BRKDCN 3900
BRKDCN 3900
BRKDCN 3900
BRKDCN-3900
Cisco Webex App
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install the Webex App or go directly to the Webex space Enter your personal notes here
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
• What’s Different About ACI Forwarding?
• (iVXLAN, contracts, endpoint learning)
• Proxy Forwarding
ACI Forwarding Tables
Agenda •
• Endpoint tables, routing tables, hardware
lookups
• Understanding the Configuration Options
• The Anatomy of an ACI Switch
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
• Understanding the Tools
• UI Tools
• Elam
• Ftriage
Agenda •
•
Span / ERSPAN
Flow Telemetry / netflow
• Debugging and Walking Through ACI
Flows
• (Routed, Bridged, BUM, Proxied)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Glossary of Acronymns
VxLAN packet acronyms
Acronyms Definitions
Acronyms Definitions
ACI Application Centric Infrastructure
dXXXo Outer Destination XXX
APIC Application Policy Infrastructure Controller (dIPo = Outer Destination IP)
sXXXo Outer Source XXX
EP Endpoint
(sIPo = Outer Source IP)
EPG Endpoint Group dXXXi Inner Destination XXX
(dIPi = Inner Destination IP)
BD Bridge Domain
sXXXi Inner Source XXX
VRF Virtual Routing and Forwarding (sIPi = Inner Source IP)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
What’s Different
About ACI
Forwarding?
What is “Application Centric”?
• Traditional networks use ACL’s to
classify traffic
• Usually based on L3 or L2 addresses
• Makes security decisions (permit,
Host1
deny, log, etc) EPG1
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
How is “Application Centric” Achieved?
Sources and Destinations Must be Classified into EPG’s
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Vlan Types
※ PI-VLAN : Platform Independent VLAN
VRF1 2523136
VRF1
EP EP EP EP
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
What is an Endpoint?
At the APIC level an Endpoint is a Mac address with zero or more
IP/IPv6 Addresses
fvCEp
<epg-dn>/cep-00:00:00:00:0a
fvIp
<epg-dn>/cep-00:00:00:00:0a/ip-[10.0.0.10]
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
What is an Endpoint?
An Endpoint joins both forwarding and security policy
Local Learn VNID Remote Learn
leaf103# show system internal epm end ip 192.168.200.11 leaf103# show system internal epm endpoint ip 192.168.100.10
MAC : 0000.1111.2222 ::: Num IPs : 1 MAC : 0000.0000.0000 ::: Num IPs : 1
IP# 0 : 192.168.200.11 ::: IP# 0 flags : ::: l3-sw-hit: No IP# 0 : 192.168.100.10 ::: IP# 0 flags : ::: l3-sw-hit: No
Vlan id : 2 ::: Vlan vnid : 12661 ::: VRF name : CL2022:vrf1 Vlan id : 0 ::: Vlan vnid : 0 ::: VRF name : CL2022:vrf1
BD vnid : 16613259 ::: VRF vnid : 2523136 BD vnid : 0 ::: VRF vnid : 2523136
Phy If : 0x40018000 ::: Tunnel If : 0 Phy If : 0 ::: Tunnel If : 0x18010001
Interface : Ethernet1/25/1 Interface : Tunnel1
Flags : 0x80005c04 ::: sclass : 32771 ::: Ref count : 5 Flags : 0x80004400 ::: sclass : 49154 ::: Ref count : 3
EP Create Timestamp : 11/01/2021 14:06:25.769904 EP Create Timestamp : 11/04/2021 16:38:13.570615
EP Update Timestamp : 11/04/2021 18:51:54.387104 EP Update Timestamp : 11/04/2021 18:51:54.386595
EP Flags : local|IP|MAC|host-tracked|sclass|timer| EP Flags : IP|sclass|timer|
Interface/TEP
PcTag
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
What is a TEP? (Tunnel Endpoint)
• IP addresses allocated for overlay communication
• VXLAN Traffic is sent to the TEP + VNID of destination
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
What are Tunnels?
• Leafs/Spines Install Tunnel Interface to each known TEP.
• Used for VXLAN Dataplane How are Tunnels Learned?
leaf# moquery -c tunnelIf -f 'tunnel.If.id=="tunnel1"'
id : tunnel1
dest : 10.0.72.67
Dataplane Learns idRequestorDn : sys/*/db-dtep/dtep-[10.0.72.67]
id : tunnel1
Through BGP dest : 10.0.72.64
(l3out routes) idRequestorDn : sys/bgp/*/db-dtep/dtep-[10.0.72.64]
# tunnel.If
id : tunnel1
Local POD ISIS dest : 10.0.152.64
Database idRequestorDn : sys/isis/*/lvl-l1/db-dtep/dtep-[10.0.152.64]
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
How is an Endpoint Learned? How does the Egress leaf classify
traffic into the correct EPG?
Spine Spine
4 Leaf Installs Remote 3
Endpoint learn from Leaf Updates COOP
dataplane Database on spines
2
Ingress leaf classifies smac and sIP
(if IP learning enabled) into EPG
based on some info such as vlan.
Leaf Leaf Leaf Endpoint entry installed
EP2 EP1 1
10.1.1.2/24 10.1.1.1/24 Source sends some
4444.5555.6666 0000.1111.2222 type of traffic
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Overlay iVXLAN Bit pos 4 – Source Policy Applied
Bit pos 5 – Destination Policy Applied
ACI uses VXLAN with some additional bits Bit pos 7 – Don’t learn
Spine Spine
VNID (3 bytes) PcTag/Sclass (2 bytes) Flags (1 byte)
L4/Payload Proto DIP SIP 802.1Q SMAC DMAC VXLAN DSCP DIP SIP 802.1Q SMAC DMAC
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
How is an Endpoint Learned?
Spine
leaf103# show system internal epm vlan 2 detail
VLAN 2
VLAN type : FD vlan
hw id : 34 ::: sclass : 32771
access enc : (802.1Q, 100)
fabric enc : (VXLAN, 12661)
Object store EP db version : 4
Leaf BD vlan id : 1 ::: BD vnid : 16613259 ::: VRF vnid : 2523136
Valid : Yes ::: Incomplete : No ::: Learn Enable : Yes
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Checking Endpoints
Reference commands can be run from leafs or apics
#Check object model for Mac Address Endpoint
moquery -c epmMacEp -f 'epm.MacEp.addr=="00:00:AA:AA:BB:BB"'
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
How is an Endpoint Learned?
