Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 Version History Version Number Date Notes 1 June 1, 2003 This document was created upon test plan completion. Executive Summary Cisco IOS Safe Harbor is an initiative that provides the global financial services enterprise customer with a stable Cisco IOS 12.1 E version of choice. Safe Harbor focuses on satisfying customer quality requirements in key vertical markets. This program links and expands upon several Cisco testing projects, including development, regression testing, and systems testing critical to the success of the financial services business. Safe Harbor is the successful completion of extensive validated testing for each release targeting the financial enterprise market. The Cisco nEverest program will integrate testing for many diverse vertical markets and will leverage Safe Harbor testing to verify a "holistic" approach to the general improvement of Cisco IOS software. This document describes the testing environment, test plans, and results. This document contains the following introductory sections: • About Cisco IOS Safe Harbor, page 2 • Financial Lab Topology, page 2 • Test Results Summary, page 13 • DDTS Summary, page 18 • Feature Sets Testing, page 19 This document contains the following test sections: • Memory Leak, page 19 • Hardware Redundancy, page 21 • Layer 2 Features, page 25 • Hardware Forwarding Features, page 40 • Layer 3 Routing Features, page 79 • Network Management Features, page 111 • Miscellaneous Features, page 115 Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Copyright © 2003. Cisco Systems, Inc. All rights reserved. About Cisco IOS Safe Harbor About Cisco IOS Safe Harbor The goal of Cisco IOS Safe Harbor is to provide improved network stability, reliability, and performance with respect to Cisco IOS software. Safe Harbor involves testing the feature sets and protocols in a particular Cisco IOS Release 12.1 E image on the Catalyst 6500 platform to provide high quality code for the financial services sector. This combination of features, hardware, and image is tested in a laboratory environment that simulates the financial services business network environment using regularly updated topologies and configurations provided by the financial customers. For information on the hardware tested and the network setup of the test environment, see the “Financial Lab Topology” section on page 2. The groups of feature sets that are tested include the following: hardware redundancy, Layer 2 features, hardware forwarding features, Layer 3 routing features, network management features, and several miscellaneous features. Regression tests are conducted to validate existing features and verify that functionality is maintained. Negative tests are designed and conducted to stress the features and their inter operability. For information on each feature and its testing, see the “Feature Sets Testing” section on page 19. During the testing, the network is placed under loads that are consistent with those in a financial services network. A standard suite of tools (for example, Netcom Smartbits, IXIA packet generator, or Cisco Pagent) is used to generate network traffic. Network testing includes a combination of automated and manual tests. Simple Network Management Protocol (SNMP) is used to poll the network during the tests, and all tests are analyzed. For a summary of the test results, see the “Basic Topology: Testbed Diagrams” section on page 4. Note Safe Harbor testing does not address issues that might exist in the customer change control and operations processes. Financial Lab Topology The base Native IOS financial lab topology is defined in the following sections and illustrated in Figure 1 through Figure 8: • Basic Topology: Port Channel Deployment, page 3 • Basic Topology: Routing Protocols, page 3 • Basic Topology: Testbed Diagrams, page 4 The financial services network environment configured in the lab includes the following hardware: • Fourteen Catalyst 6500 switches running Cisco Native IOS Release 12.1(8b)E14 (SH1-97 to SH1-110) • Two Catalyst 6500 switches that are running Hybrid CatOS 6.4 train with no routing (Dista-1 and Dista-2) • Pagent test devices to simulate the Internet Service Providers (ISPs), Area 3, and Area 4, injecting Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) routes • IXIA test devices to generate simulated customer traffic The hardware configuration in the financial test lab includes a combination of distributed fabric, fabric-capable, and nonfabric modules. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 2 Financial Lab Topology Note The Switch Fabric Module is supported only with the Supervisor Engine 2 in the Catalyst 6500 series switch. Basic Topology: Port Channel Deployment Figure 1 through Figure 8 show the port-channel deployment for the Safe Harbor testing. Catalyst 6500 series switches running Native Cisco IOS support both Layer 2 (L2) and Layer 3 (L3) EtherChannels, with up to eight ports aggregated in a single EtherChannel interface. All interfaces in each EtherChannel must be identically configured (the same speed, all Layer 2 or Layer 3, and so on). EtherChannel load balancing can use MAC addresses or IP addresses, and either source or destination or both source and destination addresses. The selected mode applies to all EtherChannels configured on the switch. EtherChannel is a trunking technology that groups together multiple full-duplex 802.3 Ethernet interfaces to provide fault-tolerant high-speed links between switches, routers, and servers. An EtherChannel interface (consisting of up to eight Ethernet interfaces) is treated as a single interface; this is called a port-channel. The port-channels configured for Safe Harbor testing are Gigabit EtherChannels (GECs). The following types of GEC port-channels are configured and tested for Safe Harbor: • Layer 3 GEC distributed forwarding card (DFC) • Layer 3 GEC DFC and non-DFC mixed • Layer 3 GEC using fabric-capable modules, nonfabric modules, and combinations of both • Layer 2 GEC using fabric-capable modules, nonfabric modules, and combinations of both Basic Topology: Routing Protocols The following routing protocols are configured for Safe Harbor testing: • BGP – External BGP (eBGP) – Interior BGP (iBGP) • EIGRP • OSPF Figure 1 through Figure 8 shows the following: • Where each routing protocol is configured in the basic test lab topology. • The eBGP and iBGP routing protocol deployment for the Safe Harbor testing. • The EIGRP routing protocol deployment for Safe Harbor testing. • OSPF routing protocol areas configured for Safe Harbor testing. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 3 Financial Lab Topology Basic Topology: Testbed Diagrams • Figure 1 on page 5 summarizes hardware module types per device and their position in the chassis. This data is taken directly from the output of the show module command. • Figure 2 on page 6 shows the Ether Channeling configuration of the Safe Harbor testbed. It displays the number of ports in each channel, the Channel ID, the static or dynamic configuration of the channel, and whether the channel is Layer 3 or Layer 2. • Figure 3 on page 7 is the most detailed illustration of the Safe Harbor topology configuration. It contains the physical ports connecting each of the main devices, and network addresses of those connections. Where Hot Standby Routing Protocol (HSRP) is configured, the addressing scheme of all VLANs is provided. • Figure 4 on page 8 provides a high-level view of the Safe Harbor network routing topology. OSPF, BGP, and EIGRP protocols are delimited here and devices involved in each. • Figure 5 on page 9 shows the Safe Harbor network multicast configuration based on one of our largest financial customers. It presents a real-world scenario. This figure shows the extent that devices participate in the overall multicast scheme, highlighting Multicast Source Discovery Protocol (MSDP) and Rendezvous Point (RP). • Figure 6 on page 10 shows where chassis connections are made with network devices (IXIA Connections Map) using the IXIA test tool for traffic generation, and some OSPF route generation. • Figure 7 on page 11 shows how Pagent and IXIA test tools are connected to the testbed, and specific routes they generate (Route Feed). These generated routes are not inherent in the Safe Harbor network and combine OSPF, BGP, and EIGRP generated feeds equal to 130,000 total routes. • Figure 8 on page 12 shows background traffic running to emulate real-world network conditions with three multicast and four unicast streams traversing the network and the devices they cross in a majority of the test plan. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 4 Financial Lab Topology Figure 1 Safe Harbor Device Modules and Chassis Positions Modules 97 1 2 3 4 5 6 7 8 98 1 2 3 4 5 6 7 8 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6324-100FXMMWS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6348-RJ-45 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6324-100FX-MM 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 9 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6348-RJ-45 WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6324-100FX-MM 1 2 3 4 5 6 7 8 9 109 WS-X 6K- SUP1A-2G E WS-X 6K- SUP1A-2G E WS-X 640 8-G BI C WS-X 640 8-G BI C WS-X 640 8-G BI C WS-X 640 8-G BI C WS-X 632 4-1 00 FX- MM WS-X 634 8-R J- 45 1 2 3 4 5 6 7 1 2 3 4 5 6 WS-X6K-S UP1A- 2GE WS-X6K-S UP1A- 2GE WS-X64 08 -GB IC WS-X64 08 -GB IC WS-X64 08 -GB IC WS-X64 08 -GB IC WS-X63 24 -10 0F X-MM 1 2 3 4 5 6 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X681 6-G BIC WS-X681 6-G BIC WS-X650 0-S FM2 WS-X651 6-G BIC WS-X651 6-G BIC WS-X681 6-G BIC 1 2 3 4 5 6 7 8 WS-X 6K-S2U-M SFC2 WS-X 6K-S2U-M SFC2 WS-X 681 6-G BI C WS-X 681 6-G BI C WS-X 650 0-S FM2 WS-X 650 0-S FM2 WS-X 651 6-G BI C WS-X 651 6-G BI C 111 WS-X 6K-SUP1A-2 GE WS-X 6K-SUP1A-2 GE WS-X 640 8-GBI C WS-X 640 8-GBI C WS-X 632 4-100 FX-MM WS-X 654 8-RJ- 45 1 2 3 4 5 6 WS-X6K-SUP2-2GE WS-X6416-GE-MT WS-X6408A-GBIC WS-X6416-GE-MT WS-X6324-100FX-MM WS-X6248A-RJ-45 112 108 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6516-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6516-GBIC WS-X6324-100FX-MM 1 2 3 4 5 6 7 8 110 107 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6816-GBIC WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6516-GBIC WS-X6548-RJ-45 104 WS-X6K- S2U-MSFC2 WS-X6K- S2U-MSFC2 WS-X681 6-G BIC WS-X681 6-G BIC WS-X650 0-S FM2 WS-X650 0-S FM2 WS-X654 8-R J-4 5 WS-X651 6-G BIC 1 2 3 4 5 6 7 9 106 103 WS-X6K-S 2U-MSFC2 WS-X6K-S 2U-MSFC2 WS-X6816 -G BIC WS-X6816 -G BIC WS-X6500 -S FM2 WS-X6500 -S FM2 WS-X6348 -R J-4 5 WS-X6516 -G BIC 100 1 2 3 4 5 6 7 9 1 2 3 5 6 7 8 102 99 1 2 3 4 5 6 7 9 105 101 WS-X6K-S2U-MSFC2 WS-X6K-S2U-MSFC2 WS-X6816-GBIC WS-X6324-100FX-MM WS-X6500-SFM2 WS-X6500-SFM2 WS-X6516-GBIC WS-X6348-RJ-45 WS-X6K-S UP1A- 2GE WS-X6K-S UP1A- 2GE WS-X6408 -GB IC WS-X6408 -GB IC WS-X6324 -10 0F X-MM WS-X6348 -RJ -4 5 1 2 3 4 5 6 WS-X6K-SUP2-2GE WS-X6416-GE-MT WS-X6408A-GBIC WS-X6416-GE-MT WS-X6324-100FX-MM WS-X6248A-RJ-45 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 5 Financial Lab Topology Figure 2 Safe Harbor EtherChannel Configuration SH1-101 EtherChannel Dista-1 SH1-107 EtherChannel modes: PoXX On PoXX Desirable PoXX Auto SH 1-102 Dista-1 All EtherChannels are L3 channels, unless otherwise noted SH1-97 SH1-99 Po12 Po16 SH1-103 Po16 SH1-108 Po12 SH1-109 SH1-98 SH1-100 Po13 SH1-104 Po113 Po17 Po117 Dista-2 SH 1-105 SH1-110 SH1-106 Dista-2 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 6 Financial Lab Topology Figure 3 Safe Harbor Comprehensive IP Interface Topology Configuration IP Interfaces A table of IP addresses configured on VLANs 40 through 50 on devices SH1101 and SH1-102. The address format is 172.31.x.x/24. The two HSRP addresses for these interfaces are 172.31.[70-80].[1,254]. vl an 40 41 42 43 44 101 70.14 71.14 72.14 73.14 74.14 102 70.14 71.14 72.14 73.14 74.14 45 46 47 48 49 50 75.14 76.14 77.14 78.14 79.14 80.14 IP addresses configuredonVLAN s vlan 40 hrou t gh 50 on dev ices SH1-107 10 and SH1-108. The addres s format 11 12 is 172. 31.x.x/24. The tw o HSR P 13 addres ses o frthese int erf aces are 14 172.31.[9-19].[1,254]. SH1-101 75.14 76.14 77.14 78.14 79.14 80.14 Dista-1 107 10.68 11.68 12.68 13.68 14.68 108 10.69 11.69 12.69 13.69 14.69 15 16 17 18 19 20 15.68 16.68 17.68 18.68 19.68 20.68 15.69 16.69 17.69 18.69 19.69 20.69 SH1-107 SH1-102 Dista-1 SH 1-97 SH 1-99 SH1-108 1-2/1,3/1,3/9 (5) 1-2/1,3/5,4/13 (6) SH1-103 Unless otherwise noted, all IP interfaces described in this diagram use the format 172.31.1.x/30, where x is replaced with the (value) given next to the interface list. SH1-104 SH1-109 SH 1-100 SH1-97 3/1,3/9 (9) 3/5,4/13 (10) Dista-2 SH1-105 SH1-110 Dista-2 A table of IP addresses configured on VLANs 40 through 50 on devices SH1105 and SH1-106. The address format is 172.31.x.x/24. The two HSRP addresses for these interfaces are 172.31.[100-110].[1,254]. vl an 40 41 42 43 44 105 100.66 101.66 102.66 103.66 104.66 106 100.67 101.67 102.67 103.67 104.67 45 46 47 48 49 50 105.66 106.66 107.66 108.66 109.66 110.66 105.67 106.67 107.67 108.67 109.67 110.67 SH1-106 3/7-8 IP addresses configured on VLANs vl an 10 through 20 on devices SH1-109 10 11 and SH1-110. The address format 12 is 172.31.x.x/24. The two HSRP 13 addresses for these interfaces are 14 172.31.[20-30].[1,254]. 109 20.70 21.70 22.70 23.70 24.70 110 20.71 21.71 22.71 23.71 24.71 15 16 17 18 19 20 25.70 26.70 27.70 28.70 29.70 30.70 25.71 26.71 27.71 28.71 29.71 30.71 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 7 Financial Lab Topology Figure 4 Safe Harbor Network Routing Topology Layer 3 AS 100 Dista-1 SH1-107 SH1-101 AREA 5 EIGRP 1320 AREA 6 SH1-97 SH1-102 Dista-1 SH1-99 SH1-103 SH1-108 AS 10 AREA 0 AS 20 AREA 1 SH1-109 SH1-100 SH1-98 SH1-104 Dista-2 SH1-105 AREA 3 AREA 4 SH1-106 AREA 2 SH1-110 Dista-2 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 8 Financial Lab Topology Figure 5 Safe Harbor Multicast Configuration Multicast SH1-101 This diagram represents a view of the general multicast design for this topology. This topology includes two local multicast areas, three regional areas, and one global area. Each area includes a pair of PIM-RPs, only one active at a time (that with the highest IP address on the Lo0 interface. The active RP is also the PIM-DR for any attached subnets with clients (local areas only). The RPs in each area are responsible for the forwarding of multicast traffic for a certain range of addresses, shown in the text boxes attached to the areas in the diagram. Each pair of routers in an area has an MSDP peering relationship. SH1-107 Lo0: 4.107 Lo1: 0.8 239.255.102.0 239.255.102.255 SH1-102 Lo0: 4.102 Lo1: 0.102 Each loopback address begins with the octet pair 172.31.x.x and uses a 32-bit mask. LOCAL Dista-1 Lo0: 4.101 Lo1:0.102 Dista-1 239.255.8.0 239.255.8.255 RP/DR SH1-97 SH1-99 SH1-103 Lo0: 4.97 Lo0: 4.99 Lo1: 0.200 Lo0: 4.103 Lo1: 0.104 REGIONAL SH1-108 Lo0: 4.108 Lo1: 0.8 RP/DR GLOBAL 239.255.200.0 239.255.200.255 239.255.104.0 239.255.104.255 SH1-109 SH1-98 Lo0: 4.98 Each router contains the following configuration: ip pim rp-address 1 72.31.0.8 1 override ip pim rp-address 1 72.31.0.10 2 override ip pim rp-address 1 72.31.0.102 3 override ip pim rp-address 1 72.31.0.104 4 override ip pim rp-address 1 72.31.0.106 5 override ip pim rp-address 1 72.31.0.200 6 override ! access-list 1 permit 239.255.8.0 0.0.0.255 access-list 2 permit 239.255.10.0 0.0.0.255 access-list 3 permit 239.255.102.0 0.0.0.255 access-list 4 permit 239.255.104.0 0.0.0.255 access-list 5 permit 239.255.106.0 0.0.0.255 access-list 6 permit 239.255.200.0 0.0.0.255 access-list 6 permit 224.0.0.0 0.0.255.255 SH1-100 SH1-104 Lo0: 4.100 Lo1: 0.200 Lo0: 4.104 Lo1: 0.104 RP/DR RP/DR Lo0: 4.109 Lo1: 0.10 239.255.10.0 239.255.10.255 SH1-105 Dista-2 Lo0: 4.105 Lo1: 0.106 SH1-110 Lo0: 4.110 Lo1: 0.10 239.255.106.0 239.255.106.255 SH1-106 Dista-2 RP/DR Lo0: 4.106 Lo1: 0.106 RP/DR Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 9 Financial Lab Topology Figure 6 Safe Harbor IXIA Connections Map IXIA SH1-101 g3/16 11/2 Dista-1 g7/16 6/1 12/1 2/1 6/5 2/2 SH1-107 g3/8 10.194.17.111 10.194.17.101 g4/8 SH1-102 16/1 16/2 10.194.17.107 fa4/1 fa4/5 10.194.17.102 2/3 Dist a-1 3/3 4/1 4/6 2/4 13/1 8/1 8/2 10.194.17.111 SH1-97 SH1-103 SH1-99 SH1-108 g3/8 g4/8 10.194.17.9 7 7/1 7/2 10.194.17.103 10.194.17.99 10.194.17.108 SH1-109 SH 1-98 g3/8 g4/8 g3/16 SH1-104 SH1-100 g7/16 15/1 15/2 9/1 9/2 10.194.17.109 10.19 4.17.9 8 10.194.17.104 10.194.17 .100 Dist a-2 SH1-105 g3/2 fa9/13 fa9/14 2/1 1/1 1/1 2/6 1/1 10.194.17.112 SH1-110 10.194.17.105 g4/16 6/1 SH1-106 Dist a-2 6/2 6/5 6/6 2/5 2/6 2/7 2/8 10.194.17.112 10.194.17.106 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 10 3/3 g8/16 10.194.17.110 11/1 12/2 13/2 10/1 10/2 Financial Lab Topology Figure 7 Safe Harbor Pagent and IXIA Generated Route Feed rtp-wbu-te -p5 172.18.179.184 Pagent and IXIA Route Feeds EIGRP 1320: 180.1.1.0/24 ++10000 BGP AS20: 120.1.1.0/24 ++65000 BGP AS10: 110.1.1.0/24 ++35000 OSPF Area6: 160.1.1.0/24 ++5000 6/37 Dista-1 fa8/1 fa8/47 fa7/47 SH1-97 SH1-99 fa8/48 fa7/48 fa7/38 OSPF Area3: 130.1.1.0/24 ++125 OSPF Area3: 130.2.1.0/24 ++125 OSPF Area5: 150.1.1.0/24 ++125 OSPF Area5: 150.2.1.0/24 ++125 OSPF Area4: 140.1.1.0/24 ++2000 BGP AS20: 120.1.1.0/24 ++65000 BGP AS10: 110.1.1.0/24 ++35000 OSPF Area6: 160.1.1.0/24 ++5000 fa8/1 fa8/47 fa7/47 SH1-98 OSPF Area3: 130.1.1.0/24 ++125 OSPF Area3: 130.2.1.0/24 ++125 SH1-100 fa7/48 fa8/48 fa7/38 OSPF Area5: 150.1.1.0/24 ++125 OSPF Area5: 150.2.1.0/24 ++125 OSPF Area4: 140.1.1.0/24 ++2000 OSPF Area2: 170.1.1.0/24 ++2500 rtp-wbu-te -p4 172.18.179.185 6/47 Dista-2 rtp-wbu -te-ix ia1 172.18.179.189 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 11 Financial Lab Topology Figure 8 Safe Harbor Background Traffic Background Traffic 1 Ix > D-2 > 106 > 100 > 104 > 108 > D-1 > Ix 1 IP Multicast: Group 239.255.8.50 2 Ix > D-2 > 110 > 104 > 100 > 102 > D-1 > Ix 2 IP Multicast: Group 239.255.102.50 3 Ix > 110 > 104 > 100 > 104 > 108 > Ix 3 IP Multicast: Group 239.255.200.50 4 IP Unicast 5 IP Unicast 6 IP Unicast 7 IP Unicast SH1-101 Dist a-1 6/1 2/1 6 2 SH1-107 SH1-102 Dist a-1 SH1-97 SH1-99 3/3 13/1 4 4/1 8/1 7 1 SH1-103 IP/TV Clients SH1-108 5 g4/8 IP/TV Clients 7/2 3 SH1-109 SH1-98 SH1-100 SH1-104 IP/TV Clients 2347 136 IP/TV Clients Dist a-2 SH1-105 g3/2 2/6 1/1 4 SH1-110 SH1-1 6 6/1 0 Dista-2 1 4 Ix > D-1 > 108 > 104 > 100 > 105 > D-2 > Ix 5 Ix > D-2 > 110 > 103 > 99 > Ix 6 Ix > D-1 > 102 > 100 > 104 > 110 > D-2 > Ix 7 Ix > D-1 > 108 > 104 > 100 > 105 > D-2 > Ix 2/5 1 7 IP/TV Server Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 12 3/3 g8/16 12/2 3 13/2 5 6 10/2 2 Test Results Summary Test Results Summary Table 1 summarizes the results of all completed testing as part of the Cisco IOS Safe Harbor initiative. Table 1 includes the feature or function tested, the section that describes the feature set to which the feature or function belongs, the results of the feature or function tests (pass or fail), the component tests for each feature or function, and any related defects, or bugs, found during the Safe Harbor testing. Note Table 1 Test results are specific to technologies covered and actual scenarios in which they were tested. Safe Harbor is designed to cover critical path areas and augment ongoing regression and systems testing. Safe Harbor Test Results Summary Test Suites Feature/Function Memory Leak, page 19 Memory Leak, page 19 Hardware Redundancy, page 21 Hardware Redundancy, page 21 Layer 2 Features, page 25 Tests Results DDTS Pass None Pass None • Extended Memory Leak, page 19 • Repeated Telnet, page 20 • Fabric Flap, page 21 • Supervisor 1 Failover, page 22 • Supervisor 2 Failover, page 23 Spanning Tree Protocol, page 25 • Basic Spanning Tree Protocol Configuration, page 25 Pass None Unidirectional Link Detection-Aggressive Mode, page 26 • Basic UDLD on Layer 2 Link, page 27 Pass None • Basic UDLD on Layer 3 Link, page 28 Trunking, page 29 • Supervisor 1 Configuration and Failure Recovery, page 29 Pass None • Supervisor 2 Configuration and Failure Recovery, page 30 • Basic Layer 2 Channeling Configuration, page 32 Pass None • Basic Layer 3 Channeling Configuration, page 33 • Gigabit Ethernet Module Reset, page 35 • Basic VLAN Trunking Protocol Configuration, page 37 Pass None • Layer 2 Gigabit EtherChannel Failover—Supervisor 1, page 40 Pass None • Layer 2 Gigabit EtherChannel Failover—Supervisor 2, page 41 • Layer 3 Gigabit EtherChannel Failover, page 42 Port Aggregation Protocol (Channeling), page 31 VLAN Trunking Protocol, page 37 Hardware Forwarding IP Unicast, page 40 Features, page 40 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 13 Test Results Summary Table 1 Test Suites Safe Harbor Test Results Summary (continued) Feature/Function IP Multicast, page 44 Tests • Local Multicast, page 45 • Regional Multicast with IGMP Functionality, page 46 • Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 1, page 48 • Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 2, page 50 • Gigabit EtherChannel Failover: Non-dCEF, page 53 • Gigabit EtherChannel Failover: Mixed-dCEF, page 55 • Gigabit EtherChannel Failover: dCEF, page 58 • Switch Fabric Module Failover, page 60 • Gigabit Ethernet Module Failover—Supervisor 1, page 62 • Gigabit Ethernet Module Failover—Supervisor 2, page 64 • Protocol Independent Module-Designated Router Failover—Supervisor 11, page 66 • Protocol Independent Module-Designated Router Failover—Supervisor 22, page 68 • Auto-Rendezvous Point Functionality and Failover, page 70 • Layer 3 Interface Multicast Negative, page 72 • Protocol Independent Module-Rendezvous Point Failover—Supervisor 22, page 74 • MSDP Failover, page 76 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 14 Results DDTS Pass CSCea50652 CSCdw95457 Test Results Summary Table 1 Safe Harbor Test Results Summary (continued) Test Suites Feature/Function Tests Layer 3 Routing Features, page 79 Cisco Express Forwarding, page 79 Open Shortest Path First, page 88 Border Gateway Protocol, page 95 Hot Standby Routing Protocol, page 100 Enhanced Interior Gateway Routing Protocol, page 107 Results • Cisco Express Forwarding Packet Pass Switching, page 79 • Cisco Express Forwarding Route Entries on DFC, page 81 • Cisco Express Forwarding Many-to-One Distribution Load Balance, page 82 • Cisco Express Forwarding Many-to-Many Distribution with Polarization Load Balance, page 84 • OSPF Autocost, page 88 • OSPF Passive Interface, page 89 • OSPF Filtering, page 91 • OSPF Redistribution, page 93 • OSPF Topology Database, page 94 • Scale to Ten Neighbors and 100K Pass Routes in Core (Add 120,000 Routes), page 95 • Route Redistribution Between Other Protocols and BGP—ACL/Route Map, page 97 • BGP Neighbor Flap—No Dampening, page 99 • Basic HSRP, page 100 • HSRP Failover with Standard Timers—Supervisor 22, page 101 • HSRP Failover Using Fast Timers—Supervisor 22, page 103 • HSRP Failover—Supervisor 22, page 105 • HSRP Maximum Group Limit—Supervisor 22, page 106 • EIGRP Summarization, page 107 • EIGRP Redistribution, page 108 DDTS Pass CSCea74804 CSCdt00287 Pass Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 15 Test Results Summary Table 1 Safe Harbor Test Results Summary (continued) Test Suites Feature/Function Network Management Simple Network Management Features, page 111 Protocol, page 111 Basic Functionality Shut/No Shut Pass Interface—Supervisor 11, page 111 • Basic Functionality Shut/No Shut Interface—Supervisor 22, page 112 • Protos Negative Request Application, page 113 • User Authentication—Supervisor 11, page 114 • User Authentication—Supervisor 22, page 115 Switched Port Analyzer, page 116 • SPAN Basic Functionality, page 116 Pass Access Control Lists, page 118 • Scripted Test of ACL 110, page 118 Pass • Scripted Test of ACL 131, page 119 Pass CSCdz69491 CSCdz78710 CSCdx89464 • Show-All Script, page 120 Pass Network Address Translation, page 121 • Static 2 Hosts, page 121 Pass • Static 40 Hosts, page 122 • Static 40 Hosts Extended, page 123 • Static 2 Networks, page 124 • Static Inside Dynamic Outside, page 125 • Dynamic Inside Static Outside, page 127 • Verify CSCdx40232, page 128 • Addition/Removal of NAT Statements, page 129 • Static 40 Hosts Overnight, page 130 • Basic NTP Functionality—Supervisor 1, page 131 • Basic NTP Functionality—Supervisor 2, page 132 • NTP Failover—Supervisor 1 and Supervisor 2, page 133 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 DDTS CSCdw62852 Parser, page 120 Network Time Protocol, page 131 16 Results • TACACS, page 114 Miscellaneous Features, page 115 Tests Fail CSCdx77078 CSCdu21785 Pass Test Results Summary Table 1 Test Suites Safe Harbor Test Results Summary (continued) Feature/Function Tests Syslog, page 133 Results • Basic Syslog Functionality—Supervisor 1, page 134 • Basic Syslog Functionality—Supervisor 2, page 134 User Datagram Protocol Broadcast Flooding, page 135 • UDP Broadcast Flooding, page 136 Pass System Upgrade, page 137 • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 11, page 137 Pass • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 12, page 138 • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 22, page 139 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 11, page 140 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 12, page 140 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 22, page 141 • SSH Server Vulnerability, page 142 Secure Shell, page 142 DDTS Pass Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 17 DDTS Summary DDTS Summary Table 2 lists Development Defect Tracking System (DDTS) software bugs, descriptions, and comments filed by the Safe Harbor testing team during Cisco Native IOS Release 12.1(8b)E14 testing. Table 3 lists DDTS and descriptions encountered during Cisco Native IOS Release 12.1(8b)E14 testing. Table 2 Summary of DDTS Filed During Safe Harbor Native Cisco IOS 12.1(8b)E14 Testing DDTS Description CSCea50652 IGMP v2 report ignored after host-attached module (Helios) reset Table 3 Summary of DDTS Encountered During Safe Harbor Native Cisco IOS 12.1(8b)E14 Testing DDTS Description CSCdp45359 While RP is booting, %DEC21140-5-LATECOLL: EOBC0 transmit error CSCdt00287 Some OSPF counters (DCBitless LSA, indication, DNA) are never reset CSCdu21785 NEBULA: clear counter command not working when issued first time CSCdu56638 CPUHOG in table_walk CSCdv26643 Herschel-Seaquest:traceback at Icc_card_restart by reload command CSCdv36693 Herschel:No mem available to unregister card- on 2nd sup OIR CSCdw62852 Unprotected bugtrace CSCdw95457 Help output is incorrect for debug ip pim - qdm CSCdx74064 MMLS: show mls ip multicast group <g> source <s> bogus output CSCdx77078 Source static network NAT translations fail on msfc2/sup2 CSCdx89464 cosmos-e: RP crashed in ip_nacl_extended_nvgen while removing ACL CSCdz69491 Range purge every 1 minute when default route command is configured CSCdz78710 NAT NetFlow entries purged and not reinstalled CSCea15655 CDP neighbors for port-channels show same local interface for member CSCea70798 CDP on port-channel is broken in nightly builds CSCea74804 Unnecessary LSAs generated when area with no interface created and deleted Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 18 Feature Sets Testing Feature Sets Testing Functionality critical to the global financial service business tested for the Cisco IOS Safe Harbor release is described in the following sections: Note • Memory Leak, page 19 • Hardware Redundancy, page 21 • Layer 2 Features, page 25 • Hardware Forwarding Features, page 40 • Layer 3 Routing Features, page 79 • Network Management Features, page 111 • Miscellaneous Features, page 115 For a compete list of Cisco IOS commands and usage, refer to: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/index.htm Memory Leak Testing for memory leaks occurred each evening of a regular workday. The last regular test of the day that is performed was repeated throughout the night, with the memory being recorded for each device in the network. The duration of each memory leak test is approximately 16 hours, or from 5 p.m. to 9 a.m. the next morning. On weekends, the test was run for the entire weekend, or approximately 64 hours, from 5 p.m. Friday evening until 9 a.m. Monday morning. The testing that occurred for this iteration was a repetition of the EIGRP route summarization test. Summarization was configured on devices SH1-99 and SH1-100, followed by a 5-minute sleep period. Then summarization was removed from the same devices, followed by another 5-minute sleep period. This cycle was repeated overnight. SNMP polls were taken every 5 minutes and the results for the Memory Free for each device displayed. Whenever a fault was encountered, the redundant module took over the functions of the failed hardware module. Memory leak testing for Safe Harbor involved performing various failover scenarios to verify that internal hardware redundancy failed over as expected. The following tests were performed: • Extended Memory Leak, page 19 • Repeated Telnet, page 20 Extended Memory Leak This test summarized final memory leak testing for 8bE14. The test began at approximately 7pm 5/21/2003 and ended at approximately 9am 5/27/2003. The total run time was about 134 hours. The testing focused on three devices, SH1-110 (sup22), SH1-108 (sup12), and SH1-106 (sup11). Each of the three devices had 250 mroute entries created and removed, and 5000 OSPF routes added and removed within a 30-minute period. This was repeated about 268 times for the entire testing period. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 19 Memory Leak An initial "show proc mem" was taken at the beginning of the test, and a final at the end. The following before and after memory information is summarized for each device and memory statistics from polls taken every 10 seconds are captured for the testing period. Devices under test: SH1-97, SH1-98, SH1-99, SH1-100, SH1-101, SH1-102, SH1-103, SH1-104, SH1-105, SH1-106 (sup11), SH1-107, SH1-108 (sup12), SH1-109, and SH1-110 (sup22). Test Plan The procedure used to perform the extended memory leak test follows: Step 1 Verify that all the Layer 3 devices in the network are running Cisco IOS Release 12.1(8b)E14 and that there are no memory leaks on any device during the testing period. Expected Results The following test results are expected: • That all devices do not become unresponsive or leak memory. Results Table 5 shows the extended memory leak test results. Table 4 Extended Memory Leak Test Results Tests Results Extended Memory Leak Pass Repeated Telnet This test verified that repeated Telnets to supervisor 11, supervisor 12, and supervisor 22 did not impact memory or system stability. Devices under test: SH1-106 (sup 11), SH1-107 (sup 12), and SH1-97 (sup 22). Test Plan The procedure used to perform the repeated Telnet test follows: Step 1 Verify that DUTs are running Native Cisco IOS Release 12.1(8b)E14. