SlideShare a Scribd company logo
1 of 88
Download to read offline
#CLUS
#CLUS
Shashank Singh
Technical Leader, Customer Experience, Cisco
BRKARC-3146
Troubleshooting Cisco
Catalyst 3850 and 3650
Series Switches
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
Find this session in the Cisco Live Mobile App
Click “Join the Discussion”
Install Webex Teams or go directly to the team space
Enter messages/questions in the team space
How
Webex Teams will be moderated
by the speaker until June 16, 2019.
1
2
3
4
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Cisco Webex Teams
cs.co/ciscolivebot#
3
BRKARC-3146
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Shashank Singh
Technical Leader, Cisco Services
Email: shashasi@cisco.com
Twitter: @shashankcisco
Shashank is a Technical Leader with Routing and
Switching Technical Leadership team in San Jose, CA
and has extensive experience in troubleshooting
Catalyst line of products including Catalyst 3850/3650
series switches.
Shashank works as an escalation point for Cisco TAC
and partners with engineering teams to solve some of
the most complex customer problems pertaining to
Cisco switches.
Prior to this role, Shashank has worked as a TAC
engineer for over five years, troubleshooting switching
products and technologies. Shashank has a software
development background from his previous role as a
software developer in General Electric.
Your Instructor Today…
4
BRKARC-3146
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 5
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
Key switch components
Baselining & Anomaly Detection
Tools and Techniques
BRKARC-3146 5
Product Overview
In this section, you will learn about ...
• Overview of Catalyst 3850/3650 switch
• IOS-XE architecture
• Multigigabit Ethernet on Catalyst 3850
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Catalyst 3850 Switch
Built on Cisco’s Innovative “UADP” ASIC
480 Gbps
Stacking Bandwidth
MACsec 128 and 256-bit
encryption
MPLS
IEEE 802.3bz 2.5/5Gbps
Ethernet
80 Gbps Uplink
Bandwidth
Stackpower
Line Rate on All Ports
SGT/SGACL
DNA
POE+ & UPoE
FRU Fans, Power
Supplies
Granular QoS/Flexible
NetFlow
BRKARC-3146 7
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Catalyst 3650 Switch
MPLS
40 Gbps Uplink
Bandwidth
Line Rate on All Ports
FRU Fans
Granular QoS/Flexible
NetFlow
Modular 160 Gbps
9 member Stack
SGT/SGACL
POE+ & UPoE
Fixed 1G/10G Uplinks
IEEE 802.3bz
2.5/5Gbps Ethernet
New Front-End
Power Supplies
The foundation for full wired and wireless convergence on a
single platform.
Campus Fabric
BRKARC-3146 8
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Cable Type 1G 2.5G 5G 10G
Cat5e ● ● ● NOT
SUPPORTED
Cat6 ● ● ● ●
55m
Cat6a ● ● ● ●
100m
Can an mGig port work at 100 mbps if
end device cannot work at a higher
speed?
Catalyst 3850 Multigigabit Ethernet Switches
Why is it Needed?
3850 48-port
12 mGig ports 24 mGig ports
UPOE, EEE, MACsec
On ALL ports UPOE, EEE, MACsec
On ALL ports
New 2x40G and 8x10G
Uplink support
New 2x40G and 8x10G
Uplink support
3850 24-port
# mgig
ports
Advanced port
capabilities
New high-
speed
uplinks
• 802.11ac-2 (3.5Gbps), maintain switch to AP reach at higher speeds (future
proof for higher speeds)
• Infrastructure investment protection
• Auto-negotiation of cable type of speeds supported
• Brownfield deployments can leverage existing Cat5e extending ROI and
support mGig at 2.5G and 5G speeds at a distance of 100m
• Greenfield deployments with Cat6a will support 10G but can also now
support mGig at 2.5G and 5G speeds at a distance of 100m
Yes it can. Try using auto-negotiation
instead of hard coding speed to 100.
BRKARC-3146 9
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Recommended IOS XE Release
Benefits of running recommended release?
Suggested Cisco IOS XE Software Releases for Cisco Catalyst 3850 & 3650 Switches
• Evaluated by Cisco for longevity & stability.
• Optimizations, critical fixes & hardening. Do 3850 Multigigabit Ethernet Switches run
IOS XE version 3.6.X?
No. Multigigabit Ethernet variants run IOS XE
versions 3.7.X or 16.X.
If accidently booted on 3.6.X, switch will
remain in bootloader prompt & will let you
boot correct image from flash or USB stick.
BRKARC-3146 10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 11
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
BRKARC-3146
BRKARC-3146 11
Troubleshooting Memory & CPU
In this section you will learn about…
• 3850/3650 CPU complex and CPU Punt Path
• Reasons for punting packets to the CPU
• Capturing packets – Embedded Wireshark
• Troubleshooting high CPU utilization
• Troubleshooting memory utilization
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
CPU Utilization
Why Should I be concerned about high CPU utilization ?
It is very important to protect the control plane for network stability, as resources (CPU, Memory and buffer) are
shared by control plane and data plane traffic (sent to CPU for further processing).
What are the usual symptoms of high CPU usage ?
• Control plane instability e.g., OSPF flap
• Reduced switching / forwarding performance
• Slow response to Telnet / SSH
• SNMP poll miss
At what percentage level should I start troubleshooting ?
It depends on the nature and level of the traffic. It is very essential to find a baseline CPU usage during normal
working conditions, and start troubleshooting when it goes above a specific threshold.
E.g., Baseline CPU usage 25%. Start troubleshooting when the CPU usage is consistently at 50% or above.
BRKARC-3146 13
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Why should packets be sent to CPU?
Common Cause Recommended Solution
Same interface forwarding change design, use “no ip redirect”
ACL logging disable ACL logging
ACL deny causing switch to send ICMP unreachable no ip unreachables
Forwarding/Feature exception (out of TCAM/adj space) reduce TCAM usage
SW-supported feature disable the feature or reduce the amount of
traffic
IP packets with TTL<2 or options disable the offending traffic
Broadcast Storm Fix STP loop, disable traffic
Unexpected control/data traffic Control Plane Policing (CoPP), Deny ACL
Software Bug Open a Service Request
BRKARC-3146 14
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show platform software fed switch active punt cause summary
Statistics for all causes
Cause Cause Info Rcvd Dropped
------------------------------------------------------------------------------
7 ARP request or response 498132 0
21 RP<->QFP keepalive 79 0
show process cpu sort | ex 0.00
CPU utilization for five seconds: 67%/48%; one minute: 17%; five minutes: 4%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
34 1719 964 1783 24.63% 1.98% 0.40% 0 ARP Input
65 73 256 285 0.55% 0.06% 0.01% 0 Net Background
72 4472 523 8550 0.07% 5.31% 1.37% 0 IOSD ipc task
194 98 1913 51 0.07% 0.07% 0.02% 0 IP ARP Retry Age
211 34 462 73 0.07% 0.03% 0.01% 0 UDLD
Punt Cause
Troubleshooting High CPU
CPU utilization for IOSd processes only on IOS XE
16.X
For entire system check
show processes cpu platform sorted
Biggest Consumer
Process is ARP.
BRKARC-3146 15
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show process cpu platform history 1min
1 minutes ago, CPU utilization: 64%
2 minutes ago, CPU utilization: 66%
3 minutes ago, CPU utilization: 67%
4 minutes ago, CPU utilization: 64%
5 minutes ago, CPU utilization: 64%
6 minutes ago, CPU utilization: 66%
7 minutes ago, CPU utilization: 66%
8 minutes ago, CPU utilization: 64%
9 minutes ago, CPU utilization: 66%
10 minutes ago, CPU utilization: 72%
11 minutes ago, CPU utilization: 0%
show controllers cpu-interface
queue retrieved dropped invalid hol-block
-------------------------------------------------------------------------
Routing Protocol 3427 0 0 0
L2 Protocol 32117 0 0 0
sw forwarding 0 0 0 0
broadcast 552 0 0 0
icmp 0 0 0 0
icmp redirect 0 0 0 0
Troubleshooting High CPU
Identifying busy CPU queues
Queue-wise
accounting
CPU went high
10 min ago
Display Interval
Queue Name
BRKARC-3146 16
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Dig Deeper on IOS-XE 16.X - High CPU
Commands Troubleshooting Step
show platform hardware fed switch active qos queue stats
internal cpu policer
Find out if CoPP is enabled for CPU queues and if any
queue has non zero drops
show platform software fed switch active punt cause
summary
Possible causes and packets received/dropped
show platform software fed switch active inject cause
summary
Reasons for injection at Fed Process
show processes cpu extended
Show extended cpu usage report of last 5 seconds for
IOS(d) process - Also lists out CPU intensive processes
show processes cpu platform sorted Show CPU usage per IOS-XE process
show proc cpu sorted
Show sorted output based on percentage of usage for
IOS(d) processes
BRKARC-3146 17
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Equivalent Commands on IOS XE 3.6.X and 3.7.X
Troubleshooting CPU utilization
Troubleshooting Steps Commands
Check CPU usage on IOS threads show process cpu detailed process iosd [sorted]
Check CPU usage on platform
dependent processes
show process cpu detailed process {fed | platform_mgr | stack-
mgr | ha_mgr | eicored…}
Check traffic on the RX and TX CPU
queues
show platform punt client, show platform punt tx
Check details of CPU queues show platform punt statistics port-asic 0 cpuq 0 direction {rx |
tx}
BRKARC-3146 18
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Embedded Wireshark
Overview
• Allows for packet data to be captured at various points in the
packet processing path; flowing through, to and from Catalyst
3850/3650 switch.
• Requires IPBase or IPServices license.
• No need to have physical access to the switch or a separate
computer (unlike SPAN)
C3850
Gi1/0/1
Buffer/ Bootflash:
Export Data
Capture point –
Interface/ Control-
plane/VLAN
TFTP
Server
• During a Wireshark packet capture, hardware forwarding happens concurrently.
• Capture can be saved and viewed on switch itself, or can be exported as a .pcap file to be viewed
on a computer.
Catalyst 3850 Series Switch High CPU Usage Troubleshoot
BRKARC-3146 19
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Embedded Wireshark
3850#monitor capture my_cap match any control-plane both filter any
3850#monitor capture my_cap start
Started capture point : my_cap1
3850#ping 192.168.1.11
Sending 5, 100-byte ICMP Echos to 192.168.11,
timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5)
3850#monitor capture my_cap stop
Stopped capture point : mycap1
Attach wireshark to control-
plane
Start capture
Ping switch IP address,
packet goes to CPU
Stop the
capture
CPU Packet Capture
BRKARC-3146 20
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3850#show monitor capture my_cap buffer brief
----------------------------------------------------------------------------
# size timestamp source destination dscp protocol
----------------------------------------------------------------------------
0 0 0.000000 10.154.66.69 -> 172.16.94.195 0 BE TCP
1 0 0.005004 172.16.94.195 -> 10.154.66.69 48 CS6 TCP
--snip--
37 0 5.152036 172.16.94.195 -> 10.154.66.69 48 CS6 TCP
40 0 5.153043 192.168.1.11 -> 192.168.1.10 0 BE ICMP
41 0 5.153043 10.154.66.69 -> 172.16.94.195 0 BE TCP
43 0 5.155042 10.154.66.69 -> 172.16.94.195 0 BE TCP
44 0 5.158048 192.168.1.10 -> 192.168.1.11 0 BE ICMP
45 0 5.159040 172.16.94.195 -> 10.154.66.69 48 CS6 TCP
3850#monitor capture clear
Captured data will be deleted [clear]?[confirm]
cleared buffer : my_cap1
3850#monitor capture my_cap export location usbflash0:my_cap.pcap
Display-filter
available
Clear buffer
Export to USB stcik
Embedded Wireshark
CPU Packet Capture
BRKARC-3146 21
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Memory Utilization (RAM)
Why Should I be concerned about high memory utilization?
It is very important have enough free memory to support features and network convergence events that require
transient memory.
What are the usual symptoms of high memory usage ?
• Memory utilization of process(es) keeps increasing
• System runs out of buffers and software packet forwarding stops
• Memory allocation failures are reported
• System crashes after reporting out of memory
At what percentage level should I start troubleshooting ?
It depends on the nature and level of feature config on the switch. It is very essential to find a baseline memory
usage during normal working conditions, and start troubleshooting when it goes above specific threshold.
E.g., Baseline memory usage 40%. Start troubleshooting when the memory goes above 70% and constantly keeps
increasing without adding any new configuration.
BRKARC-3146 22
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Memory Utilization (RAM)
Why is memory utilization high?
Common Cause Recommended Solution
Extensive Config Reduce configuration to supported scale
Excessive memory allocated to trace buffers Reset trace buffers to default sizes
DoS Attack/Punted traffic causing buffer depletion Identify packets and block them using an ACL
Protocol flaps/re-convergence causing high
transient memory utilization
Identify reason for network instability
Memory Leak caused by software bug Open a Service Request
Set trace control <>
buffer default
BRKARC-3146 23
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Memory Utilization Alarms
Committed memory > 95% for warnings
*May 30 19:55:33.384 PDT: %PLATFORM-4-LEMENT_WARNING:switch
active R0/0: smand: 4/RP/0: Committed Memory value 96% exceeds
warning level 95%
Committed memory > 99% for critical errors
show platform software status control-processor brief
Load Average
Slot Status 1-Min 5-Min 15-Min
1-RP0 Healthy 0.40 0.40 0.35
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
1-RP0 Healthy 3958028 2544852 (64%) 1413176 (36%) 3288040 (83%)
CPU Utilization
Slot CPU User System Nice Idle IRQ SIRQ IOwait
1-RP0 0 2.40 0.50 0.00 97.10 0.00 0.00 0.00
1 1.80 0.30 0.00 97.90 0.00 0.00 0.00
2 1.10 0.40 0.00 98.50 0.00 0.00 0.00
3 7.50 0.10 0.00 92.39 0.00 0.00 0.00
4 0.90 0.20 0.00 98.90 0.00 0.00 0.00
5 3.00 0.90 0.00 96.10 0.00 0.00 0.00
BRKARC-3146 24
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show process memory sorted
Processor Pool Total: 886295488 Used: 345992688 Free: 540302800
lsmpi_io Pool Total: 6295128 Used: 6294296 Free: 832
PID TTY Allocated Freed Holding Getbufs Retbufs Process
289 0 362372784 67944416 268093424 3748898 67 HTTP CORE
73 0 32768232 1322824 31831480 0 637980 IOSD ipc task
164 0 8710232 415696 5673776 0 0 SNMP MA SA
413 0 3929984 5680 3981304 849828 0 EEM ED Syslog
0 0 0 0 3545664 0 0 *MallocLite*
1 0 1686544 6944 1724600 0 0 Chunk Manager
425 0 1521744 33024 1533720 0 0 EEM Server
0 0 5948784 4810448 726936 17522495 0 *Dead*
4 0 2691272 600360 637760 0 0 RF Slave Main Th
414 0 390160 5680 441480 72316 0 EEM ED Generic
29 0 422296 896 404464 0 0 IPC Seat RX Cont
388 0 310248 1616 377632 0 0 Crypto IKEv2
314 0 304960 1640 373320 0 0 DHCP Client
205 0 631128 340616 265928 0 0 mDNS
Troubleshooting Memory Utilization
Which process is holding most memory?
Total Memory
Process
HTTP CORE in this case
BRKARC-3146 25
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show memory allocating-process totals
Head Total(b) Used(b) Free(b) Lowest(b) Largest(b)
Processor FF9B4FD010 886295488 945983712 40311776 536270200 537368132
lsmpi_io FF9ACBE1A8 6295128 6294304 824 824 412
Allocator PC Summary for: Processor
PC Total Count Name
0xAAB3404678 193360840 93301 HTTP CORE
0xAAAE38D944 27808280 530 *Init*
0xAAAE403E0C 27047776 981 DynCmd object c
0xAAB0573440 21658208 7713 *Packet Header*
0xAAB35CDDB0 20989080 454 XOS_MEM_UTILS
0xAAB0573498 19068568 7484 *Packet Data*
Troubleshooting Memory Utilization - End
Drill Down deeper – Is a process not releasing memory?
Is count increasing
continuously?
Memory leak due to
HTTP CORE process?
BRKARC-3146 26
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
top - 20:22:02 up 2:13, 0 users, load average: 0.44, 0.29, 0.31
Tasks: 274 total, 2 running, 272 sleeping, 0 stopped, 0 zombie
Cpu(s): 2.8%us, 0.4%sy, 0.0%ni, 96.7%id, 0.0%wa, 0.0%hi, 0.0%si,
0.0%st
Mem: 3958028k total, 2934896k used, 1023132k free, 151096k buffers
Swap: 0k total, 0k used, 0k free, 1006324k cached
*** Delay time Not changed ***
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
17682 root 20 0 2606m 394m 175m S 12 10.2 16:28.87 fed main event
31884 root 20 0 245m 52m 43m S 2 1.4 3:05.98 repm
30028 root 20 0 1755m 639m 250m S 2 16.5 3:42.94 linux_iosd-imag
15231 root 20 0 1440m 175m 155m S 2 4.5 2:48.06 sif_mgr
31884 root 20 0 245m 52m 43m S 2 1.4 3:05.86 repm
1 root 20 0 8324 4352 2180 S 0 0.1 0:02.64 systemd
2 root 20 0 0 0 0 S 0 0.0 0:00.00 kthreadd
3850#terminal terminal-type xterm
3850#monitor platform software process switch active R0
CPU & Memory Utilization – Real time monitoring
Top processes inside IOS XE
Percent of CPU utilized
Percent of memory
utilized
IOS-XE
Processes
BRKARC-3146 27
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Troubleshooting Steps Commands
Check memory usage on system show processes memory sorted
Check memory usage of a particular process show processes memory detailed process fed
Check memory usage of IOSd show processes memory detailed process iosd
Check allocators of memory within IOSd show memory detailed process iosd allocating-process
totals
Equivalent Commands on IOS XE 3.6.X and 3.7.X
Troubleshooting memory utilization
BRKARC-3146 28
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 29
Agenda
BRKARC-3146
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
BRKARC-3146 29
Troubleshooting Stack & High Availability
In this section you will learn about…
