Achieving Operational Excellence

Achieving
Operational
Excellence
Asia Pacific Technical Services
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
What is Operational Excellence?
Process
People
Technology
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Is this Rocket Science?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
What are the risks?
Network Costs = 20% Purchase, 80% Operations
Cost Drivers
Source: The Meta Group, 2005
Cost of Complex
Integration
• Purchase price is ONE
element of the total cost
of a system
Opportunity Costs
• Hidden or less obvious
cost/value drivers often
outweigh the purchase price
Training Costs
• A network foundation with
integrated advanced services
leads to lower TCO
Network Purchase Price
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Architectures
ITIL or ETOM
Information
Technology
Infrastructure
Library
http://www.itilofficialsite.com/home/home.
asp
Enhanced
Telecom
Operations Map
http://www.tmforum.org/
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
A4
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Act
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Lets manage the network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
First Problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
What information do we have?
Assess
1. Voice quality on a phone has problems
2. Quality make voice stream unrecognisable?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
What information do we have?
Acquire- Environmental
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
What information do we have?
Acquire - Lifecycle
?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
What information do we have?
Act
1. Check the devices between phone and CCM for
drops and resource issues
2. Connect a network analyser at the Phone
3. Observe phone during poor voice quality
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
IOS command line
AirServicesNat#show interfaces | inc drop
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Redirect IOS command line output to a URL example
AirServicesNat#show interfaces | tee tftp://10.5.1.2/command-out
AirServicesNat#show interfaces | append ftp://10.5.1.2/command-out
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
IOS command line
AirServicesNat#show buffers input-interface fast 2/0
Header DataArea
Pool Rcnt
Size Link
Enc
Flags
Input
Output
64030310
E0010C4 Small
1
60
7
1
280
Fa2/0
None
64031BAC
E001984 Small
1
60
7
1
280
Fa2/0
None
646A4BD8
E221FE4 Small
1
60
7
1
280
Fa2/0
None
646A5D6C
E222624 Small
1
60
7
1
280
Fa2/0
None
646A7608
E2234E4 Middl
1
292
7
1
280
Fa2/0
None
646A7D10
E223B64 Middl
1
292
7
1
280
Fa2/0
None
Header DataArea
Presentation_ID
Pool
© 2006 Cisco Systems, Inc. All rights reserved.
Rcnt
Cisco Confidential
Size
Original
Flags
caller_pc
15
XML PI and NETCONF
Programatic interface that uses CLI or NETCONF
RFC4741, RFC4742
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
XML PI and NETCONF
<get-config>
<source><running/></source>
<filter type="cli"><config-format-xml
options".."></config-format-xml></filter>
</get-config>
Supported in 12.4T
http://www.cisco.com/en/US/docs/ios/12_2sr/12_2sra/feature/guide/srnetcon.
html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Wireshark – Initial Voice Capture
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Wireshark – Analyse Voice Streams
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
Audacity– Playback Audio
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
SPAN and VLAN Capture
Supported on most switches
Used for examining traffic on a local switch
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
IP Traffic Export / IP Traffic Capture
Exports matched traffic out a specific interface or VLAN
on the router
Ideal for Network analyser or probe
Capture to memory device (flash, tftp, usbflash)
Only supported on software switching ISR’s 12.4(11)T
http://www.cisco.com/en/US/docs/ios/12_4t/12_4t11/ht_rawip.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Phone during problem
Press ‘i’ twice to
obtain call
stastistics
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
23
What information do we have?
Acquire - Lifecycle
1. The packets are originating from the Media Server
(IVR) traversing the local switch/router infrastructure,
terminating at the phone.
2. Problem is seen in packets originating from server.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
24
More Video
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
25
What information do we have?
Analyse
Possible Causes:
1. Server is “busy” causing a corruption of the audio
file as it is played on the LAN
2. The audio file itself is corrupt, incorrectly recorded
or using the wrong codec
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
26
What information do we have?
Act
1. Monitor server performance
2. Examine audio file that is on the server for quality
problems.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
27
Monitor Server Performance
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
28
Examine audio file
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
29
What’s next?