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Telnet into each DUT repeatedly. Step 4 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • That all the DUTs do not become unresponsive or leak memory. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 20 Hardware Redundancy Results Table 5 shows the repeated Telnet test results. Table 5 Repeated Telnet Test Results Tests Results Repeated Telnet Pass Hardware Redundancy Whenever a fault was encountered, the redundant module took over the functions of the failed hardware module. Testing hardware redundancy for Safe Harbor involved performing various failover scenarios to verify that internal hardware redundancy failed over as expected. The following tests were performed: Note • Fabric Flap, page 21 • Supervisor 1 Failover, page 22 • Supervisor 2 Failover, page 23 For this iteration, and all subsequent iterations of testing, the total number of OSPF routes fed into the network was reduced to 10,000. This change better reflected recommendations established and outlined in Cisco IOS Release Notes for release 12.1 E at http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/12_1e/ol_2310.htm#62683 for use with RPs that have 128 MB of memory. Many devices in the Safe Harbor network have only 128 MB of memory, limiting total routes to 20,000, using fixed-length masks. Fabric Flap This test reset the active Switch Fabric Module (SFM) in the system repeatedly to verify that SFM failover operated as designed. With an IXIA traffic stream passing through it, the DUT SFM is failed 20 times. Test results include measures of the period during which no traffic was passed and the time required for the failed SFM to come back online to "standby" state. Device under test: SH1-103. Test Plan The procedure used to perform the fabric flap test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 To verify that the unicast stream used for testing will flow through the DUT, configure the ip ospf cost 100 command on interfaces: SH1-104 port-channel 69, SH1-104 port-channel 117, SH1-108 port-channel 169, and SH1-100 port-channel 17. Step 5 Verify that traffic is being switched in compact mode on DUT. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 21 Hardware Redundancy Step 6 Determine the active fabric module and start playing the test stream. Step 7 While monitoring the log messages and traffic loss, reset the active fabric module. Step 8 Record the time required for the standby fabric module to become active and for the fabric module to come online again, and the time traffic was lost during the failover. Step 9 Repeat Step 6 through Step 8 20 times. Step 10 Calculate the fastest, slowest, and average times for each event. Step 11 Verify that the DUT did not record any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 13 Reset the configuration to the original state. Expected Results The following test results are expected: • Standby fabric modules should become active in fewer than 30 ms. • Reset fabric modules should become standby in 20 to 30 seconds. • Each failover should have fewer than 1 or 2s of lost data. Results Table 6 shows the fabric flap test results. Table 6 Fabric Flap Test Results Tests Results Fabric Flap Pass Supervisor 1 Failover This test verified the proper operation of redundant supervisors during a series of 20 continual resets. The goal of this test is to verify that the box fails between the supervisors as designed, recovers, and forwards traffic. This test is further designed to verify that failure operations are within the design guidelines for the applicable hardware and software versions under test. Although this test measures time, it is by no means a measure of the speed at which failover can take place, which as this is dependent upon the configuration and line cards in the system. Supervisor Engine 2s are covered in this test. The device under test is SH1-107. A traffic stream was sent from Dista-1 to Dista-2 a a fixed rate. The amount of traffic loss during device resets was used to determine the recovery time (failover time). Test Plan The procedure used to perform the supervisor 1 failover test follows: Step 1 Verify that the DUT is running Cisco IOS Release 12.1(8b)E14. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 22 Hardware Redundancy Step 2 Show some of the factors that may contribute to reload times. Such factors may include configuration size, memory used, and size of IP routing table. Step 3 Shut down interface port-channel 10 on device SH1-108 to verify that the traffic generated in Step 2 goes through SH1-107 to get to its destination. Step 4 Begin an IXIA traffic stream (1.6 million packets) from Dista-1 to Dista-2. Send this traffic at a rate of 10,000 packets per second (pps). Use the reload command on SH1-107. Step 5 Measure the period of time between which traffic stopped and it was started again. This period of time is considered the failover time. Step 6 Repeat Step 4 through Step 5 19 more times. Expected Results The following test results are expected: • All 20 resets of the supervisor should fail within the range of 2 to 3 minutes. • Supervisors should come back online without any manual intervention. Results Table 7 shows the supervisor 1 failover test results. Table 7 Supervisor 1 Failover Test Results Tests Results Supervisor 1 Failover Pass Supervisor 2 Failover This test verified the proper operation of redundant supervisors during a series of 20 continual resets. The goal of this test is to verify that the box fails between the supervisors as designed, recovers, and forwards traffic. This test is further designed to verify that failure operations are within the design guidelines for the applicable hardware and software versions under test. Although this test measures time, it is by no means a measure of the speed at which failover can take place, which is dependent upon the configuration and line cards in the system. Supervisor Engine 2s are covered in this test. The device under test is SH1-110. A traffic stream was sent from Dista-1 to Dista-2 a a fixed rate. The amount of traffic loss during device resets was used to determine the recovery time (failover time). Test Plan The procedure used to perform the supervisor 2 failover test follows: Step 1 Verify that the DUT is running Cisco IOS Release 12.1(8b)E14. Step 2 Show some of the factors that may contribute to reload times. Such factors may include configuration size, memory used, and size of IP routing table. Step 3 Shut down interface port-channel 20 on device SH1-109 to verify that the traffic generated in Step 2 goes through SH1-110 to get to its destination. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 23 Hardware Redundancy Step 4 Begin an IXIA traffic stream (1.2 million packets) from Dista-1 to Dista-2. Send this traffic at a rate of 10,000 pps. Issue the reload command on SH1-110. Step 5 Measure the period of time between which traffic stopped and it was started again. This period of time is considered the failover time. Step 6 Repeat Step 4 through Step 5 19 more times. Expected Results The following test results are expected: • All 20 resets of the supervisor should fail within the range of 1.5 to 2.5 minutes. • Supervisors should come back online without any manual intervention. Results Table 8 shows the supervisor 2 failover test results. Table 8 Supervisor 2 Failover Test Results Tests Results Supervisor 2 Failover Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 24 Layer 2 Features Layer 2 Features Layer 2 feature testing for Safe Harbor involves the features: • Spanning Tree Protocol, page 25 • Unidirectional Link Detection-Aggressive Mode, page 26 • Trunking, page 29 • Port Aggregation Protocol (Channeling), page 31 • VLAN Trunking Protocol, page 37 Spanning Tree Protocol The spanning-tree algorithm provides path redundancy by defining a tree that spans all of the switches in an extended network and then forces certain redundant data paths into a standby (blocked) state. At regular intervals, the switches in the network send and receive spanning-tree packets that they use to identify the path. If one network segment becomes unreachable, or if spanning-tree costs change, the spanning-tree algorithm reconfigures the spanning-tree topology and reestablishes the link by activating the standby path. Note STP has limited use in the financial customer topology, so it receives limited attention in testing. The following test was performed: • Basic Spanning Tree Protocol Configuration, page 25 Basic Spanning Tree Protocol Configuration This test verified that various STP states occurred within the defined times, that STP properly converged with all switches pointing to the correct device as root, and that the CPU did not reach unreasonable levels. Devices under test: SH1-109, SH1-110, and Dista-2. Note Safe Harbor testing for Native IOS limits STP coverage because customer implementation is limited. Test Plan The procedure used to perform the basic functionality of Spanning Tree Protocol test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that trunk links are configured between SH1-109 and Dista-2 and also between SH1-110 and Dista-2. Step 5 Verify that SH2-109 is the root switch for all VLANs in the 10 to 20 range. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 25 Layer 2 Features Note The empty root port and root cost of 0 above signifies that this DUT is root on these VLANs. Step 6 Disable the link between SH1-110 and Dista-2. Step 7 Verify that spanning-tree converges and a new root is elected on each VLAN. Step 8 Disable the link between SH1-110 and Dista-2. Step 9 Verify that spanning-tree converges and the original root is reelected on each VLAN. Step 10 Verify that the DUT did not record any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Spanning tree convergence times should not exceed configured specifications. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 9 shows the basic Spanning Tree Protocol configuration test results. Table 9 Basic Spanning Tree Protocol Configuration Test Results Tests Results Basic Spanning Tree Protocol Configuration Pass Unidirectional Link Detection-Aggressive Mode The Unidirectional Link Detection (UDLD) protocol allows devices connected through fiber-optic or copper Ethernet cables (for example, Category 5 cabling) to monitor the physical status of the cables and detect when a unidirectional link exists. When a unidirectional link is detected, UDLD shuts down the affected port and alerts the user. Unidirectional links can cause a variety of problems, including spanning-tree topology loops and erroneous Layer 3 routing. In a bidirectional relationship, the UDLD-AM (aggressive mode) protocol disables the port at the end of a link-up sequence if no reply is received. However, UDLD goes into an undetermined state. The lowest value of a UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 seconds. Note The lowest value of UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 sec. By default, the HSRP hello timer is 3 sec. and the hold down timer is 10 sec. When the link becomes unidirectional, before the UDLD-AM can shut down the port, the HSRP will flap. After UDLD-AM shuts down the unidirectional port, the HSRP will stay up and be stable. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 26 Layer 2 Features Note The lowest value of UDLD-AM message interval can be only 7 seconds, and the hold down time can be 21 sec. By default, EIGRP hello timer is 5 sec. and hold down timer is 15 sec. When the link becomes unidirectional, before the UDLD-AM can shut down the port, the EIGRP neighbor will flap. After UDLD-AM shuts down the unidirectional port, the EIGRP neighbor will stay up and be stable. Note If UDLD mode or UDLD-AM are enabled globally on WFDM switches, the interface shows the UDLD message interval is 7 sec which is actually "running message interval." Once the UDLD neighbor is established, the message interval changed to 60 sec. See CSCdv74001, which is integrated in Herschel 8EX and will be in Cisco IOS Release 13E but not Cisco IOS Release 8E. The following tests were performed: • Basic UDLD on Layer 2 Link, page 27 • Basic UDLD on Layer 3 Link, page 28 Basic UDLD on Layer 2 Link This test created a unidirectional link between SH1-109 (DUT) and Dista-2. Console messages are logged during the mock failure, and port states are recorded. Test Plan The procedure used to perform the basic UDLD on Layer 2 link test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that UDLD is configured globally on the DUT and that UDLD Aggressive Mode is configured locally on the interface g7/3. Step 5 With terminal monitoring configured, pull the receive fiber from port 1/1 on Dista-2. Log any messages on the DUT. Step 6 Verify the interface state of g7/3 on the DUT. Step 7 Reconnect the send fiber. Step 8 Record any log messages on the DUT. Step 9 Verify the interface state. Issue the reset udld command on the DUT if the interface g7/3 does not return to up/up state. Step 10 Verify that the DUT did not record any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • UDLD should err-disable the port when the fiber was pulled. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 27 Layer 2 Features • The port should recover when the fiber is plugged back in. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 10 shows the basic UDLD on Layer 2 link test results. Table 10 Basic UDLD on Layer 2 Link Test Results Tests Results Basic UDLD on Layer 2 Link Pass Basic UDLD on Layer 3 Link This test emulated a unidirectional link on a Layer 3 interface. Console messages are logged, and interface states throughout the process. Devices under test: SH1-104, and SH1-109. Test Plan The procedure used to perform the basic UDLD on Layer 3 link test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that UDLD is configured globally on both DUTs and that UDLD Aggressive Mode is configured locally on the interfaces g4/15 of SH1-104 and g3/5 of SH1-109. Also verify that terminal monitoring is active on this session. Step 5 Once it has been verified that the interfaces connecting the DUTs are in state up/up, pull the send side of the g3/5 interface on SH1-109. Step 6 Record logging messages from both DUTs and their interface states. Step 7 Reconnect the fiber pulled out in Step 4. Use the reset udld command to verify the interfaces are again up/up. Step 8 Pull out the receive side of the g3/5 interface on SH1-109 and record all messages and the interface states from both DUTs. Step 9 Reconnect the fiber pulled out in Step 7. Use the reset udld command to verify the interfaces are again up/up. Step 10 Verify that the DUT did not record any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • UDLD should err-disable the port when the fiber was pulled. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 28 Layer 2 Features • The port should recover when the fiber is plugged back in. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 11 shows the basic UDLD on Layer 3 link test results. Table 11 Basic UDLD on Layer 3 Link Test Results Tests Results Basic UDLD on Layer 3 Link Pass Trunking A trunk is a point-to-point link between one or more switch ports and another networking device such as a router or a switch. Trunks carry the traffic of multiple VLANs over a single link and allow VLANs to be extended across an entire network. Table 12 lists and describes the five modes of trunking on Cisco switches. Table 12 Trunking Modes on Cisco Switches Mode Description On Local interface trunks. Sends Dynamic Trunking Protocol (DTP) packets. Puts the port into permanent trunking mode and negotiates to convert the link to a trunk link. The port becomes a trunk port even if the neighboring port does not agree to the change. Off Local interface does not trunk. Puts the port into nontrunking mode and negotiates to convert the link into a nontrunk link. The port becomes a nontrunk port even if the neighboring port does not agree to the change. Auto Local interface trunks if it receives DTP packets. Enables the port to convert the link to a trunk link. The port becomes a trunk port if the neighboring port is set to on or desirable mode. This is the default mode for Fast Ethernet and Gigabit Ethernet ports. Desirable Local interface sends DTP packets. Makes the port actively attempt to convert the link to a trunk line. The port becomes a trunk port if the neighboring port is set to on, desirable, or auto mode. Nonnegotiate Local interface forms a trunk and does not send DTP packets. Puts the port into permanent trunking mode, but prevents the port from generating DTP frames. You must configure the neighboring port normally as a trunk port to establish a trunk link. The following trunking tests were performed: • Supervisor 1 Configuration and Failure Recovery, page 29 • Supervisor 2 Configuration and Failure Recovery, page 30 Supervisor 1 Configuration and Failure Recovery In this procedure tested the configuration of both static and dynamically formed trunks, the recovery of both static and dynamic trunks, and trunk links that exist between SH1-107 and dista-1. These links were configured, then failed and recovered to verify that trunking is reestablished. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 29 Layer 2 Features Test Plan The procedure used to perform the trunking supervisor 1 configuration and failure recovery test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 The standard configuration for this link in the Safe Harbor network is both sides configured for static trunking. Verify this is the current configuration and the trunk is currently working. Step 5 Change the configuration on both sides to dynamic trunking, and verify that the ports begin trunking again. Step 6 Fail one of the trunking links on SH1-107 and verify that it is down. Step 7 Bring the port back up, and verify that the port begins trunking again. Step 8 Change the configuration on both sides back to static trunking, and verify that the ports begin trunking again. Step 9 Fail one of the trunking links on SH1-107 and verify that it is down. Step 10 Bring the port back up, and verify that the port begins trunking again. Step 11 Verify that the DUT did not record any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The DUT should be able to trunk in both static and dynamic mode. • The trunk port should recover from a port failure. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 13 shows the trunking supervisor 1 configuration and failure recovery test results. Table 13 Trunking Supervisor 1 Configuration and Failure Recovery Test Results Tests Results Supervisor 1 Configuration and Failure Recovery Pass Supervisor 2 Configuration and Failure Recovery In this procedure tested the configuration of both static and dynamically formed trunks, the recovery of both static and dynamic trunks, and trunk links that exist between SH1-109 and dista-1. These links were configured, then failed and recovered to verify that trunking is reestablished. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 30 Layer 2 Features Test Plan The procedure used to perform the trunking supervisor 2 configuration and failure recovery test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 The standard configuration for this link in the Safe Harbor network is both sides configured for dynamic trunking. Verify that this is the current configuration and the trunk is currently working. Note The lack of switchport mode configuration implies that the port is configured as desirable. Step 5 Change the configuration on both sides to static trunking, and verify that the ports begin trunking again. Step 6 Fail one of the trunking links on SH1-109 and verify that it is down. Step 7 Bring the port back up, and verify that the port begins trunking again. Step 8 Change the configuration on both sides back to dynamic trunking, and verify that the ports begin trunking again. Step 9 Fail one of the trunking links on SH1-109 and verify that it is down. Step 10 Bring the port back up, and verify that the port begins trunking again. Step 11 Verify that the DUT did not record any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The DUT should be able to trunk in both static and dynamic mode. • The trunk port should recover from a port failure. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 14 shows the trunking supervisor 2 configuration and failure recovery test results. Table 14 Trunking Supervisor 2 Configuration and Failure Recovery Test Results Tests Results Supervisor 2 Configuration and Failure Recovery Pass Port Aggregation Protocol (Channeling) The port aggregation protocol (PAgP) facilitates the automatic creation of EtherChannels by exchanging packets between Ethernet ports. PAgP packets are exchanged only between ports in auto and desirable modes. Ports configured in on or off mode do not exchange PAgP packets. The protocol learns the Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 31 Layer 2 Features capabilities of port groups dynamically and informs the other ports. Once PAgP identifies correctly matched EtherChannel links, it groups the ports into an EtherChannel. The EtherChannel is then added to the spanning tree as a single bridge port. EtherChannel includes four user-configurable modes: on, off, auto, and desirable. Only auto and desirable are PAgP modes. The auto and desirable modes can be modified with the silent and non-silent keywords. By default, ports are in auto silent mode. An EtherChannel distributes frames across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. EtherChannel frame distribution is based on a Cisco-proprietary hashing algorithm. The algorithm is deterministic; given the same addresses and session information, you always hash to the same port in the channel, preventing out-of-order packet delivery. The following tests were performed: • Basic Layer 2 Channeling Configuration, page 32 • Basic Layer 3 Channeling Configuration, page 33 • Gigabit Ethernet Module Reset, page 35 Basic Layer 2 Channeling Configuration In Native IOS, a port-channel interface is created, and then individual interfaces are joined to that port-channel interface. The configuration of the individual interfaces determines whether the channel is static or dynamic. This test verified the basic aspects of Layer 2 PAgP configuration to verify that the basic functionality worked correctly. A set of links between SH1-107 and Dista-1 was given a configuration for static channeling. Dynamic channeling was tested in the bundling of links between SH1-110 and Dista-2. In Native IOS, a port-channel interface is created, and then individual interfaces are joined to that port-channel interface. The configuration of those individual interfaces determines whether the channel is static or dynamic. Figure 9 shows the topology for PAgP Basic Layer 2 channeling configuration. Figure 9 PAgP Basic Layer 2 Channeling Topology Devices under test: SH1-107, and SH1-110. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 32 Layer 2 Features Test Plan The procedure used to perform the PAgP basic Layer 2 channeling test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that the channel between devices SH1-107 and Dista-1 is configured as a static channel. Step 3 Verify that the channel between devices SH1-110 and Dista-1 is configured as a dynamic channel. Expected Results The following test results are expected: • The Layer 2 channels should form with their respective static and dynamic configurations. Results Table 15 shows the PAgP basic Layer 2 channeling test results. Table 15 PAgP Basic Layer 2 Channeling Test Results Tests Results Basic Layer 2 Channeling Configuration Pass Basic Layer 3 Channeling Configuration This test verified Layer 3 port-channel functionality. This test verified static and dynamic channel configurations for each of the following combinations: dCEF::dCEF channels, non-dCEF::non-dCEF channels, and mixed::mixed (involving both non-dCEF and dCEF modules). Table 16 maps each of the six steps to the combination covered. Table 16 Step # Basic Layer 3 Channeling Configuration Matrix Devices dCEF? Channeling? Step 1 103-99 Yes Static Step 2 104-99 Yes Dynamic Step 3 103-109 Mixed Static Step 4 103-110 Mixed Dynamic Step 5 103-107 No Static Step 6 104-107 No Dynamic Figure 10 and Figure 11 show the topologies for PAgP basic Layer 3 channeling configuration. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 33 Layer 2 Features Figure 10 PAgP Basic Layer 3 Channeling Topology port-channel Figure 11 PAgP Basic Layer 3 Channeling Topology Devices under test: SH1-103, SH1-99, SH1-104, SH1-107, SH1-109, and SH1-110. Test Plan The procedure used to perform the PAgP basic Layer 3 channeling test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 The port-channel (4 ports) between SH1-103 (Po16) and SH1-99 (Po16) resides on dCEF-only modules. Verify that it is configured for static channeling and that it is functioning correctly. Step 3 The port-channel (4 ports) between SH1-104 (Po17) and SH1-99 (Po17) resides on dCEF-only modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. Step 4 The port-channel (4 ports) between SH1-103 (Po70) and SH1-109 (Po70) resides on mixed modules. Verify that it is configured for static channeling and that it is functioning correctly. Step 5 The port-channel (4 ports) between SH1-103 (Po71) and SH1-110 (Po71) resides on mixed modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 34 Layer 2 Features Step 6 The port-channel (4 ports) between SH1-103 (Po68) and SH1-107 (Po68) resides on non-dCEF modules. Verify that it is configured for static channeling and that it is functioning correctly. Step 7 The port-channel (4 ports) between SH1-104 (Po68) and SH1-107 (Po168) resides on non-dCEF modules. Verify that it is configured for dynamic channeling and that it is functioning correctly. Expected Results The following test results are expected: • The port-channels should form correctly in each configuration and line card combination. Results Table 17 shows the basic PAgP basic Layer 3 channeling test results. Table 17 Basic PAgP Layer 3 Channeling Test Results Tests Results Basic Layer 3 Channeling Configuration Pass Gigabit Ethernet Module Reset This test verified the ability of Layer 2 and Layer 3 EtherChannels to handle module resets and failures. The supervisor 1 and supervisor 2 were both tested with IXIA traffic (configured for 20 source IP addresses and 1 destination IP address) sent from Dista-1 to Dista-2. Two modules were reset, individually, on device SH1-108 (Sup1). One of the modules was involved in a Layer 2 Gigabit EtherChannel (GEC) and the other in a Layer 3 GEC. For Sup2 coverage, a single module was reset on SH1-110. This module has interfaces involved in both Layer 2 and Layer 3 GECs. Figure 12 shows the topology for PAgP Gigabit Ethernet module reset configuration: Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 35 Layer 2 Features Figure 12 PAgP Gigabit Ethernet Module Reset Topology Devices under test: SH1-108, and SH1-110. Test Plan The procedure used to perform the PAgP Gigabit Ethernet module reset test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Stop the background unicast traffic streams temporarily so that they do not interfere in the counter observation. Step 4 Begin an IXIA traffic stream, sourcing from 20 IP addresses, on Dista-1, destined for a single IP address connected to Dista-2. Step 5 Verify that the traffic is being load-balanced across all the aggregated interfaces of port-channels 10, 69, and 169 of device SH1-108. Step 6 Reset module 4 of SH1-108. This module has interfaces (g4/1-g4/4) that make up a Layer 2 channel and interfaces (g4/5-6) that make up half of a Layer 3 channel. Step 7 Verify that the channel reforms correctly after the module comes back online and that those interfaces on module 4 that were passing traffic before are again passing traffic. Step 8 Reset module 3 of SH1-108. This module has interfaces involved in two separate Layer 3 GECs (g3/1-g3/4 of port-channel 69 and g3/5-g3/6 of port-channel 169). Step 9 Verify that the interfaces on module 3 are aggregated back into port-channels 69 and 169 correctly, and that they are again passing traffic. Step 10 Verify that the interfaces on module 7 of SH1-110 that are involved in port-channels 20 and 71 are passing traffic. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 36 Layer 2 Features Step 11 Reset module 7 of SH1-110. This module has interfaces (g7/3 and g7/5) that are involved in a Layer 2 channel (port-channel 20) and an interface (g7/1) that is involved in a Layer 3 GEC (port-channel 71). Step 12 Verify that the interfaces in module 7 are aggregated back into their respective port-channels correctly and that they are again passing traffic. Step 13 Verify that the interfaces on module 3 that are involved in port-channels 71 and 171 are passing traffic. Step 14 Reset module 3 of SH1-110. This module has an interface (g3/1) that is involved in a Layer 3 channel (port-channel 71) and two interfaces (g3/3-4) that are involved in a Layer 3 GEC (port-channel 171). Step 15 Verify that the interfaces in module 3 are aggregated back into their respective port-channels correctly and that they are again passing traffic. Step 16 Restart the background unicast traffic streams. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Following the reset of the module, the interfaces on that module should be reaggregated back into their respective port-channels and again pass traffic. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 18 shows the PAgP Gigabit Ethernet module reset test results. Table 18 PAgP Gigabit Ethernet Module Reset Test Results Tests Results Gigabit Ethernet Module Reset Pass VLAN Trunking Protocol VLAN Trunking Protocol (VTP) is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can result in a number of problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations. You can use VTP to manage VLANs 1 to 1005 in your network. (Note that VTP does not support VLANs 1025 to 4094.) With VTP, you can make configuration changes centrally on one switch and have those changes automatically communicated to all the other switches in the network. The following test was performed: • Basic VLAN Trunking Protocol Configuration, page 37 Basic VLAN Trunking Protocol Configuration This procedure tests the various combinations of VTP client, server, and transparent modes between devices SH1-107 and Dista-1. With each combination that is tested, VLANs are configured and behavior is checked for normalcy. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 37 Layer 2 Features Device under test: SH1-107. Test Plan The procedure used to perform the basic VLAN trunking protocol configuration test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-107 and Dista-1 are in VTP transparent mode and that both devices are in the domain named FIN. Step 4 Verify that a trunk link is configured between SH1-107 (g4/1, g4/3) and Dista-1 (1/1, 2/1). Step 5 Run the script that will execute the remaining steps of this test. Step 6 Check the output of the script, to verify that both cases passed. Step 7 With both SH1-107 and Dista-1 in transparent mode, configure VLAN 200 on SH1-107. Step 8 Verify that VLAN 200 is created on SH1-107 but not on Dista-1. Step 9 Configure SH1-107 for VTP server mode (Dista-1 still in transparent mode) and add VLAN 201 to the VLAN database of SH1-107. Step 10 Verify that VLAN 201 is created on SH1-107 but not on Dista-1. Step 11 Configure Dista-1 for VTP mode client (SH1-107 is server) and add VLAN 202 to the VLAN database on SH1-107. Step 12 Verify that VLAN 202 was added to both SH1-107 and Dista-1. Step 13 Configure Dista-1 for VTP server mode (SH1-107 in server mode), and add VLAN 203 to SH1-107. Step 14 Verify that VLAN 203 is created on both SH1-107 and Dista-1. Step 15 With SH1-107 and Dista-1 both in server mode, enable VTP Version 2 on Dista-1 (VTP V2 disabled on SH1-107). Step 16 Configure VLAN 204 on SH1-107. Step 17 Verify that VLAN 204 is created on both SH1-107 and Dista-1. Step 18 With the same VTP configurations as in Step 13, create VLAN 205 on Dista-1. Step 19 Verify that VLAN 205 is created on both SH1-107 and Dista-1. Step 20 With SH1-107 in server mode, configure Dista-1 for VTP transparent mode and SH1-108 for VTP client mode. Step 21 Configure VLAN 206 on SH1-107. Step 22 Verify that VLAN 206 is not created on Dista-1 but is created on SH1-108. Step 23 Verify the CPU and memory of the device under test. Expected Results The following test results are expected: • When a switch is in VTP transparent mode, it should not accept any VLAN changes from a VTP server but should still forward the changes to other VTP switches in the domain. Locally created VLANs should not be propagated to other VTP clients or VTP servers. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 38 Layer 2 Features • When a switch is in VTP client mode, it should accept VLAN changes from a VTP server, but no changes should be allowed locally. • When a switch is in VTP server mode, local VLAN changes should be propagated to other VTP servers and VTP clients. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 19 shows the basic VLAN trunking protocol configuration test results. Table 19 Basic VLAN Trunking Protocol Configuration Test Results Tests Results Basic VLAN Trunking Protocol Configuration Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 39 Hardware Forwarding Features Hardware Forwarding Features Hardware forwarding testing for Safe Harbor involves these features: • IP Unicast, page 40 • IP Multicast, page 44 IP Unicast The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. IP handles addressing, fragmentation, reassembly, and protocol demultiplexing. It is the foundation on which all other IP protocols (collectively referred to as the IP Protocol suite) are built. A network-layer protocol, IP contains addressing and control information that allows data packets to be routed. The Transmission Control Protocol (TCP) is built upon the IP layer. TCP is a connection-oriented protocol that specifies the format of data and acknowledgments used in the transfer of data. TCP also specifies the procedures that the networking devices use to verify that the data arrives correctly. TCP allows multiple applications on a system to communicate concurrently because it handles all demultiplexing of the incoming traffic among the application programs. The following tests were performed: • Layer 2 Gigabit EtherChannel Failover—Supervisor 1, page 40 • Layer 2 Gigabit EtherChannel Failover—Supervisor 2, page 41 • Layer 3 Gigabit EtherChannel Failover, page 42 Layer 2 Gigabit EtherChannel Failover—Supervisor 1 This test sent traffic over an Layer 2 GEC, and the links in that GEC were failed one at a time until the traffic was forced to find a different path to the destination. Devices under test: SH1-108, which has an Layer 2 GEC connecting it with Dista-1. Test Plan The procedure used to perform the Layer 2 Gigabit EtherChannel failover—supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the GEC (interface port-channel 10) between the SH1-108 and Dista-1 is up and the appropriate physical interfaces are active within that channel. Step 5 Start an IXIA traffic stream emulating 20 IP sources on Dista-1 sending to a single destination on Dista-2. Step 6 Verify that the first-hop for this traffic is the SH1-108 (HSRP active router). Step 7 Use the etherchannel loadbalance command on the switch processor (SP) to verify that load is being distributed evenly over all four interfaces of the GEC, based on source/destination IP pair. Step 8 Shut down one interface of the GEC on the SH1-108. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 40 Hardware Forwarding Features Step 9 Measure any traffic loss and verify that the traffic load is being balanced again over the remaining links. Step 10 Repeat Step 8 through Step 9 three more times, until all interfaces of the SH1-108 have been shut down. Step 11 Verify that all traffic now goes through SH1-107 (HSRP Standby Router) and measure traffic loss. Step 12 Bring all the interfaces that have been shut down back up, so that port-channel 10 is up/up and all traffic flows through DUT again. Step 13 Measure any traffic loss. Step 14 Shut down all interfaces in port-channel 10 at once. Step 15 Measure traffic loss. Step 16 Verify that the DUT did not record any tracebacks. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 18 Bring all the interfaces that have been shut down back up, so that port-channel 10 is up/up. Expected Results The following test results are expected: • When one port in EtherChannel is shut down, traffic should fail to operation ports. • When the entire EtherChannel goes down, traffic should fail to the standby HSRP router. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 20 shows the Layer 2 Gigabit EtherChannel failover—supervisor 1 test results. Table 20 Layer 2 Gigabit EtherChannel Failover—Supervisor 1 Test Results Tests Results Layer 2 Gigabit EtherChannel Failover—Supervisor 1 Pass Layer 2 Gigabit EtherChannel Failover—Supervisor 2 This test verified that traffic was sent over a Layer 2 GEC, and the links in that GEC was failed one at a time until the traffic is forced to find a different path to the destination. Devices under test: SH1-110, which has an Layer 2 GEC connecting it with Dista-2. Test Plan The procedure used to perform the Layer 2 Gigabit EtherChannel failover—supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the GEC (interface port-channel 20) between the DUT (now SH1-110) and Dista-2 is up and the appropriate physical interfaces are active within that channel. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 41 Hardware Forwarding Features Step 5 Start an IXIA traffic stream emulating 20 IP sources on Dista-2 sending to a single destination on Dista-1. Step 6 Verify that the first hop for this traffic is the DUT (HSRP active router). Step 7 Use the etherchannel loadbalance command on the SP to verify that load is being distributed evenly over all four interfaces of the GEC, based on source/destination IP pair. Step 8 Shut down one interface of the GEC on the DUT. Step 9 Measure any traffic loss and verify that the traffic load is being balanced again over the remaining links. Step 10 Repeat Step 8 through Step 9 three more times, until all interfaces of the SH1-110 have been shut down. Step 11 Verify that all traffic now goes through SH1-109 (HSRP Standby Router) and measure traffic loss. Step 12 Bring all the interfaces that have been shut down back up, so that port-channel 20 is up/up and all traffic flows through DUT again. Step 13 Measure any traffic loss. Step 14 Shut down all interfaces in port-channel 20 at once. Step 15 Measure traffic loss. Step 16 Verify that the DUT did not record any tracebacks. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 18 Bring all the interfaces that have been shut down back up, so that port-channel 20 is up/up. Expected Results The following test results are expected: • When one port in EtherChannel is shut down, traffic should fail to operation ports. • When the entire EtherChannel goes down, traffic should fail to the standby HSRP router. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 21 shows the Layer 2 Gigabit EtherChannel failover—supervisor 2 test results. Table 21 Layer 2 Gigabit EtherChannel Failover—Supervisor 2 Test Results Tests Results Layer 2 Gigabit EtherChannel Failover—Supervisor 2 Pass Layer 3 Gigabit EtherChannel Failover This test verified the ability of a system to cope with a Layer 3 GEC failure, with a minimum amount of traffic loss. IXIA traffic was directed through the Layer 3 GEC being tested, and the Layer 3 GEC will undergo a forced failure, first one interface at a time, and then all interfaces at once. With the GEC between SH1-108 and SH1-103 being tested, coverage for both the supervisor 1 (SH1-108) and the supervisor 2 (SH1-103) is included in a single procedure. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 42 Hardware Forwarding Features Test Plan The procedure used to perform the Layer 3 Gigabit EtherChannel failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the GEC (interface port-channel 69) between the DUT (SH1-108) and SH1-103 is up and that the appropriate physical interfaces are active within that channel. Step 5 Change the OSPF cost on port-channel 169 between SH1-108 and SH1-104 so that port-channel 69 will be preferred until all ports in that channel are shut down. Step 6 Start an IXIA traffic stream emulating 20 IP sources on Dista-1 sending to a single destination on Dista-2. Step 7 Verify that this traffic is being forwarded through the Layer 3 port-channel under test. Step 8 Use the etherchannel loadbalance command on the SP to verify that load is being distributed evenly over all four interfaces of the GEC, based on source/destination IP pair. Step 9 Shut down one interface of the GEC on the DUT. Step 10 Measure any traffic loss and verify that the traffic load is being balanced again over the remaining links. Step 11 Repeat Step 9 through Step 10 three more times, until all interfaces of the GEC have been shut down. Step 12 Verify that all traffic now goes through SH1-104 and measure traffic loss. Step 13 Bring all the interfaces that have been shut down back up, so that port-channel 69 is up/up and all traffic flows through DUT again. Step 14 Measure any traffic loss. Step 15 Shut down all interfaces in port-channel 69 at once. Step 16 Measure traffic loss. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 18 Bring all the interfaces that have been shut down back up, so that port-channel 69 is up/up. Expected Results The following test results are expected: • When one port in EtherChannel is shut down, traffic should fail to operation ports. • When the entire EtherChannel goes down, traffic should fail to the other route. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 22 shows the Layer 3 Gigabit EtherChannel failover test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 43 Hardware Forwarding Features Table 22 Layer 3 Gigabit EtherChannel Failover Test Results Tests Results Layer 3 Gigabit EtherChannel Failover Pass IP Multicast Traditional IP communication allows a host to send packets to a single host (unicast transmission) or to all hosts (broadcast transmission). IP multicast provides a third scheme, allowing a host to send packets to a subset of all hosts (group transmission). These hosts are known as group members. Packets delivered to group members are identified by a single multicast group address. Multicast packets are delivered to a group using best-effort reliability, just like IP unicast packets. The multicast environment consists of senders and receivers. Any host, regardless of whether it is a member of a group, can send to a group. However, only the members of a group receive the message. A multicast address is chosen for the receivers in a multicast group. Senders use that address as the destination address of a datagram to reach all members of the group. Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on the location or number of members in a multicast group. A host can be a member of more than one multicast group at a time. Note On PFC1, the (*, G) can only be software switched. If the ip pim spt-threshold infinity command is used on PFC1, there may be high CPU usage, and multicast packets might be lost under heavy traffic. Note For this iteration of Safe Harbor Native IOS testing, and for all subsequent iterations, the following interfaces have been equipped with the Texas-2 GBIC, which sends Gigabit Ethernet over copper: SH1-103: g7/13 & g8/13, SH1-110: g3/1 & g7/1. Note All tests have been run with the mls ip multicast consistency-checker command enabled. The following tests were performed: • Local Multicast, page 45 • Regional Multicast with IGMP Functionality, page 46 • Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 1, page 48 • Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 2, page 50 • Gigabit EtherChannel Failover: Non-dCEF, page 53 • Gigabit EtherChannel Failover: Mixed-dCEF, page 55 • Gigabit EtherChannel Failover: dCEF, page 58 • Switch Fabric Module Failover, page 60 • Gigabit Ethernet Module Failover—Supervisor 1, page 62 • Gigabit Ethernet Module Failover—Supervisor 2, page 64 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 44 Hardware Forwarding Features • Protocol Independent Module-Designated Router Failover—Supervisor 11, page 66 • Protocol Independent Module-Designated Router Failover—Supervisor 22, page 68 • Auto-Rendezvous Point Functionality and Failover, page 70 • Layer 3 Interface Multicast Negative, page 72 • Protocol Independent Module-Rendezvous Point Failover—Supervisor 22, page 74 • MSDP Failover, page 76 Local Multicast This test verified multicast functionality on a local level, including the creation of hardware shortcuts for multicast entries. In this test, IXIA was used to send traffic streams to five multicast groups, 239.255.8.100 through 239.255.8.104. The traffic entered the network at an interface on SH1-108, and exited the network at three points, one on SH1-108 and two on Dista-1. Two million packets were sent at a rate of 10,000 pps. Figure 13 shows the topology for local multicast. Figure 13 Local Multicast Topology Device under test: SH1-108. Test Plan The procedure used to perform the local multicast test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Start the IGMP join traffic for the five multicast groups 239 255.8.100 through 239.255.8.104 on IXIA ports 8/1 (Dista-1 4/1), 8/2 (Dista-1 4/6), and 7/1 (SH1-108 g3/8). Step 4 Begin sending traffic on IXIA port 7/2. Step 5 Verify that the proper (S, G) entries are created on SH1-108. Step 6 Verify that the multicast traffic is being hardware-switched. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 45 Hardware Forwarding Features Step 7 Verify that all multicast traffic that is sent is also received by the intended interfaces and ports. Step 8 Stop the test traffic stream and the IXIA IGMP reports. Step 9 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • That the multicast traffic for all 5 groups should be delivered to each intended recipient. • That the 5 multicast traffic flows to be hardware-switched in device under test. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 23 shows the local multicast test results. Table 23 Local Multicast Test Results Tests Results Local Multicast Pass Regional Multicast with IGMP Functionality Internet Group Management Protocol (IGMP) software components run on both the Cisco router and the switch. An IGMP-capable IP multicast router sees all IGMP packets and can inform the switch when specific hosts join or leave IP multicast groups. When the IGMP-capable router receives an IGMP control packet, it creates an IGMP packet that contains the request type (either join or leave), the multicast group address, and the MAC address of the host. The router sends the packet to a well-known address to which all switches listen. When a switch receives the packet, the supervisor engine interprets the packet and modifies the forwarding table automatically. Cisco Group Management Protocol (CGMP) should seamlessly integrate with IGMP and performs the same function. This test verified IGMP and CGMP basic functionality, including the IGMP and CGMP status, and verified that no multicast traffic was flooded into ports that do not have a multicast client. IGMP joins generated by IXIA-8/2 are sent to Dista-1 4/6 (VLAN 16) for multicast groups 239.255.104.105 through 239.255.104.109. Traffic for these groups was generated by IXIA 8/1 and sent to Dista-1 4/1 (VLAN 11). The traffic was 2 million packets sent at a rate of 10,000 pps. Success of the test was measured by 100 percent of traffic being received by the single receiver interface, no traffic going to unintended interfaces, and no sustained or abnormal impact to the memory or CPU utilization. Figure 14 shows the topology for regional multicast with IGMP functionality. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 46 Hardware Forwarding Features Figure 14 Regional Multicast Topology Devices under test: SH1-104, and SH1-108. Test Plan The procedure used to perform the regional multicast with IGMP functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT threshold for the devices under test is configured for "infinity." If it is not, reconfigure the devices so that it is. Step 4 Start the IGMP join messages on IXIA port 8/2 (Dista-1 4/6). Step 5 Stop the background traffic stream on IXIA port 8/1. Step 6 Begin sending multicast traffic using IXIA port 8/1 into Dista-1 port 4/1. Step 7 Verify that device SH1-104 is the primary PIM-RP for multicast groups 239.255.104.105 through 239.255.104.109. Step 8 On Dist A-1, determine that IGMP is working correctly by looking at the IGMP status. Step 9 Verify that the primary PIM-RP, SH1-104, has the necessary entries in its multicast routing (mroute) table (including the correct outgoing interface list) and the necessary multicast multilayer switching (MMLS) entries. Step 10 Verify that the PIM-DR for its local segment, SH1-108, has the correct entries in its mroute table (including the correct outgoing interface list) and the necessary MMLS entries. Step 11 Verify that 100 percent of packets sent were received by the appropriate port and not by the unintended interfaces. Step 12 Restart the background traffic stream that was stopped in Step 5 and stop the IGMP reports that were started for this test. Step 13 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 47 Hardware Forwarding Features Expected Results The following test results are expected: • IGMP and CGMP basic functionality should work properly, and that no multicast traffic is flooded into ports that do not have a multicast client. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 24 shows the regional multicast with IGMP functionality test results. Table 24 Regional Multicast with IGMP Functionality Test Results Tests Results Regional Multicast with IGMP Functionality Pass Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 1 Stub multicast routing allows you to configure remote and stub routers as IGMP proxy agents. Instead of fully participating in PIM, these stub routers simply forward IGMP messages from the hosts to the upstream multicast router. This test verified that the multicast stub command worked and that non-Reverse Path Forwarding (RPF) rate limiting functionality worked on Policy Feature Cards (PFC1 and PFC2), and dCEF, including a hardware shortcut. PFC1, PFC2, and the DFCs support ACL-based filtering of RPF failures for sparse mode stub networks. When you enable the ACL-based method of filtering Reverse Path Forwarding failures by entering the mls ip multicast stub command on the redundant router, the ACLs automatically download to the PFC and are applied to the interface you specify. The ACLs filter Reverse Path Forwarding failures and drop them in hardware so that they are not forwarded to the router. This test grades multicast stub functionality on the PFC1 (on SH1-107). Multicast traffic was sent from one side of the network to the other (from Dista-2 to Dista-1). As a component of this test, the non-RPF rate-limiting functionality was observed. In this part of the test, SH1-107 was configured to be the multicast stub router. Five groups of multicast traffic (groups 239.255.104.110 through 239.255.104.114) were sent from Dista-2. Joins for these five groups were sent from Dista-1. The IP address of the remote interface connecting SH1-107 to SH1-104 was configured as the IGMP helper address. The IGMP join packets that were received by SH1-107 were forwarded via this address statement to SH1-104. All five groups should appear on SH1-104, when the show ip igmp groups command is used. Coupled with the mls ip multicast stub command on SH1-107 is the ip pim neighbor-filter access-list command configured on SH1-104. This configuration blocked PIM neighbor updates coming from SH1-107, and made SH1-107 truly transparent to the rest of multicast functionality. Figure 15 shows the topology for the Non-RFP rate limiting and multicast stub—supervisor 1 test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 48 Hardware Forwarding Features Figure 15 Multicast Stub—Supervisor 1 Topology Devices under test: SH1-107, SH1-108, and SH1-104. Test Plan The procedure used to perform the non-RPF rate limiting and multicast stub—supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that the SPT threshold is set to infinity on devices SH1-107 and SH1-108. If it is not, configure it to be so. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Configure the VLAN 11 interface (source of IGMP joins) on SH1-107 as a multicast stub. Step 5 Configure the IP helper address for SH1-107 VLAN 11, the address on SH1-104 to which SH1-107 will forward the IGMP join packets. Step 6 Configure SH1-104 to filter out IP PIM neighbor updates coming from SH1-107 on the interface port-channel 169. Step 7 Verify that access list 10 exists and points to the correct IP address of the blocked PIM updates (the IP address of the interface on SH1-107 connected to SH1-104, or 172.31.1.102). Step 8 Begin the IGMP join messages for the five multicast groups on Dista-1 port 4/1 (IXIA port 8/1). Step 9 Begin the IXIA traffic stream for the five multicast groups on Dista-2 port 2/1. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 49 Hardware Forwarding Features Step 10 Verify that the IGMP join messages have been forwarded from SH1-107 to SH1-104 and that SH1-104 does not register SH1-107 as an IP PIM neighbor. Step 11 Verify that RPF rate limiting is done in hardware on the stub router. Step 12 Determine the path of traffic to the receiver, starting at SH1-104 (the rendezvous point). Traffic is expected to be sent out both interfaces of port-channel 68 and port-channel 69 from SH1-104, to SH1-107 and SH1-108, respectively, because there are IGMP joins coming from port-channel 68 (forwarded from SH1-107) and PIM requests coming from port-channel 69 (from SH1-108). The traffic should be forwarded, beyond that, only by SH1-108, because that is the PIM-DR for that segment. SH1-107 should not be forwarding traffic. Step 13 Verify that 100 percent of the multicast traffic that was sent is received on the appropriate port (zero packet loss). Step 14 Negate the commands configured in Step 4 through Step 6. Step 15 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SH1-107 should act as a multicast stub router and forward IGMP packets to its helper address, on SH1-104. • SH1-104 should receive and process the IGMP packets sent by SH1-107. • SH1-104 should not have SH1-107 listed in its PIM neighbor table when the neighbor-filter command is configured. • Rate-limiting of non-RPF failures should be done in hardware. • All traffic sent should be received by the appropriate receivers, following the correct path. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 25 shows the non-RPF rate limiting and multicast stub—supervisor 1 test results. Table 25 Non-RFP Rate Limiting and Multicast Stub—Supervisor 1Test Results Tests Results Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 1 Pass Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 2 Stub multicast routing allows you to configure remote and stub routers as IGMP proxy agents. Instead of fully participating in PIM, these stub routers simply forward IGMP messages from the hosts to the upstream multicast router. This test verified that the multicast stub command worked and that non-Reverse Path Forwarding (RPF) rate limiting functionality worked on Policy Feature Cards (PFC1 and PFC2), and dCEF, including a hardware shortcut. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 50 Hardware Forwarding Features PFC1, PFC2, and the DFCs support ACL-based filtering of RPF failures for sparse mode stub networks. When you enable the ACL-based method of filtering RPF failures by entering the mls ip multicast stub command on the redundant router, the ACLs automatically download to the PFC and are applied to the interface you specify. The ACLs filter Reverse Path Forwarding failures and drop them in hardware so that they are not forwarded to the router. Multicast traffic was sent from one side of the network to the other (from Dista-1 to Dista-2). As a component of this test, the non-RPF rate limiting functionality was observed. In this part of the test, SH1-109 was configured to be the multicast stub router. Five groups of multicast traffic (groups 239.255.104.115 through 239.255.104.119) were sent from an IXIA port connected to Dista-1. Joins for these five groups were sent from an IXIA port connected to Dista-2. The IP address of the remote interface connecting SH1-109 to SH1-104 was configured as the IGMP helper address. The IGMP join packets that are received by SH1-109 were forwarded via this address statement to SH1-104. All five groups should appear on SH1-104, when the show ip igmp groups command is used. Coupled with the mls ip multicast stub command on SH1-109 is the ip pim neighbor-filter access-list command configured on SH1-104. This configuration blocked PIM neighbor updates coming from SH1-109, and made SH1-109 truly transparent to the rest of multicast functionality. Figure 16 shows the topology for Non-RPF rate limiting and multicast stub—supervisor 2 test. Figure 16 Multicast Stub—Supervisor 2 Topology Devices under test: SH1-109, SH1-110, and SH1-104. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 51 Hardware Forwarding Features Test Plan The procedure used to perform the non-RPF rate limiting and multicast stub—supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that the SPT threshold is set to infinity on devices SH1-109 and SH1-110. If it is not, configure it to be so. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Configure the VLAN 11 interface (source of IGMP joins) on SH1-109 as a multicast stub. Step 5 Configure the IP helper address for SH1-109 VLAN 11, the address on SH1-104 to which SH1-107 will forward the IGMP join packets. With this helper address configured, SH1-109 will process the IGMP packets itself, and will also forward them to SH1-104. Step 6 Configure SH1-104 to filter out IP PIM neighbor updates coming from SH1-109 on the interface port-channel 170. Step 7 Verify that access list 20 exists and points to the correct IP address of the blocked PIM updates (the IP address of the interface on SH1-109 connected to SH1-104, or 172.31.1.110). SH1-104 will no longer accept PIM updates from SH1-109. This access list will cause any traffic coming from SH1-109 (IP address 172.31.1.110, the address of the remote side of port-channel 70, which is SH1-104's connection to SH1-109), including PIM neighbor updates, to be denied. Step 8 Begin the IGMP join messages for the five multicast groups on Dista-2 port 2/1 (IXIA port 10/1). Step 9 Begin the IXIA traffic stream for the five multicast groups on Dista-1 port 4/6. Step 10 Verify that the IGMP join messages have been forwarded from SH1-109 to SH1-104 and that SH1-104 does not register SH1-109 as an IP PIM neighbor. Step 11 Verify that RPF rate limiting is done in hardware on the stub router. Step 12 Determine the path of traffic to the receiver, starting at SH1-104 (the rendezvous point). Traffic is expected to be sent out both interfaces, port-channel s 70 and 71 from SH1-104, to SH1-109 and SH1-110, respectively, because there are IGMP joins coming from port-channel 70 (forwarded from SH1-109) and PIM requests coming from port-channel 71 (from SH1-110). The traffic should be forwarded, beyond that, only by SH1-110, because that is the PIM-DR for that segment. SH1-109 should not be forwarding traffic. Step 13 Verify that 100 percent of the multicast traffic that was sent is received on the appropriate port (zero packet loss). A script was used to start the test traffic stream and collect statistics. Step 14 Negate the commands configured in Step 4 through Step 6. Step 15 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SH1-109 should act as a multicast stub router and forward IGMP packets to its helper address, on SH1-104. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 52 Hardware Forwarding Features • SH1-104 should receive and process the IGMP packets sent by SH1-109. • SH1-104 should not have SH1-109 listed in its PIM neighbor table, when the neighbor-filter command is configured. • Rate limiting of non-RPF failures should be done in hardware. • All traffic sent should be received by the appropriate receivers, following the correct path. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 26 shows the non-RPF rate limiting and multicast stub—supervisor 2 test results. Table 26 Non-RFP Rate Limiting and Multicast Stub—Supervisor 2 Test Results Tests Results Non-Reverse Path Forwarding Rate Limiting and Multicast Stub—Supervisor 2 Pass Gigabit EtherChannel Failover: Non-dCEF This test verified multicast and MSDP functionality during a non distributed Cisco Express Forwarding (dCEF) GEC failover. Traffic for multicast groups 239.255.104.115 through 239.255.104.119 was sent out via IXIA from Dista-1 and received at Dista-2. Traffic was sent at a rate of 10,000 pps. The port-channel between devices SH1-104 (Po69) and SH1-108 (Po169) was failed, first two of four ports, then all four ports. Figure 17 shows the topology for non-dCEF Gigabit EtherChannel failover test. Figure 17 Non-dCEF Gigabit EtherChannel Failover Topology Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 53 Hardware Forwarding Features Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Note Background traffic remained running for this test at a rate of 25,000 pps. Results for zero-packet loss of this traffic are not given, though, because the test involved failovers and traffic was certain to be lost. Test Plan The procedure used to perform the Gigabit EtherChannel failover: non-dCEF test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that SH1-103 and SH1-104 are running MSDP Anycast and are peered with each other. Step 3 Verify that the SPT-threshold is configured for "infinity" on devices SH1-109 and SH1-110. Step 4 Begin monitoring memory and CPU utilization for the devices being tested. Step 5 Start IGMP join traffic for multicast groups 239.255.104.115 through 239.255.104.119 on IXIA port 10/1, which is connected to Dista-2 2/1. Step 6 Start the test traffic stream. Step 7 Configure the test traffic stream to run in continuous mode. Step 8 Verify that SH1-104 is the primary PIM rendezvous point for the given multicast groups and that SH1-108 is forwarding the test multicast group traffic to SH1-104. Step 9 Verify that the MMLS entries for the test multicast groups are consistent with the mroute entries seen. Step 10 Verify that the modules connecting SH1-104 and SH1-108 are non-dCEF modules. The ports connecting them are g8/7-g8/10 on the SH1-104 side, and g3/5-6, g4/5-6 on the SH1-108 side. Step 11 Use the test etherchannel command on the supervisor (SP, not Route Processor) of SH1-108 to verify that each link of the GEC should pass some multicast traffic. Step 12 Verify that traffic is actually being passed across each of the physical interfaces using the interface counters. Step 13 Configure the test traffic stream to stop after sending 500,000 packets. Step 14 Stop and restart the test traffic stream. Step 15 Fail two links of the 4-port GEC between SH1-104 and SH1-108, forcing some multicast traffic to move to two other links. Step 16 Measure any traffic loss. Step 17 Verify that traffic is now flowing through device SH1-107, which has the lower OSPF cost to SH1-104 now, and that the mroute table entries on SH1-104 and SH1-107 are consistent with the devices' respective MMLS entries. Step 18 Bring up the two links that were failed. Step 19 Verify that traffic is flowing again through SH1-108, and that the mroute table entries on SH1-104 and SH1-108 are consistent with the devices' respective MMLS entries. Step 20 Restart the IXIA test traffic stream. Step 21 Fail the entire port-channel interface between SH1-104 and SH1-108, forcing multicast traffic to go through SH1-107 to get to SH1-104. Step 22 Measure the traffic loss. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 54 Hardware Forwarding Features Step 23 Verify that traffic is now flowing through device SH1-107, and that the mroute table entries on SH1-104 and SH1-107 are consistent with the devices' respective MMLS entries. Step 24 Bring the channel back online. Step 25 Verify that traffic once again flows through SH1-108, and that the mroute table entries on SH1-104 and SH1-108 are consistent with the devices' respective MMLS entries. Step 26 Fail the port-channel interface four more times, recording the traffic loss each time. Step 27 Determine the average amount of downtime over the five tests. Step 28 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should failover and be forwarded by SH1-107 when half and then all of the port-channel between SH1-108 and SH1-104 is torn down. • Failover should take place in a reasonable time (within the 10-second HSRP dead timer value). • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 27 shows the Gigabit EtherChannel failover: non-dCEF test results. Table 27 Gigabit EtherChannel Failover: Non-dCEF Test Results Tests Results Gigabit EtherChannel Failover: Non-dCEF Pass Gigabit EtherChannel Failover: Mixed-dCEF This test verified multicast and MSDP functionality during the failover of a port-channel on dCEF and non-dCEF modules. There is a four-port-channel between devices SH1-103 and SH1-110. On the SH1-103 side, those four ports are divided evenly between two modules, a dCEF-capable module and a non-dCEF module. During this test, multicast traffic was sent from Dista-2 to Dista-1. The two ports on the non-dCEF module were disabled and enabled, one port on each dCEF and non-dCEF module was disabled and enabled, both ports on the dCEF card were disabled and enabled, and, all four ports were disabled and enabled. Traffic for multicast groups 239.255.104.120 through 239.255.104.124 was sent at a rate of 10,000 pps. The source IP address of the traffic streams is incremented so that the traffic is coming from four sources which assures that traffic was distributed over all the interfaces in the port-channel. Note Applicable to this test, among others, is the static topology change in which SH1-103 interfaces g7/13 and g8/13, and SH1-110 g3/1 and g7/1, are using the Texas 2 GBICs (WS-X5383) to run Gigabit Ethernet over copper. Figure 18 shows the topology for the mixed-dCEF Gigabit EtherChannel failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 55 Hardware Forwarding Features Figure 18 Mixed-dCEF Gigabit EtherChannel Failover Topology Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Test Plan The procedure used to perform the Gigabit EtherChannel failover: mixed-dCEF test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that SH1-103 and SH1-104 are running MSDP Anycast and are peered with each other. Step 3 Verify that the SPT-threshold is configured for "infinity" on devices SH1-107 and SH1-108. Step 4 Begin monitoring memory and CPU utilization for the devices being tested. Step 5 Configure the OSPF cost to be 100 on the Loop back 1 interface of SH1-104. This will cause SH1-103 to become the RP for the multicast groups under test. Step 6 Start IGMP join traffic for multicast groups 239.255.104.120 through 239.255.104.124 on IXIA port 8/2, which is connected to Dista-1 4/6. Step 7 Start the test traffic stream. Step 8 Configure the test traffic stream to run in continuous mode. Step 9 Verify that SH1-103 is the primary PIM rendezvous point for the given multicast groups and that SH1-110 is forwarding the test multicast group traffic to SH1-103. Step 10 Verify that the MMLS entries for the test multicast groups are consistent with the mroute entries seen. Step 11 Verify that the modules connecting SH1-103 and SH1-110 are mixed-dCEF modules. The ports connecting them are g7/13-14, g8/13-14 on the SH1-103 side, and g3-4/1, g7-8/1 on the SH1-110 side. Step 12 Use the test etherchannel command on the supervisor (SP, not Route Processor) of SH1-110 to verify that each link of the GEC should pass some multicast traffic. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 56 Hardware Forwarding Features Step 13 Verify that traffic is actually being passed across each of the physical interfaces using the interface counters. Step 14 Configure the test traffic stream to stop after sending 500,000 packets. Step 15 Stop and restart the test traffic stream. Step 16 Fail interfaces g7/1 and g8/1 on SH1-110 of the 4-port GEC between SH1-103 and SH1-110, forcing some multicast traffic to move to two other links. Measure any traffic loss. Step 17 Verify that traffic is now flowing through device SH1-109, which has the lower OSPF cost to SH1-110 now, and that the mroute table entries on SH1-103 and SH1-109 are consistent with the devices' respective MMLS entries. Step 18 Bring up the two links failed. Step 19 Verify that traffic is flowing again through SH1-110. Step 20 Verify that the mroute table entries on SH1-103 and SH1-110 are consistent with the devices' respective MMLS entries. Step 21 Start the IXIA traffic stream again. Step 22 Fail interfaces g3/1 and g7/1 on SH1-110 of the 4-port GEC between SH1-103 and SH1-110, forcing some multicast traffic to move to two other links. Step 23 Measure any traffic loss. Step 24 Verify that traffic is flowing through device SH1-109, which has the lower OSPF cost to SH1-103 now, and that the mroute table entries on SH1-103 and SH1-109 are consistent with the devices' respective MMLS entries. Step 25 Bring up the two links failed. Step 26 Verify that traffic is flowing again through SH1-110, and that the mroute table entries on SH1-103 and SH1-110 are consistent with the devices' respective MMLS entries. Step 27 Fail interfaces g3/1 and g4/1 on SH1-110 of the 4-port GEC between SH1-103 and SH1-110, forcing some multicast traffic to move to two other links. Step 28 Measure any traffic loss. Step 29 Verify that traffic is flowing through device SH1-109, which has the lower OSPF cost to SH1-103 now, and that the mroute table entries on SH1-103 and SH1-109 are consistent with the devices' respective MMLS entries. Step 30 Bring up the two links failed. Step 31 Verify that traffic is flowing again through SH1-110, and that the mroute table entries on SH1-103 and SH1-110 are consistent with the devices' respective MMLS entries. Step 32 Restart the IXIA test traffic stream. Step 33 Fail the entire port-channel interface between SH1-103 and SH1-110, forcing multicast traffic to go through SH1-109 to get to SH1-103. Step 34 Measure the traffic loss. Step 35 Verify that traffic is now flowing through device SH1-109, and that the mroute table entries on SH1-104 and SH1-109 are consistent with the devices' respective MMLS entries. Step 36 Bring the channel back online. Step 37 Verify that traffic once again flows through SH1-110. Step 38 Verify that the mroute table entries on SH1-103 and SH1-110 are consistent with the devices' respective MMLS entries. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 57 Hardware Forwarding Features Step 39 Fail the port-channel interface four more times, recording the traffic loss each time. Step 40 Determine the average amount of downtime over the five tests. Step 41 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should failover and be forwarded by SH1-109 when half and then all of the port-channel between SH1-110 and SH1-103 is torn down. • This failover should take place in a reasonable time (within the 10-second HSRP dead timer value). • There should be a consistency in the information contained in the MMLS entries and the mroute entries for each test group. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 28 shows the Gigabit EtherChannel failover: mixed dCEF test results. Table 28 Gigabit EtherChannel Failover: Mixed-dCEF Test Results Tests Results Gigabit EtherChannel Failover: Mixed-dCEF Pass Gigabit EtherChannel Failover: dCEF This test verified multicast and MSDP functionality during a dCEF GEC failover. Traffic for multicast groups 239.255.104.115 through 239.255.104.119 was sent out via IXIA from Dista-1 and received at Dista-2. Traffic was sent at a rate of 10,000 pps. The port-channel between devices SH1-104 (Po71) and SH1-110 (Po171) was failed on the SH1-110 side, first two of four ports, then all four ports. Figure 19 shows the topology for the dCEF Gigabit EtherChannel failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 58 Hardware Forwarding Features Figure 19 dCEF Gigabit EtherChannel Failover Topology Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110 Note Background traffic remained running for this test at a rate of 25,000 pps. Results for zero-packet loss of this traffic are not given, though, because the test involved failovers and traffic was certain to be lost. Test Plan The procedure used to perform the Gigabit EtherChannel failover: dCEF test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that SH1-103 and SH1-104 are running MSDP Anycast and are peered with each other. Step 3 Verify that the SPT-threshold is configured for "infinity" on devices SH1-109 and SH1-110. Step 4 Begin monitoring memory and CPU utilization for the devices being tested. Step 5 Start IGMP join traffic for multicast groups 239.255.104.115 through 239.255.104.119 on IXIA port 10/1, which is connected to Dista-2 2/1. Step 6 Start the test traffic stream. Step 7 Configure the test traffic stream to run in continuous mode. Step 8 Verify that SH1-104 is the primary PIM rendezvous point for the given multicast groups and that SH1-110 is receiving the test multicast group traffic from SH1-104. Step 9 Verify that the MMLS entries for the test multicast groups are consistent with the mroute entries seen. Step 10 Verify that the modules connecting SH1-110 to SH1-104 are dCEF modules. The ports connecting them are g3/13-14, g8/13-14 on the SH1-104 side, and g3/3-4, g4/3-4 on the SH1-110 side. Step 11 Use the test etherchannel command on the supervisor (SP, not Route Processor) of SH1-104 to verify that each link of the GEC should pass some multicast traffic. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 59 Hardware Forwarding Features Step 12 Verify that traffic is actually being passed across each of the physical interfaces using the interface counters. Step 13 Configure the test traffic stream to stop after sending 500,000 packets. Step 14 Stop and restart the test traffic stream. Step 15 Fail two links of the 4-port GEC between SH1-104 and SH1-110, forcing some multicast traffic to move to two other links. Step 16 Measure any traffic loss. Step 17 Bring up the two links failed. Step 18 Restart the IXIA test traffic stream. Step 19 Fail the entire port-channel interface between SH1-104 and SH1-110, forcing multicast traffic to go through SH1-103 to get to Dista-2. Step 20 Measure the traffic loss. Step 21 Verify that traffic is now flowing through device SH1-103, and that the mroute table entries on SH1-103 and SH1-110 are consistent with the devices' respective MMLS entries. Step 22 Bring the channel back online. Step 23 Verify that traffic once again flows through SH1-104, and that the mroute table entries on SH1-104 and SH1-110 are consistent with the devices' respective MMLS entries. Step 24 Fail the port-channel interface four more times, recording the traffic loss each time. Step 25 Determine the average amount of downtime over the five tests. Step 26 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should failover and be forwarded by SH1-103 when half and then all of the port-channel between SH1-110 and SH1-104 is torn down. • This failover should take place in a reasonable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 29 shows the Gigabit EtherChannel Failover: dCEF test results. Table 29 Gigabit EtherChannel Failover: dCEF Test Results Tests Results Gigabit EtherChannel Failover: dCEF Pass Switch Fabric Module Failover This test verified multicast functionality during Switch Fabric Module (SFM) failover. Multicast traffic generated by IXIA is sent through the network from Dista-2 to Dista-1, through SH1-104. The active SFM is failed a number of times. Traffic is tracked in each case, and traffic loss is calculated. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 60 Hardware Forwarding Features In several of the following steps, verification that the traffic is using the SFM is requested. Verify by examining how the Medusa Application-Specific Integrated Circuit (ASIC) is handling traffic. The Medusa ASIC interfaces are between the line card local bus and the backplane of the Catalyst 6500. If traffic is using the SFM (no legacy, or nonfabric-enabled, cards present), the Medusa mode was "Compact" for all line cards, indicating that it is sending a compact header on the backplane for the switching decision. Note that any WS-X6816 modules are always in "Compact" mode, because they are fabric-only cards. More on the switching modes involving the SFM can be found at the Cisco Catalyst 6500 Series Switches site: http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_guide_chapter0918 6a008007fb2a.html Figure 20 shows the topology for the switch fabric module failover test. Figure 20 Switch Fabric Module Failover Topology Device under test: SH1-104. Test Plan The procedure used to perform the switch fabric module failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT threshold is configured for infinity on SH1-108, and backup designated router (BDR) SH1-107 to ensure that the multicast routing state (*,G) is used, and not (S,G). Step 4 Begin sending the IGMP join messages for multicast groups 239.255.104.120 to 239.255.104.124 to Dista-1 g4/6. Step 5 Start the IXIA test stream. Temporarily configure the stream to run in continuous burst mode. Step 6 Verify that SH1-104 is being used as the PIM-RP by SH1-110 and that the test traffic is flowing through SH1-104. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 61 Hardware Forwarding Features Step 7 Reconfigure the IXIA test stream to stop after sending 350,000 packets, or 35 seconds of traffic. Step 8 Start the test script, which will failover the active fabric module on SH1-104 20 times while running traffic. Step 9 Show the results from the script and verify that failover times are within tolerances. Step 10 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Failovers should occur within an acceptable time and traffic loss due to fabric failure should be minimal. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 30 shows the switch fabric module failover test results. Table 30 Switch Fabric Module Failover Test Results Tests Results Switch Fabric Module Failover Pass Gigabit Ethernet Module Failover—Supervisor 1 This test verified multicast functionality during Gigabit Ethernet module failover. There are four Gigabit Ethernet modules in SH1-110. Each was reset multiple times with traffic passing through them. The ability of the devices to compensate for these failovers was measured by traffic loss. Figure 21 shows the topology for the supervisor 1 Gigabit Ethernet module failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 62 Hardware Forwarding Features Figure 21 Supervisor 1 Gigabit Ethernet Module Failover Topology Device under test: SH1-108. Test Plan The procedure used to perform the Gigabit Ethernet module failover—supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT threshold is set to infinity on SH1-107 and SH1-108. Step 4 Verify that SH1-108 is the PIM-DR for its VLAN segments. For whatever interface the two are connected, SH1-107 sees SH1-108 as the designated router (DR) for that LAN segment. Step 5 Start IGMP join messages from IXIA to Dista-1 4/1, Dista-1 4/6, SH1-108 g3/8, and SH1-108 g4/8 for multicast groups 239.255.104.110 to 239.255.104.114. Step 6 Begin the IXIA traffic stream. This stream is sending traffic to multicast groups 239.255.104.110 to 239.255.104.114 at a rate of 10,000 pps. The traffic enters the network at device Dista-2 2/1. Step 7 Configure the traffic stream so that it is being sent from four different source IP addresses, ensuring that the traffic is spread across all four GEC links. Step 8 Verify that SH1-104 is the RP and that the test traffic is passing through it, coming in from port-channel 71 and going out port-channel 69. Step 9 Verify that traffic is being switched by SH1-108, across all appropriate links and modules. Step 10 Reset SH1-108 Gigabit Ethernet module 3 while sending 1 million packets. Step 11 After the module comes back on line, verify that traffic is still passing through interfaces on module 3. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 63 Hardware Forwarding Features Step 12 In the case of interfaces that serve as the final destination to the IXIA receiver, verify that there is still an mroute entry for that interface in the Outgoing Interface List (OIL). Step 13 Determine traffic loss. Step 14 Repeat Step 10 through Step 13 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 15 Reset SH1-108 Gigabit Ethernet module 4. Step 16 After the module comes back on line, verify that traffic is still passing through interfaces on module 4. Step 17 In the case of interfaces that serve as the final destination to the IXIA receiver, verify that there is still an mroute entry for that interface in the OIL. Step 18 Determine traffic loss. Step 19 Repeat Step 15 through Step 18 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 20 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should fail over within an acceptable time frame. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 31 shows the Gigabit Ethernet module failover—supervisor 1 test results. Table 31 Gigabit Ethernet Module Failover—Supervisor 1 Test Results Tests Results Gigabit Ethernet Module Failover—Supervisor 1 Pass Gigabit Ethernet Module Failover—Supervisor 2 This test verified multicast functionality during Gigabit Ethernet module failover. There are four Gigabit Ethernet modules in SH1-110. Each was reset multiple times with traffic passing through them. The ability of the devices to compensate for these failovers was measured by traffic loss. Figure 22 shows the topology for the supervisor 2 Gigabit Ethernet module failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 64 Hardware Forwarding Features Figure 22 Supervisor 2 Gigabit Ethernet Module Failover Topology Device under test: SH1-110. Test Plan The procedure used to perform the Gigabit Ethernet module failover—supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT threshold is set to infinity on the device under test. Step 4 Verify that SH1-110 is the PIM-DR on its segment. Step 5 Start IGMP join messages from IXIA to Dista-2 4/10, SH1-110 g8/16 and SH1-110 g4/16 for multicast groups 239.255.127.100 to 239.255.127.104. Step 6 Begin the IXIA traffic stream. This stream is sending traffic to multicast groups 239.255.127.100 to 239.255.127.104 at a rate of 10,000 pps. The traffic enters the network at device Dista-1. Step 7 Configure the traffic stream so that it is being sent from four different source IP addresses. This will verify that the traffic is spread across all four GEC links. Step 8 Verify that SH1-104 is the RP and that the test traffic is passing through it, coming in port-channel 69 and going out port-channel 71. Step 9 Verify that traffic is being switched by SH1-110, across all appropriate links and modules. Step 10 Reset SH1-110 Gigabit Ethernet module 7. Step 11 After the module comes back on line, verify that traffic is still passing through interfaces on module 7. Step 12 Determine traffic loss. Step 13 Repeat Step 10 through Step 12 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 14 Reset SH1-110 Gigabit Ethernet module 8. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 65 Hardware Forwarding Features Step 15 After the module comes back on line, verify that traffic is still passing through interfaces on module 8. Step 16 Determine traffic loss. Step 17 Repeat Step 14 through Step 16 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 18 Reset SH1-110 Gigabit Ethernet module 3. Step 19 After the module comes back on line, verify that traffic is still passing through interfaces on module 3. Step 20 Determine traffic loss Step 21 Repeat Step 18 through Step 20 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 22 Reset SH1-110 Gigabit Ethernet module 4. Step 23 After the module comes back on line, verify that traffic is still passing through interfaces on module 4. Step 24 Determine traffic loss Step 25 Repeat Step 22 through Step 24 four more times, each time determining traffic loss and verifying that traffic resumes through the interfaces on the failed module. Step 26 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should fail over within an acceptable time frame. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 32 shows the Gigabit Ethernet module failover—supervisor 2 test results. Table 32 Gigabit Ethernet Module Failover—Supervisor 2 Test Results Tests Results Gigabit Ethernet Module Failover—Supervisor 2 Pass Protocol Independent Module-Designated Router Failover—Supervisor 11 This test verified multicast functionality during designated router (PIM-DR) failover on a supervisor 11 platform. IXIA traffic for five multicast groups is sourced from the IXIA connected to Dista-1 and collected from Dista-2. The PIM-DRs in this part of the network is SH1-106 (Sup11). The backup is SH1-105. SH1-106 is isolated from the network by shutting down its port-channel interfaces to its neighbors. SH1-105 is thus forced to take over the PIM-DR role and forward traffic. The average downtime is taken after five such failovers. Figure 23 shows the topology for the supervisor 11 protocol independent module-designated router failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 66 Hardware Forwarding Features Figure 23 Supervisor 11 Protocol Independent Module-Designated Router Failover Topology Devices under test: SH1-105, SH1-106, and SH1-100. Test Plan The procedure used to perform the protocol independent module-designated router failover—supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT-threshold is set to infinity on SH1-105 and SH1-106 to verify that the multicast routing state (*,G) is used, and not (S,G). Step 4 Verify that SH1-105 and SH1-106 are PIM neighbors and that SH1-106 is the PIM-DR. Step 5 Start IGMP join traffic for multicast groups 239.255.200.100 to 239.255.200.104 on Dista-2 6/2. Step 6 Start an IXIA traffic stream for multicast groups 239.255.200.100 to 239.255.200.104 on Dista-1 4/6. Step 7 Configure the stream to stop after sending 500,000 packets. Step 8 Verify that SH1-100 is the RP for the five multicast test groups. Step 9 Show the mroute that the test packets are taking through the PIM-RP, SH1-100, and verify that the MMLS entries are consistent with the mroute entries. Step 10 Shut down port-channels 67, 167, and 20 on SH1-106, isolating SH1-106 from its neighbors. Step 11 Verify that SH1-105 becomes the PIM-DR and that the test multicast traffic is forwarded through it. Step 12 Measure any traffic loss. Step 13 Bring up the interfaces that were shut down, so SH1-106 becomes the PIM-DR again. Step 14 Verify that traffic being routed through SH1-100 is again going out interface port-channel 67, and verify that SH1-106 is again the PIM-DR for this segment. Step 15 Repeat Step 10 and Step 14 four more times, each time determining the amount of traffic loss. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 67 Hardware Forwarding Features Step 16 Determine the average amount of loss over five failovers. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Test traffic should be forwarded onto the receiving VLAN segment only by the PIM-DR for that segment in the starting state, and after recovery from any failover. • The backup PIM-DR (SH1-105) should assume forwarding responsibilities for the test traffic when the primary PIM-DR (SH1-106) becomes unavailable. This behavior should happen within an acceptable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 33 shows the protocol independent module-designated router failover—supervisor 11 test results. Table 33 Protocol Independent Module-Designated Router Failover—Supervisor 11 Test Results Tests Results Protocol Independent Module-Designated Router Failover—Supervisor 11 Pass Protocol Independent Module-Designated Router Failover—Supervisor 22 This test verified multicast functionality during designated router (PIM-DR) failover on a supervisor 22 platform. IXIA traffic for five multicast groups is sourced from the IXIA connected to Dista-1 and collected from Dista-2. The PIM-DRs in this part of the network is SH1-110 (Sup22). The backup is SH1-109. SH1-110 is isolated from the network by shutting down its port-channel interfaces to its neighbors. SH1-109 is thus forced to take over the PIM-DR role and forward traffic. The average downtime is taken after five such failovers. Figure 23 shows the topology for the supervisor 22 protocol independent module-designated router failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 68 Hardware Forwarding Features Figure 24 Supervisor 22 Protocol Independent Module-Designated Router Failover Topology Devices under test: SH1-104, SH1-109, and SH1-110. Test Plan The procedure used to perform the protocol independent module-designated router failover—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the SPT-threshold is set to infinity on SH1-109 and SH1-110 to verify that the multicast routing state (*,G) is used, and not (S,G). Step 4 Verify that SH1-109 and SH1-110 are PIM neighbors and that SH1-110 is the PIM-DR. Step 5 Start IGMP join traffic for multicast groups 239.255.104.115 to 239.255.104.119 on Dista-2 2/1. Step 6 Start an IXIA traffic stream for multicast groups 239.255.104.115 to 239.255.104.119 on Dista-1 4/6. Step 7 Configure the stream to stop after sending 500,000 packets. Step 8 Verify that SH1-104 is the RP for the five multicast test groups. Step 9 Show the mroute that the test packets are taking through the PIM-RP, SH1-104, and verify that the MMLS entries are consistent with the mroute entries. Step 10 Shut down port-channels 71, 171, and 20 on SH1-110, isolating it from its neighbors. Step 11 Verify that SH1-109 becomes the PIM-DR and that the test multicast traffic is forwarded through it. Step 12 Measure any traffic loss. Step 13 Bring up the interfaces that were shut down, so SH1-110 becomes the PIM-DR again. Step 14 Verify that traffic being routed through SH1-104 is again going out interface port-channel 71, or into port-channel 171 on SH1-110, and that SH1-110 is again the PIM-DR for this segment. Step 15 Repeat Step 10 through Step 14 four more times, each time determining the amount of traffic loss. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 69 Hardware Forwarding Features Step 16 Determine the average amount of loss over five failovers. Step 17 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Test traffic should be forwarded onto the receiving VLAN segment only by the PIM-DR for that segment in the starting state, and after recovery from any failover. • The backup PIM-DR (SH1-109) should assume forwarding responsibilities for the test traffic when the primary PIM-DR (SH1-110) becomes unavailable. This behavior should happen within an acceptable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 34 shows the protocol independent module-designated router failover—supervisor 22 test results. Table 34 Protocol Independent Module-Designated Router Failover—Supervisor 22 Test Results Tests Results Protocol Independent Module-Designated Router Failover—Supervisor 22 Pass Auto-Rendezvous Point Functionality and Failover Auto-RP eliminates the need to statically (manually) configure RP information in every router in the network. Selected routers in the network can be configured to be candidate RPs for a given set of multicast groups (as defined by access control lists). These routers advertise their candidacy in the form of RP-Announce messages at a configurable interval (default is 60 seconds). One or more (for redundancy) routers are configured as Mapping Agents, which will cache active Group-to-RP information. Mapping Agents learn which routers are candidate RPs for given groups by joining the well-known Cisco-RP-Announce multicast group (224.0.1.39) to receive candidate RP announcements. Once an RP is selected (based on highest IP address) by the Mapping Agent, the other routers in the network will learn of the IP address of the RP for the given groups by listening to the well-known Cisco-RP-Discovery multicast group (224.0.1.40) that they had joined at startup. The command to configure a router as a candidate RP is: ip pim send-rp-announce interface scope ttl [group-list acl] [interval x] The command to configure the Mapping Agent is: ip pim send-rp-discovery scope ttl To test the Auto-RP feature, two candidates were configured with each of those routers also acting as the Mapping Agents. Test success was based on whether the candidate with the highest IP address is correctly advertised as the RP for the active groups. A test involving the failure of the “elected” candidate RP will also be performed, to verify traffic failover the candidate with the lower IP address, to verify that traffic will revert to its path through the candidate with the higher IP address once it comes back online. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 70 Hardware Forwarding Features SH1-103 and SH1-104 were the candidate RPs and the Mapping Agents. The default configurations of SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110 were removed and replaced with configurations necessary for Auto-RP. Traffic was sent from Dista-1 to Dista-2 for groups 239.255.104.105 to 239.255.104.109. Traffic loss was measured as the elected RP is failed over. Figure 25 shows the topology for auto-rendezvous point functionality and failover. Figure 25 Auto-Rendezvous Point Functionality and Failover Topology Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Test Plan The procedure used to perform the auto-RP functionality and failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Save the running configuration to NVRAM on the devices under test. Note Because this is not the default configuration for the majority of the multicast tests, Auto-RP must be configured at the beginning of this test. This is why a write memory in done at the beginning of this test; so that the previous configuration can be recalled out of NVRAM at the end of the test. Step 4 There are six commands on each of the device that must be removed. These commands represent the configuration of a static RP, which is not used during this procedure. Step 5 Configure SH1-103 and SH1-104 to be Auto-RP candidates and Mapping Agents. Show access list 4 and which groups it restricts SH1-103 and SH1-104 to. Also show the IP addresses of the Loop back 0 interfaces by which SH1-103 and SH1-104 are running Auto-RP. The RP candidates are configured with a group-list qualifier, to limit the groups for which they are RPs: Step 6 Configure switches SH1-107, SH1-108, SH1-109, and SH1-110 to accept RP statements from Auto-RP mapping agents. This will define for these devices which router is the active RP. Step 7 Verify that commands entered in Step 4 and Step 5 are the only ones defining RP behavior on the devices. Step 8 Begin IGMP join messages for multicast groups 239.255.104.105 to 239.255.104.109 on Dista-2 2/1. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 71 Hardware Forwarding Features Step 9 Begin IXIA traffic streams for multicast groups 239.255.104.105 to 239.255.104.109 on Dista-1 4/1. This stream will send 500,000 packets at a rate of 10,000 pps. Step 10 Verify that SH1-104 is the elected RP, because of the higher IP address of its Loopback0 interface, and that SH1-108 (the first-hop router) recognizes SH1-104 as the RP. Step 11 Verify that the elected RP (SH1-104) is the one receiving and forwarding the test traffic and that the MMLS entries are consistent with the mrouting entries. Step 12 Shut down the etherchannel interfaces on the elected RP, SH1-104, to simulate a router reload. Step 13 Verify that traffic is successfully diverted through the other candidate RP. Step 14 Determine the time required for this diversion to occur. Step 15 Reintroduce SH1-104 into the network. Step 16 When SH1-104 is back online, verify that traffic once again passes through it. Step 17 Repeat Step 12 through Step 15 four more times, each time measuring traffic loss. Step 18 Determine the average amount of downtime for the five switch overs. Step 19 Remove the commands configured in Step 5 through Step 6 on the appropriate switches. Step 20 Copy the configuration stored in NVRAM to the current running configuration. Step 21 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Basic Auto-RP configuration should work, with a group-list configured, and one of the two candidate-RPs should be elected and forward traffic. • When the elected RP is failed, the other candidate RP should assume the RP role and take over forwarding responsibilities within a reasonable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 35 shows the auto-RP functionality and failover test results. Table 35 Auto-RP Functionality and Failover Test Results Tests Results Auto-Rendezvous Point Functionality and Failover Pass Layer 3 Interface Multicast Negative This test introduces faults into the topology and verifies that multicast functionality remains consistent with functional specifications on Layer 3 ports. Online insertion and removal (OIR) of line cards, resetting individual line cards, reloading the switch, and Supervisor Engine/Switch Fabric Module failover were introduced. Interface Gig4/16 on device SH1-110 is used as the Layer 3 interface for the duration of this test. It is receiving traffic for multicast groups 239.255.104.105 to 239.255.104.109. Gig4/16 is also sending traffic to groups 239.255.104.110 to 239.255.104.114 (with a receiver connected to SH1-108). Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 72 Hardware Forwarding Features Dista-1 port 4/1 on SH1-108 is sending the traffic for groups 239.255.104.105 to 239.255.104.109. It is also receiving traffic in groups 239.255.104.110 to 239.255.104.114. Traffic was sent at 10,000 pps for periods of 50 seconds. A 50,000-packet burst was used at each step in which failure is introduced in order to measure traffic loss. Device under test: SH1-110. Test Plan The procedure used to perform the Layer 3 interface multicast negative test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that interface g4/16 of SH1-110 is configured as a Layer 3 interface. This interface is connected to IXIA port 11/1. Step 4 Verify that the IXIA port (11/1) connected to SH1-110 is receiving traffic destined for multicast groups 239.255.104.105 to 239.255.104.109 and is sending to multicast groups 239.255.104.110 to 239.255.104.114. Step 5 Verify that the IXIA port 8/1, which is connected to Dista-1 4/1, is configured exactly the opposite from Step 4, that it is receiving traffic destined for multicast groups 239.255.104.110 to 239.255.104.114, and that it is sending to multicast groups 239.255.104.105 to 239.255.104.109. Step 6 Reload the active supervisor in SH1-110 while sending 300 seconds of traffic in either direction (3 million packets). Step 7 After SH1-110 comes back online, verify that it resumes the forwarding role for all multicast test groups. Step 8 Measure any traffic loss. Step 9 Perform OIR on the active supervisor on SH1-110. Step 10 After SH1-110 comes back online, verify that it resumes the forwarding role for all multicast test groups. Step 11 Measure any traffic loss. Step 12 Reset module 4 on SH1-110. Step 13 After module 4 comes back online, verify that it resumes the forwarding role for all multicast test groups. Step 14 Measure any traffic loss. Step 15 Perform OIR on module 4 on SH1-110. Step 16 After module 4 comes back online, verify that it resumes the forwarding role for all multicast test groups. Step 17 Measure any traffic loss. Step 18 Verify that the traffic on SH1-110 is being switched by the fabric module. Step 19 Fail over the active SFM on SH1-110. Step 20 Once the fabric has failed over, verify that SH1-110 resumes forwarding for all multicast test groups. Step 21 Measure any traffic loss. Step 22 Cycle interface g4/16 on SH1-110. Step 23 After interface g4/16 comes back online, verify that it resumes the forwarding role for all multicast test groups. Step 24 Measure any traffic loss. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 73 Hardware Forwarding Features Step 25 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The failed device/module/interface should recover as expected and the mroute entries should be maintained or recreated correctly, following the recovery. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 36 shows the Layer 3 interface multicast negative test results. Table 36 Layer 3 Interface Multicast Negative Test Results Tests Results Layer 3 Interface Multicast Negative Pass Protocol Independent Module-Rendezvous Point Failover—Supervisor 22 This test verified multicast functionality during a PIM-RP failover on a supervisor 22 platform. IXIA traffic for five multicast groups is sourced from the IXIA connected to Dista-1 and collected from seven different receivers throughout the network. SH1-103 and SH1-104 are running Anycast RP for the test traffic groups, with SH1-104 being the primary PIM-RP. SH1-104 is reloaded, forcing SH1-103 to take over the PIM-RP role and forward traffic. The average downtime is taken after ten such failovers. Figure 26 shows the topology for the supervisor 22 protocol independent module-rendezvous point failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 74 Hardware Forwarding Features Figure 26 Supervisor 22 Protocol Independent Module-Rendezvous Point Failover Topology Devices under test: SH1-100, SH1-103, SH1-104, SH1-108, SH1-109, SH1-110, SH1-102, and SH1-106. Test Plan The procedure used to perform the supervisor 22 protocol independent module-rendezvous point failover test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-109 and SH1-110 are PIM neighbors and that SH1-110 is the PIM-DR. Do the same for the pair SH1-105 and SH1-106, and for SH1-107 and SH1-108, verifying that SH1-106 and SH1-108 are the PIM-DRs. Step 4 Start IGMP join traffic for multicast groups 239.255.104.115 to 239.255.104.119 on the seven receiver interfaces, IXIA ports 7/2, 9/1, 9/2, 10/1, 11/1, 2/4, and 2/6. Step 5 Start an IXIA traffic stream for multicast groups 239.255.104.115 to 239.255.104.119 on Dista-1 4/6. Step 6 Configure the stream to stop after sending 1 million packets. Step 7 Verify that SH1-104 is considered to be the PIM-RP for the five multicast test groups, by SH1-108. Step 8 Show the mroute that the test packets are taking through the PIM-RP, SH1-104, and verify that the MMLS entries are consistent with the mroute entries. The incoming interface in each case should be port-channel 69, with the traffic coming from SH1-108. The OIL should contain the interfaces port-channel 70, port-channel 71, and port-channel 117. Step 9 Reset SH1-104, the PIM-RP, and determine the amount of traffic loss. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 75 Hardware Forwarding Features Step 10 Verify that SH1-103 becomes the PIM-RP and populates its mrouting table accordingly, and verify that the MMLS entries on SH1-103 are consistent with the mroute entries for the test groups. The incoming interface should be port-channel 69 for SH1-103, (from SH1-108). The OIL for SH1-103 should contain interfaces port-channel 70, port-channel 71, and port-channel 17. Step 11 Once SH1-104 comes back online, verify that it is again the RP for the test traffic and that its mrouting table and MMLS entries are correct. Step 12 Repeat Step 8 through Step 11 four more times, each time determining only the amount of traffic loss at each receiver. Step 13 Determine the average amount of loss over five failovers. Step 14 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SH1-104 should be the primary PIM-RP until it is failed (reloaded), at which point SH1-103 should take over as the PIM-RP. • There should be a minimum amount of traffic loss as a result of the failover. • SH1-104 should resume the PIM-RP role after it is online again. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 37 shows the supervisor 22 protocol independent module-rendezvous point failover test results. Table 37 Protocol Independent Module-Rendezvous Point Failover—Supervisor 22 Test Results Tests Results Protocol Independent Module-Rendezvous Point Failover—Supervisor 22 Pass MSDP Failover This test verified that multicast traffic was forwarded in hardware when the destination is on a secondary subnet. Interface g4/16 of SH1-110 is configured with a secondary IP address, the subnet on which a multicast receiver resides. Figure 26 shows the topology for the MSDP failover test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 76 Hardware Forwarding Features Figure 27 MSDP Failover Topology Device under test: SH1-110. Test Plan The procedure used to perform the MSDP failover test follows. Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Begin the IGMP join messages on IXIA port 11/1. Step 4 Begin sending the test traffic using the IXIA test tool. Step 5 Verify that SH1-110 has a secondary IP address configured on its interface g4/16, and that the IXIA port is connected to it (can ping it) and known on its secondary subnet. Step 6 Verify that SH1-110 has the correct mroute and MMLS entries for the test groups. Step 7 Disable MMLS on SH1-110 and verify that the traffic is no longer hardware-switched. Step 8 After about 1 minute, reenable MMLS so that traffic is again hardware-switched. Step 9 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic destined to a host on a secondary subnet should be switched in hardware. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 77 Hardware Forwarding Features Results Table 38 shows the MSDP failover test results. Table 38 MSDP Failover Test Results Tests Results MSDP Failover Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 78 Layer 3 Routing Features Layer 3 Routing Features Layer 3 routing feature testing for Safe Harbor involves these features: • Cisco Express Forwarding, page 79 • Open Shortest Path First, page 88 • Border Gateway Protocol, page 95 • Hot Standby Routing Protocol, page 100 • Enhanced Interior Gateway Routing Protocol, page 107 Cisco Express Forwarding Cisco Express Forwarding (CEF) evolved to best accommodate the changing network dynamics and traffic characteristics resulting from increasing numbers of short period flows typically associated with web-based applications and interactive type sessions. Existing Layer 3 switching paradigms use a route-cache model to maintain a fast lookup table for destination network prefixes. The route-cache entries are traffic-driven in that the first packet to a new destination was routed via routing table information and, as part of that forwarding operation, a route-cache entry for that destination was then added. This behavior allows subsequent packet flows to that same destination network to be switched based on an efficient route cache match. These entries are periodically aged out to keep the route cache current and can be immediately invalidated if the network topology changes. This "demand-caching" scheme—maintaining a very fast access subset of the routing topology information—is optimized for scenarios whereby the majority of traffic flows are associated with a subset of destinations. However, given that traffic profiles at the core of the Internet (and potentially within some large enterprise networks) are no longer resembling this model, a new switching paradigm was required that would eliminate the increasing cache maintenance resulting from growing numbers of topologically dispersed destinations and dynamic network changes. CEF avoids the potential overhead of continuous cache churn by instead using a Forwarding Information Base (FIB) for the destination switching decision that mirrors the entire contents of the IP routing table; that is, that there was a one-to-one correspondence between FIB table entries and routing table prefixes. Therefore, there was no need to maintain a route cache. The following tests were performed: • Cisco Express Forwarding Packet Switching, page 79 • Cisco Express Forwarding Route Entries on DFC, page 81 • Cisco Express Forwarding Many-to-One Distribution Load Balance, page 82 • Cisco Express Forwarding Many-to-Many Distribution with Polarization Load Balance, page 84 Cisco Express Forwarding Packet Switching This test verified that IP Unicast traffic was hardware-switched. If traffic was not hardware-switched by the Policy Feature Card (PFC), the traffic would have been fast-switched by the MSFC. Figure 9 shows the topology for the Cisco Express Forwarding Packet-Switching test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 79 Layer 3 Routing Features Figure 28 Cisco Express Forwarding Packet-Switching Topology A fixed number of ping packets are sent from SH1-104 to SH1-103, across SH1-99. The ping and response totals are compared against the number of MLS CEF Layer 3 packets switched. An extended ping of 500 packets is used to calculate the number of packets hardware-switched across the interim switch, SH1-99. The result should be 1000 FIB switched packets on SH1-99. Devices under test: SH1-104, SH1-99, and SH1-103. Test Plan The procedure used to perform the Cisco express forwarding packet-switching test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Shut down any alternate paths that the ping packets may take through the network from SH1-104 to SH1-103 (on SH1-104, shut down the port-channel 68, port-channel 69, port-channel 70, and port-channel 71 interfaces). Because these interfaces are shut down, all traffic sent from SH1-104 to SH1-103 will be switched through SH1-99. Step 5 If there are any background traffic streams running, stop them for this test. They may interfere with the counter statistics observed on SH1-99. Step 6 Show the MLS statistics for Module 3 on SH1-99. This will give a base packet count from which to work. SH1-99 begins the test with 1,736,266,428 packets having been FIB switched. Step 7 Clear out the MLS entries on module 3 of SH1-99 and verify that there are none. No MLS flows are registered in module 3. Step 8 Send 500 ping packets from SH1-104 (172.31.1.38) to SH1-103 (172.31.1.34). Step 9 Verify that the 1000 packets (500 from echo request, 500 from echo reply) have been logged in the MLS statistics on SH1-99. Step 10 Verify that MLS entries have been created for the unicast flows. Step 11 Return the configuration of SH1-104 to default by reenabling the port-channel interfaces (68 and 71) that were shut down in Step 4. Step 12 Verify that the DUT did not record any tracebacks. Step 13 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The MLS counters on SH1-99 should be incremented by 1000 when 500 ping packets are sent from SH1-104 to SH1-103, through SH1-99. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 80 Layer 3 Routing Features • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 39 shows the Cisco express forwarding packet switching test results. Table 39 Cisco Express Forwarding Packet Switching Test Results Tests Results Cisco Express Forwarding Packet Switching Pass Cisco Express Forwarding Route Entries on DFC This test verified that correct CEF table entries were used to forward IP unicast traffic passing through a switch on a ws-x6816 module (with DFC). Devices SH1-99, SH1-103, and SH1-104 were used for the test. port-channel 16 is used to connect SH1-99 to SH1-103 and port-channel 17 is used to connect SH1-99 to SH1-104. Device under test: SH1-104. Test Plan The procedure used to perform the CEF route entries on DFC test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 On device SH1-104, show the routing table entries for the networks 172.31.1.32, 172.31.1.36, and 172.31.1.0. The 172.31.1.32 network is one hop away from SH1-104. The 172.31.1.36 network is directly connected to SH1-104. The 172.31.1.0 network is remote (more than one hop away from) to SH1-104. Step 5 Verify that there are entries in the CEF table on the PFC2 for these networks and any host within them. Step 6 Show which module of SH1-104 has the DFC module. Step 7 Verify that the same CEF table entries on the PFC are also on the DFC of Module 3. Step 8 Verify that the DUT did not record any tracebacks. Step 9 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • There should be corresponding CEF table entries for each routing table entry for networks that are directly connected, one hop away, and more than one hop away. • The entries on the PFC2 should also be on the DFC of Module 3. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 81 Layer 3 Routing Features Results Table 40 shows the CEF route entries on DFC test results. Table 40 Cisco Express Forwarding Route Entries on DFC Test Results Tests Results Cisco Express Forwarding Route Entries on DFC Pass Cisco Express Forwarding Many-to-One Distribution Load Balance These tests were performed to verify that HW shortcuts and CEF distribution functioned properly with IP unicast traffic. Two tests were performed that monitored unicast traffic streams of "many-to-one" with 20 incremented IP addresses sending traffic to a single destination IP address and "many-to-many" with 100 source and 100 destination address pairs. Figure 29 shows the topology for the CEF many-to-one distribution: load balance test. Figure 29 Cisco Express Forwarding Packet-Switching Topology Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 82 Layer 3 Routing Features Note Background traffic was not used in this test because it would have confused the interface traffic counters used to gauge traffic path and delivery. Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Test Plan The procedure used to perform the CEF many-to-one distribution test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that all the port-channel interfaces involved in this test are up and that the proper interfaces are bundled in them. Table 41 lists devices and which EtherChannel IDs to check. Table 41 Device Many-to-One Port-Channel Interfaces Readied and Bundled Channel ID SH1-103 68, 69, 70, 71 SH1-104 68, 69, 70, 71 SH1-107 68, 168 SH1-108 69, 169 SH1-109 70, 170 SH1-110 71, 171 Test One (Many-to-One) Test One used traffic streams with 20 incrementing source IP addresses destined to a single IP address. The destination IP address was 172.31.26.102. The source IP addresses incremented from 172.31.16.82 to 172.31.16.101. The traffic source was IXIA-1 port Ix8/2 connected to switch Dista-1. The destination IP address was IXIA-1 port Ix-10/2 connected to switch Dista-2. Router SH1-108 received the traffic from Dista-1 and distributed it into the test network. A total of 10 million packets at 100,000 pps was sent. The path of the traffic for this test was as follows: IXIAtx -> Dista-1 -> SH1-108 -> (SH1-103 / SH1-104) -> (SH1-109 / SH1-110) -> Dista-2 -> IXIArx Step 5 Clear the traffic counters on the test devices and begin playing the traffic stream. Step 6 Verify that at all 10 million packets sent were received. Step 7 Once the traffic stream has completed, show the interface traffic counters on devices SH1-108, SH1-103, SH1-104, SH1-109, and SH1-110 to demonstrate that CEF load balancing did occur along the traffic path. Traffic Distribution (Following the Traffic from Dista-1 to Dista-2) Step 8 Begin a continuous burst traffic stream with the same characteristics of the stream used earlier (20 source IP addresses to 1 destination IP address). This stream will also be sent out IXIA port 8/2 and enter Dista-1. Traffic counters are not important for this test, which is why a continuous burst of traffic is sent. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 83 Layer 3 Routing Features Step 9 Display the MLS entries on each router along the traffic path. There should be a total of 20 entries at each level (i.e. 20 entries on SH1-108; 20 entries on SH1-103 and SH1-104, combined; 20 entries on SH1-109 and SH1-110, combined). Step 10 Count each entry with a destination IP address (DstIP) of 172.31.26.102. Note In some cases, it may be necessary to display the MLS entries on the DFC cards of certain modules. Step 11 Verify that the DUT did not record any tracebacks. Step 12 Verify CPU and memory usage during this second phase of test one to ensure that no anomalies occurred. Expected Results The following test results are expected: • Traffic sourced from multiple IP hosts to a single IP host should use multiple paths if available. • Traffic sourced from multiple IP hosts to a single IP host should be hardware-switched. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 42 shows the CEF many-to-one distribution test results. Table 42 Cisco Express Forwarding Many-to-One Distribution Test Results Tests Results Cisco Express Forwarding Many-to-One Distribution Load Balance Pass Cisco Express Forwarding Many-to-Many Distribution with Polarization Load Balance These tests verified that HW shortcuts and CEF distribution functioned properly with IP unicast traffic. Two tests were performed that monitored unicast traffic streams of "many-to-one" with 20 incremented IP addresses sending traffic to a single destination IP address and "many-to-many" with 100 source and 100 destination address pairs. Figure 30 shows the topology for the CEF many-to-many distribution with polarization load balance test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 84 Layer 3 Routing Features Figure 30 Note Cisco Express Forwarding Packet-Switching with polarization Topology Background traffic was not used in this test because it would have confused the interface traffic counters used to gauge traffic path and delivery. Devices under test: SH1-103, SH1-104, SH1-107, SH1-108, SH1-109, and SH1-110. Test Plan The procedure used to perform the CEF many-to-many distribution with polarization test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that all the port-channel interfaces involved in this test are up and that the proper interfaces are bundled in them. Table 43 lists devices and which EtherChannel IDs to check. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 85 Layer 3 Routing Features Table 43 Device Many-to-Many Port-Channel Interfaces Readied and Bundled Channel ID SH1-103 68, 69, 70, 71 SH1-104 68, 69, 70, 71 SH1-107 68, 168 SH1-108 69, 169 SH1-109 70, 170 SH1-110 71, 171 Test Two (Many-to-Many) Test Two uses traffic streams with 100 incrementing source IP addresses destined to 100 incrementing IP addresses. The source IP addresses increment from 172.31.26.102 to 172.31.26.201. The destination IP addresses increment from 172.31.16.82 to 172.31.16.181. The traffic source was IXIA-1 port Ix10/2 connected to switch Dista-2. The destination IP address was IXIA-1 port Ix-8/2 connected to switch Dista-1. Router SH1-110 received the traffic from Dista-2 and distributed it into the test network. A total of 10 million packets at 100,000 pps was sent. The path of the traffic for this test is as follows: IXIAtx -> Dista-2 -> SH1-110 -> (SH1-103 / SH1-104) -> (SH1-107 / SH1-108) -> Dista-1 -> IXIArx Polarization The Sup2/MSFC2 uses the ipSrc, ipDst and pathcount to make frame distribution decisions. Under certain network configurations traffic may not always use all paths available in the CEF table. In the test configuration switches 110, 103 and 104 have the same pathcount. Figure 31 shows a description and illustration of the problem. If traffic B and D will hash to the right path of the two output paths, then that same traffic will hash to a single path even if multiple paths are available. Traffic B and D do not take the separate paths available. This behavior is expected, and is due to the original hash algorithm used by CEF. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 86 Layer 3 Routing Features Figure 31 Cisco Express Forwarding Packet-Switching with Polarization Topology To address the polarization issue, Native IOS version 12.1(13)E3 allows the configuration of three different CEF distribution algorithms. These are called original, universal (configured by default), and tunnel. These algorithms, however, apply only to traffic that is software-switched; traffic that is hardware-switched in the PFC2 uses the original algorithm. The test uses the default algorithm (universal), but still encounters the polarization problem, due to hardware limits in the PFC2. This problem is addressed with the introduction of the EARL7 ASIC in the coming supervisor 3. Because there are now 100 different SrcIP::DstIP pairs, this test will not look at the MLS entries. Rather it will look only at the traffic to endure that it is load-balanced correctly. Step 5 Clear the traffic counters on the test devices. Step 6 Begin the IXIA traffic stream sending traffic from Dista-2 to Dista-1. Step 7 Verify that all of the 10 million packets that were sent were received on the proper IXIA port. Step 8 Show the interface traffic counters on devices SH1-108, SH1-103, SH1-104, SH1-109, and SH1-110 to demonstrate that CEF load-balancing did occur along the traffic path. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 87 Layer 3 Routing Features Traffic Distribution (Following the Traffic from Dista-1 to Dista-2) Step 9 Verify that the DUT did not record any tracebacks. Step 10 Verify CPU and memory usage during the first two steps of test one to ensure that no anomalies occurred. Expected Results The following test results are expected: • Traffic sourced from multiple IP hosts to a single IP host should use multiple paths if available. • Traffic sourced from multiple IP hosts to a single IP host should be hardware-switched. • Traffic sourced from multiple IP hosts to multiple IP hosts should use multiple paths if available (with polarization taken into account). • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 44 shows the CEF many-to-many distribution with polarization test results. Table 44 Cisco Express Forwarding Many-to-Many Distribution with Polarization Test Results Tests Results Cisco Express Forwarding Many-to-Many Distribution with Polarization Load Balance Pass Open Shortest Path First Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) developed by the OSPF working group of the Internet Engineering Task Force (IETF). Designed expressly for IP networks, OSPF supports IP subnetting and tagging of externally derived routing information. OSPF also allows packet authentication and uses IP multicast when sending and receiving packets. The following tests were performed: • OSPF Autocost, page 88 • OSPF Passive Interface, page 89 • OSPF Filtering, page 91 • OSPF Redistribution, page 93 • OSPF Topology Database, page 94 OSPF Autocost This test verified that the auto-cost reference-bandwidth value command functions correctly. OSPF used the interface cost to compute routing matrixes. By default: cost = 100/bandwidth (in Mbps) The lowest cost is 1, which is for 100 Mbps interfaces. In order to let Gigabit Ethernet, GEC, or 10 Gigabit Ethernet, have a cost that will allow comparison of the higher speed connections, use the auto-cost command to set up a higher reference bandwidth other than 100 Mbps. The default autocost reference-bandwidth for the Native IOS Safe Harbor testing is 100,000. Device under test: SH1-97. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 88 Layer 3 Routing Features Test Plan The procedure used to perform the OSPF autocost test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Show the autocost configuration for SH1-97. Step 4 Show the OSPF interface costs for interfaces port-channel 11 and port-channel 13 on SH1-97. Show that port-channel 11 is a two-port-channel, and that port-channel 13 is a four port-channel. The autocost configuration allows the 4-port port-channel to have half the cost of the 2-port port-channel. Step 5 Reconfigure the reference bandwidth to the default bandwidth 100. Show that both port-channel interfaces now have the same minimum cost of one (in this case, they would be compared equally with a single Fast Ethernet interface). Step 6 Change the autocost value to 500000, and verify that the interface costs have changed to 250 and 125 for port-channel 11 and port-channel 13, respectively. Step 7 Change the autocost value back to 100000, and verify that the interface costs have changed back to their original values. Step 8 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The OSPF interface cost should will change accordingly with the change in configuration of the autocost reference value. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 45 shows the OSPF autocost test results. Table 45 OSPF Autocost Test Results Tests Results OSPF Autocost Pass OSPF Passive Interface This test verified that the passive-interface command functions correctly. Routers should not send routing updates out passive interfaces. In the case of OSPF, hello packets will not be sent out passive interfaces, so neighbors will not be formed. For this test, SH1-106 is an OSPF neighbor to devices SH1-99 and SH1-100 in OSPF area 2. SH1-100 and SH1-99 are being sent OSPF routes by Pagent. SH1-100 and SH1-106 are connected by the port-channel 67 interface on SH1-100 and the port-channel 167 interface on SH1-106. SH1-99 and SH1-106 are connected by the port-channel 67 interface on SH1-100 and the port-channel 67 interface on SH1-106. The passive-interface command was configured on port-channel 67 on SH1-100 and on port-channel 67 on SH1-99. The neighbor tables on SH1-100 and SH1-99 were checked to verify the Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 89 Layer 3 Routing Features command worked (SH1-106 should be removed). SH1-106 should likewise lose about 25,000 OSPF routes out of its routing table (this includes both 15,000 OSPF routes generated by Pagent and 10,000 EIGRP routes redistributed into OSPF by SH1-99 and SH1-100). The passive-interface commands were removed and the neighbor relationships and route table updates were reestablished. Figure 32 shows the topology for the OSPF passive interface test. Figure 32 OSPF Passive Interface Topology Devices under test: SH1-99, SH1-100, and SH1-106. Test Plan The procedure used to perform the OSPF passive interface test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Turn off the background traffic, if running, for the duration of this test. Step 4 Shut down the port-channel 20 interface on device SH1-105 to ensure that SH1-106 will have no secondary way to get the routes from SH1-99 and SH1-100. Step 5 Verify that SH1-99, SH1-100 and SH1-106 are running OSPF (process ID 1) and that both belong to Area 2. Step 6 Verify the neighbor relationship between SH1-100 and SH1-106 and between SH1-99 and SH1-106. Step 7 Show the number of OSPF routes that SH1-106 has in its routing table. Step 8 Configure a passive interface on port-channel 67 of SH1-99 and on port-channel 67 of SH1-100. Step 9 After the Dead Timer expires for the neighbors on SH1-106, verify that the neighbor relationship no longer exists between SH1-100 and SH1-106 or between SH1-99 and SH1-106. Step 10 Verify that the OSPF routes SH1-106 was receiving from its neighbors are no longer in its routing table. SH1-106 should have only 5000 OSPF routes in its routing table (from another Pagent source connected to Dista-2). Step 11 Remove the passive interfaces configured in Step 4. Step 12 Verify that the neighbor relationship between SH1-100/SH1-99 and SH1-106 has been reestablished and verify that SH1-106 again received routing updates from its neighbors. Step 13 Bring up the port-channel 20 interface on SH1-105 that was shut down earlier. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 90 Layer 3 Routing Features Step 14 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The neighbor relationships between SH1-99, SH1-100 and SH1-106 should be broken down when the passive-interface commands are applied. • SH1-106 should destroy the ~17,500 routes that it was learning from SH1-99 and SH1-100 when it loses those two devices as neighbors. • The neighbor relationships should reform properly when the passive-interface commands are removed. • SH1-106 should, once again, fully populate its routing table with the new updates from SH1-99 and SH1-100. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 46 shows the OSPF passive interface test results. Table 46 OSPF Passive Interface Test Results Tests Results OSPF Passive Interface Pass OSPF Filtering This procedure tested the capability of OSPF to filter out routes using the distribute-list command. SH1-97, SH1-100, and SH1-106 are connected as such: SH1-97 to SH1-100 to SH1-106. These connections are Layer 3 links (channels). The link between SH1-100 and SH1-106 (Po13) is network 172.31.1.96/30. Figure 33 shows the relevant topology. SH1-97 knows, through OSPF, this network via port-channel 13. SH1-97 was configured with an access list and the distribute-list command, so that SH1-97 no longer knows this route; it is filtered out. Figure 33 OSPF Filtering Topology Devices under test: SH1-97, SH1-100, and SH1-106. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 91 Layer 3 Routing Features Test Plan The procedure used to perform the OSPF filtering test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Stop the background traffic streams, if running, for the duration of this test. Step 4 Verify that SH1-97, SH1-100, and SH1-106 are running OSPF and have network statements for their respective connecting networks (Figure 33). Step 5 Verify that SH1-97 knows the route to network 172.31.1.96 via port-channel 13. Step 6 Verify that access list 30 is configured, on SH1-97, to deny network 172.31.1.96. Step 7 Configure the distribute-list command for access list 30 on SH1-97, OSPF process ID 1. Step 8 Verify that the route to the 172.31.1.96 network is no longer known via port-channel 13 in SH1-97. Note SH1-97 has connections to other routers running OSPF and, so, should learn the route to that network via another interface. Step 9 Remove the distribute-list command configured on SH1-97. Step 10 Verify that the route to the 172.31.1.96 network is, once again, in the routing table of SH1-97, known via port-channel 13. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SH1-97 should not know the route to network 172.31.1.96 out interface port-channel13 when the filter is applied. • SH1-97 should relearn the route to the 172.31.1.96 network out interface port-channel13 when the filter is removed. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 47 shows the OSPF filtering test results. Table 47 OSPF Filtering Test Results Tests Results OSPF Filtering Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 92 Layer 3 Routing Features OSPF Redistribution This test verified that the redistribution of EIGRP routes into OSPF functions properly. The baseline configuration for the Safe Harbor Native Cisco IOS testbed includes having all EIGRP routes redistributed into OSPF by devices SH1-99 and SH1-100. We verified that the EIGRP routes from EIGRP 1320 are known to device SH1-97 via OSPF. The redistribute configuration statements from SH1-99 and SH1-100 is then removed so the routes from EIGRP 1320 should no longer be known by SH1-97. Redistribution on SH1-99 and SH1-100 is then reconfigured and the routes from EIGRP 1320 should, again, be known to SH1-97 via OSPF. Figure 29 shows the topology for the OSPF redistribution test. Figure 34 OSPF Redistribution Topology Devices under test: SH1-97, SH1-99, SH1-100, and SH1-101. Test Plan The procedure used to perform the OSPF redistribution test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Stop the background traffic streams, if running, for the duration of this test. Step 4 Verify that SH1-99 and SH1-100 are running both OSPF process ID 1 and EIGRP 1320. Step 5 Verify that SH1-101 is running EIGRP 1320. Step 6 Verify that SH1-97 is running OSPF process ID 1. Step 7 Verify that the routes 172.31.1.25 and 172.31.1.42 are known to SH1-97 via OSPF. Step 8 Show the number of OSPF routes known to SH1-97 (there should be about 20,000). Step 9 Remove the redistribution configuration from both SH1-99 and SH-100. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 93 Layer 3 Routing Features Step 10 See if the route entries seen in Step 7 are still present on SH1-97. Step 11 Show the number of OSPF routes known to SH1-97 (there should be only about 10,000 now). Step 12 Re-configure redistribution on SH1-99 and SH1-100. Step 13 Verify that the route entries seen in Step 7 are once again present on SH1-97. Step 14 Show the number of OSPF routes known to SH1-97 (there should be over 20,000). Step 15 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The route entries observed in Step 7 should no longer be known via OSPF 1 with the removal of the redistribution configuration. • These route entries should be created again when redistribution is reconfigured. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 48 shows the OSPF redistribution test results. Table 48 OSPF Redistribution Test Results Tests Results OSPF Redistribution Pass OSPF Topology Database This test verified that the OSPF topology database functions correctly. Each section of the test observes the OSPF database both in the case of no Pagent or IXIA test tools feeding extra routes (Pagent and IXIA interfaces shut down or disabled) and in the case of Pagent and IXIA feeding extra routes. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Plan The procedure used to perform the OSPF topology database test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 From each router in the Safe Harbor network, gather information about the OSPF interfaces and the OSPF processes that are running. Step 3 From each ABR in the Safe Harbor network, gather information about the OSPF database maintained for each area. Step 4 Verify router LSA. In each area, verify that there is one router LSA in the database for each router in that area. Step 5 Verify network LSA. For each multiaccess network that has more than one OSPF router on it, a DR and BDR are elected and the DR generates a network LSA for this subnet. However, an OSPF router with an interface on a multiaccess network with no other OSPF routers still shows up as DR, but no network LSA Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 94 Layer 3 Routing Features is generated because no other OSPF router is on the subnet. To know which multiaccess subnets should have a network LSA generated for them, look for an existing BDR on that subnet. In each area, verify that there is one network LSA for each BDR interface in the output of the show ip ospf interface command. Step 6 Verify summary network LSA. In each area, count the number of DR or loopback interfaces [*] that are in the up/up state in the output of the show ip OSPF interface command. Step 7 Verify that the number of summary network LSAs in each area is equal to the sum of the previous counts of all the other areas times the number of ABRs advertising those routes. Step 8 Verify summary autonomous system boundary router (ASBR), with test tools, and without test tools. An ABR between areas X and Y will generate a summary ASBR into X for an ASBR that exists in Y. However, an ABR that is an ASBR will not advertise itself. Safe Harbor has a unique topology in that every area has dual ABRs that also are ASBRs. So each ABR or ASBR sees its partner as an ASBR in both areas, and will advertise its partner with a Summary ASBR LSA in both areas. In each area, verify that there is a summary ASBR LSA from each ABR in that area for each ASBR outside this area. Step 9 Verify external LSAs; that there is an external LSA for each external route redistributed into OSPF. Results Table 49 shows the OSPF topology database test results. Table 49 OSPF Topology Database Test Results Tests Results OSPF Topology Database Pass Border Gateway Protocol Border Gateway Protocol (BGP) is an exterior gateway protocol designed to exchange network reachability information with other BGP systems in other autonomous systems. BGP exchanges routing information in the form of routing updates. An update includes a network number, a list of autonomous systems that the routing information has passed through (the autonomous system path), and a list of other path attributes. The following tests were performed: • Scale to Ten Neighbors and 100K Routes in Core (Add 120,000 Routes), page 95 • Route Redistribution Between Other Protocols and BGP—ACL/Route Map, page 97 • BGP Neighbor Flap—No Dampening, page 99 Scale to Ten Neighbors and 100K Routes in Core (Add 120,000 Routes) This test ensured that no memory leaks or unexpected CPU load occurs with 8 BGP neighbors in the core (4 core routers and 4 pagent neighbors) and a total of 100,000 BGP routes, 10,000 OSPF routes, and 10,000 EIGRP routes. The test begins with the core routers SH1-97, SH1-98, SH1-99, and SH1-100 having no routes added from the test tools. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 95 Layer 3 Routing Features During the course of this test, OSPF routes were added to the network via the Pagent and IXIA test tools. EIGRP and BGP routes were added via the Pagent test tool. All of the routes were added successively, with no scaling up. The CPU and memory were monitored on the core routers to verify that there were no anomalies. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Plan The procedure used to perform the scale to ten neighbors and 100K routes in core test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 If the routes from the test tools have already been added to the various places in the network, stop them now. Step 3 Begin SNMP monitoring of CPU and memory usage for the four core routers. Step 4 Begin SNMP monitoring of CPU and memory usage for the remaining devices in the network. Step 5 Show a route summary for the four core devices with no test tool routes added. Step 6 Add all the BGP routes using the test tools. Step 7 Verify that the 100,000 BGP routes are now in the routing tables of the core routers. Step 8 Add all the OSPF routes using the test tools. Step 9 Verify that the 10,000 OSPF routes are now in the routing tables of the core routers. Step 10 Add all the EIGRP routes. Step 11 Verify that the 10,000 EIGRP routes are now in the routing tables of the core routers. Step 12 Verify that any CPU and memory impact on the four core routers is acceptable. Step 13 Verify that any CPU and memory impact on the other routers in the network is acceptable. Expected Results The following test results are expected: • All 120,000 routes should be added to the core devices. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 50 shows the scale to ten neighbors and 100K routes in core test results. Table 50 Scale to Ten Neighbors and 100K Routes in Core Test Results Tests Results Scale to Ten Neighbors and 100K Routes in Core (Add 120,000 Routes) Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 96 Layer 3 Routing Features Route Redistribution Between Other Protocols and BGP—ACL/Route Map This test verified that route redistribution works correctly between BGP and both OSPF and EIGRP. Device SH1-100 is a border router between OSPF, EIGRP, and BGP. It is on this router and its neighbor SH1-99 that the configuration for redistribution was applied. OSPF and EIGRP were redistributed into BGP individually, at first, and then both were redistributed at the same time. In each of the three cases, only a limited number of routes were redistributed. Device SH1-97 was used to check whether the routes had been redistributed. Figure 35 shows the topology for route redistribution between other protocols and BGP—ACL/Route map: Figure 35 BGP ACL/Route Map Topology Devices under test: SH1-97, SH1-99, and SH1-100. Test Plan The procedure used to perform the route redistribution between other protocols and BGP—ACL/route map test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 On device SH1-97, determine by what protocol the route for 170.1.1.0 is known. Step 4 Show the default BGP configuration of SH1-99 and SH1-100. Step 5 Configure redistribution from BGP into OSPF on both devices SH1-99 and SH1-100. Step 6 Verify that ecclesiastic 16 is configured on SH1-97, and that it denies the 170.1.1.0 network. Step 7 Apply an inbound distribution list using access list 16 in the OSPF configuration on SH1-97 to block network 170.1.1.0 from being known by OSPF. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 97 Layer 3 Routing Features Step 8 Verify that the route to 170.1.1.0 is now known via BGP 100 on SH1-97 and has a metric of 100, as configured in Step 5. Step 9 Remove the redistribution from SH1-99 and SH1-100 and the distribute-list command from SH1-97. Verify that the 170.1.1.0 network is known again via OSPF 1. Step 10 Verify that the route to 180.1.1.0 is known on SH1-97 via OSPF 1, redistributed from EIGRP (identified by the "type extern 2" label). Step 11 Verify that access list 18 exists in SH1-99 and SH1-100 and permits only the even numbered subnets within 180.1.x.x/24. Step 12 Verify that a route-map called EIGRP2BGP is on SH1-99 and SH1-100 that uses matches IP addresses to access list 18. Step 13 Configure redistribution of EIGRP into BGP on SH1-99 and SH1-100 using the routemap EIGRP2BGP, which allows only the even-numbered subnets within 180.1.x.x. Step 14 Remove the redistribution statement from the OSPF configuration on SH1-99 and SH1-100. If this step is not taken, SH1-97 will continue to know the 180.x.x.x networks via OSPF 1, because OSPF has a lower administrative distance than BGP. Step 15 Verify that the even-numbered networks within 180.1.x.0/24 are known to SH1-97 via BGP 100. Step 16 With EIGRP redistribution configured, reconfigure OSPF redistribution into BGP as in Step 5 and Step 7. Step 17 Verify that device SH1-97 knows the EIGRP and OSPF routes via BGP 100, as earlier. Step 18 Reapply the EIGRP redistribution configuration in OSPF on SH1-99 and SH1-100 that was deleted in Step 14. Step 19 Remove the redistribution configurations applied in BGP on devices SH1-99 and SH1-100 in Step 13 and Step 16. Step 20 Remove the distribute-list from SH1-97, applied in Step 16. Step 21 Verify that the routes seen in Step 3 are known, again, via OSPF 1. Step 22 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • EIGRP routes should be correctly redistributed into BGP. • OSPF routes should be correctly redistributed into BGP. • The application of a route-map should correctly alter the rules by which BGP redistributes routes. • Redistribution of both OSPF and EIGRP routes into BGP at the same time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 51 shows the route redistribution between other protocols and BGP—ACL/route map test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 98 Layer 3 Routing Features Table 51 Route Redistribution Between Other Protocols and BGP—ACL/Route map Test Results Tests Results Route Redistribution Between Other Protocols and BGP—ACL/Route Map Pass BGP Neighbor Flap—No Dampening This test verified that a flapping nondampened BGP peer did not cause any memory leaks or prolonged high CPU utilization, and that the DUT functions properly after the peer stops flapping. With BGP routes being fed into devices SH1-97 and SH1-98, this test will simulate constant flapping of those BGP neighbors. Specifically, the Pagent device rtp-wbu-te-p4 is feeding 35,000 BGP routes into SH1-97 from interface fa1/0. The Pagent configuration on this interface was modified to enable flapping and the test was run overnight. Devices under test: SH1-97, SH1-98, SH1-99, and SH1-100. Test Plan The procedure used to perform the BGP neighbor flap test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-97 is an eBGP peer with a Pagent router. The Pagent router is sending 35000 route updates from autonomous system (AS) 10. Step 4 Log into the Pagent test tool and configure the lne bgp interface fa2/0 command (BGP route feed) to flap every 30 to 60 seconds followed by a nonflapping period of 60 to 120 seconds. Turn router flap on and allow it to continue overnight. Step 5 Verify that there was no unacceptable impact to the CPU or memory of the four devices under test. Step 6 Verify that there was no unacceptable impact to the CPU or memory of other devices under test. Expected Results The following test results are expected: • The amount of memory free for each device being monitored should be about the same, indicating no memory leaks. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 52 shows the BGP neighbor flap—no dampening test results. Table 52 BGP Neighbor Flap T—No Dampening est Results Tests Results BGP Neighbor Flap—No Dampening Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 99 Layer 3 Routing Features Hot Standby Routing Protocol For IP, the Hot Standby Router Protocol (HSRP) allows one router to automatically assume the function of the second router if the second router fails. HSRP is particularly useful when the users on one subnet require continuous access to resources in the network. The following tests were performed: • Basic HSRP, page 100 • HSRP Failover with Standard Timers—Supervisor 22, page 101 • HSRP Failover Using Fast Timers—Supervisor 22, page 103 • HSRP Failover—Supervisor 22, page 105 • HSRP Maximum Group Limit—Supervisor 22, page 106 Basic HSRP This test verified the basic functionality of HSRP. SH1-109 and SH1-110 were configured as HSRP routers for VLANs 10 to 20, peered to each other through Layer 2 switch Dista-2. This test verified that the configuration on each Layer 3 switch produced the desired results. The unicast traffic stream that was running in the background from Dista-2 to SH1-105 was used to prove that traffic chose the active HSRP router. Figure 36 shows the topology for basic HSRP test. Figure 36 Basic HSRP Topology Devices under test: SH1-109, and SH1-110. Test Plan The procedure used to perform the basic HSRP test follows: Step 1 Record the version and initial CPU time for the devices being tested. Also record the start time. Step 2 Verify that SH1-109 and SH1-110 are configured with HSRP on their interfaces for VLANs 10 through 20. Step 3 Verify that trunking is configured for VLANs 10 to 20 on the links between SH1-109 and Dista-2, and SH1-110 and Dista-2. The trunking of these VLANs is what allows the two HSRP routers to negotiate for status. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 100 Layer 3 Routing Features Step 4 Verify that SH1-109 and SH1-110 are running multiple HSRP groups on VLAN 10 through VLAN 20. Expected Results The following test results are expected: • All VLAN interfaces on both SH1-109 and SH1-110 should be in Active or Standby state. • The VLAN interfaces with the higher priority should be in Active state. • If a VLAN interface has a higher priority, the Active address should be listed as local, and the Standby address given should be the interface of the HSRP neighbor. • If a VLAN interface has a lower priority, the Standby address should be listed as local, and the Active address given should be the interface of the HSRP neighbor. • The group address listed should be consistent with that given in the configuration. Results Table 53 shows the basic HSRP test results. Table 53 Basic Hot Standby Routing Protocol Test Results Tests Results Basic HSRP Pass HSRP Failover with Standard Timers—Supervisor 22 This test verified HSRP failover when a link was down. This test also verified that the HSRP preempt command worked when the link returned to an up/up state, if the interface was configured with a higher priority than the currently active router interface in the same HSRP group. Figure 37 shows the topology for the HSRP failover with standard timers—supervisor 22 test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 101 Layer 3 Routing Features Figure 37 HSRP Failover with Standard Timers—Supervisor 22 Topology Devices under test: SH1-101, and SH1-102. Test Plan The procedure used to perform the HSRP failover with standard timers—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify the HSRP configurations on devices SH1-101 and SH1-102 for VLANs 40 through 50. Step 4 Verify that the links between SH1-101 and Dista-1 and the links between SH1-102 and Dista-1 are trunks and that VLANs 40 to 50 are active within them. Step 5 Stop the transmission of the background traffic stream being generated by IXIA port 2/1. This is the port that will be used for this test. Step 6 Begin the IXIA unicast traffic stream. This stream sends 500,000 packets at 10,000 pps. Step 7 Verify that HSRP is active on SH1-102 for VLAN 41 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-101 for VLAN 41. Note The IXIA traffic stream is configured with the MAC address of the default gateway for group 3. Step 8 Verify that traffic is being sent to the active HSRP router. Step 9 On SH1-102, shut down the port-channel 10 interface, which should force the unicast traffic stream to fail over to SH1-101. Measure the time (using traffic loss) required for that switch over to occur. Step 10 Verify that the active HSRP router for VLAN 41, group 3 is now SH1-101. Step 11 Bring the port-channel 10 interface back up on SH1-102. Step 12 Verify that HSRP on SH1-102 preempts SH1-101 and once again becomes the active HSRP router. Step 13 Perform a series of nine more port cycles on the port-channel 10 interface of SH1-102. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 102 Layer 3 Routing Features Step 14 Measure the average time required for switch over following interface shut down. Include the results from Step 9. Step 15 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Traffic should fail over within a reasonable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 54 shows the HSRP failover with standard timers—supervisor 22 test results. Table 54 HSRP Failover with Standard Timers—Supervisor 22 Test Results Tests Results HSRP Failover with Standard Timers—Supervisor 22 Pass HSRP Failover Using Fast Timers—Supervisor 22 This test verified HSRP failover when a link was down. This test also verified that the HSRP preempt command worked when the link returned to an up/up state, if the interface was configured with a higher priority than the currently active router interface in the same HSRP group. In this test, the hello and dead timers are configured to 1 and 3 seconds, respectively to allow for faster switch over of traffic from the active HSRP router to the standby HSRP router in case the active router is not reachable. Figure 38 shows the topology for the HSRP failover using fast timers—supervisor 22 test: Figure 38 HSRP Failover Using Fast Timers—Supervisor 22 Topology Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 103 Layer 3 Routing Features Devices under test: SH1-101, and SH1-102. Test Plan The procedure used to perform the HSRP failover using fast timers—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Configure the fast timers of 1 (hello) and 3 (dead) seconds on the appropriate HSRP groups of the VLAN interfaces 40 to 50. Perform this configuration on both devices SH1-101 and SH1-102. Step 4 Verify the HSRP configurations on devices SH1-101 and SH1-102 for VLANs 40 through 50. Step 5 Verify that the links between SH1-101 and Dista-1 and the links between SH1-102 and Dista-1 are trunks and that VLANs 40 to 50 are active within them. Step 6 Stop the transmission of the background traffic stream being generated by IXIA port 2/1. This is the port that will be used for this test. Step 7 Begin the IXIA unicast traffic stream. This stream sends 250,000 packets at 10,000 pps. Step 8 Verify that HSRP is active on SH1-102 for VLAN 41 (this is the VLAN on which traffic will be sent by IXIA), and standby on SH1-101 for VLAN 41. Note The IXIA traffic stream is configured with the MAC address of the default gateway for group 3. Step 9 Verify that traffic is being sent to the active HSRP router. Step 10 On SH1-102, shut down the port-channel 10 interface, which should force the unicast traffic stream to fail over to SH1-101. Measure the time (using traffic loss) required for that switch over to occur. Step 11 Verify that the active HSRP router for VLAN 41, group 3 is now SH1-101. Step 12 Bring the port-channel 10 interface back up on SH1-102. Step 13 Verify that HSRP on SH1-102 preempts SH1-101 and once again becomes the active HSRP router. Step 14 Perform a series of nine more port cycles on the port-channel 10 interface of SH1-102. Step 15 Measure the average time required for switch over following interface shut down. Include the results from Step 10. Step 16 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 17 Return both devices to their original, default configurations. Expected Results The following test results are expected: • Traffic should fail over within a reasonable time. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 55 shows the HSRP failover using fast timers—supervisor 22 test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 104 Layer 3 Routing Features Table 55 HSRP Failover Using Fast Timers—Supervisor 22 Test Results Tests Results HSRP Failover Using Fast Timers—Supervisor 22 Pass HSRP Failover—Supervisor 22 This test measures the impact of traffic on the CPU of the supervisor 22 when traffic is going through a VLAN that has 16 HSRP groups configured on it. VLANs 60 and 61 are configured on SH1-101 and SH1-102; 16 separate HSRP groups (101-116) are configured on each VLAN interface. Traffic is sourced from IXIA, connected to Dista-1, on VLAN 60. The destination is an IXIA port also connected to Dista-1, on VLAN 61. Traffic is sent at increasing rates of 100,000 pps, 250,000 pps, 500,000 pps, and 1 million pps. The CPU and memory utilization is measured. Figure 39 shows the topology for the HSRP failover—supervisor 22 test. Figure 39 HSRP Failover—Supervisor 22 Topology Devices under test: SH1-101, and SH1-102. Test Plan The procedure used to perform the HSRP maximum group limit—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Write the running configuration to memory (NVRAM) so that it can be recalled. Step 4 Determine which VLAN interfaces are present on the device. Step 5 Remove any VLANs discovered in Step 4, with the exception of VLAN 1. Perform this function on each device, for its respective VLANs. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 105 Layer 3 Routing Features Step 6 Configure VLANs 60 and 61 on each device SH1-101 and SH1-102. Each of these VLANs will participate in HSRP with the other device on 16 groups within each VLAN. SH1-101 will be the active HSRP router for the odd groups, and SH1-102 will be the active HSRP router for the even groups. Also configure each VLAN to participate in multicast PIM-SM. Step 7 Verify that the HSRP states on each device, for each VLAN and group, are as they should be. For SH1-101, all odd-numbered groups should be active, and the even-numbered groups should be standby. For SH1-102, all odd-numbered groups should be standby and all even-numbered groups active. Step 8 Verify that ports 6/5 and 6/6 on Dista-1 are on VLANs 60 and 61, respectively. Step 9 Begin the traffic stream. This stream will run at the following rates (packets per second) for 1 minute each: 25,000, 50,000, 75,000, 100,000, 125,000; 22.5 million packets total will be sent at these varying rates. Step 10 Verify that 100 percent of the traffic sent was received on the proper port. Step 11 Remove the VLAN 60 and VLAN 61 configurations from the devices under test. Step 12 Copy the startup configuration in NVRAM to the running configuration, and bring the VLAN interfaces up (VLANs 40 to 50 and those others removed in Step 5, restoring the default configuration for the devices under test. Step 13 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • 100 percent of the traffic sent at the varying rates should be received correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 56 shows the HSRP failover—supervisor 22 test results. Table 56 HSRP Failover—Supervisor 22 Test Results Tests Results HSRP Failover—Supervisor 22 Pass HSRP Maximum Group Limit—Supervisor 22 The PFC2 and MSFC2 support a maximum of 16 unique HSRP groups. There are concerns, that in recent Cisco IOS code, no warnings are given if more than 16 unique HSRP groups are configured. This test demonstrates that an error message is displayed when an attempt is made to configure the 17th group. Device under test: SH1-103. Test Plan The procedure used to perform the HSRP maximum group limit—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 106 Layer 3 Routing Features Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Configure 16 HSRP groups on VLAN 100 of SH1-103. Step 4 Attempt to configure the 17th HSRP group. Step 5 Remove VLAN 100 from the configuration on SH2-104. Step 6 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • An error message should appear on attempt to configure the 17th HSRP group, and the 17th group should not be configurable. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 57 shows the HSRP maximum group limit—supervisor 22 test results. Table 57 HSRP Maximum Group Limit—Supervisor 22 Test Results Tests Results HSRP Maximum Group Limit—Supervisor 22 Pass Enhanced Interior Gateway Routing Protocol The Enhanced Interior Gateway Routing Protocol (EIGRP) is an enhanced version of the IGRP protocol developed by Cisco Systems. Enhanced IGRP uses the same distance vector algorithm and distance information as IGRP. However, the convergence properties and the operating efficiency of Enhanced IGRP have improved significantly over IGRP. The convergence technology is based on research conducted at SRI International and employs an algorithm referred to as the Diffusing Update Algorithm (DUAL). This algorithm guarantees loop-free operation at every instant throughout a route computation and allows all devices involved in a topology change to synchronize at the same time. Routers that are not affected by topology changes are not involved in recomputations. The convergence time with DUAL rivals other routing protocol. The following tests were performed: • EIGRP Summarization, page 107 • EIGRP Redistribution, page 108 EIGRP Summarization This test verified manual EIGRP summarization by using the ip summary-address interface configuration command. Several /24 networks are known via EIGRP by device SH1-101 that can be summarized as a single /22 network on the port-channels of devices SH1-99 and SH1-100 (port-channels 14 and 15). This test will involve the summarization of the routes 172.31.20.0/24 to 172.31.23.0/24 into 172.31.20.0/22. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 107 Layer 3 Routing Features Devices under test: SH1-99, SH1-100, and SH1-101. Test Plan The procedure used to perform the EIGRP summarization test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Show that the routes are not summarized and exist as /24 routes on SH1-101. Step 4 Configure the ip summary-address eigrp command on the port-channel 14 and port-channel 15 interfaces of SH1-100 and SH1-99. Step 5 Verify that the routes to the networks that were shown in Step 3 now have an entry on the summary subnet of 172.31.20.0/22. Step 6 Remove the summarization configuration statements applied in Step 4. Step 7 Verify that the routing entries appear, again, as they should and as they did in Step 3. Step 8 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • The /24 networks shown should be correctly summarized as /22 networks. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 58 shows the EIGRP summarization test results. Table 58 EIGRP Summarization Test Results Tests Results EIGRP Summarization Pass EIGRP Redistribution This test verified that EIGRP route redistribution works correctly, with and without access lists (ACLs) and route map filtering. Figure 40 shows SH1-99 and SH1-100 redistributing OSPF routes into EIGRP 1320 (of which SH1-101 is a member). Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 108 Layer 3 Routing Features Figure 40 EIGRP Redistribution CPU Usage The routes examined in this test are OSPF routes for 10,000 networks with a /24 mask, beginning at 160.1.1.0, 160.1.2.0, 160.1.3.0, and so on. These routes are fed directly into device SH1-97 via the Pagent test tool. Because redistribution is a part of the normal configuration in the Safe Harbor topology, the first part of the test was to remove that configuration on devices SH1-99 and SH1-100, and verify that the 160.x.x.x networks are no longer propagated to SH1-101 in the EIGRP domain. Redistribution will then be configured with a route map added, which will allow only the odd-numbered networks to be redistributed (160.1.1.0, 160.1.3.0, 160.1.5.0, and so on). The even-numbered networks will not appear in the routing table of SH1-101. The final part of the test was to reconfigure redistribution as it is in the default setup for this network to allow all 160.x.x.x networks to be redistributed. Devices under test: SH1-97, SH1-99, SH1-100, and SH1-101. Test Plan The procedure used to perform the EIGRP redistribution test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Show the default EIGRP configuration for devices SH1-99 and SH1-100. Step 4 Show that, with the default EIGRP configuration (allowing redistribution), the 160.x.x.x networks are propagated to SH1-101. Step 5 Show that SH1-101 has a full routing table with about 30,000 total routes (20,000 routes from OSPF 1 and 10,000 routes from EIGRP 1320). Step 6 Remove the redistribution configuration from devices SH1-99 and SH1-100. Step 7 Verify that the routes for the 160.x.x.x networks are no longer present in SH1-101 and that the routing table has been reduced by about 10,000 routes. Several minutes may pass before the old routes time out and are eliminated. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 109 Layer 3 Routing Features Step 8 Show the route map OSPF2EIGRP-odd and the access list 22 on SH1-99 and SH1-100. Step 9 Configure redistribution on SH1-99 and SH1-100, applying the route map OSPF2EIGRP-odd, so that the even-numbered networks are blocked from being redistributed. Step 10 Verify that the only routes for the 160.x.x.x networks that are on SH1-101 are for the odd-numbered networks, 160.1.1.0, 160.1.3.0, 160.1.5.0, and so on. Step 11 Show that the number of subnets in the routing table of SH1-101 has been decreased by 5000. Step 12 Reconfigure the default redistribution configuration that was removed in Step 6. Step 13 Verify that all of the 160.x.x.x networks are redistributed into SH1-101 (odd-numbered and even-numbered), and that the routing table on SH1-101 is back to normal status (seen in Step 5). Step 14 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • When the default redistribution configuration is removed from SH1-99 and SH1-100, none of the 20,000 OSPF routes should be propagated to SH1-101. • When the route map OSPF2EIGRP-odd is applied, with redistribution, on SH1-99 and SH1-100, only the odd-numbered subnets within 160.x.x.x should be propagated to SH1-101. • When the default redistribution configuration is reapplied to SH1-99 and SH1-100, all of the routes for the 160.x.x.x networks should be in the routing table of SH1-101 and that the routing table should be populated correctly in its default state. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 59 shows the EIGRP redistribution test results. Table 59 EIGRP Redistribution Test Results Tests Results EIGRP Redistribution Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 110 Network Management Features Network Management Features Network management feature testing for Safe Harbor is described in the following sections: • Simple Network Management Protocol, page 111 • TACACS, page 114 Simple Network Management Protocol The Simple Network Management Protocol (SNMP) system consists of an SNMP manager, an SNMP agent, and a MIB. SNMP is an application-layer protocol that provides a message format for communication between SNMP managers and agents. Protos tests send exceptional elements to SNMP agents and managers in the form of requests and traps. These elements are designed to provoke undesired behavior of the subject implementation. An exceptional element is an input that might not have been considered properly when implementing the software. The following tests were performed: • Basic Functionality Shut/No Shut Interface—Supervisor 11, page 111 • Basic Functionality Shut/No Shut Interface—Supervisor 22, page 112 • Protos Negative Request Application, page 113 Basic Functionality Shut/No Shut Interface—Supervisor 11 This test verified the basic SNMP functionality of the Supervisor 11. In this procedure, SNMP traps are created by a shut/no shut of an interface on device SH1-108. The logging messages created on the device should be logged to the SNMP trap receiver. Device under test: SH1-106. Test Plan The procedure used to perform the basic functionality shut/no shut interface—supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-106 is configured to send SNMP traps generated by configuration messages to the server 172.18.177.135. Step 4 Enter and leave configuration mode on SH1-106, generating a log message. Step 5 Verify that the traps are received by a machine that is set up as the SNMP trap receiver. Step 6 Display the output from the log files of that machine. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 111 Network Management Features Expected Results The following test results are expected: • SNMP should generate and send a trap to the configured host. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 60 shows the basic functionality shut/no shut interface—supervisor 11 test results. Table 60 Basic Functionality Shut/No Shut Interface- Supervisor 11 Test Results Tests Results Basic Functionality Shut/No Shut Interface—Supervisor 11 Pass Basic Functionality Shut/No Shut Interface—Supervisor 22 This test verified the basic SNMP functionality of the supervisor 22. In this procedure, SNMP traps are created by a shut/no shut of an interface on device SH1-110. The logging messages created on the device should be logged to the SNMP trap receiver. Device under test: SH1-110. Test Plan The procedure used to perform the basic functionality shut/no shut interface—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-110 is configured to send SNMP traps generated by configuration messages to the server 172.18.177.135. Step 4 Enter and leave configuration mode on SH1-110, generating a log message. Step 5 Verify that the traps are received by a machine that is set up as the SNMP trap receiver. Step 6 Display the output from the log files of that machine. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SNMP should function according to specifications, generating and sending a trap to the configured host. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 61 shows the basic functionality shut/no shut interface—supervisor 22 test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 112 Network Management Features Table 61 Basic Functionality Shut/No Shut Interface—Supervisor 22 Test Results Tests Results Basic Functionality Shut/No Shut Interface—Supervisor 22 Pass Protos Negative Request Application This test verified that no SNMP vulnerabilities exist in the Native Cisco IOS code. Protos testing involves sending erroneous SNMP packets to the device under test. These tests are run on all permutations of supervisor and MSFC. This is a negative test, so the only verification is that the DUT was unaffected. Test Plan The procedure used to perform the Protos negative request application test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Start background unicast and multicast traffic (rate = 25,000 pps). Step 5 Execute the protos c06-snmpv1-req-app-r1.jar and c06-snmpv1-req-app-r1.jar on each host. Step 6 After background traffic is done, verify that no packets were lost. Show the results. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Step 8 Verify that the switch or router did not pause indefinitely, reload, or give tracebacks. Expected Results The following test results are expected: • All DUTs should not drop any background traffic while running the test. • All DUTs should not pause indefinitely, reload, or give tracebacks while running the test. Results Table 62 shows the Protos negative request application test results. Table 62 Protos Negative Request Application Test Results Tests Results Protos Negative Request Application Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 113 Network Management Features TACACS Terminal Access Controller Access Control System (TACACS) is an authentication protocol that provides remote access authentication and related services, such as event logging. User passwords are administered in a central database rather than in individual routers, providing an easily scalable network security solution. Login authentication increases the security of the system by keeping unauthorized users from guessing the password. The user is limited to a specific number of attempts to successfully log in to the switch. If the user fails to authorize the password, the system delays access and captures the user ID and the IP address of the station in the syslog file and in the SNMP trap. The following test was performed: • User Authentication—Supervisor 11, page 114 • User Authentication—Supervisor 22, page 115 User Authentication—Supervisor 11 This test verified that the TACACS login authentication works correctly on a supervisor 1 on MSFC 1 system. The server 172.18.177.132 is a TACACS server. It was used in this test as the source of user authentication information. Device under test: SH1-106. Test Plan The procedure used to perform the user authorization—supervisor 11 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-106 has connectivity to the TACACS server 172.18.177.132. Step 4 Configure SH1-106 to be a TACACS device with 172.18.177.132 as its server. Step 5 Verify that user authentication is necessary on SH1-106. Step 6 Remove the TACACS configuration from SH1-106. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • TACACS login authentication should work correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 63 shows the user authorization—supervisor 11 test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 114 Miscellaneous Features Table 63 User Authorization—Supervisor 11 Test Results Tests Results User Authentication—Supervisor 11 Pass User Authentication—Supervisor 22 This test verified that the TACACS login authentication works correctly on a supervisor 2 on MSFC 2 system. The server 172.18.177.132 is a TACACS server. It was used in this test as the source of user authentication information. Device under test: SH1-104. Test Plan The procedure used to perform the user authorization—supervisor 22 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that SH1-104 has connectivity to the TACACS server 172.18.177.132. Step 4 Configure SH1-104 to be a TACACS device with 172.18.177.132 as its server. Step 5 Verify that user authentication is necessary on SH1-104. Authentication works as designed: Step 6 Remove the TACACS configuration from SH1-104. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • TACACS login authentication should work correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 64 shows the user authorization—supervisor 22 test results. Table 64 User Authorization—Supervisor 22 Test Results Tests Results User Authentication—Supervisor 22 Pass Miscellaneous Features Miscellaneous features tested for Safe Harbor are described in the following sections: • Switched Port Analyzer, page 116 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 115 Miscellaneous Features • Access Control Lists, page 118 • Parser, page 120 • Network Address Translation, page 121 • Network Time Protocol, page 131 • Syslog, page 133 • User Datagram Protocol Broadcast Flooding, page 135 • System Upgrade, page 137 • Secure Shell, page 142 Switched Port Analyzer Local switched port analyzer (SPAN) selects network traffic to send to a network analyzer such as a switch probe device or other Remote Monitoring (RMON) probe. SPAN does not affect the switching of network traffic on source ports or VLANs. SPAN sends a copy of the packets received or sent by the source ports and VLANs to the destination port. The destination port must be dedicated for SPAN use. The following test was performed: • SPAN Basic Functionality, page 116 SPAN Basic Functionality This test verified the basic functionality of the SPAN feature across both the supervisor 12 and supervisor 22 platforms, and across a number of different modules. A multicast stream with a single group destination was sent into the network at Dista-2. There were two receivers, both on Dista-1. Traffic passes through SH1-110 (supervisor 22), SH1-108 (supervisor 12) and SH1-102 (supervisor 22) along the way to the two destinations. There are four interfaces in these three devices configured to monitor the multicast traffic. These four interfaces are on the WS-X6348-RJ-45, WS-X6408-GBIC, WS-X6516-GBIC, and WS-X6816-GBIC modules. Figure 41 shows the topology for the SPAN basic functionality test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 116 Miscellaneous Features Figure 41 Switched Port Analyzer (SPAN) Topology Devices under test: SH1-110, SH1-108, and SH1-102. Test Plan The procedure used to perform the SPAN basic functionality test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Stop all background traffic streams. Step 4 Configure the SPAN sessions on SH1-102, SH1-108, and SH1-110, as shown in Figure 41. Step 5 Start the IGMP joins on IXIA ports 2/1 and 8/1 for multicast group 239.255.200.100. Step 6 Start the test traffic stream using IXIA. This traffic stream generates 1 million packets destined to multicast group 239.255.200.100, at a rate of 10,000 packets per second. Step 7 Verify that all 1 million packets were received by the multicast destinations, and that all 1 million packets were sent to the monitoring interfaces. Step 8 Remove the SPAN configurations from the devices. Step 9 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Each packet sent in the traffic stream should be duplicated on each of the four monitor destination interfaces. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 117 Miscellaneous Features • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 65 shows the SPAN basic functionality test results. Table 65 SPAN Basic Functionality Test Results Tests Results SPAN Basic Functionality Pass Access Control Lists Access control lists (ACLs) are used to classify traffic and permit or deny forwarding based on this classification. The following tests were performed: • Scripted Test of ACL 110, page 118 • Scripted Test of ACL 131, page 119 Scripted Test of ACL 110 ACL 110 is a 1404 line access list taken from customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. This script is run against a supervisor 11, supervisor 12, and supervisor 22. Test Plan The procedure used to perform the scripted test of ACL 110 test follows: Step 1 Verify that the DUTs are running Cisco IOS Release 12.1(8b)E14. Step 2 Begin SNMP monitoring. Step 3 Begin the ACL test script on SH1-105, SH1-107, and SH1-102. Step 4 Using the script's output file, verify that all packets were permitted and denied correctly. Step 5 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Each DUT will not permit any denied traffic, and will not deny any permitted traffic. • All traffic should be hardware-switched, and no permitted packets dropped. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 118 Miscellaneous Features Results Table 66 shows the scripted test of ACL 110 test results. Table 66 Scripted Test of ACL 110 Test Results Tests Results Scripted Test of ACL 110 Pass Scripted Test of ACL 131 ACL 131 is a 2985 line access control list taken from a customer configuration. Our ACL test script configures this ACL on a router. For each line of the ACL, the script creates a stream on an IXIA box that matches the ACL; 10,000 packets from each stream are sent through the router and back to the IXIA. The script then checks the IXIA statistics to verify that 10,000 packets were received for each stream that matched a permit, and that no packets were received for each stream that matched a deny. Test Plan The procedure used to perform the scripted test of ACL 131 test follows: Note To fit this ACL in the TCAM you need to be using the ODM ACL merge algorithm. This feature is not supported until Cisco IOS Release 12.1(11b)E4. Until then we must split the ACL into two ACLs and run them separately. Step 1 Verify that the DUTs are running Cisco IOS Release 12.1(8b)E14. Step 2 Begin SNMP monitoring. Step 3 Begin the ACL test script on SH1-105, SH1-107, and SH1-102. Step 4 Using script output file verify that all packets were permitted or denied correctly. Step 5 Begin SNMP and CPU monitoring and verify supervisor and MSFCs are running the correct version of Cisco IOS software. Step 6 Begin the ACL test script on SH1-105, SH1-107, and SH1-102. Step 7 Using the script's output file, verify that all packets were permitted or denied correctly. Expected Results The following test results are expected: • Each DUT should not permit any denied traffic, and should not deny any permitted traffic. • All traffic should be hardware-switched, and no permitted packets dropped. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 67 shows the Scripted Test of ACL 131 test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 119 Miscellaneous Features Table 67 Scripted Test of ACL 131 Test Results Tests Results Scripted Test of ACL 131 Pass Parser Parser testing robustly exercises the command-line interface (CLI) of a router. The testing walks the parser tree, executing completed commands and filling in options as it comes to them. Certain branches of the parser tree were left out due to time constraints of the testing (for example, the show tag-switching tdp, and show mpls commands. The following test was performed: • Show-All Script, page 120 Show-All Script An automated script was used to test over 14,000 valid show and clear commands on a supervisor 11, supervisor 12 and supervisor 22. Certain commands were left out (for example, the show memory; show tag-switching tdp; show mpls) due the to length of time they take to execute. Test Plan The procedure used to perform the parser show-all script test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Begin executing show and clear commands on the device under test. Step 4 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Commands should execute without the router reloading, giving tracebacks, pausing indefinitely, or having CPU problems. Results Table 68 shows the reloads, indefinite pauses, or show-all script test results. Table 68 Show-All Script Test Results Tests Results Show-All Script Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 120 Miscellaneous Features Network Address Translation Two key problems facing the Internet are depletion of IP address space and scaling in routing. Network Address Translation (NAT) is a feature that allows the IP network of an organization to appear from the outside to use different IP address space than what it is actually using. Thus, NAT allows an organization with nonglobally routable addresses to connect to the Internet by translating those addresses into globally routable address space. NAT also allows a more graceful renumbering strategy for organizations that are changing service providers or voluntarily renumbering into classless interdomain routing (CIDR) blocks. NAT is also described in RFC 1631. The following tests were performed: • Static 2 Hosts, page 121 • Static 40 Hosts, page 122 • Static 40 Hosts Extended, page 123 • Static 2 Networks, page 124 • Static Inside Dynamic Outside, page 125 • Dynamic Inside Static Outside, page 127 • Verify CSCdx40232, page 128 • Addition/Removal of NAT Statements, page 129 • Static 40 Hosts Overnight, page 130 Static 2 Hosts This test verified the basic functionality of the NAT feature on a supervisor 2 on MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Plan The procedure used to perform the static 2 hosts test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify joins are being sent from the IXIA to the NAT outside interface. Step 5 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions for the inside and outside interfaces set up but not active. Step 6 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 121 Miscellaneous Features Step 7 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture inbound and outbound packets on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 8 After traffic has been sent, verify that no packets were lost. Step 9 Stop SNMP data collection. Step 10 Show current status of NAT, interfaces, and buffers on the DUT. Step 11 Verify that the DUT did not give any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 69 shows the static 2 hosts test results. Table 69 Static 2 Hosts Test Results Tests Results Static 2 Hosts Pass Static 40 Hosts This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Plan The procedure used to perform the static 40 hosts test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 122 Miscellaneous Features Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 6 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 7 After traffic has completed, verify that no packets were lost. Step 8 Show current status NAT, interfaces, and buffers on the DUT. Step 9 Stop SNMP data collection. Step 10 Verify that the DUT did not give any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 70 shows the static 40 hosts test results. Table 70 Static 40 Hosts Test Results Tests Results Static 40 Hosts Pass Static 40 Hosts Extended This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 10 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Plan The procedure used to perform the static 40 hosts extended test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 123 Miscellaneous Features Step 4 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 6 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture inbound and outbound packets on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 7 After traffic has completed, verify that no packets were lost. Step 8 Show current status NAT, interfaces, and buffers on the DUT. Step 9 Stop SNMP data collection. Step 10 Verify that the DUT did not give any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 71 shows the static 40 hosts extended test results. Table 71 Static 40 Hosts Extended Test Results Tests Results Static 40 Hosts Extended Pass Static 2 Networks This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Plan The procedure used to perform the static 2 networks test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 124 Miscellaneous Features Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 6 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 7 After traffic has completed, verify that no packets were lost. Step 8 Show current status NAT, interfaces, and buffers on the DUT. Step 9 Stop SNMP data collection. Step 10 Verify that the DUT did not give any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results The following exceptions were reported. • No packets sourced from the outside were received on the inside. • Sniffer showed that inside packets were not being translated, and outside packets were not being forwarded. • Memory and CPU usage were unaffected through the test because packets were hardware-switched. Table 72 shows the static 2 networks test results. Table 72 Static 2 Networks Test Results Tests Results Static 2 Networks Fail; fixed in 13E, not SS, has a work around (use individual NAT statements) Static Inside Dynamic Outside This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 125 Miscellaneous Features Test Plan The procedure used to perform the static inside dynamic outside test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify joins are being sent from the IXIA to the NAT outside interface. Step 5 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 6 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 7 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 8 After traffic has completed, verify that no packets were lost. Step 9 Show current status NAT, interfaces, and buffers on the DUT. Step 10 Stop SNMP data collection. Step 11 Verify that the DUT did not give any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 73 shows the static inside dynamic outside test results. Table 73 Static Inside Dynamic Outside Test Results Tests Results Static Inside Dynamic Outside Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 126 Miscellaneous Features Dynamic Inside Static Outside This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. The DUT for this test is SH1-97. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Test Plan The procedure used to perform the dynamic inside static outside test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify joins are being sent from the IXIA to the NAT outside interface. Step 5 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 6 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 7 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 8 After traffic has completed, verify that no packets were lost. Step 9 Show current status NAT, interfaces, and buffers on the DUT. Step 10 Stop SNMP data collection. Step 11 Verify that the DUT did not give any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 74 shows the dynamic inside static outside test results. Table 74 Dynamic Inside—Static Outside Test Results Tests Results Dynamic Inside Static Outside Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 127 Miscellaneous Features Verify CSCdx40232 This test verified that CSCdx40232 exists. The DUT was configured to dynamically translate inside global addresses to inside local addresses. IXIA will send 1 million packets in each direction for each test using overlapping inside and outside static NAT. Device under test: SH1-97. Test Plan The procedure used to perform the verify CSCdx40232 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic. Step 6 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an outbound packet. Verify that the packets are being translated properly. Step 7 While traffic is being sent, verify that there are 8000 dynamic translations from several different pools. Step 8 While traffic is being sent, verify that the CPU did not suffer from severe or sustained impact. Step 9 Stop SNMP data collection. Step 10 Verify that the DUT did not give any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 75 shows the verify CSCdx40232 test results. Table 75 Verify CSCdx40232 Test Results Tests Results Verify CSCdx40232 Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 128 Miscellaneous Features Addition/Removal of NAT Statements This test measured the impact on the CPU from the removal and addition of NAT statements while those translations were in use. There are four NAT statements on switch SH1-97, translating four outside global addresses into four outside local addresses. Traffic is passed with source IP addresses of the four outside global addresses. As traffic is being passed, the NAT statements for those four particular translations are removed, and then readded, while the CPU was being monitored. Test Plan The procedure used to perform the addition/removal of NAT statements test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify joins are being sent from the IXIA to the NAT outside interface. Step 5 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 6 Begin sending unicast NAT traffic. Step 7 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 8 Remove each of the static NAT statements every 10 seconds and readd them. Then remove all 4 NAT statements at once, and then readd them. Remove the first two NAT statements 10 seconds apart, followed by removing the last two statements after 1 second. Then readd all four statements. Step 9 After NAT statements readded, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 10 Stop SNMP data collection. Step 11 Verify that the DUT did not give any tracebacks. Step 12 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • Removal and addition of NAT statements should not cause NAT to fail. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 76 shows the addition/removal of NAT statements test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 129 Miscellaneous Features Table 76 Addition/Removal of NAT Statements Test Results Tests Results Addition/Removal of NAT Statements Pass Static 40 Hosts Overnight This test verified the basic functionality of the NAT feature on a supervisor 2 or MSFC 2. The DUT was configured to translate outside global addresses into outside local addresses and inside global addresses to inside local addresses. IXIA will send 400 million packets in each direction for each test using overlapping inside and outside static NAT. IXIA will also send a background multicast stream from the inside interface to the outside interface. Device under test: SH1-97. Test Plan The procedure used to perform the static 40 hosts overnight test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that there are no alignment errors or other abnormal messages in the log, and then clear it. Step 3 Begin monitoring memory and CPU utilization for the devices being tested. Step 4 Verify that the DUT has NAT inside and outside interfaces, static NAT translations, static routes to NAT networks, ARP entries to next hop routers, and monitor sessions on inside and outside interfaces set up but not active. Step 5 Clear statistics and counters, and begin sending unicast NAT traffic and multicast background traffic. Step 6 While traffic is being sent, turn on monitoring on the inside interface, then on the outside interface, and capture with a sniffer an inbound and outbound packet on both interfaces. Verify that the packets from the inside interface have the inside local and outside local IP addresses, and that the packets from the outside interface have the inside global and outside global IP addresses. Step 7 After traffic has been sent, verify that no packets were lost. Step 8 Show current status NAT, interfaces, and buffers on the DUT. Step 9 Stop SNMP data collection. Step 10 Verify that the DUT did not give any tracebacks. Step 11 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • All unicast packets should be translated correctly. • All multicast packets should be forwarded correctly. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 130 Miscellaneous Features Results Table 77 shows the static 40 hosts overnight test results. Table 77 Static 40 Hosts Overnight Test Results Tests Results Static 40 Hosts Overnight Pass Network Time Protocol Network Time Protocol (NTP) synchronizes timekeeping among a set of distributed time servers and clients. This synchronization allows events to be correlated when system logs are created and other time-specific events occur. An NTP server must be accessible by the client switch. NTP runs over User Datagram Protocol (UDP), that runs over IP. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two machines to within a millisecond of one another. This test verified basic functionality. It used a local Sun server (IP address: 172.18.177.132) as the NTP server. SH1-104 was configured as the NTP client. The following tests were performed: • Basic NTP Functionality—Supervisor 1, page 131 • Basic NTP Functionality—Supervisor 2, page 132 • NTP Failover—Supervisor 1 and Supervisor 2, page 133 Basic NTP Functionality—Supervisor 1 This test verified the basic functionality of NTP on the supervisor 1. It used a local Sun server (IP address: 172.18.177.132), and a local Cisco 6500 router running native as NTP servers. SH1-106 was configured as the NTP client. Device under test: SH1-106. Test Plan The procedure used to perform the basic NTP functionality—supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that one or more servers are configured as the NTP server on the DUT. Step 3 Verify that the association between the NTP server and the client is active. Step 4 Verify that the NTP status is "synchronized" and that the time and date shown on SH1-104 are the same as those shown on the server (NTP is working). Expected Results The following test results are expected: Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 131 Miscellaneous Features • The test device should be synchronized to the configured NTP server and the clocks on the device and the server are synchronized. Results Table 78 shows the basic NTP functionality—supervisor 1 test results. Table 78 Basic NTP Functionality—Supervisor 1 Test Results Tests Results Basic NTP Functionality—Supervisor 1 Pass Basic NTP Functionality—Supervisor 2 This test verified the basic functionality of NTP on the supervisor 2. It used a local Sun server (IP address: 172.18.177.132), and a local Cisco 6500 router running native as NTP servers. SH1-104 was configured as the NTP client. Device under test: SH1-104. Test Plan The procedure used to perform the basic NTP functionality—supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that one or more servers are configured as the NTP server on the DUT. Step 3 Verify that the association between the NTP server and the client is active. Step 4 Verify that the NTP status is "synchronized" and that the time and date shown on SH1-104 are the same as those shown on the server (NTP is working). Expected Results The following test results are expected: • The test device should be synchronized to the configured NTP server and the clocks on the device and the server are synchronized. Results Table 79 shows the basic NTP functionality—supervisor 2 test results. Table 79 Basic NTP Functionality—Supervisor 2 Test Results Tests Results Basic NTP Functionality—Supervisor 2 Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 132 Miscellaneous Features NTP Failover—Supervisor 1 and Supervisor 2 Two NTP servers are configured on each device in the test network. This test verified the ability of the device to switch over to the backup NTP server if the primary server fails. Devices under test: SH1-106, and SH1-104. Test Plan The procedure used to perform the NTP failover—supervisor 1 and supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Verify that the servers with IP addresses 172.18.177.131 and 172.18.177.132 (preferred) are configured as the NTP servers on SH1-104 and SH1-106 and that 172.18.177.132 is synchronized to SH1-106 as the master. Step 3 On the server 172.18.177.132, stop the NTP daemon. Step 4 Verify that the server 172.18.177.131 is now the master server for each SH1-104 and SH1-106 and that NTP is functioning again. (This verification may take some time because the timeout interval is lengthy.) Step 5 Start the NTP daemon on the server 172.18.177.132 again and verify that it once again becomes the active master server for SH1-104 and SH1-106. (This verification may take some time because the timeout interval is lengthy.) Expected Results The following test results are expected: • The test device should be synchronized to the configured NTP server and the clocks on the device and the server are synchronized. Results Table 80 shows the NTP failover—supervisor 1 and supervisor 2 test results. Table 80 Basic NTP Failover—Supervisor 1 and Supervisor 2 Test Results Tests Results NTP Failover—Supervisor 1 and Supervisor 2 Pass Syslog The system log (syslog) protocol provides a transport to allow a machine to send event notification messages across IP networks to event message collectors, that are also known as syslog servers. The following tests were performed: • Basic Syslog Functionality—Supervisor 1, page 134 • Basic Syslog Functionality—Supervisor 2, page 134 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 133 Miscellaneous Features Basic Syslog Functionality—Supervisor 1 This test verified syslog functionality. Device under test: SH1-105. Test Plan The procedure used to perform the basic syslog functionality—supervisor 1 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that syslog is configured on the DUT and that the designated server is 172.18.177.132. Step 4 Enable the terminal monitor command on the DUT and enable IP PIM debugging. Step 5 Once you receive debug messages on the DUT, turn debugging off. Step 6 Show output from the syslog server. Compare it to messages received on the DUT. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Each message that is logged to the vty session should also be logged to the syslog server. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 81 shows the basic syslog functionality—supervisor 1 test results. Table 81 Basic Syslog Functionality—Supervisor 1 Test Results Tests Results Basic Syslog Functionality—Supervisor 1 Pass Basic Syslog Functionality—Supervisor 2 This test verified syslog functionality. Device under test: SH1-104. Test Plan The procedure used to perform the basic syslog functionality—supervisor 2 test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that syslog is configured on SH1-104 and that the designated server is 172.18.177.132. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 134 Miscellaneous Features Step 4 Enable the terminal monitor command on SH1-104 and enable IP PIM debugging. Step 5 Once you receive debug messages on SH1-104, turn debugging off. Step 6 Show output from the syslog server. Compare it to messages received on SH1-104. Step 7 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • Each message that is logged to the vty session should also be logged to the syslog server. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 82 shows the basic syslog functionality—supervisor 2 test results. Table 82 Basic Syslog Functionality—Supervisor 2 Test Results Tests Results Basic Syslog Functionality—Supervisor 2 Pass User Datagram Protocol Broadcast Flooding A broadcast is a data packet that is destined for multiple hosts. Broadcasts can occur at the data link layer and the network layer. Data-link broadcasts are sent to all hosts attached to a particular physical network. Network layer broadcasts are sent to all hosts attached to a particular logical network. TCP/IP supports the following types of broadcast packets: • All ones—By setting the broadcast address to all ones (255.255.255.255), all hosts on the network receive the broadcast. • Network—By setting the broadcast address to a specific network number in the network portion of the IP address and setting all ones in the host portion of the broadcast address, all hosts on the specified network receive the broadcast. For example, when a broadcast packet is sent with the broadcast address of 131.108.255.255, all hosts on network number 131.108 receive the broadcast. • Subnet—By setting the broadcast address to a specific network number and a specific subnet number, all hosts on the specified subnet receive the broadcast. For example, when a broadcast packet is set with the broadcast address of 131.108.4.255, all hosts on subnet 4 of network 131.108 receive the broadcast. Because broadcasts are recognized by all hosts, a significant goal of router configuration is to control unnecessary proliferation of broadcast packets. Cisco routers support two kinds of broadcasts: directed and flooded. A directed broadcast is a packet sent to a specific network or series of networks, whereas a flooded broadcast is a packet sent to every network. In IP internetworks, most broadcasts take the form of UDP broadcasts. The following test was performed: • UDP Broadcast Flooding, page 136 Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 135 Miscellaneous Features UDP Broadcast Flooding There are several facets to this test. An IXIA broadcast stream is used for each aspect of the procedure. First, the broadcast stream is sent into the network at a single device. It is verified that this device forwards the broadcast out all physical interfaces. Next the device is configured to use an IP helper address, which will cause the IP destination portion of the header, originally a broadcast address, to be replaced by a unicast address, destined for the IP helper address. The IXIA streams that are configured have been done so with UDP port 53 (domain name system, DNS). The next part of the procedure tests the functionality of the no ip forward-protocol command, that is expected to halt the forwarding of any broadcasts using the protocol specified (in this case DNS). Device under test: SH1-101. Test Plan The procedure used to perform the UDP broadcast flooding test follows: Step 1 Record the version, start time, and CPU utilization from each DUT. Step 2 Begin monitoring memory and CPU utilization for the devices being tested. Step 3 Verify that the ip helper-address command and the no ip forward-protocol commands are not yet configured on the device. Step 4 Begin the broadcast IXIA stream on Ix-12/1 (SH1-101 g7/16). The stream should have a length of 74 bytes and be sent at a rate of 5000 pps. The broadcast stream has a destination media access control (DMAC) of FFFF.FFFF.FFFF and a destination IP (DIP) of 255.255.255.255. This stream will come in on VLAN 40 and should be broadcast out all interfaces carrying VLAN 40. Verify that it is. Step 5 Configure an IP helper address of 172.31.64.112 on the VLAN40 interface of SH1-101. This IP address belongs to IXIA port 11/2, also connected to SH1-101 via interface g3/16. Step 6 Verify that the traffic coming in is now being sent out interface g3/16 as unicast traffic. Step 7 Configure the no ip forward-protocol udp domain command globally on SH1-101 to cause the router to stop forwarding any UDP traffic with a Layer 4 port of 53 (DNS). Step 8 Verify that traffic stops being sent out interface g3/16. Step 9 Allow IP forwarding of DNS packets again, and verify that unicast traffic is being sent to the IP helper address again. Step 10 Stop the IXIA traffic for about 2 minutes. Step 11 Reconfigure the IXIA stream to send at a rate of 2500 pps, instead of the previous 5000 pps. Step 12 Send traffic for about two minutes, enough to get a measure of what halving the traffic rate does for helping CPU utilization. Step 13 Stop the IXIA traffic for a short period of time. Step 14 Reconfigure the IXIA stream to send at a rate of 5000 pps, but with a packet size of 500 bytes (was 74 bytes previously). Step 15 Send traffic for about 2 minutes, enough to get a measure of what increasing the packet size does for the CPU utilization. Step 16 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 136 Miscellaneous Features Expected Results The following test results are expected: • SH1-101 should forward all broadcast packets on the same VLAN (VLAN 40) they come in on. • The packets should forward to the IP helper address as unicast packets when configured to do so. • The packets should not be forwarded when the DNS protocol is blocked, and should resume when the filter is lifted. • The CPU and memory should not suffer from severe, sustained, or unacceptable impact. Results Table 83 shows the UDP broadcast flooding test results. Table 83 UDP Broadcast Flooding Test Results Tests Results UDP Broadcast Flooding Pass System Upgrade This test measured the basic ability of the code to boot correctly. The boot process was followed in each case from the console and screened for any errors. The output shows three separate sections, one for each supervisor and MSFC combination: supervisor 11, supervisor 12, and supervisor 22. This test verified that the Cisco IOS upgrade process worked correctly. The following tests were performed: • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 11, page 137 • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 12, page 138 • Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 22, page 139 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 11, page 140 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 12, page 140 • Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 22, page 141 Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 11 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 11 for a Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-106 Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 11 test follows: Step 1 Record the start time of this test. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 137 Miscellaneous Features Step 2 On Sup 11, verify that SH1-106 is running the old Native Cisco IOS image, 12.1(8b)E9. Step 3 Verify that the Sup11 image under test is on the proper file devices. Step 4 Verify that the MSFC1 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade process should complete without error. Results Table 84 shows the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 11 test results. Table 84 Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 11 Test Results Tests Results Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 11 Pass Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 12 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 12 for a Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-107. Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 12 test follows: Step 1 Record the start time of this test. Step 2 On Sup 12, verify that SH1-107 is running the old Native Cisco IOS image, 12.1(8b)E9. Step 3 Verify that the Sup12 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 138 Miscellaneous Features Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade process should complete without error. Results Table 85 shows the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 12 test results. Table 85 Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 12 Test Results Tests Results Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 12 Pass Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 22 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 22 for a Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-109. Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 22 test follows: Step 1 Record the start time of this test. Step 2 On Sup 22, verify that SH1-109 is running the old Native Cisco IOS image, 12.1(8b)E9. Step 3 Verify that the Sup22 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade process should complete without error. Results Table 86 shows the Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 upgrade—supervisor 22 test results. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 139 Miscellaneous Features Table 86 Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 22 Test Results Tests Results Cisco IOS 12.1(8b)E9 to 12.1(8b)E14 Upgrade—Supervisor 22 Pass Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 11 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 11 for a Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-106. Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 11 test follows: Step 1 Record the start time of this test. Step 2 On Sup 11, verify that SH1-106 is running the old Native Cisco IOS image, 12.1(8b)E12. Step 3 Verify that the Sup11 image under test is on the proper file devices. Step 4 Verify that the MSFC1 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade process should complete without error. Results Table 88 shows the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 11 test results. Table 87 Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 11 Test Results Tests Results Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 11 Pass Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 12 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 12 for a Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 140 Miscellaneous Features Device under test: SH1-107. Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 12 test follows: Step 1 Record the start time of this test. Step 2 On Sup 12, verify that SH1-107 is running the old Native Cisco IOS image, 12.1(8b)E12. Step 3 Verify that the Sup12 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade process should complete without error. Results Table 88 shows the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 12 test results. Table 88 Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 12 Test Results Tests Results Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 12 Pass Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 22 This test verified that the Cisco IOS upgrade process worked correctly. It measured the basic ability of the code to boot correctly on supervisor 22 for a Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade. The boot process was followed from the console and screened for errors. Device under test: SH1-109. Test Plan The procedure used to perform the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 22 test follows: Step 1 Record the start time of this test. Step 2 On Sup 22, verify that SH1-109 is running the old Native Cisco IOS image, 12.1(8b)E12. Step 3 Verify that the Sup22 image under test is on the proper file devices. Step 4 Verify that the MSFC2 boot image is on the proper file devices. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 141 Miscellaneous Features Step 5 Verify that the boot string points to the proper device and filename for both the test image and the MSFC boot image. Save any changes to NVRAM when done. Step 6 Either power-cycle the device or perform a reset on the standby supervisor followed by a reload, to verify that both primary and standby supervisors reload with the new image. Report any error messages seen during reload. Step 7 Verify that both supervisors come online successfully and that the new image is running. Expected Results • The Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade process should complete without error. Results Table 89 shows the Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 upgrade—supervisor 22 test results. Table 89 Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 22 Test Results Tests Results Cisco IOS 12.1(8b)E12 to 12.1(8b)E14 Upgrade—Supervisor 22 Pass Secure Shell Secure Shell (SSH) is an application and a protocol that provide a secure replacement to the Berkeley r-tools. The protocol secures the sessions using standard cryptographic mechanisms, and the application can be used similarly to the Berkeley rexec and rsh tools. Two versions of SSH are available: SSH Version 1 and SSH Version 2. Only SSH Version 1 is implemented in the Cisco IOS software. The SSH Server feature enables a SSH client to make a secure, encrypted connection to a Cisco router. This connection provides functionality that is similar to that of an inbound Telnet connection. Before SSH, security was limited to Telnet security. SSH allows a strong encryption to be used with the Cisco IOS software authentication. The SSH server in Cisco IOS software will work with publicly and commercially available SSH clients. The user authentication mechanisms supported for SSH are RADIUS, TACACS+, and the use of locally stored user names and passwords. The following test was performed: • SSH Server Vulnerability, page 142 SSH Server Vulnerability This test verified that the SSH server built into Cisco IOS crypto images is not succeptible to SSH malformed packet vulnerabilities as described at: • http://www.cisco.com/warp/public/707/ssh-packet-suite-vuln.shtml. The test protocol data units (PDUs) sent to the device were downloaded from: • http://www.rapid7.com/Product-Download.html. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 142 Miscellaneous Features Test Plan The procedure used to perform the SSH server vulnerability test follows: Step 1 Verify that SH1-101 is running Native Cisco IOS Release 12.1(13)E4 with a 3DES cryptography feature set. Step 2 Begin monitoring CPU and memory of SH1-101. Step 3 Verify that SH1-101 is configured with a host name, domain name, and TACACS authentication on vty lines. Step 4 Verify that the SSH server on SH1-101 is enabled by generating an rsa key pair. Configure the vty lines to allow SSH, and verify that SH1-101 is accepting SSH connections. Note If the following step causes the error message “WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!” this device has generated a different key than last time this test was performed. You will need to delete the line that contains the old key in the file ~/.ssh/known_hosts and reconnect. Step 5 Send malformed SSH packets at SH1-101 while monitoring the device. Step 6 Verify that the device does not reload or pause indefinitely. Step 7 Remove the configuration added in this test case. Note Zeroizing the rsa key is the only way to shut off the SSH server process. However, removing SSH from the transport input statement will is enough to disallow incoming SSH connections. If the key is zeroized, the next time the test case is performed prior to Step 5, the tester will need to remove the old key stored in ~/.ssh/known_hosts before SSH will allow the connection to be made. Step 8 Show the CPU, memory, and log output. Step 9 Verify that the CPU and memory did not suffer from severe, sustained, or unacceptable impact. Expected Results The following test results are expected: • SSH vulnerability testing should not cause the router to pause indefinitely, or reload. Results Table 90 shows the SSH server vulnerability test results. Table 90 SSH Server Vulnerability Test Results Tests Results SSH Server Vulnerability Pass Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 143 Miscellaneous Features CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0304R) Copyright © 2003, Cisco Systems, Inc. All rights reserved. Cisco Safe Harbor Testing for Financial Enterprise Customers, Release 12.1(8b)E14 144
© Copyright 2026 Paperzz