 Ok SH1-100 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 8 24 24 port 100FX Multi mode WS-X6324-100FX-MM 9 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC Mod --1 1 2 3 4 9 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD055106GE SAD0602030E SAD055101LK SAD055101PJ SAD06010302 SAD0552048K SAL0552FSB6 SAD0551070A SAD0438056B Serial Hw Status --------------- ------- ------SAD055004RV 3.0 Ok SAD055107AS 2.0 Ok SAD0552068V 1.3 Ok SAD055102P3 2.0 Ok SAD060100F7 2.0 Ok SAD044002NS 0.205 Ok SH1-101 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 24 24 port 100FX Multi mode WS-X6324-100FX-MM Serial No. ----------SAD06010069 SAD060100CA SAD055101MR SAD060102Y4 SAD055002UN SAD055204XF SAD055106ZS Cisco IOS Safe Harbor for Financial Enterprise Customers 61 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Supplementary Information Mod --1 2 2 3 Sub-Module --------------------------Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial Hw Status --------------- ------- ------SAD055205S3 1.3 Ok SAD05520068 3.0 Ok SAD055205N5 1.3 Ok SAD055102PV 2.0 Ok SH1-102 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Inline power present, Version: 1 5 6 7 8 Mod --1 2 2 3 0 0 16 24 Switching Fabric Module-136 (Active) Switching Fabric Module-136 (Standby) SFM-capable 16 port 1000mb GBIC 24 port 100FX Multi mode Sub-Module --------------------------Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6324-100FX-MM Serial No. ----------SAD0601007D SAD06010090 SAD055101NA SAD04340DY4 SAD060102Z7 SAD060102YG SAD055204WM SAD055106XY Serial Hw Status --------------- ------- ------SAD055205RT 1.3 Ok SAD055205JU 3.0 Ok SAD055205WH 1.3 Ok SAD060100F0 2.0 Ok SH1-103 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 9 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 2 2 3 4 Sub-Module --------------------------Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD060100BX SAD0601004E SAD055101PD SAD055101NL SAD055204C8 SAD060102UV SAD055204MG SAD055204NZ SAD055106YM Serial Hw Status --------------- ------- ------SAD055205T9 1.3 Ok SAD0552053W 3.0 Ok SAD055205TL 1.3 Ok SAD055102U3 2.0 Ok SAD060100EV 2.0 Ok SH1-104 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 5 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 9 24 24 port 100FX Multi mode WS-X6324-100FX-MM Cisco IOS Safe Harbor for Financial Enterprise Customers 62 Serial No. ----------SAD0601008Z SAD060100DD SAD055101KK SAD055204TJ SAD0601031V SAD0552046C SAD055204PB SAD055204XJ SAD055106Y3 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Supplementary Information Mod --1 2 2 3 Sub-Module --------------------------Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial Hw Status --------------- ------- ------SAD055206A3 1.3 Ok SAD0552053D 3.0 Ok SAD055205MJ 1.3 Ok SAD055102NP 2.0 Ok SH1-105 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Cat 6000 sup 1 Enhanced QoS (Active) WS-X6K-SUP1A-2GE 2 2 Cat 6000 sup 1 Enhanced QoS (Standby) WS-X6K-SUP1A-2GE 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 4 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 5 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 6 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 7 24 24 port 100FX Multi mode WS-X6324-100FX-MM 9 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Inline power present, Version: 1 Mod --1 1 2 Sub-Module --------------------------Policy Feature Card MSFC Cat6k daughterboard MSFC Cat6k daughterboard Model --------------WS-F6K-PFC WS-F6K-MSFC WS-F6K-MSFC Serial No. ----------SAD060203GM SAD060100V5 SAL0545E7GX SAL0551FFML SAL0545E6G3 SAL0545E7JA SAD055106XG SAL0544DYR3 Serial Hw Status --------------- ------- ------SAD060100NR 1.1 Ok SAD060203N1 2.1 Ok SAD060203M8 2.1 Ok SH1-106 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Cat 6000 sup 1 Enhanced QoS (Active) WS-X6K-SUP1A-2GE 