Act
Next Problem!
What else can we do that will proactively
examine counters and alert us to
potential problems?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
30
Synchronised Clocks
Network Time Protocol (NTP)
ntp server (host) [version n]
ntp peer (host) [version n]
http://www.cisco.com/en/US/tech/tk648/tk362/tk461/tsd_technology_support_subprotocol_home.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
31
Embedded Event Manager (EEM)
Think of a policy
as an action
registered to an
event
ED notifies EEM
Server; which
triggers interested
policies
Tcl-based policies
Programmed in Tcl
As complex as you want
Applet-based policies
Defined via CLI
Simpler
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
32
Periodic MIB Data Collection
Device polls specific MIB counters
Stores this locally (memory)
Periodically transfers data to server (tftp, rcp, and ftp)
Introduced 12.3(2)T
http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_mib_
collect_trans.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
33
Second Problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
34
Second Problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
35
What information do we have?
Assess
1. Internet access is down
2. Users complaining
3. Large Business Impact
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
36
What information do we have?
Acquire- Environmental
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
37
What information do we have?
Acquire - Lifecycle
?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
38
Network Topology Diagram
R1
R2
R4
R8
R5
Internet
R3
PC A
PC B
R6
R9
R7
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
39
What information do we have?
Act
1. Gather Source and Destination addresses
2. Verify problem existence in the network
3. Identify which device(s) is causing the issue
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
40
Gather Source and Destination addresses
Translate the customer complaint to useful information
Helps identify what are possible causes
Narrow problem down to a specific lifecycle through the
network
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
41
Verify problem existence in the network
Gain access to the devices experiencing the issue
Confirm the customer’s symptoms
Find alternate device exhibiting same issue
Recreate in a lab environment
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
42
Traceroute and Debug ip icmp
Traceroute from source to destination
Traceroute in the opposite direction
Enable “debug ip icmp” on either side of suspected device
Turn off console and terminal logging
no logging console
no logging monitor
logging buffered
Traceroute again to observe debugs
http://www.cisco.com/warp/public/63/ping_traceroute.html#traceroute
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
43
Network Topology Diagram
R1
R2
R4
R8
R5
Internet
R3
PC A
PC B
R6
R9
R7
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
44
Using access-lists to find packet flows
Configure access lists ingress and egress
access-list 100 deny ip host a.b.c.d host w.x.y.z
access-list 100 permit ip any any
Verify access-list matches
show access-list 100
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
45
Netflow and IP accounting
Configure netflow ingress on the interface
ip route-cache flow OR
ip flow ingress
Verify access-list matches
show ip cache flow
IP Accounting on the egress
ip accounting [access-violations] [output-packets]
show ip accounting
http://www.cisco.com/en/US/docs/ios/12_4/netflow/configuration/guide/onf_bcf.html#wp1047360
http://www.cisco.com/en/US/docs/ios/12_3/ipaddr/command/reference/ip1_i1g.html#wp1091971
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
46
What now?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
47
What information do we have?
Acquire - Lifecycle
1. Problem narrowed down to a single device R3
2. Traffic direction is broken toward the internet
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
48
What information do we have?
Analyse
Possible Causes:
1. Access-list blocking traffic
2. Physical interface problems
3. Forwarding problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
49
What information do we have?