• 3850/3650 Stacking Architecture
- CLI commands for stack health
- Troubleshooting failure to form a stack
• 3850/3650 HA Architecture
- Election of Active and Standby
- CLI commands for HA states
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
• 3850 StackWise-480 is a new generation of Catalyst 3850 stacking
• 240Gbps of bandwidth (120Gbps TX & 120Gbps RX per connector)
• Similar to previous stacking implementations, ring redundancy is
achieved via ring-wrap capabilities provided in hardware
• NOT backward compatible with currently fielded stacking
technologies, most notably StackWise Plus.
Which Stacking Technology?
StackWise-480
BRKARC-3146 31
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Stack–Cables and Components
Catalyst 3850 | Stackwise-480 Catalyst 3650 | Stackwise-160
3 lengths of cable, 0.5 1 and 3 Meters 1 ring in 3650 vs 3 rings in 3850
Can I connect Stackwise-480 cables on 3850-48XS?
No, 3850-48XS does not support Stackwise-480. It’s
a high end model with 640G switching capacity &
supports Stackwise Virtual using front panel ports.
BRKARC-3146 32
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
• 6 rings in total
• 3 rings go East
• 3 rings go West
• Each ring is 40G
• Total Stack BW = 240G
• With Spatial Reuse = 480G
Stack Interface
of UADP
Stack Interface of UADP
ASIC
Assuming
4 x 24-port
3850 Switches
Packets are segmented/reassembled in HW (256 byte
segments)
How many rings in my stack?
BRKARC-3146 33
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Destination
Stripping
Packet
travels ½ the
rings.
Taken out of
stack by
destination
1
3
1
3
Assuming
4 x 24-port
3850 Switches
4
2
4
2
Understanding Spatial Reuse
Doubling the capacity of my stack
BRKARC-3146 34
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
What is the status of my stack?
show switch detail
Switch/Stack Mac Address : 6400.f124.df80 - Local Mac Address
Mac persistency wait time: Indefinite
H/W Current
Switch# Role Mac Address Priority Version State
------------------------------------------------------------
*1 Active 6400.f124.df80 10 0 Ready
2 Standby 6400.f124.de80 1 0 Ready
Priority, followed by MAC Address determines
which switch gets elected as Active.
show switch stack-ports summary
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In
Loopback
------------------------------------------------------------------------------------------------------------
1/1 OK 2 50cm Yes Yes Yes 0 No
1/2 OK 2 Unknown Yes Yes Yes 0 No
2/1 OK 1 100cm Yes Yes Yes 1 No
2/2 OK 1 50cm Yes Yes Yes 1 No
show platform hardware authentication status
Mainboard Authentication: Passed
FRU Authentication: Passed
Stack Cable A Authentication: Failed << Corrupt EEPROM?
Stack Cable B Authentication: Passed
show platform software sif switch active r0 exceptions
SIF INT : SIFEXCEPTIONINTERRUPTA1_SIFRAC5PMARECEIVEFIFOSPILL3_FIELD_IDX
Occurred count: 1
BRKARC-3146 35
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
What happens when Image Version mismatches?
• If switches are in version mismatch state, they will not stack.
• If versions do not match, upgrade standby/member switch to the Active’s
version
show switch
Switch# Role Mac Address Priority Version State
---------------------------------------------------------------------------
*1 Active 6400.f125.1480 1 V01 Ready
2 Standby 6400.f125.2680 1 V01 Ready
3 Member 6400.f125.2500 1 0 V-Mismatch
4 Member 6400.f125.2480 1 0 V-Mismatch
3850(config)# software auto-upgrade enable
Any newly added member automatically
upgraded. Reload only new switch
BRKARC-3146 36
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
What happens when there is License Mismatch?
Member switch will not stack
license right-to-use deactivate ipservices
license right-to-use activate ipbase
acceptEULA
Reload switch
IP Base
IP Base
IP Base
IP
Services
A
S
BRKARC-3146 37
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
HA SSO Architecture
Interfaces
L2 Control
L3 Control
QoS
Interfaces
L2 Control
L3 Control
QoS
Wireless
Wireless
Feature State is synced
between Active and
Standby Member in stack
Feature States are inactive
on Standby Member
S
A
BRKARC-3146 38
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
RP Infra
LC
RP Infra
Infra
LC
Infra
LC
S
LC
• Active starts Route Processor (RP) Domain
(IOSd, WCM, etc) locally
• Programs hardware on all Line Card(LC) Domains
• Traffic resumes once hardware is programmed
• Starts 2min Timer to elect Standby in parallel
• Active elects Standby
• Standby starts RP Domain locally
• Starts Bulk Sync with Active RP
• Standby reaches “Standby Hot”
2min timer
A
Catalyst 3850/3650 – HA State Machine
BRKARC-3146 39
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show switch
Switch/Stack Mac Address : 2037.06cf.0e80 - Local Mac Address
H/W Current
Switch# Role Mac Address Priority Version State
------------------------------------------------------------
*1 Active 2037.06cf.0e80 10 PP Ready
2 Standby 2037.06cf.3380 8 PP Ready
3 Member 2037.06cf.1400 6 PP Ready
4 Member 2037.06cf.3000 4 PP Ready
Stateful Switchover Redundancy (SSO)
Mac Address doesn’t
change for stack duration
Standby
Active
show redundancy states
my state = 13 –ACTIVE
peer state = 8 -STANDBY HOT
Mode = Duplex
Unit ID = 2
Redundancy Mode (Operational) = SSO
Redundancy Mode (Configured) = SSO
Redundancy State = SSO
Communications = Up
client count = 76
client_notification_TMR = 360000 milliseconds
keep_alive TMR = 9000 milliseconds
Terminal state for SSO. If “peer state” is stuck
in any other state for more than 10 minutes,
open a service request with TAC
If Communication channel is not Up, there might
be a problem with stack connectivity. Check
stack cable.
BRKARC-3146 40
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
BRKARC-3146
BRKARC-3146 41
In this section, you will learn about ...
• TCAM (Ternary Content Addressable Memory)
• Unicast Forwarding – Layer 2
• Unicast Forwarding – Layer 3
• Multicast Forwarding
Troubleshooting Hardware Forwarding
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Ternary Content Addressable Memory
• Features that need packet forwarding at line rate program entries in TCAM
• TCAM is partitioned in several banks and regions
• Features use a Hash Table Manager (HTM) to select and configure region
• Entries wrongly programmed in TCAM will lead to wrong or unexpected
forwarding decisions
TCAM on Catalyst 3850/3650
BRKARC-3146 43
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
What features are using the TCAM?
Establish a Baseline
show platform hardware fed switch active fwd-asic resource tcam utilization
CAM Utilization for ASIC# 0
Table Max Values Used Values
--------------------------------------------------------------------------
Unicast MAC addresses 32768/512 82/22
Directly or indirectly connected routes 32768/8192 7/89
IGMP and Multicast groups 8192/512 0/16
Security Access Control Entries 3072 173
QoS Access Control Entries 2816 52
Netflow ACEs 1024 15
Input Microflow policer ACEs 256 7
Output Microflow policer ACEs 256 7
Control Plane Entries 512 187
Policy Based Routing ACEs 1024 9
<Snip>
Features
Maximum # entries/
Maximum # Masks
Current usage
Asic 0 (24 ports Per
Asic)
On IOS XE versions 3.6.X and 3.7.X, check
show platform tcam utilization asic all
BRKARC-3146 44
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Mac Address Learning
How does learning happen?
• Catalyst 3850/3650 support up to 32000 mac addresses in TCAM
• Hardware assisted software learning
• Port ASIC learns MAC Address and puts it into a Learning Cache – (Mac
Address Table Manager MATM)
• Forwarding Engine Driver(FED) reads MATM Table and programs entry in TCAM
BRKARC-3146 45
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Unicast Forwarding – Layer 2
show mac address-table address 501c.bf66.0b48
Mac Address Table
-------------------------------------------
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 501c.bf66.0b48 DYNAMIC Gi1/0/1
Total Mac Addresses for this criterion: 1
show platform software matm switch ?
<1-9> Switch number
active Active instance
standby Standby instance
Software Mac Address
Table
Look at MAC Address Table
Manager on which stack
member?
Verifying Mac Address
Gi1/0/1
10.10.10.2
Vlan 1
501c.bf66.0b48
3850
10.10.10.1
Vlan 1
3850 acting as layer
2 switch for vlan 1
BRKARC-3146 46
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show platform software object-manager switch active f0 statistics
Forwarding Manager Asynchronous Object Manager Statistics
Object update: Pending-issue: 0, Pending-acknowledgement: 0
Batch begin: Pending-issue: 0, Pending-acknowledgement: 0
Batch end: Pending-issue: 0, Pending-acknowledgement: 0
Command: Pending-acknowledgement: 0
Any errors with programming
MAC address?
Unicast Forwarding – Layer 2
Verifying Mac Address
show platform software fed switch active matm macTable vlan 1
VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports
501c.bf66.0b47 0X8002 0 0xffcc735968 0xffcc726978 0x97 0 0 Vlan1
501c.bf66.0b48 0X101 3 0xffcc7022f8 0xffcc702168 0xf096 0 0 Gi1/0/1
Total Mac number of addresses:: 2
*a_time=aging_time(secs) *e_time=total_elapsed_time(secs)
show platform hardware fed switch active matm macTable vlan 1
HEAD: MAC address 501c.bf66.0b48 in VLAN 1
KEY: vlan 3, mac 0x501cbf660b48, l3_if 0, gpn 150, epoch 15, static 0, flood_en 1, vlan_lead_wless_flood_en
3, client_home_asic 0
MASK: vlan 0, mac 0x0, l3_if 0, gpn 0, epoch 0, static 0, flood_en 0, vlan_lead_wless_flood_en 0,
MAC address check in FED –
hardware
MAC address check in FED –
software
BRKARC-3146 47
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
show platform software fed switch standby matm macTable vlan 1
VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports
1 501c.bf66.0b47 0X8002 0 0xffc0703b28 0xffc0736908 0x97 0 0 Vlan1
1 501c.bf66.0b48 0X1 3 0xffc073d498 0xffc073d308 0xf096 300 46 Gi1/0/1
The Meaning of Type & Sequence Number
• A MAC Address is aged out only on the switch where it is first learned
• Other switches learn through Notifications
show platform software fed switch active matm macTable vlan 1
VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports
1 501c.bf66.0b47 0X8002 0 0xffcc735968 0xffcc726978 0x97 0 0 Vlan1
1 501c.bf66.0b48 0X101 3 0xffcc7022f8 0xffcc702168 0xf096 0 0 Gi1/0/1
Type 0x101 means 501c.bf66.0b48 is
a dynamic entry on active switch that
will age on this switch.
Type 0x1 means 501c.bf66.0b48 is learnt on
standby switch through notification & cannot be
aged out on this switch.
If sequence number keeps changing
frequently, it indicates MAC re-
learning.
Unicast Forwarding – Layer 2 - End
BRKARC-3146 48
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3850#show ip cef 50.50.50.50 detail
50.50.50.50/32, epoch 3, flags [attached]
Adj source: IP adj out of Vlan500, addr 50.50.50.50 FFAFC4ABC0
Dependent covered prefix type adjfib, cover 50.50.50.0/24
attached to Vlan500
3850#show adjacency 50.50.50.50 detail
Protocol Interface Address
IP Vlan500 50.50.50.50(8)
0 packets, 0 bytes
epoch 0
sourced in sev-epoch 0
Encap length 14
80E01D24AC50E4AA5D9933D00800
L2 destination address byte offset 0
3850#show interface vlan 500 | in bia
Hardware is Ethernet SVI, address is e4aa.5d99.33d0 (bia e4aa.5d99.33d0)
Unicast Forwarding – Layer 3 3850 acting as
router
Gig2/0/48
3850
Gig2/0/47
172.16.1.1 50.50.50.50
172.16.1.2 50.50.50.51
Rewrite Info
Cross check source
MAC
BRKARC-3146 49
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3850#show platform software ip switch active R0 cef prefix 50.50.50.50/32 detail
Forwarding Table
50.50.50.50/32 -> OBJ_ADJACENCY (10), urpf: 11
Connected Interface: 115
Prefix Flags: Directly L2 attached
OM handle: 0x805ce088
3850#show platform software adjacency switch active R0 index 10
Adjacency id: 0xa (10)
Interface: Vlan500, IF index: 115, Link Type: MCP_LINK_IP
Encap: 80:e0:1d:24:ac:50:e4:aa:5d:99:33:d0:8:0
Encap Length: 14, Encap Type: MCP_ET_ARPA, MTU: 1500
Flags: no-l3-inject
Incomplete behavior type: None
Fixup: unknown
Fixup_Flags_2: unknown
Nexthop addr: 50.50.50.50
IP FRR MCP_ADJ_IPFRR_NONE 0
OM handle: 0x805cda30
Unicast Forwarding – Layer 3 - End
3850 acting as
router
Gig2/0/48
3850
Gig2/0/47
172.16.1.1 50.50.50.50
172.16.1.2 50.50.50.51
Rewrite Info
Cross check next hop
From previous output
BRKARC-3146 50
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3850-1#show ip mroute 239.1.1.1 10.33.33.33
(10.33.33.33, 239.1.1.1), 1d04h/00:01:47, flags: JT
Incoming interface: Vlan33, RPF nbr 0.0.0.0
Outgoing interface list:
Vlan77, Forward/Sparse, 1d02h/00:02:47
Multicast Forwarding
Ingress vlan 33
Egress Vlan 77
3850-1#show ip mfib 239.1.1.1 10.33.33.33 verbose
(10.33.33.33,239.1.1.1) Flags: K HW DDE
0xB OIF-IC count: 0, OIF-A count: 1
SW Forwarding: 7/0/1278/0, Other: 0/0/0
HW Forwarding: 10334626/99/1278/988, Other: 0/0/0
Vlan33 Flags: RA A MA
Vlan77 Flags: RF F NS
CEF: Adjacency with MAC: 01005E010101B07D47E147F30800
Multicast Rewrite Info
MRIB Accept, MFIB Accept
Drops?
RPF Failure, OIF Null etc
MRIB Forward, MFIB Forward
show platform hardware fed switch active fwd-asic counters tla RWE
drop
RweDropCount on Asic 0
[0] dropCount 0x00000000
3850-1
Vlan 33
Sender IP 10.33.33.33
Multicast IP 239.1.1.1
3850 with PIM
Acting as mcast router
3850-2
3850 with IGMP Snooping
Acting as switch
Gig1/0/1
Gig1/0/47
Vlan 77
Gig1/0/2
10.77.77.76
Gig1/0/48
10.77.77.77
Multicast
Receivers
BRKARC-3146 51
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3850-2#show platform software fed switch active ip igmp snooping vlan 77
Vlan 77
---------
Snoop Enabled : On
Flood Mode : Off
I-Mrouter : Off
Oper State : Up
STP TCN Flood : Off
Routing Enabled : Off
PIM Enabled : Off
<...snip...>
==============================================================
Mrouter PortQ :
If 0x8 GigabitEthernet1/0/1
Flood PortQ :
If 0x8 GigabitEthernet1/0/1
If 0xa GigabitEthernet1/0/47
If 0xa GigabitEthernet1/0/48
3850-2#show ip igmp snooping groups vlan 77
Vlan Group Type Version Port List
-------------------------------------------
77 239.1.1.1 igmp v2 Gi1/0/47, Gi1/0/48
Multicast Forwarding - End
Egress Vlan 77
Mrouter Port
Layer 2 ports –
multicast receivers
Layer 2 ports –
multicast receivers
Are 3850 Stack members capable of forwarding
multicast coming in locally?
Yes! Stack members have forwarding information for
both layer 2 and layer 3 multicast and can forward
traffic to local egress ports or stack ports as needed.
3850-1
Vlan 33
Sender IP 10.33.33.33
Multicast IP 239.1.1.1
3850 with PIM
Acting as mcast router
3850-2
3850 with IGMP Snooping
Acting as switch
Gig1/0/1
Gig1/0/47
Vlan 77
Gig1/0/2
10.77.77.76
Gig1/0/48
10.77.77.77
Multicast
Receivers
BRKARC-3146 52
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
ASIC level drops and exceptions
show platform hardware fed switch active fwd-asic drops exceptions
Run command multiple times
to check for incrementing
count
BRKARC-3146 53
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Equivalent Commands on IOS XE 3.6.X and 3.7.X
Troubleshooting unicast forwarding
Troubleshooting Steps Commands
Check TCAM utilization show platform tcam utilization asic all
Check hardware MAC address table show platform matm macTable vlan #
show platform matm <H.H.H> vlan #
Check ip route in hardware show platform ip route switch X, show platform ip route
summary
Check adjacency in hardware show platform ip adjacency switch X
Check ASIC level drops show platform fwd-asic drops exceptions
BRKARC-3146 54
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 55
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
BRKARC-3146
In this section, you will learn about ...
• Pre-checks before starting to troubleshoot PoE
• PoE stages and state machine
• Commands and outputs
Troubleshooting Power over Ethernet (PoE)
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Before you start troubleshooting…
• Is the problem with a Cisco PD (powered device) or a third party device?
• What is the power requirement of the device?
• Is this a new install, or was the powered device working normally before?
• If the trouble started after the powered device was working, what changed?
• Are all the PoE ports affected?
• Where is the affected interface located;master/standby/member switch ?
• Does the PD (powered device) work fine on a different port or a different switch?
BRKARC-3146 57
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
PoE Detection - State Machine
Switch# show platform ilpower port gi1/0/4
<snip>
Current State: NGWC_ILP_SHUT_OFF_S
Previous State: NGWC_ILP_DETECTING_S
<After some time>
Current State: NGWC_ILP_LINK_UP_S
Previous State:NGWC_ILP_IEEE_PD_DETECTED_S
State Machine
BRKARC-3146 58
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Debugging PoE detection
C3850#debug ilpower event
//
// debug provides information about events and changes in ILP state machine
//
ILP:: Gi2/0/12: State=NGWC_ILP_SHUT_OFF_S-0 , Event=NGWC_ILP_CLI_START_DETECT_EV-17
ILP:: Gi2/0/12: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_CLI_START_DETECT_EV-17
ILP:: Gi2/0/12: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_IEEE_CLASS_DONE_EV-1
%ILPOWER-7-DETECT: Interface Gi2/0/12: Power Device detected: IEEE PD
ILP:: Gi2/0/12: State=NGWC_ILP_IEEE_PD_DETECTED_S-4, Event=NGWC_ILP_PWR_GOOD_EV-2
%ILPOWER-5-POWER_GRANTED: Interface Gi2/0/12: Power granted
ILP:: Gi2/0/12: State=NGWC_ILP_LINK_UP_S-6, Event=NGWC_ILP_WAIT_LINK_DOWN_TIMER_EV-42
ILP:: Gi2/0/12: State=NGWC_ILP_LINK_UP_S-6, Event=NGWC_ILP_PHY_LINK_UP_EV-20
%LINK-3-UPDOWN: Interface GigabitEthernet2/0/12, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/12, changed state to up
ILP state machine:
SHUT_OFF (event: start detect) 