The Leaf Updates COOP on Spines
Spine spine1005# show coop internal info ip-db | grep -B 1 -A 15
192.168.200.11
------------------------------
IP address : 192.168.200.11
Vrf : 2523136 VNID info should match
Update Flags : 0 the info on leaf
COOP EP bd vnid : 16613259
EP mac : 00:00:AA:AA:BB:BB
Publisher Id : 10.0.64.70
Leaf Record timestamp : 11 05 2021 17:02:56 217794556
Publish timestamp : 11 05 2021 17:02:56 220584642
Seq No: 0
Remote publish timestamp: 01 01 1970 00:00:00 0
URIB Tunnel Info
Num tunnels : 1
Tunnel address : 10.0.64.70
EP1 Tunnel ref count : 1
10.1.1.1/24
0000.1111.2222 Leaf TEP that owns this EP:
#From APIC
moquery -c ipv4Addr -f 'ipv4.Addr.addr=="10.0.64.70"'
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Checking COOP
Reference commands can be run from spines or apics
Query COOP for l2 entry:
moquery -c coopEpRec -f 'coop.EpRec.mac=="00:00:AA:AA:BB:BB"'
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
How is Traffic Classified with no EP Learn?
In most of these cases, the pcTag is based on a policy-prefix lookup
• There will be no endpoint learn in several cases
• Source/dest is behind an l3out
• Source/dest is in another vrf
• Endpoint learning is disabled by some option
• If ingress leaf doesn’t apply policy, egress leaf should (indicated via
policy-applied bits in ivxlan header)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
How is Traffic Classified with no EP Learn?
Destination Behind L3out
leaf101# vsh_lc -c "show forwarding route 10.99.99.100 platform vrf CL2022:vrf1"
!
Policy Prefix 10.99.99.0/24
!
vrf: 16(0x10), routed_if: 0x0 epc_class: 32772(0x8004)
Classification based on
longest l3out policy prefix
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
How is Traffic Classified with no EP Learn?
Destination is unknown and is proxied
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
How is Traffic Classified with no EP Learn?
Destination is in shared services Shared Services
provider EPG (different vrf) Classification
leaf# show ip route 192.168.255.10 vrf CL2022:vrf1
192.168.255.0/24, ubest/mbest: 1/0, attached, direct, pervasive
*via 10.0.176.66%overlay-1, [1/0], static, tag !!!, rwVnid: vxlan-2457601 Destination is in shared services
recursive next hop: 10.0.176.66/32%overlay-1
consumer EPG (different vrf)
leaf# vsh_lc -c "show forwarding route 192.168.255.10 plat vrf CL2022:vrf1"
Prefix:192.168.255.0/24, Update_time:Fri Nov 5 20:57:00 2021 leaf# show ip route 192.168.100.10 vrf CL2022:vrf2
! 192.168.100.0/24, ubest/mbest: 1/0, attached, direct, pervasive
Policy Prefix 0.0.0.0/0 *via 10.0.176.66%overlay-1, [1/0], static, rwVnid: vxlan-2523136
! recursive next hop: 10.0.176.66/32%overlay-1
Flags: IN-HW, SHRD-SVC,
vrf: 16(0x10), routed_if: 0x0 epc_class: 36(0x24) leaf# vsh_lc -c "show forwarding route 192.168.100.10 plat vrf CL2022:vrf2"
Prefix:192.168.100.0/24, Update_time:Tue Nov 9 14:34:05 2021
! Reserved tag for shared
Policy Prefix 0.0.0.0/0 services consumer. Policy
PcTag of provider epg ! applied in consumer vrf
Flags: IN-HW, SHRD-SVC,
vrf: 10(0xa), routed_if: 0x0 epc_class: 14(0xe)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Check hidden slide for impact of “Policy
Control Enforcement Direction” setting
Policy-Applied
Bits set?
Dest
EPG1
Leaf No
Do contract
lookup. Permit,
PcTag 100
deny, redir, log
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Policy enforcement table
Where is policy enforced?
VRF Enforcement
Setting
Flow Direction INGRESS EGRESS
EPG to unknown EPG Applied Egress Unchanged
EPG to known EPG Applied Ingress Unchanged
EPG to L3out Applied Ingress/non-BL Applied Egress/BL
L3out to unknown EPG Applied Egress/non-BL Applied Egress
L3out to known EPG Applied Egress/non-BL Applied Ingress/BL
L3out to L3out Applied Ingress Applied Egress
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
What About Flooded Traffic?
The following traffic may be flooded: How does ACI flood?
• Broadcast • Flooded traffic is sent to the BD
• Multicast
GiPo (l2 flood) or VRF GiPo (l3
flood)
• Unknown Unicast
• The GiPo is an overlay multicast
• Control Plane maintenance (EP address allocated to a BD or VRF
announce, fabric ARP, etc)
• Flooding is done on a loop-free
tree called an FTAG
Security policy NOT applied
GiPo
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
What are FTAGs?
3
Forward out all Outgoing
Interfaces Root for
Ftag 0
EP1
10.1.1.1/24
*Note, the ingress leaf communicates the selected ftag to 0000.1111.2222
the rest of the fabric by adding it to the destination gipo.
1 Who has 10.1.1.100?
If the gipo is 225.0.0.0 and the ftag is 0x9, the
Please tell 10.1.1.1
destination address would be 225.0.0.9
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Checking FTAGs
Find the outgoing interfaces for a tree
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Proxy
Forwarding
What is Proxy Forwarding?
Why? Scaling out Endpoint Learning
Send traffic
destined to EP Send traffic destined
1 to Leaf 1
Spine to an Unknown EP to Spines own
any Spine separate anycast
TEP’s for mac, ipv4,
and ipv6 proxy
I am connected lookups
to Endpoint 1 Leaf 1 Leaf 2 Leaf 3 Leaf 4
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
How to check the Spine-Proxy TEP
BD Subnet (Pervasive Route)
leaf1# show ip route vrf CL2022:vrf1
next-hop should be
192.168.0.0/24, ubest/mbest: 1/0, attached, direct, pervasive SPINE-PROXY
*via 10.0.16.64%overlay-1, [1/0], 00:21:39, static
leaf1# show isis dteps vrf overlay-1 | grep PROXY next-hop of Pervasive Route
10.0.16.65 SPINE N/A PHYSICAL,PROXY-ACAST-MAC is IPv4 Spine Proxy TEP
10.0.16.64 SPINE N/A PHYSICAL,PROXY-ACAST-V4
10.0.16.67 SPINE N/A PHYSICAL,PROXY-ACAST-V6
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
What is COOP?
COOP is the proxy-database of ACI
• Council of Oracles Protocol – A TCP protocol for citizens (Leafs) to
publish records to oracles (Spines).