Act
1. Implement a workaround to minimise the impact
2. Gain console access to the device in question
3. Step through possible causes to identify the culprit
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
50
Access-list
Check ingress and egress interface configuration
show run interface [Interface name]
Verify access-list configuration and deny matches
show access-list [number}
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
51
Check Ingress and Egress Interfaces
Display interface counters
show interfaces [Interface name]
Check the command output for the following
Duplex Setting
Input and output drops
CRC’s
Overruns
underruns
Ignores
Throttles
http://www.cisco.com/en/US/products/hw/routers/ps133/products_tech_note09186a0080094791.shtml
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
52
Forwarding verification steps
Start by checking the routing table entry
Check arp entry for next hop
Verify switching method
show interfaces [Interface name] stats
show cef interface [Interface name]
show cef not-cef-switched
Check cef entries
show ip cef w.x.y.z detail
(w.x.y.z destination ip)
show adjacency a.b.c.d
(a.b.c.d next hop ip)
http://www.cisco.com/en/US/tech/tk827/tk831/tk102/tsd_technology_support_sub-protocol_home.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
53
Forwarding architectures
Centralised software
Centralised hardware
Distributed software
Distributed hardware
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
54
Root Cause
Drop adjacency in hardware cef on GSR linecard
show ip hardware-cef exact-route a.b.c.d w.x.y.z
FIB: 0x45AE0980, FIB->hwleaf: 0x7004FD60
PSA node: 0x86000FE0
PSA leaf from PSA node: 0x78003F80
Leaf FCR 1, psa_node 0x78003F80 found 1 deep
Prefix w.x.y.z
Leaf FCR 1, psa_node 0x78003F80 found 1 deep
default psa ip loadbalance
(hw rpfmask 0x80000000)
16 paths (hw maxpath 0)
Hash 1,3,5,7,9,11,13,15: psa adjacency: 0x700C8D40 (hw_adj
0x700C7D80)
[0-7] loq ABAB mtu 4 (Drop) oq BABA ai 0 oi 00000000 oacl
FFFF (encaps size 0)
punt gather 210 (bufhdr size 32 Punt profile 16)
counters 15458387815 bytes, 134893531 pkts; reported 0 bytes,
0 pkts.
Drop Adjacency
a.b.c.d
-> w.x.y.z
hash: 5
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
55
What Else?
Act
1. Scripts and Syslog
2. Test fix in lab
3. Interface usage graphs
4. Apply change management
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
56
Scripts and Syslog information
Very useful when time is limited
Large amount of Data
Across many devices
Check for any configuration changes made
Track any physical events in the network
Helps in isolating trigger conditions
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
57
Lab Setup and Usage Graphs
Root cause not found in production
Problem cleared itself
Large business impact
Monitored for network status
Produce possible causes
Pin point fault location in lifecycle
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
58
Enhanced Object Tracking and IPSLA to
avoid “black holes”
Cable
Fa0/0
Internet
LAN
Fa0/1
DSL
ip sla 99
icmp-echo <dstip> source-interface Fa0/0
timeout 1000
threshold 1000
frequency 2
ip sla schedule 1 life forever start-time now
!
access-list 101 permit icmp any host <dstip>
!
route-map track-primary-if permit 10
match ip address 101
set interface Fa0/0
set default interface Fa0/0
ip local policy route-map track-primary-if
!
track 1 rtr 99 reachability
delay down 10 up 10
!
ip route 0.0.0.0 0.0.0.0 Fa0/0 track 1
ip route 0.0.0.0 0.0.0.0 Fa0/1 200
http://www.cisco.com/en/US/docs/ios/12_4t/ip_appl/configuration/guide/taipbtrk.html#wp1054537
http://www.cisco.com/web/about/ac123/ac114/downloads/packet/packet/apr04/pdfs/apr04.pdf
(pages 9-12,88)
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
59
Change Management
Develop change plans
Prepare your team
Notify Stakeholders
Implement change plans and document
Assess gaps
Implement corrective actions
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
60
Third Problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
61
Third Problem
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
62
What information do we have?
Assess
Concerns:
1. Router’s User Interface cannot be accessed.
2. At risk of missing the provisioning deadline as a result
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
63
What information do we have?
Acquire- Environmental
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
64
What information do we have?
Act
1. Need to “see” the symptom that the user
experiences.
2. Need to understand the network topology
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
65
WebEx – Information sharing
http://www.cisco.com/web/products/webex/index.html
http://www.webex.com/index.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
66
Screen Shots – Information sharing
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
67
Document the network – logical/physical
R3
871
Lab
SW2
3750G
Internet
R2
3845
Home VPN User
PC 1
R1
ASA
2851
5520
SW1
4507R
Corporate
AD
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
ACS
R1
68
What information do we have?
Assess
Concerns:
1. Router “SDM” interface cannot be accessed.
“The page cannot be displayed”
2. At risk of missing the provisioning deadline as a result
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
69
What information do we have?