DETECTING (event: ieee-class-done) 
PD_DETECTED (event: power-good)
BRKARC-3146 59
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
PoE Classification
There are 4 Classes with PoE
BRKARC-3146 60
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
PoE Signature
BRKARC-3146 61
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Are we getting power to the device?
Switch#show power inline
Module Available Used Remaining
(Watts) (Watts) (Watts)
------ --------- -------- ---------
1 1440.0 6.3 1433.7
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/1 auto off 0.0 n/a n/a 30.0
Gi1/0/2 auto on 6.3 Ieee PD 2 30.0
Switch#show power inline
Module Available Used Remaining
(Watts) (Watts) (Watts)
------ --------- -------- ---------
1 1440.0 6.3 1433.7
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/1 auto off 0.0 n/a n/a 30.0
Gi1/0/2 auto on 6.3 IP Phone 7962 2 30.0
Non Cisco device
Cisco device
Class
Class
BRKARC-3146 62
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
How does power budget look?
Switch#show platform ilpower system 1
ILP System Configuration
Slot: 1
ILP Supported: Yes
Total Power: 1440000
Used Power: 6300
Initialization Done: Yes
Post Done: Yes
Post Result Logged: No
Post Result: Success
Power Summary:
Module: 0
Power Total: 1440000
Power Used: 6300
Power Threshold: 0
Operation Status: On
Pool: 1
Pool Valid: Yes
Total Power: 1440000
Power Usage: 6300
Failure is bad
BRKARC-3146 63
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Debugging power management
C3850#debug ilpower powerman
//
// provides information about power management (allocation of initial power / changes in power-
allocation due to
// exchanged CDP/LLDP packets and changes in ICUT thresholds.
//
ilpower_powerman_power_available_tlv: about sending patlv on Gi2/0/12
req id 0, man id 1, pwr avail 0, pwr man -1
ilpower_get_cdp_spare_pair_tlv: about sending Spare Pair PoE TLV on Gi2/0/12
pse_support 1, det_req 0, pd_desired 0, pse_oper 0
Ilpower PD device 3 class 5 from interface (Gi2/0/12)
ilpower new power from pd discovery Gi2/0/12, power_status ok
Ilpower interface (Gi2/0/12) power status change, allocated power 7000
ilpower_notify_lldp_tlv: lldp power class tlv:
(curr/prev) pwr value 7000/0
!
Ilpower interface (Gi2/0/12) process tlv from cdp INPUT:
power_consumption = 6300, power_request_id = 8027, power_man_id = 0,
power_request_level[] = 6300 0 0 0 0
!
Ilpower interface (Gi2/0/12) power negotiation: consumption = 6300, alloc_power = 6300
Ilpower interface (Gi2/0/12) setting ICUT_OFF threshold to 6300.
UPoE TLV
advertisement
changes in power
power negotiation &
ICUT logic.
BRKARC-3146 64
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
PoE Errors - Short
C3850#debug ilpower event
ILP:: Gi2/0/2: State=NGWC_ILP_SHUT_OFF_S-0 , Event=NGWC_ILP_CLI_START_DETECT_EV-17
ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_CLI_START_DETECT_EV-17
ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_IEEE_DET_SHORT_EV-29
detected short from IEEE. still waiting to hear from phy Gi2/0/2
%LINK-3-UPDOWN: Interface GigabitEthernet2/0/2, changed state to down
%ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi2/0/2: Power
Controller reports Short detected
ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2,
Event=NGWC_ILP_WAIT_IEEE_SHORT_TIMER_EV-41
ILP_DETECTING_S: Gi2/0/2 phy still didn't get back to us.
It looks like a real short and not a csco pd. don't power up the pd
ILP state machine:
SHUT_OFF (event: start detect) 
DETECTING (event: start detect) 
DETECTING (event: detected short)
ILP state machine:
DETECTING (event: wait short timer event)
Note: in the output of 'show power inline <...> detail' 'Short
Current Counter' will increase. Counters will be zero'ed
when interface is shut down.
BRKARC-3146 65
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
PoE Errors - Imax
• Catalyst 3650/3850 support strict policing by default for each power class. Imax error
happens when PD tries to draw more power than negotiated.
%ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/6: Power Controller
reports power Imax error detected
• Find out PD class. Static power upper limit could be configured on a per port basis.
PD may get powered down if it tries
to exceed configured power
3850#sh run int gi 3/0/44
interface GigabitEthernet3/0/44
power inline static max 20000
end
3850#sh power inline gi 3/0/44 detail
Interface: Gi3/0/44
Inline Power Mode: static
Operational status: on
Device Detected: yes
Device Type: Ieee PD
IEEE Class: 3
Discovery mechanism used/configured:
Ieee and Cisco
Police: off
Power Allocated Admin Value: 20.0
Power drawn from the source: 20.0
Power available to the device: 20.0
BRKARC-3146 66
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
UPoE (Universal PoE)
Upto 60W of power (51W to PD) by using all four pairs of standard Ethernet
cabling (cat5e or better)
UPoE capbale PIDs
WS-C3850-24U
WS-C3850-48
WS-C3850-24XUU
WS-C3850-12X48U
WS-C3650-8X24UQ
WS-C3650-12X48UQ
WS-C3650-12X48UR
WS-C3650-12X48UZ
BRKARC-3146 67
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
UPoE – Classification
UPoE defines two classification mechanisms:
- LLDP based (preferred)
- forced 4-pair
Forced 4-pair mode can be used to support devices which do not have LLDP/CDP
capabilities.
By default UPoE switch uses LLDP. To turn on 'forced 4-pair' the following CLI is
required:
(config-if)#power inline four-pair forced
BRKARC-3146 68
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Useful PoE Commands
show version
show module
show env power all
show stack-power budgeting
show interface <>
show power inline <> detail
show platform software ilpower port <>
show platform frontend-controller version 0 <switch no.>
show controller power inline module <switch no.>
show tech poe
debug ilpower event, controller, powerman
BRKARC-3146 69
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
BRKARC-3146 70
Troubleshooting QoS
In this section, you will learn about ...
• QOS implementation on Catalyst 3850/3650
• QOS Troubleshooting examples
• QoS Case study
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
QoS – What’s New with Catalyst 3850/3650
Default Behavior Change
 3750, With “mls qos” enabled at global level all the ports are untrusted and
DSCP/precedence/COS of the incoming packets are reset to 0.
 3750, “mls qos trust” is needed at the interface level to change the trust mode
 3850, port is trusted by default, DSCP/precedence/COS values are retained
BRKARC-3146 72
3850/3650 QoS buffer tuning - qos queue-softmax-multiplier <value>
 Increases the value of softmax buffer.
 Takes effect only on ports where a policy-map is attached.
 If value = 1200, softmax for non-priority queues and non-primary priority queue
is increased 12 times.
 Not applicable for priority queue level 1.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3750 MLS QoS vs. 3850 MQC QoS
3750 3850
Basic Structure MLS MQC
Global Config
Support mls qos
Support some of MQC at ingress
No mls qos support
Support MQC [class-map, policy-map]
Interface Config
Support mls qos config and some of MQC cli
at ingress
Attach the policy to the interface
Port Ingress Classification/Policing/Marking/Queuing Classification/Policing/Marking
Port Egress Queueing Classification/Policing/Marking/Queuing
SVI Ingress Classification/Policing/Marking Classification/Marking
SVI Egress None Classification/Marking
3750 to 3850/3650 QoS conversion
BRKARC-3146 73
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
3560-2# show access-lists QOS
Extended IP access list QOS
10 permit icmp host 192.168.30.1 host
192.168.30.2 dscp af11(5 matches)
QoS Example
Verify Default trust mode on 3850
Gig2/0/7
Gig0/7 Gig2/0/5 Gig0/5
3560-1 3850
3560-2
AF11=DSCP10=TOS 40
Access List QOS
Permit icmp host 192.168.30.1
host 192.168.30.2 dscp af11
3560-1# ping 192.168.30.2 repeat 5 tos 40
192.168.30.1
192.168.30.2
All interfaces are
switchport mode trunk
With no explicit QoS config
BRKARC-3146 74
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
TOS = 0
QoS Example
Marking of packets to af11
Gig2/0/7
Gig0/7 Gig2/0/5 Gig0/5
3560-1 3850
3560-2
AF11=DSCP10=TOS 40
access-list TEST
permit icmp host 192.168.30.1 host 192.168.30.2
class-map QOS
match access-group TEST
policy Map MARK-AF11
Class QOS
set dscp af11
interface gig2/0/7
service-policy input MARK-AF11
192.168.30.1
3560-1# ping 192.168.30.2 repeat 5
3850#show platform software fed switch 2 qos policy target status
Loc Interface IIF-ID Dir State:(cfg,opr) Policy
--- ------------ ---------------- --- --------------- ---------------
GigabitEthernet1/0/1 0x00000000000008 OUT VALID,SET_INHW QoS
3560-2#show access-lists QOS
10 permit icmp host 192.168.30.1 host
192.168.30.2 dscp af11 (5 matches)
3850#show platform hardware fed switch 2 qos dscp-cos counters interface gigabitEthernet 2/0/7 | in DSCP0
Ingress DSCP0 5 0
Egress DSCP0 0 0
3850#show platform hardware fed switch 2 qos dscp-cos counters interface gigabitEthernet 2/0/5 | in DSCP10
Ingress DSCP10 0 0
Egress DSCP10 5 0
192.168.30.2
BRKARC-3146 75
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
QoS – Case Study
Problem - LACP Portchannel does not come up
Gig2/0/1 Gig1/0/1
3850-1 3850-2
interface range GigabitEthernet2/0/1-2
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active
service-policy output WIRED_EGRESS_QOS
!
policy Map WIRED_EGRESS_QOS
Class DSCP_VOICE
priority level 1
Class DSCP_CALL_SIGNALING
bandwidth remaining 20 (%)
queue-buffers ratio 20
Class class-default
bandwidth remaining 80 (%)
queue-buffers ratio 80
Gig2/0/2 Gig1/0/2
interface range GigabitEthernet1/0/1-2
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active
%EC-5-L3DONTBNDL2: Gi1/0/1 suspended: LACP currently not enabled on the remote port.
%EC-5-L3DONTBNDL2: Gi1/0/2 suspended: LACP currently not enabled on the remote port.
BRKARC-3146 76
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
QoS – Case Study - End
Solution- LACP Portchannel does not come up
Gig2/0/1 Gig1/0/1
3850-1 3850-2
interface range GigabitEthernet2/0/1-2
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active
service-policy output WIRED_EGRESS_QOS
!
Policy Map WIRED_EGRESS_QOS
Class DSCP_VOICE
priority level 1
Class DSCP_CALL_SIGNALING
bandwidth remaining 20 (%)
queue-buffers ratio 20
Class class-default
bandwidth remaining 80 (%)
queue-buffers ratio 80
Gig2/0/2 Gig1/0/2
interface range GigabitEthernet1/0/1-2
switchport mode trunk
channel-protocol lacp
channel-group 1 mode active
3850-1#show platform hardware fed switch 2 qos queue config interface Gi 2/0/1
DATA Port:21 GPN:1 AFD:Disabled QoSMap:1 HW Queues: 168 - 175
DrainFast:Disabled PortSoftStart:2 - 1440
----------------------------------------------------------
DTS Hardmax Softmax PortSMin GlblSMin PortStEnd
--- -------- -------- -------- --------- ---------
0 1 4 0 5 0 5 0 0 0 4 1920
1 1 4 0 8 240 7 160 3 60 4 1920
2 1 4 0 9 960 8 640 4 240 4 1920
3 1 4 0 5 0 5 0 0 0 4 1920
4 1 4 0 5 0 5 0 0 0 4 1920
5 1 4 0 5 0 5 0 0 0 4 1920
6 1 4 0 5 0 5 0 0 0 4 1920
7 1 4 0 5 0 5 0 0 0 4 1920
3850-1#show platform hardware fed switch 2 qos queue stats Gi 2/0/1
-------------------------------
Queue Buffers Enqueue-TH0 Enqueue-TH1 Enqueue-TH2
----- ------- ----------- ----------- -----------
0 0 0 0 0
1 0 0 0 452
2 0 0 0 37645
3 0 0 0 0
4 0 0 0 0
5 0 0 0 0
6 0 0 0 0
7 0 0 0 0
-------------------------------
Queue Drop-TH0 Drop-TH1 Drop-TH2 SBufDrop QebDrop
----- ----------- ----------- ----------- ----------- -----------
0 0 0 9393 0 0
LACP PDUs
dropped
On IOS XE 3.6.X and 3.7.X, check
show platform qos queue stats interface
BRKARC-3146 77
Solution: Assign buffers to priority queue
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 78
• Product Overview
• Troubleshooting Memory & CPU
• Troubleshooting Stack & High Availability
• Troubleshooting Hardware Forwarding
• Troubleshooting Power over Ethernet
• Troubleshooting QoS
• Platform specific tools and techniques
• Summary
Agenda
BRKARC-3146
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Guest Shell - IOS XE 16.X
Guest Shell is a Linux container providing a standard Linux
environment for a user to run scripts/applications via Python
3850#config t
Enter configuration commands, one per line. End with CNTL/Z.
3850(config)#iox
3850(config)#exit
3850#guestshell enable
Management Interface will be selected if configured
Please wait for completion
Guestshell enabled successfully
3850#guestshell run bash
[guestshell@guestshell ~]$
[guestshell@guestshell ~]$ exit
exit
3850#guestshell run python flash:script_name.py ?
LINE <cr>
3850#
3850#guestshell run python
Python 2.7.5 (default, Jun 17 2014, 18:11:42)
[GCC 4.8.2 20140120 (Red Hat 4.8.2-16)] on linux2
Type "help", "copyright", "credits" or "license" for more
information.
>>>
Also Supported…
• ZTP – Zero Touch Provisioning can retrieve a Python
script via DHCP at boot time
• EEM – Use Embedded Event Manager to trigger a
Python script in response to an event
DMI = Data Model Interface = Netconf/Yang interface
PnP = Plug N Play = Zero Touch provisioning
Virtual Services
Manager
Create a Linux
shell to run Linux
commands
Run a Python script
Start an interactive
Python interpreter
~2 minutes
BRKARC-3146 79
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Guest Shell Case Study – Checking ASIC drops
BRKARC-3146 80
import re,cli
sh_drops = cli.execute('show platform hardware fed sw active fwd-asic drop exceptions')
non_zero_values = re.findall(r"d+?s+?d+?s+?(S+?)s+?d+?s+?d+?s+?([1-9]d*?)s",sh_drops)
if non_zero_values:
for name, non_zero_value in non_zero_values:
cli.execute("send log" + " Non zero value found %s, for %s." % (non_zero_value, name))
Get output & store in a
variable.
Do a regex match for
non zero count
If non zero count is
found, send a log
Import regex and
cisco cli packages
3850#guestshell run python flash:asic_drop_check.py loop 10
Instead of loop, EEM can be used
to call the script periodically
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
WebUI - IOS XE 16.X
http://172.16.94.216/webui/
• 172.16.94.216 is an IP address configured on the 3850
• Privilege 15 is for monitoring & configuration
• Privilege 1-14 (or omit privilege option) = monitoring only
config terminal
username <name> privilege 15 password<pass>
ip http server
ip http authentication local
• Application visibility
on interfaces
• Filter monitoring over
interfaces & direction
• Identify top talkers
• Monitor data over 2,
24 and 48 hours
• Monitor percentage
bandwidth usage
• Python Sandbox
• Expose password
lifetime from AAA.
New!
BRKARC-3146 81
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
IOSd Event-trace - IOS XE 16.X
3850#show monitor event-trace ?
adjacency Adjacency Events
all-traces Show all the event traces
arp ARP Events
cce Show group traces
cef Show CEF traces
cfd Crypto Fault Detection eventtrace
cfm Show group traces
checkpoint "Checkpoint debug"
cpu-report display cpu-report
crypto Crypto traces
cts cts
datainteg Data integrity events
dmvpn DMVPN traces
eigrp Show EIGRP traces
epm Show group traces
fhrp Show FHRP traces
flexvpn FlexVPN event trace
flow Flow traces
hw-api HW-API Events
ifnum Show group traces
interprocess Interprocess event trace
ipv6 IPv6
link_oam Show group traces
lisp Show group traces
3850#show monitor event-trace arp all
*Apr 10 17:15:39.817: REPOP ADJ:
*Apr 10 17:15:40.418: IF ADDR: IF: GigabitEthernet0/0
*Apr 10 17:15:40.418: IF ADDR: IF: GigabitEthernet0/0
*Apr 10 17:15:41.565: FLUSH:
*Apr 10 17:15:41.798: IF UP: IF: Port-channel100
*Apr 10 17:15:41.842: ADD ENTRY: Link: IP A: 3.3.3.10 IF: Port-
channel100 Mode: Interface
*Apr 10 17:15:41.877: ADD ENTRY: Link: IP VRF: Mgmt-vrf A:
172.16.94.216 IF: GigabitEthernet0/0 Mode: Interface
*Apr 10 17:15:41.879: IF DOWN: IF: Port-channel100
*Apr 10 17:15:41.879: IF ADDR: IF: Port-channel100
--snip--
Flight recorder – Refined list of messages that are too low level for a syslog
BRKARC-3146 82
Do you have a better understanding of
• Key components of Catalyst 3850/3650 hardware and IOS XE
• How to baseline switch and detect anomalies
• Troubleshooting tools and techniques at your disposal
Summary
Complete your
online session
evaluation
• Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live water bottle.
• All surveys can be taken in the Cisco Live
Mobile App or by logging in to the Session
Catalog on ciscolive.cisco.com/us.
Cisco Live sessions will be available for viewing
on demand after the event at ciscolive.cisco.com.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS BRKARC-3146 84
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS
Continue your education
Related sessions
Walk-in labs
Demos in the
Cisco campus
Meet the engineer
1:1 meetings
BRKARC-3146 85
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLUS 86
BRKARC-3146
NDA Roadmap Sessions at Cisco Live
Customer Connection Member Exclusive
Connect online with 29,000 peer and Cisco
experts in private community forums
Give feedback to Cisco product teams
 Product enhancement ideas
 Early adopter trials
 User experience insights
Learn from experts and stay informed
about product roadmaps
 Roadmap sessions at Cisco Live
 Monthly NDA briefings
Join online: www.cisco.com/go/ccp
Join at the Customer Connection Booth
(in the Cisco Showcase)
Member Perks at Cisco Live
• Attend NDA Roadmap Sessions
• Customer Connection Jacket
• Member Lounge
Join Cisco’s online user group to …
NETWORKING ROADMAPS SESSION ID DAY / TIME
Roadmap: SD-WAN and Routing CCP-1200 Mon 8:30 – 10:00
Roadmap: Machine Learning and
Artificial Intelligence
CCP-1201 Tues 3:30 – 5:00
Roadmap: Wireless and Mobility CCP-1202 Thurs 10:30 – 12:00
Thank you
#CLUS
#CLUS