• Used for announcing endpoints, fabric owned IP’s, multicast
information, and more
• Synced across Pods/Sites with BGP EVPN
• Each Endpoint Record contains all information to forward (VNID, leaf
TEP, mac, etc)
• COOP records pushed into hardware on spines
• For modular spines, scale is achieved by pushing each EP onto only
two Fabric Modules
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
What if the Endpoint isn’t in COOP? (ARP Glean)
What if Spine’s COOP DB doesn’t know the destination when proxy’ed?
X L2 Traffic : Drop
✓ L3 Traffic : ARP Glean
5 Encap original packet with special ethertype
3 Spine Proxy
TEP1 7 LEAFsTEP2
check its BD subnets TEP3
2 Hit Pervasive Route
8 LEAF generates ARP Request 8 LEAF ignores Request from Spine
1 Unicast IP
If BD subnet for the
unknown IP doesn’t present
If BD subnet for the unknown
IP presents on LEAF
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Spine Proxy Summary
Forward to Forward to Flood Spine Forward to Forward to Spine Forward to
Proxy Drop
local port remote leaf within BD local port remote leaf Proxy Border Leaf
Hardware
Flood
Proxy
Dst IP is
L3OUT Routes?
*Note, not all traffic will show up on the kpm_inb interface. However, all
traffic shows on the pseudo interface
*Gen1 and 2 Modular spines use psdev0, psdev1, and psdev2 interfaces.
Gen 2 fixed spines use tahoe0. Gen 1 fixed spines use knet0-3
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Egress Leaf
Capturing a Glean with Tcpdump Verification
Gen2 or Later Leaf
tcpdump -xxxvei tahoe0 -w /bootflash/tahoe0.pcap
Decode type should
knet_parser.py --file /bootflash/tahoe0.pcap --pcap --decoder tahoe
be tahoe for tahoe
interface
Frame 111
RX sup traffic
Time: 2019-05-16T16:56:33.059831+00:00
rather than TX
Header: ieth_extn CPU Receive
sup_qnum:0x14, sup_code:0x21, istack:ISTACK_SUP_CODE_SPINE_GLEAN(0x21)
Header: ieth
sup_tx:0, ttl_bypass:0, opcode:0x6, bd:0x120e, outer_bd:0x27, dl:0, span:0, traceroute:0, tclass:0
src_idx:0x3a, src_chip:0x0, src_port:0x19, src_is_tunnel:1, src_is_peer:1
dst_idx:0x0, dst_chip:0x0, dst_port:0x0, dst_is_tunnel:0
Len: 148
Eth: 000d.0d0d.0d0d > 0100.5e7f.fff1, len/ethertype:0x8100(802.1q)
802.1q: vlan:2, cos:5, len/ethertype:0x800(ipv4)
ipv4: 10.0.116.64 > 239.255.255.241, len:130, ttl:249, id:0x0, df:0, mf:0, offset:0x0, dscp:32, prot:17(udp)
udp: (ivxlan) 0 > 48879, len:110
Switch recognizes
ivxlan: n:1, l:1, i:1,
this as a Glean
vnid: 0x2b0000 Traffic that
lb:0, dl:1, exception:0, src_policy:0, dst_policy:0, src_class:0x5c0 triggered Glean
mcast(routed:0, ingress_encap:0/802.1q), ac_bank:0, src_port:0x0
Eth: 000c.0c0c.0c0c > ffff.ffff.ffff, len/ethertype:0xfff2(aci-glean)
ipv4: 172.16.1.1 > 172.16.2.2, len:84, ttl:63, id:0x71f9, df:1, mf:0, offset:0x0, dscp:0, prot:1(icmp)
icmp: echo request id:0x9092, seq:0x1980
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Egress Leaf
Capturing a Glean with Tcpdump Verification
Gen1 Leaf Example
knet0 would show Rx traffic (similar output as Tahoe0)
tcpdump -xxxvei knet0 -w /bootflash/knet0.pcap
knet_parser.py --file /bootflash/knet0.pcap --pcap --decoder knet
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Egress Leaf
Verification
Layer 3 Unicast – Glean Scenario
Verify ARP on Remote Leaf
Endpoint Learn
a-leaf205#show ip arp internal event-history event | grep -F -B 1 172.16.2.2 Installed
73) Event:E_DEBUG_DSF, length:127, at 316928 usecs after Wed May 1 08:31:53 2019
Updating epm ifidx: 1a01e000 vlan: 105 ip: 172.16.2.2, ifMode: 128 mac: 0000.1111.2222 Response
75) Event:E_DEBUG_DSF, length:152, at 316420 usecs after Wed May 1 08:31:53 2019 Received
log_collect_arp_pkt; sip = 172.16.2.2; dip = 172.16.2.254; interface = Vlan104;info = Garp Check adj:(nil) ARP Request is
77) Event:E_DEBUG_DSF, length:142, at 131918 usecs after Wed May 1 08:28:36 2019 generated by leaf
log_collect_arp_pkt; dip = 172.16.2.2; interface = Vlan104;iod = 138; Info = Internal Request Done
78) Event:E_DEBUG_DSF, length:136, at 131757 usecs after Wed May 1 08:28:36 2019
Glean
Glean Received, Dst IP
Group Range
log_collect_arp_glean;dip = 172.16.2.2;interface = Vlan104;info = Received pkt Fabric-Glean: 1
included
is in BD
as Bidir
Subneton IPN
79) Event:E_DEBUG_DSF, length:174, at 131748 usecs after Wed May 1 08:28:36 2019
log_collect_arp_glean; dip = 172.16.2.2; interface = Vlan104; vrf = CiscoLive2020:vrf1; info = Address in PSVI subnet or special VIP
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
How ACI
Builds
Forwarding
Tables
Building Adjacency Tables
ACI combines ARP and MAC Tables into the Endpoint Table
• ARP/ND tables map Layer 3 to Layer 2 • Endpoint table contains endpoints, which
are Layer 2 addresses OR Layer 3
• ARP/ND tables are updated by control- addresses OR a combination of Layer 2
plane messages and Layer 3 addresses
• MAC Address Table used for switching • By default, both Layer 2 and Layer 3
decisions information is updated by dataplane
• Mac Address Table updated by • Used for security and forwarding policy
dataplane
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Endpoints can be
programmed via software
Building Endpoint Tables process or by hardware
dataplane learns (HAL)
Resource Table Info Commands to Verify
show system internal epm endpoint mac <addr>
EPM – Endpoint Manager
Supervisor show system internal epm endpoint ip <addr>
Sup process for managing
endpoints.