Acquire- Environmental
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
70
What information do we have?
Acquire - Lifecycle
Relevant Lifecycles:
1. Packet flow along the network lifecycle
2. TCP setup
3. HTTP Get/Reply lifecycle
4. Network device packet processing
Facts:
?
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
71
What information do we have?
Act
1. Get access to the network devices to run show
commands, debugs etc.
2. Need to look at the traffic at other points in the
network.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
72
Network Topology Diagram
R3
871
Lab
SW2
3750G
Here
Here
Internet
R2
3845
Home VPN User
PC 1
R1
ASA
2851
5520
SW1
4507R
Corporate
AD
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
ACS
R1
73
Console access to devices
Methods:
Access server (reverse telnet)
Cross connecting the AUX port from one device to the
neighbouring CON port for reverse telnet
Send someone onsite to physically connect to the
console
Once on the device, you might try doing a
“debug ip packet <acl>” on an acl that matches the
users traffic.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
74
ASA Capture
Steps to capture:
1. Create an ACL to match traffic you are interested in.
access-list
access-list
access-list
access-list
tac_acl_in permit ip host <clientrealip> host <serverip>
tac_acl_in permit ip host <serverip> host <clientrealip>
tac_acl_out permit ip host <clientglobalip> host <serverip>
tac_acl_out permit ip host <serverip> host <clientglobalip>
2. Capture the ACL traffic.
capture tac_cap_out access-list tac_acl_out packet-length 1522 interface outside
capture tac_cap_in access-list tac_acl_in packet-length 1522 interface inside
3. Capture traffic dropped by the ASP drop feature
capture <cap_name_3> type asp-drop all
4. Capture ARP traffic
capture <cap_name_4> ethernet-type arp interface inside
capture <cap_name_5> ethernet-type arp interface outside
“capture” command supported in 6.2(1) onwards
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c1.html#wp2090739
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
75
ASA Capture cont…
Viewing the capture information:
a) ASA CLI:
⇒
show capture <capture name>
b) Packet Decoder:
1. Download the capture file via FTP/TFTP:
copy /pcap capture:<src_cap_name> tftp://10.1.1.10/<dst_capt_name>
2. Download the capture file via HTTP/HTTPS:
https://<asa-ip-address>/capture/<src_cap_name>/pcap
Note: You may need to allow https access to download the files:
http server enable
http <ip address_and_mask_of_workstation> <interface_name>
http <webclientip> 255.255.255.255 inside
3. Now just open the capture up in Ethereal/Wireshark!
“copy capture” command supported in 7.0(1) onwards
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c4.html#wp2104187
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
76
ASA Packet tracer
a) Enable Packet Tracing via the CLI:
syntax: packet-tracer input <interface> <protocol> <src_ip> <src_port> <dst_ip>
<dst_port> [detail]
example: packet-tracer input outside tcp 10.66.64.254 1 10.66.76.45 http
“packet-tracer” command supported in 7.2(1) onwards
http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/p.html
#wp1830068
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by
configured rule
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config: Implicit Rule
Additional Information:
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
77
ASA Packet tracer cont…
b) Enable Packet Tracking via ASDM (GUI):
Step 1 In the main ASDM application window, choose Tools > Packet Tracer.
Step 2 Specify the following
- source interface, protocol type, source address, source port, destination IP address destination port
Step 3 Click Start to trace the packet.
=> The Information Display Area
shows detailed messages about the
packet trace.
The packet-tracer feature was
added to the ASDM in software
version 5.2(1)
http://www.cisco.com/en/US/docs/
security/asa/asa80/asdm60/user/g
uide/tools.html#wp1536158
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
78
What information do we have?
Acquire - Lifecycle
Facts:
1. Packets pass through firewall and reach router
2. No reply packets from router
3. TCP SYN sent by client, no SYN,ACK returned.
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
79
More Video
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
80
What information do we have?
Analyse
Possible Causes:
1. Router is blocking access
2. HTTP server is not configured correctly
3. Router is not responding due to load
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
81
What information do we have?