2 2 Cat 6000 sup 1 Enhanced QoS (Standby) WS-X6K-SUP1A-2GE 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 4 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 5 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 6 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 7 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 1 2 Sub-Module --------------------------Policy Feature Card MSFC Cat6k daughterboard MSFC Cat6k daughterboard Model --------------WS-F6K-PFC WS-F6K-MSFC WS-F6K-MSFC Serial No. ----------SAL0546EC5N SAL0542D559 SAL0545E7J9 SAL0540CTF5 SAL0545E7GY SAL0540CTE7 SAD05510703 Serial Hw Status --------------- ------- ------SAD060100LZ 1.1 Ok SAD060203M3 2.1 Ok SAD05280377 1.4 Ok SH1-107 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Cat 6000 sup 1 Enhanced QoS (Active) WS-X6K-SUP1A-2GE 2 2 Cat 6000 sup 1 Enhanced QoS (Standby) WS-X6K-SUP1A-2GE 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 4 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 5 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 1 2 Sub-Module --------------------------Policy Feature Card Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC WS-F6K-MSFC2 WS-F6K-MSFC2 Serial No. ----------SAL0501FWA7 SAL0601G6BV SAL0545E7FM SAL0545E6C0 SAD0551070E Serial Hw Status --------------- ------- ------SAL0601FXD0 2.0 Ok SAL0601FXUC 2.0 Ok SAL0601FXUF 2.0 Ok Cisco IOS Safe Harbor for Financial Enterprise Customers 63 Cisco IOS Safe Harbor for Financial Enterprise Customers, Release 12.1(8b)E11 Supplementary Information SH1-108 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Cat 6000 sup 1 Enhanced QoS (Active) WS-X6K-SUP1A-2GE 2 2 Cat 6000 sup 1 Enhanced QoS (Standby) WS-X6K-SUP1A-2GE 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 4 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 5 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 1 2 Sub-Module --------------------------Policy Feature Card Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC WS-F6K-MSFC2 WS-F6K-MSFC2 Serial No. ----------SAL0550FAST SAL0601G2HF SAL0545E7GH SAL0545E7FJ SAD055106Z9 Serial Hw Status --------------- ------- ------SAL0601FXM6 2.0 Ok SAL0601FY7X 2.0 Ok SAL0601FYB9 2.0 Ok SH1-109 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 9 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 2 2 3 4 8 Sub-Module --------------------------Cat6k MSFC 2 daughterboard Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Distributed Forwarding Card Model --------------WS-F6K-MSFC2 WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD0551063X SAD060100BR SAD055101NY SAD054406ZX SAD0550031L SAD04440CLF SAD055204WV SAD055101M1 SAD05510702 Serial Hw Status --------------- ------- ------SAD055205U3 1.3 Ok SAD0552053U 3.0 Ok SAD055205TB 1.3 Ok SAD054904SP 2.0 Ok SAD054904VC 2.0 Ok SAD060100G8 2.0 Ok SH1-110 Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 2 Catalyst 6000 supervisor 2 (Standby) WS-X6K-S2U-MSFC2 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 5 0 Switching Fabric Module-136 (Active) WS-X6500-SFM2 6 0 Switching Fabric Module-136 (Standby) WS-X6500-SFM2 7 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 8 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 9 24 24 port 100FX Multi mode WS-X6324-100FX-MM Mod --1 1 2 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Cat6k MSFC 2 daughterboard Distributed Forwarding Card Distributed Forwarding Card Cisco IOS Safe Harbor for Financial Enterprise Customers 64 Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-DFC Serial No. ----------SAD0601009S SAD060100CP SAD055101JR SAD055101KU SAD05520456 SAD055204FX SAD055204XP SAD055204SV SAD05510709 Serial Hw Status --------------- ------- ------SAD0552059T 3.0 Ok SAD0552067R 1.3 Ok SAD0552061R 1.3 Ok SAD060100F2 2.0 Ok SAD055102NR 2.0 Ok
© Copyright 2025 Paperzz