EPMC – Endpoint Manager Client vsh_lc –c “show system internal epmc endpoint mac <addr>”
Line Card Line card process that sits vsh_lc –c “show system internal epmc endpoint ip <addr>”
between hardware layer (HAL)
and EPM
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
What about ARP?
ARP Tables are still
used in ACI for… Resource Table Info Commands to Verify
show ip arp vrf <name>
Adjacency Manager.
• L3outs Supervisor Programmed by ARP
process.
• Overlay adjacencies
• VXLAN Endpoints (AVE, K8s,
vsh_lc –c “show forwarding
Openstack, etc) adjacency <ip>”
Line Card UFIB
• APIC / Fabric node
adjacencies
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Building Routing Tables
Resource Table Info Commands to Verify
show ip route x.x.x.x/y vrf <name>
URIB / MRIB – the unicast and
Supervisor show ip mroute x.x.x.x/y vrf <name>
multicast routing tables.
Programmed by route protocol
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Check Endpoint Table
Troubleshooting TIP before Routing Table
If not then…
2) Check if there is a BD (pervasive) static route
If not then… show ip route x.x.x.x/y vrf <name>
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Programming Contracts
Resource Table Info Commands to Verify
show zoning-rules
Policy Manager.
Supervisor Programmed by leaf policy-
element process
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Applicable to EX and
HAL – Hardware Abstraction Layer Later Hardware
HAL
Overflow
TRIE DLEFT TCAM Policy TCAM
ASIC
TCAM
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Applicable to EX and
HAL – Hardware Abstraction Layer Later Hardware
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
HAL – Hardware Abstraction Layer
L2 Lookup of Hardware Tables Applicable to EX and
Later Hardware
module-1# show platform internal hal ep l2 all
=============================================================
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Understanding
the
Configuration
Options
VRF Level Forwarding Options
Feature What Does it Do?
Policy Control Enforcement If disabled, policy is never applied between EPGs. If enabled,
Preference contracts are enforced.
If Disabled, ACI uses legacy behavior for learning endpoints.
IP Dataplane Learning Layer 3 endpoints are learned by ARP/GARP/ND and Layer 2
endpoints are learned by dataplane.
If set to Ingress, contract enforcement for l3out flows is done
Policy Control Enforcement
on service leaf. Egress enables enforcement on Border Leaf
Direction
(requires remote learning to be enabled)
Egress leaf does not set policy applied bits Egress leaf sets policy applied bits
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Bridge-Domain Level Forwarding Options
Feature What Does it Do?
For non-link-local L3 multicast traffic in a PIM-disabled
L3 Unknown Multicast
BD, should a leaf with no snooping entries flood in BD
Flooding
(flood) or wait for joins (OMF)?
For L2 mcast and broadcast, flood, drop, or flood within
Multidestination Flooding epg encap? If flooding with EPG encap, proxy-arp is
required for cross-epg L2 communication
If destination mac is unicast and unknown, flood or proxy
L2 Unknown Unicast
to spines?
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Bridge-Domain Level Forwarding Options
Feature What Does it Do?
Limit IP Learning to Only learn IP’s if they are within the configured BD
Subnet subnet for local learns.
Enable IP learning as well as routing (if a BD
Unicast Routing
subnet is configured)
Disable IP Dataplane Only for PBR! Only local MAC’s are learned via
Learning DP. IP’s and remote macs learned via ARP.
When disabled, ARP is unicast routed based on
ARP Flooding
the Target IP (if known)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
EPG Level Forwarding Options
Feature What Does it Do?
Feature is enabled for just the EPG (rather than all
Flood in Encapsulation epg’s in the BD). Requires proxy arp for L2 traffic
between encaps.
Designed for Direct Server Return flows. This
L4-L7 Virtual IP’s disables dataplane learning per IP. IP is learned
by ARP/ND.
Disable DP Learning Disables dataplane learning for non DSR
Per-IP/Prefix scenarios. More specific than VRF-level option
New in 5.2
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Global Forwarding Options
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
The Anatomy
of an ACI
Switch
※ LST: Local Station Table, GST: Global Station Table
GST GST
Cisco ASIC
ingress egress
Cloud Scale FP
LST LST CPU Tiles
ASIC
ingress egress
CPU Broadcom
Local EP Dest EP
Learn Lookup
Cloud Cloud
Cisco Cisco TEP Information TEP Information
Scale Scale
ASIC ASIC
ASIC ASIC
Evaluate any
matching ACL entries
ACL Engine
(ACA – ACC)
Build the final frame Apply QoS and Calaculate Load-
(egress qtag, etc) Buffering Policies Balance Hashing
Revaluate LU Result
based on ACL hits
Rewrite Block Buffering and
Phys Load Balancing Lookup
(RWX) Queueing Engine
Port (LBX) Block (LUD)
(BMX / QSX / BAX)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
※ number of ASIC per card depends on model
Fabric Module
Fabric Module
Fabric Module
sp# vsh -c "slot 26 show plat internal hal l3 routes”
ASIC 0
ASIC 0
ASIC 0
ASIC 0
40.0.99.139/ 32
3.124.199.13/ 32
0.156.151.177/ 32
ACI Line Card sp# vsh -c "slot 2 show plat internal hal l3 routes”
<no output>
ASIC 0 ASIC 1 ASIC 2 ASIC 3
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Inside an ACI Modular Spine
How is traffic forwarded?
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Inside an ACI Modular Spine
How is traffic forwarded?
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Inside an ACI Modular Spine
sp# vsh -c "slot 26 show forwarding route platform" | grep -A 10
Fabric Module
Fabric Module
Fabric Module
Fabric Module
"15.180.164.253"
!
Table: (IN-HW) Type=100 Vrf=750 Synth=0
!
ASIC 0
ASIC 0
ASIC 0
ASIC 0
FC Cards/ASICs : FC22/ASIC-0 FC26/ASIC-0
Fabric Module
Fabric Module
Fabric Module
vnTag is derived from route lookup,
FM forwards to egress LC which
forward only based on vnTag
4
ASIC 0
ASIC 0
ASIC 0
ASIC 0
Fabric Module does route lookup
based on Synthetic IP and VRF
3
Internal PC’s (2
ports per) Traffic Hashes across either FM 22
or 26 uplinks
2
ACI Line Card
ASIC 0 ASIC 1 ASIC 2 ASIC 3
Egress LC knows exactly which front-panel port to
Ports A-B Ports C-D Ports E-F Ports G-H forward out of based on the received vntag
5
DIPO is IPv4 Proxy TEP
Ingress Traffic: DIPI is 10.0.0.10
VRF Vnid is 111111 BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Understanding
the Tools
Start with High-level Tools
Use Endpoint Tracker for Building a Topology
EP Locally Learned on
pod 2, nodes 401-402
No EP Learn, is this an
L3out?