More Related Content

What's hot

Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksAPNIC
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewAmeen Wayok
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StoryCisco Enterprise Networks
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGPDuane Bodle
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)Netwax Lab
 
EtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modesEtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modesNetProtocol Xpert
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commandsRobin Rohit
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?APNIC
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesCisco Canada
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingShubhiGupta94
 

What's hot (20)

Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
SD WAN
SD WANSD WAN
SD WAN
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Bgp tutorial for ISP
Bgp tutorial for ISPBgp tutorial for ISP
Bgp tutorial for ISP
 
ARP
ARPARP
ARP
 
Software-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success StorySoftware-Defined WAN: A Real World Success Story
Software-Defined WAN: A Real World Success Story
 
Troubleshooting BGP
Troubleshooting BGPTroubleshooting BGP
Troubleshooting BGP
 
GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)GLBP (gateway load balancing protocol)
GLBP (gateway load balancing protocol)
 
IPv6
IPv6IPv6
IPv6
 
EtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modesEtherChannel PAgP and LACP modes
EtherChannel PAgP and LACP modes
 
Cisco router-commands
Cisco router-commandsCisco router-commands
Cisco router-commands
 
Vpc notes
Vpc notesVpc notes
Vpc notes
 
Bgp
BgpBgp
Bgp
 
Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?Should I run my own RPKI Certificate Authority?
Should I run my own RPKI Certificate Authority?
 
Segment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use CasesSegment Routing Technology Deep Dive and Advanced Use Cases
Segment Routing Technology Deep Dive and Advanced Use Cases
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Hot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) usingHot standby router protocol (hsrp) using
Hot standby router protocol (hsrp) using
 

Similar to BRKARC-3146_PoE_C3k.pdf

Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceCisco Canada
 
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting Cisco Catalyst Access Series Switching – Architecture and Troubleshooting
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting Fernando Andrade
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdfssusercbaa33
 
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000Cisco Russia
 
cisco-cbs350-48fp-4g-datasheet.pdf
cisco-cbs350-48fp-4g-datasheet.pdfcisco-cbs350-48fp-4g-datasheet.pdf
cisco-cbs350-48fp-4g-datasheet.pdfHi-Network.com
 
cisco-cbs350-48t-4g-datasheet.pdf
cisco-cbs350-48t-4g-datasheet.pdfcisco-cbs350-48t-4g-datasheet.pdf
cisco-cbs350-48t-4g-datasheet.pdfHi-Network.com
 
cisco-cbs350-24fp-4g-datasheet.pdf
cisco-cbs350-24fp-4g-datasheet.pdfcisco-cbs350-24fp-4g-datasheet.pdf
cisco-cbs350-24fp-4g-datasheet.pdfHi-Network.com
 
cisco-cbs350-24p-4g-datasheet.pdf
cisco-cbs350-24p-4g-datasheet.pdfcisco-cbs350-24p-4g-datasheet.pdf
cisco-cbs350-24p-4g-datasheet.pdfHi-Network.com
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
 
cisco-cbs350-48t-4x-datasheet.pdf
cisco-cbs350-48t-4x-datasheet.pdfcisco-cbs350-48t-4x-datasheet.pdf
cisco-cbs350-48t-4x-datasheet.pdfHi-Network.com
 
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...kds850
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptxAyaanMohamed4
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationJeff Squyres
 
cisco-cbs350-48p-4x-datasheet.pdf
cisco-cbs350-48p-4x-datasheet.pdfcisco-cbs350-48p-4x-datasheet.pdf
cisco-cbs350-48p-4x-datasheet.pdfHi-Network.com
 
cisco-cbs350-24fp-4x-datasheet.pdf
cisco-cbs350-24fp-4x-datasheet.pdfcisco-cbs350-24fp-4x-datasheet.pdf
cisco-cbs350-24fp-4x-datasheet.pdfHi-Network.com
 
Design and Deployment using the Cisco Smart Business Architecture (SBA)
Design and Deployment using the Cisco Smart Business Architecture (SBA)Design and Deployment using the Cisco Smart Business Architecture (SBA)
Design and Deployment using the Cisco Smart Business Architecture (SBA)Cisco Russia
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Cisco Russia
 