Act
1. Check router configuration
2. Monitor router performance
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
82
Monitor Router Performance
Troubleshooting CPU/Memory Utilization on Routers
show proc cpu sorted
show proc mem sorted
show interfaces [<interface name>]
http://www.cisco.com/warp/customer/63/highcpu.html
http://www.cisco.com/warp/customer/63/highcpu_interrupts.html
Memory Leak Detector
show memory debug leaks
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gtmleakd.html
http://www.cisco.com/en/US/docs/ios/12_4/cfg_fund/configuration/guide/hmleakd.html
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
83
Root Cause
1. TCP SYN (DoS) attack
2. High CPU due to IP Input
R3#sh proc cpu | ex 0.00
CPU utilization for five seconds: 71%/14%; one minute: 67%; five minutes:64%
PID Runtime(ms)
Invoked
uSecs
5Sec
1Min
5Min TTY Process
3
12816372 161039479
79 0.47% 0.40% 0.24%
0 OSPF Hello
155
218176261 976798810
223 45.68% 45.44% 43.90%
0 IP Input
206
41532046 155427986
267 1.91% 1.70% 0.87%
0 OSPF Router 1
230
24436795
536684
45533 4.15% 0.50% 0.34%
0 BGP Scanner
R3# debug ip packet <acl>
*Mar 3 03:54:40.436: IP: s=192.168.40.53 (Ethernet0/1), d=144.254.2.204
(Ethernet0/0), g=10.200.40.1, len 44, forward
*Mar 3 03:54:40.440: TCP src=11004, dst=53,
seq=280872555, ack=0, win=4128 SYN
Troubleshooting High CPU Utilization in IP Input Process
http://www.cisco.com/en/US/products/hw/routers/ps359/products_tech_note09186a00801c2a
f3.shtml
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
84
What’s next?
Act
1. Action to Fix: Limit connections on ASA, rate-limit
communications (apply a config change)
Sample Configuration:
http://www.ciscotaccc.com/kaidara-advisor/security/showcase?case=K18407732
2. Other preventative actions:
- ERM/EEM to monitor CPU and send email
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
85
Config Management
Keep regular archives of config
When changing config(s)
- test in a lab environment and/or off peak
- deploy config in a staggered form
Out of band access in case of connectivity loss
IOS Configuration Archive/Replace/Rollback
Store, organise and manage archives
No need to power cycle when rolling back
Config locking to prevent conflicting multiple accesses
12.3T and onwards
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gtrollbk.html#wp106
6709
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
86
Embedded Resource Manager (ERM) and
Embedded Event Manager (EEM) to
Notify of CPU threshold events
1. Configure ERM CPU event thresholds:
(config t)
resource policy
policy system-global-cpu global
system
cpu total
critical rising 90 interval 12 falling 20 interval 10
major rising 70 interval 12 falling 15 interval 10
minor rising 60 interval 12 falling 10 interval 10
2. Configure EEM to react to the ERM events:
event manager applet erm_cpu
event resource policy system-global-cpu
action 1.0 syslog msg “CPU $_resource_level alarm:
$_resource_current_value percent“
action 1.1 mail from [email protected] to [email protected] subject “CPU
$_resource_level alarm: $_resource_current_value percent” body “”
server email.xyz.com
http://www.cisco.com/en/US/docs/ios/12_4/netmgmt/configuration/guide/nm_erm.html
http://www.cisco.com/en/US/docs/ios/12_4t/12_4t2/ht_eem.html#wp1052497
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
87
Smart Call Home?
Interactive Technical Services
Customer Notification
Device and Message Reports
Exceptions/Fault Analysis
Customer
Internet
TAC
3
Secure Transport
Messages Received:
Call Home
Diagnostics
Environmental
Syslog
Inventory and
Configuration
© 2006 Cisco Systems, Inc. All rights reserved.
1
Service Request
Tracking System
2
Call
Home DB
IOS 12.2(33)SXH
Presentation_ID
Automated
Diagnosis
Capability
Cisco Confidential
88
Summary
People, Process and Technology
Small steps through best practices
Take action now!
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
89
End
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
90
Presentation_ID
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
91