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Start with High-level Tools
Use Atomic Counters to Check for Overlay Drops and Latency (PTP)
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Start with High-level Tools
Use Atomic Counters to Check for Overlay Drops and Latency (PTP)
104 Microseconds of
delay in overlay No overlay drops!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Start with High-level Tools
Use Tenant Visibility tools to check for Contract Drops
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Start with High-level Tools
Port Counters are as Useful as Ever
leaf1# show interface eth1/8
Ethernet1/8 is up
Frames received
with bad FCS Indicates a previously
admin state is up, Dedicated Interface
Last link flapped 03:07:41 stomped frame was received
RX
3527922 unicast packets !ommitted What is a Stomp?
4041582 input packets 609518993 bytes • When a frame is received
12 jumbo packets 0 storm suppression bytes with a bad FCS and/or is
0 runts 0 giants 0 CRC 0 Stomped CRC 0 no buffer
malformed
0 input error 0 short frame 0 overrun !ommitted
0 watchdog 0 bad etype drop 0 bad proto drop !ommitted AND
0 input with dribble 0 input discard • The frame is cut-through
0 input buffer drop 0 input total drop Frame transmitted switched
TX with stomped CRC
32262479565 unicast packets !ommitted The switch will invert the
32395063346 output packets 49034781261665 bytes
Buffer drops, sign new CRC to tell the first
32249687943 jumbo packets
of congestion
0 output error 0 collision 0 deferred 0 late collision store-and-forward device to
0 lost carrier 0 no carrier 0 babble 0 output discard drop it
0 output buffer drops 0 output total drops
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Start with High-level Tools
Using moquery to check port counters fabric-wide
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
ELAM – Embedded
Logic Analyzer Module
Dst – TCP 10.0.0.1:3000
asic decisions
module-1(DBG-elam-insel6)# stat
Matching frame was
ELAM STATUS
caught!
===========
Frame was not Asic 0 Slice 0 Status Armed
Asic 0 Slice 1 Status Triggered
dropped in lookups!
module-1(DBG-elam-insel6)# ereport | grep "drop reason"
RW drop reason : no drop
LU drop reason : no drop
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
What ASIC should be vsh_lc
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Steps to Using Elam on Gen2+ Leaf or Fixed Spine
Elams are run from Refer to “What ASIC should
Leafs and fixed spines are single
the line card shell be set in the ELAM” slide
asic switches. Always use asic 0
vsh_lc
debug platform internal tah elam asic 0
trigger reset
trigger init in-select 6 out-select 0
Failing to reset the trigger
can cause past elam set outer ipv4 dst_ip 10.0.0.1
Use 0 or 1
configurations to take effect. set outer l4 dst-port 3001
Always reset the trigger!
start
module-1(DBG-elam)# trigger init in-select ?
!ommitted
14 Outer(l2(vntag)|l3|l4)-inner(l2|l3|l4)-ieth
6 Outerl2-outerl3-outerl4
7 Innerl2-innerl3-innerl4 Determines which headers conditions
!ommitted can be matched in. Use 14 or 7 when
matching vxlan encapsulated headers.
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Steps to Using Elam on Gen2+ Leaf or Fixed Spine
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
ereport available since 4.2
Reading an Elam
At a high-level…
module-1(DBG-elam-insel6)# ereport
!ommitted
----------------------------------------------------------------- • ereport provides a simple,
Outer L3 Header
----------------------------------------------------------------- human-readable report output
L3 Type : IPv4
IP Version : 4 • ereport requires >= 5.2 code
DSCP : 0 for modular spines
IP Packet Length : 84 ( = IP header(28 bytes) + IP payload )
Don't Fragment Bit : set • Groups data into outer/inner,
TTL : 64
IP Protocol Number : ICMP
headers, and lookup results
Destination IP : 192.168.200.11
Source IP : 192.168.100.10
!omitted
Contract Result
Contract Drop : no
Contract Logging : no
Contract Applied : yes
Contract Hit : yes
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
ereport available since 4.2
Reading an Elam
At a low-level…
report detail | grep –F "---------" | grep -v VECTOR | grep -v end • An elam report provides a
LU BEGIN ------------------------------
LUA ------------------------------ walkthrough of each ASIC
LUB ------------------------------ block
LUC ------------------------------
LUD ------------------------------ • Each decision in each block is
LU END ------------------------------ recorded
*** FP latch results ------------------------------
*** LBX latch results ------------------------------
• Refer to “Inside an ACI Switch
*** ACX latch results ------------------------------
RW BEGIN ------------------------------ ASIC” from part 1 for more
RW END ------------------------------ details
• All output is in HEX
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
What if Elam Shows a Drop? ereport available since 4.2
ereport
Lookup Drop
--------------------------------------
LU drop reason : SECURITY_GROUP_DENY
Common Drop Reasons
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Steps to Using Elam on Gen2+ Modular Spine
Challenges of Modular Spines
• Line cards (and potentially FM’s) have multiple asics
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Steps to Using Elam on Gen2+ Modular Spine Ingress LC
Determine the Asic, Slice, and Srcid of the ingress port
FM23
FM26
FM22
FM24
ASIC 0
ASIC 0
ASIC 0
ASIC 0
1
sp# vsh
sp# attach mod 2
module-2# show plat internal hal l2 port gpd
======================================================
Uc Uc
I PC Pc
ACI Line Card (slot 2) IfId Ifname P Cfg MbrID As AP Sl Sp Ss Ovec
======================================================
!ommitted
ASIC 0 ASIC 1 ASIC 2 ASIC 3 1a09f000 Eth2/32 0 b9 38 3 31 1 8 10 90
eth2/32
Eth2/32 is on Asic 3,
Inner Headers - Slice 1, with srcid 0x10.
Ingress Src – 10.10.10.10 Use for Elam!