Similar to BRKARC-3146_PoE_C3k.pdf (20)

Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching Space
 
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting Cisco Catalyst Access Series Switching – Architecture and Troubleshooting
Cisco Catalyst Access Series Switching – Architecture and Troubleshooting
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000
Особенности архитектуры и траблшутинга маршрутизаторов серии ASR1000
 
cisco-cbs350-48fp-4g-datasheet.pdf
cisco-cbs350-48fp-4g-datasheet.pdfcisco-cbs350-48fp-4g-datasheet.pdf
cisco-cbs350-48fp-4g-datasheet.pdf
 
cisco-cbs350-48t-4g-datasheet.pdf
cisco-cbs350-48t-4g-datasheet.pdfcisco-cbs350-48t-4g-datasheet.pdf
cisco-cbs350-48t-4g-datasheet.pdf
 
cisco-cbs350-24fp-4g-datasheet.pdf
cisco-cbs350-24fp-4g-datasheet.pdfcisco-cbs350-24fp-4g-datasheet.pdf
cisco-cbs350-24fp-4g-datasheet.pdf
 
cisco-cbs350-24p-4g-datasheet.pdf
cisco-cbs350-24p-4g-datasheet.pdfcisco-cbs350-24p-4g-datasheet.pdf
cisco-cbs350-24p-4g-datasheet.pdf
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
 
cisco-cbs350-48t-4x-datasheet.pdf
cisco-cbs350-48t-4x-datasheet.pdfcisco-cbs350-48t-4x-datasheet.pdf
cisco-cbs350-48t-4x-datasheet.pdf
 
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentation
 
cisco-cbs350-48p-4x-datasheet.pdf
cisco-cbs350-48p-4x-datasheet.pdfcisco-cbs350-48p-4x-datasheet.pdf
cisco-cbs350-48p-4x-datasheet.pdf
 
cisco-cbs350-24fp-4x-datasheet.pdf
cisco-cbs350-24fp-4x-datasheet.pdfcisco-cbs350-24fp-4x-datasheet.pdf
cisco-cbs350-24fp-4x-datasheet.pdf
 
Design and Deployment using the Cisco Smart Business Architecture (SBA)
Design and Deployment using the Cisco Smart Business Architecture (SBA)Design and Deployment using the Cisco Smart Business Architecture (SBA)
Design and Deployment using the Cisco Smart Business Architecture (SBA)
 
BRKARC-2881.pdf
BRKARC-2881.pdfBRKARC-2881.pdf
BRKARC-2881.pdf
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
BRKSEC-3035.pdf
BRKSEC-3035.pdfBRKSEC-3035.pdf
BRKSEC-3035.pdf
 
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
Using packet-tracer, capture and other Cisco ASA tools for network troublesho...
 

Recently uploaded

VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...Suhani Kapoor
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...ranjana rawat
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...nagunakhan
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaUnited Arab Emirates
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gapedkojalkojal131
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsPooja Nehwal
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样qaffana
 
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...Pooja Nehwal
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...Pooja Nehwal
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 

Recently uploaded (20)

VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
VIP Call Girls Kavuri Hills ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With ...
 
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(PARI) Alandi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
(MEGHA) Hinjewadi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune E...
 
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
Slim Call Girls Service Badshah Nagar * 9548273370 Naughty Call Girls Service...
 
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai WisteriaDubai Call Girls O528786472 Call Girls In Dubai Wisteria
Dubai Call Girls O528786472 Call Girls In Dubai Wisteria
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
 
Thane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call GirlsThane Escorts, (Pooja 09892124323), Thane Call Girls
Thane Escorts, (Pooja 09892124323), Thane Call Girls
 
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service NashikLow Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
Low Rate Call Girls Nashik Vedika 7001305949 Independent Escort Service Nashik
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts ServiceVip Noida Escorts 9873940964 Greater Noida Escorts Service
Vip Noida Escorts 9873940964 Greater Noida Escorts Service
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
哪里办理美国宾夕法尼亚州立大学毕业证(本硕)psu成绩单原版一模一样
 
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
(ZARA) Call Girls Jejuri ( 7001035870 ) HI-Fi Pune Escorts Service
 
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service -  Bandra F...
WhatsApp 9892124323 ✓Call Girls In Khar ( Mumbai ) secure service - Bandra F...
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
9892124323, Call Girl in Juhu Call Girls Services (Rate ₹8.5K) 24×7 with Hote...
 
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Bhavna Call 7001035870 Meet With Nagpur Escorts
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 