Traffic: Dst – 10.10.11.11
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Steps to Using Elam on Gen2+ Modular Spine Ingress LC
FM26
FM22
FM24
ASIC 0
ASIC 0
ASIC 0
ASIC 0
2
sp# vsh
sp# attach mod 2
debug plat internal tah elam asic 3 slice 1
trigger reset
trigger init in-select 14 out-select 1
set srcid 0x10
set inner ipv4 src_ip 10.10.10.10 dst_ip 10.10.11.11
ACI Line Card (slot 2) start
Source ID value of
ASIC 0 ASIC 1 ASIC 2 ASIC 3 eth1/32 (see last slide)
eth2/32
3
module-2(DBG-elam-insel14)# stat
ELAM STATUS
===========
Inner Headers - Asic 3 Slice 1 Status Triggered
Ingress Src – 10.10.10.10
Traffic: Dst – 10.10.11.11 Packet was matched!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Steps to Using Elam on Gen2+ Modular Spine Ingress LC
FM23
FM26
FM22
FM24
5
ASIC 0
ASIC 0
ASIC 0
ASIC 0
module-2# show plat internal hal l2 internal-port pi
=============================================
IfId IfName As Ovec
=============================================
96 lc(0)-fc(0):22:pc2:p1 0 b8
98 lc(1)-fc(0):22:pc2:p1 1 b8
9a lc(2)-fc(0):22:pc2:p1 2 b8
9c lc(3)-fc(0):22:pc2:p1 3 b8
ACI Line Card (slot 2)
Packet forwarded to FM
ASIC 0 ASIC 1 ASIC 2 ASIC 3 23! (output is zero-based)
Ovector indicates the
eth2/32 egress port to FM
4 report | egrep "drop\_vec|ovec|asic"
Dumping report for asic inst 3 slice 1 insel 14 outsel 1
*_sidebnd_no_spare_vec.ovector_idx: 0xB8
Inner Headers - *_vec.pbx_header_sidebnd_drop_vec.lux_drop_vec: 0x0000000
Ingress Src – 10.10.10.10
Traffic: Dst – 10.10.11.11 Packet wasn’t dropped in lookups!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Steps to Using Elam on Gen2+ Modular Spine Fabric Mod
FM26
FM22
FM24
ASIC 0
ASIC 0
ASIC 0
ASIC 0
6
sp# vsh
sp# attach mod 23
debug plat internal tah elam asic 0
trigger reset
trigger init in-select 14 out-select 1
set inner ipv4 src_ip 10.10.10.10 dst_ip 10.10.11.11
start
ACI Line Card (slot 2)
7
ASIC 0 ASIC 1 ASIC 2 ASIC 3 module-23(DBG-elam-insel14)#
stat
eth2/32 ELAM STATUS
===========
Asic 0 Slice 0 Status Armed
Asic 0 Slice 1 Status Triggered Packet was matched!
Inner Headers - Asic 0 Slice 2 Status Armed
Ingress Src – 10.10.10.10 Asic 0 Slice 3 Status Armed
Traffic: Dst – 10.10.11.11 Asic 0 Slice 4 Status Armed
Asic 0 Slice 5 Status Armed
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Steps to Using Elam on Gen2+ Modular Spine Fabric Mod
FM23
FM26
FM22
FM24
ASIC 0
ASIC 0
ASIC 0
ASIC 0
module-23# show plat internal hal l2 port gpd
9 ========================================
IfId Ifname As Ovec
============================
f5 fc0-lc1:3-1 0 58
Packet forwarded to LC 2
(zero based – Asic 3, Slice 1)
ACI Line Card (slot 2)
ASIC 0 ASIC 1 ASIC 2 ASIC 3
Ovector indicates the
eth2/32 egress port to LC
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Steps to Using Elam on Gen2+ Modular Spine Egress LC
FM26
FM22
FM24
ASIC 0
ASIC 0
ASIC 0
ASIC 0
10
sp# vsh
sp# attach mod 2
debug plat internal tah elam asic 3 slice 1
trigger reset
trigger init in-select 14 out-select 1
set outer l2 vntag_vld 1
set inner ipv4 src_ip 10.10.10.10 dst_ip 10.10.11.11
ACI Line Card (slot 2) start
Vntag present only
ASIC 0 ASIC 1 ASIC 2 ASIC 3 coming from FM
eth2/27
11
module-2(DBG-elam-insel14)# stat
ELAM STATUS
===========
Inner Headers - Asic 3 Slice 1 Status Triggered
Egress Traffic: Src – 10.10.10.10
Dst – 10.10.11.11 Packet was matched!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Steps to Using Elam on Gen2+ Modular Spine Egress LC
13
FM23
FM26
FM22
FM24
module-2# show plat internal hal l2 port gpd
ASIC 0
ASIC 0
ASIC 0
=======================================
ASIC
IfId Ifname As AP Sl Sp Ss Ovec
0
=======================================
1a08a000 Eth2/11 1 5 0 4 8 8
1a09a000 Eth2/27 3 5 0 4 8 8
Spine forwards out
front-panel Eth2/27!
ACI Line Card (slot 2)
ASIC 0 ASIC 1 ASIC 2 ASIC 3
Ovector indicates the
eth2/27 egress port to Leaf
12 report | egrep "drop\_vec|ovec|asic"
Dumping report for asic inst 3 slice 1 insel 14 outsel 1
*_sidebnd_no_spare_vec.ovector_idx: 0x8
Inner Headers - *_vec.pbx_header_sidebnd_drop_vec.lux_drop_vec: 0x00000000
Egress Traffic: Src – 10.10.10.10
Dst – 10.10.11.11 Packet wasn’t dropped in lookups!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Automating Modular Spine ELAMs
CLI-based Modular Spine Elam tool available at – EasySpineElam
Easily Set Conditions on
All or Some Modules
spine1#./easy-spine-elam.sh -m all -d ingress
Final module list is:
2 23 26 3
2022-06-08T14:55:57 In-select - 14 and out-select - 0 are being used.
!ommitted
70. inner ipv4 destination ip > Format : d.d.d.d
71. inner ipv4 protocol > Format : 0-255
73. inner ipv4 source ip > Format : d.d.d.d
91. inner l4 dest port > Format : 0-65535
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Automating Modular Spine ELAMs
CLI-based Modular Spine Elam tool available at – EasySpineElam
2022-06-08T14:56:28 Checking elam status for module 2 Generate and view ereport
2022-06-08T14:56:28 Checking elam status for module 23
2022-06-08T14:56:28 Checking elam status for module 26 from all Triggered Modules!
2022-06-08T14:56:28 Checking elam status for module 3
Type "status" to check elam status again. Type "ereport", "report" or "report detail"
to collect all reports: ereport
2022-06-08T14:57:36 Collecting report for module 26 asic 0...
2022-06-08T14:57:36 Collecting report for module 2 asic 3... Locally view or copy
2022-06-08T14:57:46 Converting reports to ereport format! off the final ereports
The following decoded elams are available -
/data/techsupport/mod26-asic0-elamreport-2022-06-08T14-57-36-EREPORT
/data/techsupport/mod2-asic3-elamreport-2022-06-08T14-57-36-EREPORT
2022-06-08T14:57:49 FINISHED!
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Shouldn’t ELAM be More Simple?
Elam Assistant in DCAppCenter
https://dcappcenter.cisco.com
ELAM (Embedded Logic Analyzer Module)
• Perform an ASIC level packet capture
ELAM Assistant
• You can perform ELAM like a TAC
engineer!
• With a nicely formatted result report
Detail Explanations:
• https://dcappcenter.cisco.com/elam-assistant.html
• How to use video, pictures
➢ A download link for ELAM Assistant
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
ELAM Assistant in ACI AppCenter (example)
1. Perform an Elam
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
ELAM Assistant in ACI AppCenter (example)
2. Read a Report
Click to see
report
Report shows
up here
Scroll Down
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
FTRIAGE – Automating Elams
Orchestrate End-to-End
ELAMs from the APIC!
apic1# ftriage route -ii LEAF:101,102 -dip 10.99.99.100 -sip 192.168.100.10
20:19:54 INFO main:1295 L3 packet Seen on leaf102 Ingress: Eth1/34 (Po5) Egress: Eth1/54 Vnid: 2523136
20:19:55 INFO main:1364 leaf102: Packet's egress outer [SIP:10.0.176.67, DIP:10.0.64.70]
20:19:55 INFO main:1371 leaf102: Outgoing packet's Vnid: 2523136
20:19:56 INFO main:353 Computed ingress encap string vlan-3501
20:20:03 INFO main:464 Ingress BD(s) CL2022:bd1
20:20:03 INFO main:476 Ingress Ctx: CL2022:vrf1 Vnid: 2523136
!
20:21:46 INFO main:1295 L3 packet Seen on spine1005 Ingress: Eth1/1 Egress: Eth1/3 Vnid: 2523136
20:22:38 INFO fib:737 spine1005: Transit in spine
20:23:32 INFO main:1295 L3 packet Seen on leaf103 Ingress: Eth1/29 Egress: Eth1/27/4 Vnid: NULL
!
20:24:02 INFO fib:219 leaf103: L3 out interface Ethernet1/27/4
20:24:10 INFO main:781 Computed egress encap string vlan-1055
20:24:17 INFO main:1796 Packet is Exiting fabric with peer-device: N3K-1 and peer-port: Ethernet1/31
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
SPAN / ERSPAN
Don’t neglect old friends!
• Both local span and erspan supported
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Other Tools Requiring External Resources
Netflow
• Captures flow information based on specified criteria
Flow Telemetry
• Hardware directly streams flow data to Nexus Dashboard Insights
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Debugging ACI
BUM Flows
Bridge Domain Settings:
ARP – Ingress Leaf Unicast Routing Disable
ARP Flooding Enabled
Spine Spine
Leaf Floods ARP in BD GIPO on
selected FTAG tree with BD
1 vnid set Check GIPO Route
show ip mroute 225.0.2.128 vrf overlay-1
IP Multicast Routing Table for VRF "overlay-1"
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
ARP – How to Find the GiPo
From the GUI…
From the APIC CLI…
moquery -c fvBD -f 'fv.BD.dn*"tn-CL2022/BD-bd1"'
# fv.BD
arpFlood : yes
bcastP : 225.0.2.128
dn : uni/tn-CL2022/BD-bd1
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Bridge Domain Settings:
ARP – Ingress Leaf Unicast Routing Disable
ARP Flooding Enabled
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Bridge Domain Settings:
ARP – Ingress Leaf Elam Results (ereport) Unicast Routing Disable
ARP Flooding Enabled
Outer L2 Header
------------------------------------ Make sure this matches
Access Encap VLAN : 3502( 0xDAE ) what is expected
Outer L3 Header
------------------------------------
ARP Opcode : Request( 0x1 )
ARP Sender IP : 192.168.100.11
ARP Target IP : 192.168.100.10
Contract Result
------------------------
Contract Drop : no
Contract Applied : no Frame is flooded in the Bridge Domain!
FINAL FORWARDING LOOKUP
------------------------------------------------------------------------------------
Bits set in Final Forwarding Block: : IFABRIC_IG MC TENANT MYTEP BRIDGE MISS FLOOD
Lookup Drop
----------------------------- Not Dropped in lookups!
LU drop reason : no drop
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
ARP – How to Find the FTAG
No other way than Elam…
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Bridge Domain Settings:
ARP - Spine 2
Unicast Routing Disable
Root spine for ftag 8 ARP Flooding Enabled
Root for forwards out OIFs
Ftag 8
This spine is the root!
Spine Spine
spine1005# show isis internal mcast routes ftag
IS-IS process: isis_infra
VRF : default
FTAG Routes
====================================
FTAG ID: 8 [Root] [Enabled] Cost:( 0/ 0/ 0)
----------------------------------
Root port: -
Leaf Leaf Leaf OIF List:
Ethernet1/1.20
Ethernet1/2.21
Ethernet1/3.19
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Bridge Domain Settings:
ARP – Egress Leaf Unicast Routing Disable
ARP Flooding Enabled
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Bridge Domain Settings:
ARP – Egress Leaf Unicast Routing Disable
ARP Flooding Enabled
stat
ELAM STATUS
===========
ARP: Who has Asic 0 Slice 0 Status Triggered
192.168.100.10? Asic 0 Slice 1 Status Armed
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
ARP – Egress Leaf Elam Bridge Domain Settings:
Unicast Routing Disable
Results (ereport) ARP Flooding Enabled
Outer L3 Header
-------------------------------
Destination IP : 225.0.2.136 Destination is GIPO
(225.0.2.128) + FTAG (0x8)
Inner L3 Header
----------------------------------
ARP Sender IP : 192.168.100.11
ARP Target IP : 192.168.100.10
Outer L4 Header
---------------------------------------
VRF or BD VNID : 14811121( 0xE1FFF1 )
Contract Result
----------------------
Contract Drop : no
Frame is flooded in the Bridge Domain!
FINAL FORWARDING LOOKUP
----------------------------------------------------------------------------------------
Bits set in Final Forwarding Block: : IFABRIC_EG MC INFRA ENCAP MYTEP BRIDGE MISS FLOOD
Lookup Drop
Not Dropped in lookups!