BRKARC-3146_PoE_C3k.pdf

  • 2. #CLUS Shashank Singh Technical Leader, Customer Experience, Cisco BRKARC-3146 Troubleshooting Cisco Catalyst 3850 and 3650 Series Switches
  • 3. Questions? Use Cisco Webex Teams to chat with the speaker after the session Find this session in the Cisco Live Mobile App Click “Join the Discussion” Install Webex Teams or go directly to the team space Enter messages/questions in the team space How Webex Teams will be moderated by the speaker until June 16, 2019. 1 2 3 4 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Cisco Webex Teams cs.co/ciscolivebot# 3 BRKARC-3146
  • 4. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Shashank Singh Technical Leader, Cisco Services Email: shashasi@cisco.com Twitter: @shashankcisco Shashank is a Technical Leader with Routing and Switching Technical Leadership team in San Jose, CA and has extensive experience in troubleshooting Catalyst line of products including Catalyst 3850/3650 series switches. Shashank works as an escalation point for Cisco TAC and partners with engineering teams to solve some of the most complex customer problems pertaining to Cisco switches. Prior to this role, Shashank has worked as a TAC engineer for over five years, troubleshooting switching products and technologies. Shashank has a software development background from his previous role as a software developer in General Electric. Your Instructor Today… 4 BRKARC-3146
  • 5. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 5 • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda Key switch components Baselining & Anomaly Detection Tools and Techniques BRKARC-3146 5
  • 6. Product Overview In this section, you will learn about ... • Overview of Catalyst 3850/3650 switch • IOS-XE architecture • Multigigabit Ethernet on Catalyst 3850
  • 7. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Catalyst 3850 Switch Built on Cisco’s Innovative “UADP” ASIC 480 Gbps Stacking Bandwidth MACsec 128 and 256-bit encryption MPLS IEEE 802.3bz 2.5/5Gbps Ethernet 80 Gbps Uplink Bandwidth Stackpower Line Rate on All Ports SGT/SGACL DNA POE+ & UPoE FRU Fans, Power Supplies Granular QoS/Flexible NetFlow BRKARC-3146 7
  • 8. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Catalyst 3650 Switch MPLS 40 Gbps Uplink Bandwidth Line Rate on All Ports FRU Fans Granular QoS/Flexible NetFlow Modular 160 Gbps 9 member Stack SGT/SGACL POE+ & UPoE Fixed 1G/10G Uplinks IEEE 802.3bz 2.5/5Gbps Ethernet New Front-End Power Supplies The foundation for full wired and wireless convergence on a single platform. Campus Fabric BRKARC-3146 8
  • 9. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Cable Type 1G 2.5G 5G 10G Cat5e ● ● ● NOT SUPPORTED Cat6 ● ● ● ● 55m Cat6a ● ● ● ● 100m Can an mGig port work at 100 mbps if end device cannot work at a higher speed? Catalyst 3850 Multigigabit Ethernet Switches Why is it Needed? 3850 48-port 12 mGig ports 24 mGig ports UPOE, EEE, MACsec On ALL ports UPOE, EEE, MACsec On ALL ports New 2x40G and 8x10G Uplink support New 2x40G and 8x10G Uplink support 3850 24-port # mgig ports Advanced port capabilities New high- speed uplinks • 802.11ac-2 (3.5Gbps), maintain switch to AP reach at higher speeds (future proof for higher speeds) • Infrastructure investment protection • Auto-negotiation of cable type of speeds supported • Brownfield deployments can leverage existing Cat5e extending ROI and support mGig at 2.5G and 5G speeds at a distance of 100m • Greenfield deployments with Cat6a will support 10G but can also now support mGig at 2.5G and 5G speeds at a distance of 100m Yes it can. Try using auto-negotiation instead of hard coding speed to 100. BRKARC-3146 9
  • 10. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Recommended IOS XE Release Benefits of running recommended release? Suggested Cisco IOS XE Software Releases for Cisco Catalyst 3850 & 3650 Switches • Evaluated by Cisco for longevity & stability. • Optimizations, critical fixes & hardening. Do 3850 Multigigabit Ethernet Switches run IOS XE version 3.6.X? No. Multigigabit Ethernet variants run IOS XE versions 3.7.X or 16.X. If accidently booted on 3.6.X, switch will remain in bootloader prompt & will let you boot correct image from flash or USB stick. BRKARC-3146 10
  • 11. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 11 • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda BRKARC-3146 BRKARC-3146 11
  • 12. Troubleshooting Memory & CPU In this section you will learn about… • 3850/3650 CPU complex and CPU Punt Path • Reasons for punting packets to the CPU • Capturing packets – Embedded Wireshark • Troubleshooting high CPU utilization • Troubleshooting memory utilization
  • 13. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS CPU Utilization Why Should I be concerned about high CPU utilization ? It is very important to protect the control plane for network stability, as resources (CPU, Memory and buffer) are shared by control plane and data plane traffic (sent to CPU for further processing). What are the usual symptoms of high CPU usage ? • Control plane instability e.g., OSPF flap • Reduced switching / forwarding performance • Slow response to Telnet / SSH • SNMP poll miss At what percentage level should I start troubleshooting ? It depends on the nature and level of the traffic. It is very essential to find a baseline CPU usage during normal working conditions, and start troubleshooting when it goes above a specific threshold. E.g., Baseline CPU usage 25%. Start troubleshooting when the CPU usage is consistently at 50% or above. BRKARC-3146 13
  • 14. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Why should packets be sent to CPU? Common Cause Recommended Solution Same interface forwarding change design, use “no ip redirect” ACL logging disable ACL logging ACL deny causing switch to send ICMP unreachable no ip unreachables Forwarding/Feature exception (out of TCAM/adj space) reduce TCAM usage SW-supported feature disable the feature or reduce the amount of traffic IP packets with TTL<2 or options disable the offending traffic Broadcast Storm Fix STP loop, disable traffic Unexpected control/data traffic Control Plane Policing (CoPP), Deny ACL Software Bug Open a Service Request BRKARC-3146 14
  • 15. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show platform software fed switch active punt cause summary Statistics for all causes Cause Cause Info Rcvd Dropped ------------------------------------------------------------------------------ 7 ARP request or response 498132 0 21 RP<->QFP keepalive 79 0 show process cpu sort | ex 0.00 CPU utilization for five seconds: 67%/48%; one minute: 17%; five minutes: 4% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 34 1719 964 1783 24.63% 1.98% 0.40% 0 ARP Input 65 73 256 285 0.55% 0.06% 0.01% 0 Net Background 72 4472 523 8550 0.07% 5.31% 1.37% 0 IOSD ipc task 194 98 1913 51 0.07% 0.07% 0.02% 0 IP ARP Retry Age 211 34 462 73 0.07% 0.03% 0.01% 0 UDLD Punt Cause Troubleshooting High CPU CPU utilization for IOSd processes only on IOS XE 16.X For entire system check show processes cpu platform sorted Biggest Consumer Process is ARP. BRKARC-3146 15
  • 16. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show process cpu platform history 1min 1 minutes ago, CPU utilization: 64% 2 minutes ago, CPU utilization: 66% 3 minutes ago, CPU utilization: 67% 4 minutes ago, CPU utilization: 64% 5 minutes ago, CPU utilization: 64% 6 minutes ago, CPU utilization: 66% 7 minutes ago, CPU utilization: 66% 8 minutes ago, CPU utilization: 64% 9 minutes ago, CPU utilization: 66% 10 minutes ago, CPU utilization: 72% 11 minutes ago, CPU utilization: 0% show controllers cpu-interface queue retrieved dropped invalid hol-block ------------------------------------------------------------------------- Routing Protocol 3427 0 0 0 L2 Protocol 32117 0 0 0 sw forwarding 0 0 0 0 broadcast 552 0 0 0 icmp 0 0 0 0 icmp redirect 0 0 0 0 Troubleshooting High CPU Identifying busy CPU queues Queue-wise accounting CPU went high 10 min ago Display Interval Queue Name BRKARC-3146 16
  • 17. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Dig Deeper on IOS-XE 16.X - High CPU Commands Troubleshooting Step show platform hardware fed switch active qos queue stats internal cpu policer Find out if CoPP is enabled for CPU queues and if any queue has non zero drops show platform software fed switch active punt cause summary Possible causes and packets received/dropped show platform software fed switch active inject cause summary Reasons for injection at Fed Process show processes cpu extended Show extended cpu usage report of last 5 seconds for IOS(d) process - Also lists out CPU intensive processes show processes cpu platform sorted Show CPU usage per IOS-XE process show proc cpu sorted Show sorted output based on percentage of usage for IOS(d) processes BRKARC-3146 17
  • 18. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Equivalent Commands on IOS XE 3.6.X and 3.7.X Troubleshooting CPU utilization Troubleshooting Steps Commands Check CPU usage on IOS threads show process cpu detailed process iosd [sorted] Check CPU usage on platform dependent processes show process cpu detailed process {fed | platform_mgr | stack- mgr | ha_mgr | eicored…} Check traffic on the RX and TX CPU queues show platform punt client, show platform punt tx Check details of CPU queues show platform punt statistics port-asic 0 cpuq 0 direction {rx | tx} BRKARC-3146 18
  • 19. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Embedded Wireshark Overview • Allows for packet data to be captured at various points in the packet processing path; flowing through, to and from Catalyst 3850/3650 switch. • Requires IPBase or IPServices license. • No need to have physical access to the switch or a separate computer (unlike SPAN) C3850 Gi1/0/1 Buffer/ Bootflash: Export Data Capture point – Interface/ Control- plane/VLAN TFTP Server • During a Wireshark packet capture, hardware forwarding happens concurrently. • Capture can be saved and viewed on switch itself, or can be exported as a .pcap file to be viewed on a computer. Catalyst 3850 Series Switch High CPU Usage Troubleshoot BRKARC-3146 19
  • 20. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Embedded Wireshark 3850#monitor capture my_cap match any control-plane both filter any 3850#monitor capture my_cap start Started capture point : my_cap1 3850#ping 192.168.1.11 Sending 5, 100-byte ICMP Echos to 192.168.11, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5) 3850#monitor capture my_cap stop Stopped capture point : mycap1 Attach wireshark to control- plane Start capture Ping switch IP address, packet goes to CPU Stop the capture CPU Packet Capture BRKARC-3146 20
  • 21. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3850#show monitor capture my_cap buffer brief ---------------------------------------------------------------------------- # size timestamp source destination dscp protocol ---------------------------------------------------------------------------- 0 0 0.000000 10.154.66.69 -> 172.16.94.195 0 BE TCP 1 0 0.005004 172.16.94.195 -> 10.154.66.69 48 CS6 TCP --snip-- 37 0 5.152036 172.16.94.195 -> 10.154.66.69 48 CS6 TCP 40 0 5.153043 192.168.1.11 -> 192.168.1.10 0 BE ICMP 41 0 5.153043 10.154.66.69 -> 172.16.94.195 0 BE TCP 43 0 5.155042 10.154.66.69 -> 172.16.94.195 0 BE TCP 44 0 5.158048 192.168.1.10 -> 192.168.1.11 0 BE ICMP 45 0 5.159040 172.16.94.195 -> 10.154.66.69 48 CS6 TCP 3850#monitor capture clear Captured data will be deleted [clear]?[confirm] cleared buffer : my_cap1 3850#monitor capture my_cap export location usbflash0:my_cap.pcap Display-filter available Clear buffer Export to USB stcik Embedded Wireshark CPU Packet Capture BRKARC-3146 21
  • 22. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Memory Utilization (RAM) Why Should I be concerned about high memory utilization? It is very important have enough free memory to support features and network convergence events that require transient memory. What are the usual symptoms of high memory usage ? • Memory utilization of process(es) keeps increasing • System runs out of buffers and software packet forwarding stops • Memory allocation failures are reported • System crashes after reporting out of memory At what percentage level should I start troubleshooting ? It depends on the nature and level of feature config on the switch. It is very essential to find a baseline memory usage during normal working conditions, and start troubleshooting when it goes above specific threshold. E.g., Baseline memory usage 40%. Start troubleshooting when the memory goes above 70% and constantly keeps increasing without adding any new configuration. BRKARC-3146 22
  • 23. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Memory Utilization (RAM) Why is memory utilization high? Common Cause Recommended Solution Extensive Config Reduce configuration to supported scale Excessive memory allocated to trace buffers Reset trace buffers to default sizes DoS Attack/Punted traffic causing buffer depletion Identify packets and block them using an ACL Protocol flaps/re-convergence causing high transient memory utilization Identify reason for network instability Memory Leak caused by software bug Open a Service Request Set trace control <> buffer default BRKARC-3146 23
  • 24. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Memory Utilization Alarms Committed memory > 95% for warnings *May 30 19:55:33.384 PDT: %PLATFORM-4-LEMENT_WARNING:switch active R0/0: smand: 4/RP/0: Committed Memory value 96% exceeds warning level 95% Committed memory > 99% for critical errors show platform software status control-processor brief Load Average Slot Status 1-Min 5-Min 15-Min 1-RP0 Healthy 0.40 0.40 0.35 Memory (kB) Slot Status Total Used (Pct) Free (Pct) Committed (Pct) 1-RP0 Healthy 3958028 2544852 (64%) 1413176 (36%) 3288040 (83%) CPU Utilization Slot CPU User System Nice Idle IRQ SIRQ IOwait 1-RP0 0 2.40 0.50 0.00 97.10 0.00 0.00 0.00 1 1.80 0.30 0.00 97.90 0.00 0.00 0.00 2 1.10 0.40 0.00 98.50 0.00 0.00 0.00 3 7.50 0.10 0.00 92.39 0.00 0.00 0.00 4 0.90 0.20 0.00 98.90 0.00 0.00 0.00 5 3.00 0.90 0.00 96.10 0.00 0.00 0.00 BRKARC-3146 24
  • 25. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show process memory sorted Processor Pool Total: 886295488 Used: 345992688 Free: 540302800 lsmpi_io Pool Total: 6295128 Used: 6294296 Free: 832 PID TTY Allocated Freed Holding Getbufs Retbufs Process 289 0 362372784 67944416 268093424 3748898 67 HTTP CORE 73 0 32768232 1322824 31831480 0 637980 IOSD ipc task 164 0 8710232 415696 5673776 0 0 SNMP MA SA 413 0 3929984 5680 3981304 849828 0 EEM ED Syslog 0 0 0 0 3545664 0 0 *MallocLite* 1 0 1686544 6944 1724600 0 0 Chunk Manager 425 0 1521744 33024 1533720 0 0 EEM Server 0 0 5948784 4810448 726936 17522495 0 *Dead* 4 0 2691272 600360 637760 0 0 RF Slave Main Th 414 0 390160 5680 441480 72316 0 EEM ED Generic 29 0 422296 896 404464 0 0 IPC Seat RX Cont 388 0 310248 1616 377632 0 0 Crypto IKEv2 314 0 304960 1640 373320 0 0 DHCP Client 205 0 631128 340616 265928 0 0 mDNS Troubleshooting Memory Utilization Which process is holding most memory? Total Memory Process HTTP CORE in this case BRKARC-3146 25
  • 26. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show memory allocating-process totals Head Total(b) Used(b) Free(b) Lowest(b) Largest(b) Processor FF9B4FD010 886295488 945983712 40311776 536270200 537368132 lsmpi_io FF9ACBE1A8 6295128 6294304 824 824 412 Allocator PC Summary for: Processor PC Total Count Name 0xAAB3404678 193360840 93301 HTTP CORE 0xAAAE38D944 27808280 530 *Init* 0xAAAE403E0C 27047776 981 DynCmd object c 0xAAB0573440 21658208 7713 *Packet Header* 0xAAB35CDDB0 20989080 454 XOS_MEM_UTILS 0xAAB0573498 19068568 7484 *Packet Data* Troubleshooting Memory Utilization - End Drill Down deeper – Is a process not releasing memory? Is count increasing continuously? Memory leak due to HTTP CORE process? BRKARC-3146 26
  • 27. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS top - 20:22:02 up 2:13, 0 users, load average: 0.44, 0.29, 0.31 Tasks: 274 total, 2 running, 272 sleeping, 0 stopped, 0 zombie Cpu(s): 2.8%us, 0.4%sy, 0.0%ni, 96.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st Mem: 3958028k total, 2934896k used, 1023132k free, 151096k buffers Swap: 0k total, 0k used, 0k free, 1006324k cached *** Delay time Not changed *** PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 17682 root 20 0 2606m 394m 175m S 12 10.2 16:28.87 fed main event 31884 root 20 0 245m 52m 43m S 2 1.4 3:05.98 repm 30028 root 20 0 1755m 639m 250m S 2 16.5 3:42.94 linux_iosd-imag 15231 root 20 0 1440m 175m 155m S 2 4.5 2:48.06 sif_mgr 31884 root 20 0 245m 52m 43m S 2 1.4 3:05.86 repm 1 root 20 0 8324 4352 2180 S 0 0.1 0:02.64 systemd 2 root 20 0 0 0 0 S 0 0.0 0:00.00 kthreadd 3850#terminal terminal-type xterm 3850#monitor platform software process switch active R0 CPU & Memory Utilization – Real time monitoring Top processes inside IOS XE Percent of CPU utilized Percent of memory utilized IOS-XE Processes BRKARC-3146 27
  • 28. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Troubleshooting Steps Commands Check memory usage on system show processes memory sorted Check memory usage of a particular process show processes memory detailed process fed Check memory usage of IOSd show processes memory detailed process iosd Check allocators of memory within IOSd show memory detailed process iosd allocating-process totals Equivalent Commands on IOS XE 3.6.X and 3.7.X Troubleshooting memory utilization BRKARC-3146 28
  • 29. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 29 Agenda BRKARC-3146 • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary BRKARC-3146 29
  • 30. Troubleshooting Stack & High Availability In this section you will learn about… • 3850/3650 Stacking Architecture - CLI commands for stack health - Troubleshooting failure to form a stack • 3850/3650 HA Architecture - Election of Active and Standby - CLI commands for HA states
  • 31. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS • 3850 StackWise-480 is a new generation of Catalyst 3850 stacking • 240Gbps of bandwidth (120Gbps TX & 120Gbps RX per connector) • Similar to previous stacking implementations, ring redundancy is achieved via ring-wrap capabilities provided in hardware • NOT backward compatible with currently fielded stacking technologies, most notably StackWise Plus. Which Stacking Technology? StackWise-480 BRKARC-3146 31
  • 32. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Stack–Cables and Components Catalyst 3850 | Stackwise-480 Catalyst 3650 | Stackwise-160 3 lengths of cable, 0.5 1 and 3 Meters 1 ring in 3650 vs 3 rings in 3850 Can I connect Stackwise-480 cables on 3850-48XS? No, 3850-48XS does not support Stackwise-480. It’s a high end model with 640G switching capacity & supports Stackwise Virtual using front panel ports. BRKARC-3146 32
  • 33. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS • 6 rings in total • 3 rings go East • 3 rings go West • Each ring is 40G • Total Stack BW = 240G • With Spatial Reuse = 480G Stack Interface of UADP Stack Interface of UADP ASIC Assuming 4 x 24-port 3850 Switches Packets are segmented/reassembled in HW (256 byte segments) How many rings in my stack? BRKARC-3146 33
  • 34. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Destination Stripping Packet travels ½ the rings. Taken out of stack by destination 1 3 1 3 Assuming 4 x 24-port 3850 Switches 4 2 4 2 Understanding Spatial Reuse Doubling the capacity of my stack BRKARC-3146 34
  • 35. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS What is the status of my stack? show switch detail Switch/Stack Mac Address : 6400.f124.df80 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Switch# Role Mac Address Priority Version State ------------------------------------------------------------ *1 Active 6400.f124.df80 10 0 Ready 2 Standby 6400.f124.de80 1 0 Ready Priority, followed by MAC Address determines which switch gets elected as Active. show switch stack-ports summary Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback ------------------------------------------------------------------------------------------------------------ 1/1 OK 2 50cm Yes Yes Yes 0 No 1/2 OK 2 Unknown Yes Yes Yes 0 No 2/1 OK 1 100cm Yes Yes Yes 1 No 2/2 OK 1 50cm Yes Yes Yes 1 No show platform hardware authentication status Mainboard Authentication: Passed FRU Authentication: Passed Stack Cable A Authentication: Failed << Corrupt EEPROM? Stack Cable B Authentication: Passed show platform software sif switch active r0 exceptions SIF INT : SIFEXCEPTIONINTERRUPTA1_SIFRAC5PMARECEIVEFIFOSPILL3_FIELD_IDX Occurred count: 1 BRKARC-3146 35
  • 36. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS What happens when Image Version mismatches? • If switches are in version mismatch state, they will not stack. • If versions do not match, upgrade standby/member switch to the Active’s version show switch Switch# Role Mac Address Priority Version State --------------------------------------------------------------------------- *1 Active 6400.f125.1480 1 V01 Ready 2 Standby 6400.f125.2680 1 V01 Ready 3 Member 6400.f125.2500 1 0 V-Mismatch 4 Member 6400.f125.2480 1 0 V-Mismatch 3850(config)# software auto-upgrade enable Any newly added member automatically upgraded. Reload only new switch BRKARC-3146 36
  • 37. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS What happens when there is License Mismatch? Member switch will not stack license right-to-use deactivate ipservices license right-to-use activate ipbase acceptEULA Reload switch IP Base IP Base IP Base IP Services A S BRKARC-3146 37
  • 38. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS HA SSO Architecture Interfaces L2 Control L3 Control QoS Interfaces L2 Control L3 Control QoS Wireless Wireless Feature State is synced between Active and Standby Member in stack Feature States are inactive on Standby Member S A BRKARC-3146 38
  • 39. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS RP Infra LC RP Infra Infra LC Infra LC S LC • Active starts Route Processor (RP) Domain (IOSd, WCM, etc) locally • Programs hardware on all Line Card(LC) Domains • Traffic resumes once hardware is programmed • Starts 2min Timer to elect Standby in parallel • Active elects Standby • Standby starts RP Domain locally • Starts Bulk Sync with Active RP • Standby reaches “Standby Hot” 2min timer A Catalyst 3850/3650 – HA State Machine BRKARC-3146 39
  • 40. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show switch Switch/Stack Mac Address : 2037.06cf.0e80 - Local Mac Address H/W Current Switch# Role Mac Address Priority Version State ------------------------------------------------------------ *1 Active 2037.06cf.0e80 10 PP Ready 2 Standby 2037.06cf.3380 8 PP Ready 3 Member 2037.06cf.1400 6 PP Ready 4 Member 2037.06cf.3000 4 PP Ready Stateful Switchover Redundancy (SSO) Mac Address doesn’t change for stack duration Standby Active show redundancy states my state = 13 –ACTIVE peer state = 8 -STANDBY HOT Mode = Duplex Unit ID = 2 Redundancy Mode (Operational) = SSO Redundancy Mode (Configured) = SSO Redundancy State = SSO Communications = Up client count = 76 client_notification_TMR = 360000 milliseconds keep_alive TMR = 9000 milliseconds Terminal state for SSO. If “peer state” is stuck in any other state for more than 10 minutes, open a service request with TAC If Communication channel is not Up, there might be a problem with stack connectivity. Check stack cable. BRKARC-3146 40
  • 41. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda BRKARC-3146 BRKARC-3146 41
  • 42. In this section, you will learn about ... • TCAM (Ternary Content Addressable Memory) • Unicast Forwarding – Layer 2 • Unicast Forwarding – Layer 3 • Multicast Forwarding Troubleshooting Hardware Forwarding
  • 43. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Ternary Content Addressable Memory • Features that need packet forwarding at line rate program entries in TCAM • TCAM is partitioned in several banks and regions • Features use a Hash Table Manager (HTM) to select and configure region • Entries wrongly programmed in TCAM will lead to wrong or unexpected forwarding decisions TCAM on Catalyst 3850/3650 BRKARC-3146 43
  • 44. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS What features are using the TCAM? Establish a Baseline show platform hardware fed switch active fwd-asic resource tcam utilization CAM Utilization for ASIC# 0 Table Max Values Used Values -------------------------------------------------------------------------- Unicast MAC addresses 32768/512 82/22 Directly or indirectly connected routes 32768/8192 7/89 IGMP and Multicast groups 8192/512 0/16 Security Access Control Entries 3072 173 QoS Access Control Entries 2816 52 Netflow ACEs 1024 15 Input Microflow policer ACEs 256 7 Output Microflow policer ACEs 256 7 Control Plane Entries 512 187 Policy Based Routing ACEs 1024 9 <Snip> Features Maximum # entries/ Maximum # Masks Current usage Asic 0 (24 ports Per Asic) On IOS XE versions 3.6.X and 3.7.X, check show platform tcam utilization asic all BRKARC-3146 44
  • 45. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Mac Address Learning How does learning happen? • Catalyst 3850/3650 support up to 32000 mac addresses in TCAM • Hardware assisted software learning • Port ASIC learns MAC Address and puts it into a Learning Cache – (Mac Address Table Manager MATM) • Forwarding Engine Driver(FED) reads MATM Table and programs entry in TCAM BRKARC-3146 45
  • 46. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Unicast Forwarding – Layer 2 show mac address-table address 501c.bf66.0b48 Mac Address Table ------------------------------------------- Vlan Mac Address Type Ports ---- ----------- -------- ----- 1 501c.bf66.0b48 DYNAMIC Gi1/0/1 Total Mac Addresses for this criterion: 1 show platform software matm switch ? <1-9> Switch number active Active instance standby Standby instance Software Mac Address Table Look at MAC Address Table Manager on which stack member? Verifying Mac Address Gi1/0/1 10.10.10.2 Vlan 1 501c.bf66.0b48 3850 10.10.10.1 Vlan 1 3850 acting as layer 2 switch for vlan 1 BRKARC-3146 46
  • 47. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show platform software object-manager switch active f0 statistics Forwarding Manager Asynchronous Object Manager Statistics Object update: Pending-issue: 0, Pending-acknowledgement: 0 Batch begin: Pending-issue: 0, Pending-acknowledgement: 0 Batch end: Pending-issue: 0, Pending-acknowledgement: 0 Command: Pending-acknowledgement: 0 Any errors with programming MAC address? Unicast Forwarding – Layer 2 Verifying Mac Address show platform software fed switch active matm macTable vlan 1 VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports 501c.bf66.0b47 0X8002 0 0xffcc735968 0xffcc726978 0x97 0 0 Vlan1 501c.bf66.0b48 0X101 3 0xffcc7022f8 0xffcc702168 0xf096 0 0 Gi1/0/1 Total Mac number of addresses:: 2 *a_time=aging_time(secs) *e_time=total_elapsed_time(secs) show platform hardware fed switch active matm macTable vlan 1 HEAD: MAC address 501c.bf66.0b48 in VLAN 1 KEY: vlan 3, mac 0x501cbf660b48, l3_if 0, gpn 150, epoch 15, static 0, flood_en 1, vlan_lead_wless_flood_en 3, client_home_asic 0 MASK: vlan 0, mac 0x0, l3_if 0, gpn 0, epoch 0, static 0, flood_en 0, vlan_lead_wless_flood_en 0, MAC address check in FED – hardware MAC address check in FED – software BRKARC-3146 47
  • 48. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS show platform software fed switch standby matm macTable vlan 1 VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports 1 501c.bf66.0b47 0X8002 0 0xffc0703b28 0xffc0736908 0x97 0 0 Vlan1 1 501c.bf66.0b48 0X1 3 0xffc073d498 0xffc073d308 0xf096 300 46 Gi1/0/1 The Meaning of Type & Sequence Number • A MAC Address is aged out only on the switch where it is first learned • Other switches learn through Notifications show platform software fed switch active matm macTable vlan 1 VLAN MAC Type Seq# macHandle siHandle diHandle *a_time *e_time ports 1 501c.bf66.0b47 0X8002 0 0xffcc735968 0xffcc726978 0x97 0 0 Vlan1 1 501c.bf66.0b48 0X101 3 0xffcc7022f8 0xffcc702168 0xf096 0 0 Gi1/0/1 Type 0x101 means 501c.bf66.0b48 is a dynamic entry on active switch that will age on this switch. Type 0x1 means 501c.bf66.0b48 is learnt on standby switch through notification & cannot be aged out on this switch. If sequence number keeps changing frequently, it indicates MAC re- learning. Unicast Forwarding – Layer 2 - End BRKARC-3146 48
  • 49. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3850#show ip cef 50.50.50.50 detail 50.50.50.50/32, epoch 3, flags [attached] Adj source: IP adj out of Vlan500, addr 50.50.50.50 FFAFC4ABC0 Dependent covered prefix type adjfib, cover 50.50.50.0/24 attached to Vlan500 3850#show adjacency 50.50.50.50 detail Protocol Interface Address IP Vlan500 50.50.50.50(8) 0 packets, 0 bytes epoch 0 sourced in sev-epoch 0 Encap length 14 80E01D24AC50E4AA5D9933D00800 L2 destination address byte offset 0 3850#show interface vlan 500 | in bia Hardware is Ethernet SVI, address is e4aa.5d99.33d0 (bia e4aa.5d99.33d0) Unicast Forwarding – Layer 3 3850 acting as router Gig2/0/48 3850 Gig2/0/47 172.16.1.1 50.50.50.50 172.16.1.2 50.50.50.51 Rewrite Info Cross check source MAC BRKARC-3146 49
  • 50. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3850#show platform software ip switch active R0 cef prefix 50.50.50.50/32 detail Forwarding Table 50.50.50.50/32 -> OBJ_ADJACENCY (10), urpf: 11 Connected Interface: 115 Prefix Flags: Directly L2 attached OM handle: 0x805ce088 3850#show platform software adjacency switch active R0 index 10 Adjacency id: 0xa (10) Interface: Vlan500, IF index: 115, Link Type: MCP_LINK_IP Encap: 80:e0:1d:24:ac:50:e4:aa:5d:99:33:d0:8:0 Encap Length: 14, Encap Type: MCP_ET_ARPA, MTU: 1500 Flags: no-l3-inject Incomplete behavior type: None Fixup: unknown Fixup_Flags_2: unknown Nexthop addr: 50.50.50.50 IP FRR MCP_ADJ_IPFRR_NONE 0 OM handle: 0x805cda30 Unicast Forwarding – Layer 3 - End 3850 acting as router Gig2/0/48 3850 Gig2/0/47 172.16.1.1 50.50.50.50 172.16.1.2 50.50.50.51 Rewrite Info Cross check next hop From previous output BRKARC-3146 50
  • 51. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3850-1#show ip mroute 239.1.1.1 10.33.33.33 (10.33.33.33, 239.1.1.1), 1d04h/00:01:47, flags: JT Incoming interface: Vlan33, RPF nbr 0.0.0.0 Outgoing interface list: Vlan77, Forward/Sparse, 1d02h/00:02:47 Multicast Forwarding Ingress vlan 33 Egress Vlan 77 3850-1#show ip mfib 239.1.1.1 10.33.33.33 verbose (10.33.33.33,239.1.1.1) Flags: K HW DDE 0xB OIF-IC count: 0, OIF-A count: 1 SW Forwarding: 7/0/1278/0, Other: 0/0/0 HW Forwarding: 10334626/99/1278/988, Other: 0/0/0 Vlan33 Flags: RA A MA Vlan77 Flags: RF F NS CEF: Adjacency with MAC: 01005E010101B07D47E147F30800 Multicast Rewrite Info MRIB Accept, MFIB Accept Drops? RPF Failure, OIF Null etc MRIB Forward, MFIB Forward show platform hardware fed switch active fwd-asic counters tla RWE drop RweDropCount on Asic 0 [0] dropCount 0x00000000 3850-1 Vlan 33 Sender IP 10.33.33.33 Multicast IP 239.1.1.1 3850 with PIM Acting as mcast router 3850-2 3850 with IGMP Snooping Acting as switch Gig1/0/1 Gig1/0/47 Vlan 77 Gig1/0/2 10.77.77.76 Gig1/0/48 10.77.77.77 Multicast Receivers BRKARC-3146 51
  • 52. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3850-2#show platform software fed switch active ip igmp snooping vlan 77 Vlan 77 --------- Snoop Enabled : On Flood Mode : Off I-Mrouter : Off Oper State : Up STP TCN Flood : Off Routing Enabled : Off PIM Enabled : Off <...snip...> ============================================================== Mrouter PortQ : If 0x8 GigabitEthernet1/0/1 Flood PortQ : If 0x8 GigabitEthernet1/0/1 If 0xa GigabitEthernet1/0/47 If 0xa GigabitEthernet1/0/48 3850-2#show ip igmp snooping groups vlan 77 Vlan Group Type Version Port List ------------------------------------------- 77 239.1.1.1 igmp v2 Gi1/0/47, Gi1/0/48 Multicast Forwarding - End Egress Vlan 77 Mrouter Port Layer 2 ports – multicast receivers Layer 2 ports – multicast receivers Are 3850 Stack members capable of forwarding multicast coming in locally? Yes! Stack members have forwarding information for both layer 2 and layer 3 multicast and can forward traffic to local egress ports or stack ports as needed. 3850-1 Vlan 33 Sender IP 10.33.33.33 Multicast IP 239.1.1.1 3850 with PIM Acting as mcast router 3850-2 3850 with IGMP Snooping Acting as switch Gig1/0/1 Gig1/0/47 Vlan 77 Gig1/0/2 10.77.77.76 Gig1/0/48 10.77.77.77 Multicast Receivers BRKARC-3146 52
  • 53. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS ASIC level drops and exceptions show platform hardware fed switch active fwd-asic drops exceptions Run command multiple times to check for incrementing count BRKARC-3146 53
  • 54. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Equivalent Commands on IOS XE 3.6.X and 3.7.X Troubleshooting unicast forwarding Troubleshooting Steps Commands Check TCAM utilization show platform tcam utilization asic all Check hardware MAC address table show platform matm macTable vlan # show platform matm <H.H.H> vlan # Check ip route in hardware show platform ip route switch X, show platform ip route summary Check adjacency in hardware show platform ip adjacency switch X Check ASIC level drops show platform fwd-asic drops exceptions BRKARC-3146 54
  • 55. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 55 • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda BRKARC-3146
  • 56. In this section, you will learn about ... • Pre-checks before starting to troubleshoot PoE • PoE stages and state machine • Commands and outputs Troubleshooting Power over Ethernet (PoE)
  • 57. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Before you start troubleshooting… • Is the problem with a Cisco PD (powered device) or a third party device? • What is the power requirement of the device? • Is this a new install, or was the powered device working normally before? • If the trouble started after the powered device was working, what changed? • Are all the PoE ports affected? • Where is the affected interface located;master/standby/member switch ? • Does the PD (powered device) work fine on a different port or a different switch? BRKARC-3146 57
  • 58. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS PoE Detection - State Machine Switch# show platform ilpower port gi1/0/4 <snip> Current State: NGWC_ILP_SHUT_OFF_S Previous State: NGWC_ILP_DETECTING_S <After some time> Current State: NGWC_ILP_LINK_UP_S Previous State:NGWC_ILP_IEEE_PD_DETECTED_S State Machine BRKARC-3146 58
  • 59. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Debugging PoE detection C3850#debug ilpower event // // debug provides information about events and changes in ILP state machine // ILP:: Gi2/0/12: State=NGWC_ILP_SHUT_OFF_S-0 , Event=NGWC_ILP_CLI_START_DETECT_EV-17 ILP:: Gi2/0/12: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_CLI_START_DETECT_EV-17 ILP:: Gi2/0/12: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_IEEE_CLASS_DONE_EV-1 %ILPOWER-7-DETECT: Interface Gi2/0/12: Power Device detected: IEEE PD ILP:: Gi2/0/12: State=NGWC_ILP_IEEE_PD_DETECTED_S-4, Event=NGWC_ILP_PWR_GOOD_EV-2 %ILPOWER-5-POWER_GRANTED: Interface Gi2/0/12: Power granted ILP:: Gi2/0/12: State=NGWC_ILP_LINK_UP_S-6, Event=NGWC_ILP_WAIT_LINK_DOWN_TIMER_EV-42 ILP:: Gi2/0/12: State=NGWC_ILP_LINK_UP_S-6, Event=NGWC_ILP_PHY_LINK_UP_EV-20 %LINK-3-UPDOWN: Interface GigabitEthernet2/0/12, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2/0/12, changed state to up ILP state machine: SHUT_OFF (event: start detect)  DETECTING (event: ieee-class-done)  PD_DETECTED (event: power-good) BRKARC-3146 59
  • 60. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS PoE Classification There are 4 Classes with PoE BRKARC-3146 60
  • 61. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS PoE Signature BRKARC-3146 61
  • 62. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Are we getting power to the device? Switch#show power inline Module Available Used Remaining (Watts) (Watts) (Watts) ------ --------- -------- --------- 1 1440.0 6.3 1433.7 Interface Admin Oper Power Device Class Max (Watts) --------- ------ ---------- ------- ------------------- ----- ---- Gi1/0/1 auto off 0.0 n/a n/a 30.0 Gi1/0/2 auto on 6.3 Ieee PD 2 30.0 Switch#show power inline Module Available Used Remaining (Watts) (Watts) (Watts) ------ --------- -------- --------- 1 1440.0 6.3 1433.7 Interface Admin Oper Power Device Class Max (Watts) --------- ------ ---------- ------- ------------------- ----- ---- Gi1/0/1 auto off 0.0 n/a n/a 30.0 Gi1/0/2 auto on 6.3 IP Phone 7962 2 30.0 Non Cisco device Cisco device Class Class BRKARC-3146 62
  • 63. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS How does power budget look? Switch#show platform ilpower system 1 ILP System Configuration Slot: 1 ILP Supported: Yes Total Power: 1440000 Used Power: 6300 Initialization Done: Yes Post Done: Yes Post Result Logged: No Post Result: Success Power Summary: Module: 0 Power Total: 1440000 Power Used: 6300 Power Threshold: 0 Operation Status: On Pool: 1 Pool Valid: Yes Total Power: 1440000 Power Usage: 6300 Failure is bad BRKARC-3146 63
  • 64. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Debugging power management C3850#debug ilpower powerman // // provides information about power management (allocation of initial power / changes in power- allocation due to // exchanged CDP/LLDP packets and changes in ICUT thresholds. // ilpower_powerman_power_available_tlv: about sending patlv on Gi2/0/12 req id 0, man id 1, pwr avail 0, pwr man -1 ilpower_get_cdp_spare_pair_tlv: about sending Spare Pair PoE TLV on Gi2/0/12 pse_support 1, det_req 0, pd_desired 0, pse_oper 0 Ilpower PD device 3 class 5 from interface (Gi2/0/12) ilpower new power from pd discovery Gi2/0/12, power_status ok Ilpower interface (Gi2/0/12) power status change, allocated power 7000 ilpower_notify_lldp_tlv: lldp power class tlv: (curr/prev) pwr value 7000/0 ! Ilpower interface (Gi2/0/12) process tlv from cdp INPUT: power_consumption = 6300, power_request_id = 8027, power_man_id = 0, power_request_level[] = 6300 0 0 0 0 ! Ilpower interface (Gi2/0/12) power negotiation: consumption = 6300, alloc_power = 6300 Ilpower interface (Gi2/0/12) setting ICUT_OFF threshold to 6300. UPoE TLV advertisement changes in power power negotiation & ICUT logic. BRKARC-3146 64
  • 65. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS PoE Errors - Short C3850#debug ilpower event ILP:: Gi2/0/2: State=NGWC_ILP_SHUT_OFF_S-0 , Event=NGWC_ILP_CLI_START_DETECT_EV-17 ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_CLI_START_DETECT_EV-17 ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_IEEE_DET_SHORT_EV-29 detected short from IEEE. still waiting to hear from phy Gi2/0/2 %LINK-3-UPDOWN: Interface GigabitEthernet2/0/2, changed state to down %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi2/0/2: Power Controller reports Short detected ILP:: Gi2/0/2: State=NGWC_ILP_DETECTING_S-2, Event=NGWC_ILP_WAIT_IEEE_SHORT_TIMER_EV-41 ILP_DETECTING_S: Gi2/0/2 phy still didn't get back to us. It looks like a real short and not a csco pd. don't power up the pd ILP state machine: SHUT_OFF (event: start detect)  DETECTING (event: start detect)  DETECTING (event: detected short) ILP state machine: DETECTING (event: wait short timer event) Note: in the output of 'show power inline <...> detail' 'Short Current Counter' will increase. Counters will be zero'ed when interface is shut down. BRKARC-3146 65
  • 66. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS PoE Errors - Imax • Catalyst 3650/3850 support strict policing by default for each power class. Imax error happens when PD tries to draw more power than negotiated. %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/6: Power Controller reports power Imax error detected • Find out PD class. Static power upper limit could be configured on a per port basis. PD may get powered down if it tries to exceed configured power 3850#sh run int gi 3/0/44 interface GigabitEthernet3/0/44 power inline static max 20000 end 3850#sh power inline gi 3/0/44 detail Interface: Gi3/0/44 Inline Power Mode: static Operational status: on Device Detected: yes Device Type: Ieee PD IEEE Class: 3 Discovery mechanism used/configured: Ieee and Cisco Police: off Power Allocated Admin Value: 20.0 Power drawn from the source: 20.0 Power available to the device: 20.0 BRKARC-3146 66
  • 67. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS UPoE (Universal PoE) Upto 60W of power (51W to PD) by using all four pairs of standard Ethernet cabling (cat5e or better) UPoE capbale PIDs WS-C3850-24U WS-C3850-48 WS-C3850-24XUU WS-C3850-12X48U WS-C3650-8X24UQ WS-C3650-12X48UQ WS-C3650-12X48UR WS-C3650-12X48UZ BRKARC-3146 67
  • 68. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS UPoE – Classification UPoE defines two classification mechanisms: - LLDP based (preferred) - forced 4-pair Forced 4-pair mode can be used to support devices which do not have LLDP/CDP capabilities. By default UPoE switch uses LLDP. To turn on 'forced 4-pair' the following CLI is required: (config-if)#power inline four-pair forced BRKARC-3146 68
  • 69. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Useful PoE Commands show version show module show env power all show stack-power budgeting show interface <> show power inline <> detail show platform software ilpower port <> show platform frontend-controller version 0 <switch no.> show controller power inline module <switch no.> show tech poe debug ilpower event, controller, powerman BRKARC-3146 69
  • 70. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda BRKARC-3146 70
  • 71. Troubleshooting QoS In this section, you will learn about ... • QOS implementation on Catalyst 3850/3650 • QOS Troubleshooting examples • QoS Case study
  • 72. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS QoS – What’s New with Catalyst 3850/3650 Default Behavior Change  3750, With “mls qos” enabled at global level all the ports are untrusted and DSCP/precedence/COS of the incoming packets are reset to 0.  3750, “mls qos trust” is needed at the interface level to change the trust mode  3850, port is trusted by default, DSCP/precedence/COS values are retained BRKARC-3146 72 3850/3650 QoS buffer tuning - qos queue-softmax-multiplier <value>  Increases the value of softmax buffer.  Takes effect only on ports where a policy-map is attached.  If value = 1200, softmax for non-priority queues and non-primary priority queue is increased 12 times.  Not applicable for priority queue level 1.
  • 73. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3750 MLS QoS vs. 3850 MQC QoS 3750 3850 Basic Structure MLS MQC Global Config Support mls qos Support some of MQC at ingress No mls qos support Support MQC [class-map, policy-map] Interface Config Support mls qos config and some of MQC cli at ingress Attach the policy to the interface Port Ingress Classification/Policing/Marking/Queuing Classification/Policing/Marking Port Egress Queueing Classification/Policing/Marking/Queuing SVI Ingress Classification/Policing/Marking Classification/Marking SVI Egress None Classification/Marking 3750 to 3850/3650 QoS conversion BRKARC-3146 73
  • 74. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 3560-2# show access-lists QOS Extended IP access list QOS 10 permit icmp host 192.168.30.1 host 192.168.30.2 dscp af11(5 matches) QoS Example Verify Default trust mode on 3850 Gig2/0/7 Gig0/7 Gig2/0/5 Gig0/5 3560-1 3850 3560-2 AF11=DSCP10=TOS 40 Access List QOS Permit icmp host 192.168.30.1 host 192.168.30.2 dscp af11 3560-1# ping 192.168.30.2 repeat 5 tos 40 192.168.30.1 192.168.30.2 All interfaces are switchport mode trunk With no explicit QoS config BRKARC-3146 74
  • 75. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS TOS = 0 QoS Example Marking of packets to af11 Gig2/0/7 Gig0/7 Gig2/0/5 Gig0/5 3560-1 3850 3560-2 AF11=DSCP10=TOS 40 access-list TEST permit icmp host 192.168.30.1 host 192.168.30.2 class-map QOS match access-group TEST policy Map MARK-AF11 Class QOS set dscp af11 interface gig2/0/7 service-policy input MARK-AF11 192.168.30.1 3560-1# ping 192.168.30.2 repeat 5 3850#show platform software fed switch 2 qos policy target status Loc Interface IIF-ID Dir State:(cfg,opr) Policy --- ------------ ---------------- --- --------------- --------------- GigabitEthernet1/0/1 0x00000000000008 OUT VALID,SET_INHW QoS 3560-2#show access-lists QOS 10 permit icmp host 192.168.30.1 host 192.168.30.2 dscp af11 (5 matches) 3850#show platform hardware fed switch 2 qos dscp-cos counters interface gigabitEthernet 2/0/7 | in DSCP0 Ingress DSCP0 5 0 Egress DSCP0 0 0 3850#show platform hardware fed switch 2 qos dscp-cos counters interface gigabitEthernet 2/0/5 | in DSCP10 Ingress DSCP10 0 0 Egress DSCP10 5 0 192.168.30.2 BRKARC-3146 75
  • 76. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS QoS – Case Study Problem - LACP Portchannel does not come up Gig2/0/1 Gig1/0/1 3850-1 3850-2 interface range GigabitEthernet2/0/1-2 switchport mode trunk channel-protocol lacp channel-group 1 mode active service-policy output WIRED_EGRESS_QOS ! policy Map WIRED_EGRESS_QOS Class DSCP_VOICE priority level 1 Class DSCP_CALL_SIGNALING bandwidth remaining 20 (%) queue-buffers ratio 20 Class class-default bandwidth remaining 80 (%) queue-buffers ratio 80 Gig2/0/2 Gig1/0/2 interface range GigabitEthernet1/0/1-2 switchport mode trunk channel-protocol lacp channel-group 1 mode active %EC-5-L3DONTBNDL2: Gi1/0/1 suspended: LACP currently not enabled on the remote port. %EC-5-L3DONTBNDL2: Gi1/0/2 suspended: LACP currently not enabled on the remote port. BRKARC-3146 76
  • 77. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS QoS – Case Study - End Solution- LACP Portchannel does not come up Gig2/0/1 Gig1/0/1 3850-1 3850-2 interface range GigabitEthernet2/0/1-2 switchport mode trunk channel-protocol lacp channel-group 1 mode active service-policy output WIRED_EGRESS_QOS ! Policy Map WIRED_EGRESS_QOS Class DSCP_VOICE priority level 1 Class DSCP_CALL_SIGNALING bandwidth remaining 20 (%) queue-buffers ratio 20 Class class-default bandwidth remaining 80 (%) queue-buffers ratio 80 Gig2/0/2 Gig1/0/2 interface range GigabitEthernet1/0/1-2 switchport mode trunk channel-protocol lacp channel-group 1 mode active 3850-1#show platform hardware fed switch 2 qos queue config interface Gi 2/0/1 DATA Port:21 GPN:1 AFD:Disabled QoSMap:1 HW Queues: 168 - 175 DrainFast:Disabled PortSoftStart:2 - 1440 ---------------------------------------------------------- DTS Hardmax Softmax PortSMin GlblSMin PortStEnd --- -------- -------- -------- --------- --------- 0 1 4 0 5 0 5 0 0 0 4 1920 1 1 4 0 8 240 7 160 3 60 4 1920 2 1 4 0 9 960 8 640 4 240 4 1920 3 1 4 0 5 0 5 0 0 0 4 1920 4 1 4 0 5 0 5 0 0 0 4 1920 5 1 4 0 5 0 5 0 0 0 4 1920 6 1 4 0 5 0 5 0 0 0 4 1920 7 1 4 0 5 0 5 0 0 0 4 1920 3850-1#show platform hardware fed switch 2 qos queue stats Gi 2/0/1 ------------------------------- Queue Buffers Enqueue-TH0 Enqueue-TH1 Enqueue-TH2 ----- ------- ----------- ----------- ----------- 0 0 0 0 0 1 0 0 0 452 2 0 0 0 37645 3 0 0 0 0 4 0 0 0 0 5 0 0 0 0 6 0 0 0 0 7 0 0 0 0 ------------------------------- Queue Drop-TH0 Drop-TH1 Drop-TH2 SBufDrop QebDrop ----- ----------- ----------- ----------- ----------- ----------- 0 0 0 9393 0 0 LACP PDUs dropped On IOS XE 3.6.X and 3.7.X, check show platform qos queue stats interface BRKARC-3146 77 Solution: Assign buffers to priority queue
  • 78. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 78 • Product Overview • Troubleshooting Memory & CPU • Troubleshooting Stack & High Availability • Troubleshooting Hardware Forwarding • Troubleshooting Power over Ethernet • Troubleshooting QoS • Platform specific tools and techniques • Summary Agenda BRKARC-3146
  • 79. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Guest Shell - IOS XE 16.X Guest Shell is a Linux container providing a standard Linux environment for a user to run scripts/applications via Python 3850#config t Enter configuration commands, one per line. End with CNTL/Z. 3850(config)#iox 3850(config)#exit 3850#guestshell enable Management Interface will be selected if configured Please wait for completion Guestshell enabled successfully 3850#guestshell run bash [guestshell@guestshell ~]$ [guestshell@guestshell ~]$ exit exit 3850#guestshell run python flash:script_name.py ? LINE <cr> 3850# 3850#guestshell run python Python 2.7.5 (default, Jun 17 2014, 18:11:42) [GCC 4.8.2 20140120 (Red Hat 4.8.2-16)] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> Also Supported… • ZTP – Zero Touch Provisioning can retrieve a Python script via DHCP at boot time • EEM – Use Embedded Event Manager to trigger a Python script in response to an event DMI = Data Model Interface = Netconf/Yang interface PnP = Plug N Play = Zero Touch provisioning Virtual Services Manager Create a Linux shell to run Linux commands Run a Python script Start an interactive Python interpreter ~2 minutes BRKARC-3146 79
  • 80. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Guest Shell Case Study – Checking ASIC drops BRKARC-3146 80 import re,cli sh_drops = cli.execute('show platform hardware fed sw active fwd-asic drop exceptions') non_zero_values = re.findall(r"d+?s+?d+?s+?(S+?)s+?d+?s+?d+?s+?([1-9]d*?)s",sh_drops) if non_zero_values: for name, non_zero_value in non_zero_values: cli.execute("send log" + " Non zero value found %s, for %s." % (non_zero_value, name)) Get output & store in a variable. Do a regex match for non zero count If non zero count is found, send a log Import regex and cisco cli packages 3850#guestshell run python flash:asic_drop_check.py loop 10 Instead of loop, EEM can be used to call the script periodically
  • 81. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS WebUI - IOS XE 16.X http://172.16.94.216/webui/ • 172.16.94.216 is an IP address configured on the 3850 • Privilege 15 is for monitoring & configuration • Privilege 1-14 (or omit privilege option) = monitoring only config terminal username <name> privilege 15 password<pass> ip http server ip http authentication local • Application visibility on interfaces • Filter monitoring over interfaces & direction • Identify top talkers • Monitor data over 2, 24 and 48 hours • Monitor percentage bandwidth usage • Python Sandbox • Expose password lifetime from AAA. New! BRKARC-3146 81
  • 82. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS IOSd Event-trace - IOS XE 16.X 3850#show monitor event-trace ? adjacency Adjacency Events all-traces Show all the event traces arp ARP Events cce Show group traces cef Show CEF traces cfd Crypto Fault Detection eventtrace cfm Show group traces checkpoint "Checkpoint debug" cpu-report display cpu-report crypto Crypto traces cts cts datainteg Data integrity events dmvpn DMVPN traces eigrp Show EIGRP traces epm Show group traces fhrp Show FHRP traces flexvpn FlexVPN event trace flow Flow traces hw-api HW-API Events ifnum Show group traces interprocess Interprocess event trace ipv6 IPv6 link_oam Show group traces lisp Show group traces 3850#show monitor event-trace arp all *Apr 10 17:15:39.817: REPOP ADJ: *Apr 10 17:15:40.418: IF ADDR: IF: GigabitEthernet0/0 *Apr 10 17:15:40.418: IF ADDR: IF: GigabitEthernet0/0 *Apr 10 17:15:41.565: FLUSH: *Apr 10 17:15:41.798: IF UP: IF: Port-channel100 *Apr 10 17:15:41.842: ADD ENTRY: Link: IP A: 3.3.3.10 IF: Port- channel100 Mode: Interface *Apr 10 17:15:41.877: ADD ENTRY: Link: IP VRF: Mgmt-vrf A: 172.16.94.216 IF: GigabitEthernet0/0 Mode: Interface *Apr 10 17:15:41.879: IF DOWN: IF: Port-channel100 *Apr 10 17:15:41.879: IF ADDR: IF: Port-channel100 --snip-- Flight recorder – Refined list of messages that are too low level for a syslog BRKARC-3146 82
  • 83. Do you have a better understanding of • Key components of Catalyst 3850/3650 hardware and IOS XE • How to baseline switch and detect anomalies • Troubleshooting tools and techniques at your disposal Summary
  • 84. Complete your online session evaluation • Please complete your session survey after each session. Your feedback is very important. • Complete a minimum of 4 session surveys and the Overall Conference survey (starting on Thursday) to receive your Cisco Live water bottle. • All surveys can be taken in the Cisco Live Mobile App or by logging in to the Session Catalog on ciscolive.cisco.com/us. Cisco Live sessions will be available for viewing on demand after the event at ciscolive.cisco.com. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS BRKARC-3146 84
  • 85. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS Continue your education Related sessions Walk-in labs Demos in the Cisco campus Meet the engineer 1:1 meetings BRKARC-3146 85
  • 86. © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public #CLUS 86 BRKARC-3146 NDA Roadmap Sessions at Cisco Live Customer Connection Member Exclusive Connect online with 29,000 peer and Cisco experts in private community forums Give feedback to Cisco product teams  Product enhancement ideas  Early adopter trials  User experience insights Learn from experts and stay informed about product roadmaps  Roadmap sessions at Cisco Live  Monthly NDA briefings Join online: www.cisco.com/go/ccp Join at the Customer Connection Booth (in the Cisco Showcase) Member Perks at Cisco Live • Attend NDA Roadmap Sessions • Customer Connection Jacket • Member Lounge Join Cisco’s online user group to … NETWORKING ROADMAPS SESSION ID DAY / TIME Roadmap: SD-WAN and Routing CCP-1200 Mon 8:30 – 10:00 Roadmap: Machine Learning and Artificial Intelligence CCP-1201 Tues 3:30 – 5:00 Roadmap: Wireless and Mobility CCP-1202 Thurs 10:30 – 12:00
  • 88. #CLUS