---------------------------
LU drop reason : no drop
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public
Bridge Domain Settings:
Unicast Routing Disable
ARP – Egress Leaf Port is VPC ARP Flooding Enabled
• Both VPC members receive a flooded copy
• One VPC member is the Designated Forwarder (DF) for the flow
DF Leaf
module-1(DBG-elam-insel14)# ereport | grep df | grep vpc
sug_lub_latch_results_vec.lub4_1.vpc_df: 0x1
sug_fpx_lookup_vec.lkup.dciptvec.pt.vpc_df: 0x1
sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec.pt.vpc_df: 0x1
sug_fpc_lookup_vec.fplu_vec.lkup.dciptvec.pt.vpc_df: 0x1
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Debugging
ACI Bridged
Flows
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Disable
Unknown Unicast Flood
Lookup dst mac in ingress BD
leaf103# show endpoint mac 0000.cccc.dddd
Spine Spine
+---------------+---------------+-----------------+-------------+
VLAN/ Encap MAC Address Interface
Domain VLAN IP Address
+---------------+---------------+-----------------+-------------+
32/CL2022:vrf1 vxlan-14811121 0000.cccc.dddd tunnel1
1
Leaf looks at the dst mac to
Ping 192.168.100.10 determine if it should route or switch
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Disable
Unknown Unicast Flood
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Disable
Forwarding Verifications Dest mac that is looked up within BD
Unknown Unicast Flood
Outer L2 Header
-------------------------------------
Make sure this is the expected vlan
Destination MAC : 0000.cccc.dddd
Source MAC : 0000.aaaa.bbbb
Access Encap VLAN : 3502( 0xDAE )
Outer L3 Header
------------------------------------- Dest is tunnel
IP Protocol Number : ICMP
Destination IP : 192.168.100.10
Source IP : 192.168.100.11
show plat internal hal tunnel rtep apd
Other Forwarding Information =================================
--------------------------------------- ifId IP RwEncapIdx
Encap Index is valid : yes =================================
Encap Index : 34( 0x22 ) 18010001 10.0.176.67 22
Lookup Drop
-------------------------- Not Dropped in lookups! Unicast + Bridge (L2 lookup) +
LU drop reason : no drop Destination Known
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Disable
Forwarding Verifications Unknown Unicast Flood
=========================================
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Disable
Contract Verification Unknown Unicast Flood
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Disable
Unknown Unicast Flood
4
Policy was applied by ingress
Leaf Leaf Leaf leaf. Don’t apply contracts!
Forward out portchannel
5 in vlan 3501!
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Disable
Unknown Unicast Flood
Spine Spine
Elam
debug plat internal tah elam asic 0
trigger reset
trigger init in-select 14 out-select 0
set inner ipv4 src_ip 192.168.100.11 dst_ip 192.168.100.10
start
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.100.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Disable
Inner L2 Header Unknown Unicast Flood
---------------------------------------
Inner Destination MAC : 0000.cccc.ddddContracts have already been
applied. No need to check.
Inner L3 Header
---------------------------------------
Destination IP : 192.168.100.10 Mac lookup done in bridge
domain with this VNID
Outer L4 Header
---------------------------------------
L4 Type : iVxLAN
Src Policy Applied Bit : 1 show platform internal hal l2 port gpd
Dst Policy Applied Bit : 1
VRF or BD VNID : 14811121( 0xE1FFF1 ) =========================================
IfId Ifname As AP Sl Sp Ss Ovec
Sideband Information =========================================
----------------------------------
ovector : 146( 0x92 )
1a021000 Eth1/34 0 32 1 9 12 92
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Debugging ACI
Routed Flows
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Lookup dst IP in ingress VRF
leaf103# show endpoint ip 192.168.100.10
Spine Spine +---------------+-----------------+-------------+
VLAN/ MAC Address Interface
Domain IP Address
+---------------+-----------------+-------------+
CL2022:vrf1 192.168.100.10 tunnel1
1
Leaf looks at the dst mac to
Ping 192.168.100.10 determine if it should route or switch
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Get Sclass
4 103# show sys internal epm endpoint ip
Leaf forwards packet to remote 192.168.200.11
Spine Spine TEP with VRF VNID set !omitted
BD vnid : 16613259 ::: VRF vnid : 2523136
sclass : 32771
Get Dclass
3 103# show sys internal epm endpoint ip
Leaf does contract
lookup based on src 192.168.100.10
and dst pcTag values !omitted
BD vnid : 0 ::: VRF vnid : 2523136
Leaf Leaf Leaf sclass : 49154
Check Contract
103# show zoning-rule src-epg 32771
dst-epg 49154 scope 2523136
+---------+------------------+--------+
Ping 192.168.100.10 | RuleID | Name | Action |
+---------+------------------+--------+
EP1 EP2 | 4209 | CL2022:allow-all | permit |
192.168.100.10/24 192.168.200.11/24 +---------+------------------+--------+
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications ACI Router Mac. Route this packet!
Outer L2 Header
-------------------------------------
Make sure this is the expected vlan
Destination MAC : 0022.BDF8.19FF
Access Encap VLAN : 3769( 0xEB9 )
Outer L3 Header
------------------------------------- Dest is tunnel
Destination IP : 192.168.100.10
Source IP : 192.168.200.11
show plat internal hal tunnel rtep apd
Other Forwarding Information =================================
--------------------------------------- ifId IP RwEncapIdx
Encap Index is valid : yes =================================
Encap Index : 34( 0x22 )
18010001 10.0.176.67 22
FINAL FORWARDING LOOKUP
------------------------------------------------------------------------ Forward to this overlay TEP
Bits set in Final Forwarding Block: IFABRIC_IG UC TENANT MYTEP ROUTE HIT
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications
=========================================
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Contract Verification
Contract Lookup Key
------------------------------------------------
IP Protocol : ICMP( 0x1 ) Source and Dest EPG used
L4 Src Port : 2048( 0x800 ) for contract lookup
L4 Dst Port : 31219( 0x79F3 )
sclass (src pcTag) : 32771( 0x8003 )
dclass (dst pcTag) : 49154( 0xC002 )
src pcTag is from local table : yes
Unknown Unicast / Flood Packet : no
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Bridge Domain Settings:
Known Unicast – Ingress Leaf Unicast Routing Enabled
Contract Verification
Contract Result
-------------------------------- Hardware Index of
Contract Drop : no matching contract
Contract Applied : yes
Contract Hit : yes
Contract Aclqos Stats Index : 131025
Run this from vsh_lc
show sys int aclqos zoning-rules | grep -B 9 "Idx: 130974"
===========================================
Rule ID: 4163 Scope 8 Src EPG: 32771 Dst EPG: 49154 Filter 532
Zoning-rule ID
Curr TCAM resource:
=============================
=== SDK Info ===
Result/Stats Idx: 130974
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Enabled
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Enabled
Spine Spine
Elam
debug plat internal tah elam asic 0
trigger reset
trigger init in-select 14 out-select 0
set inner ipv4 src_ip 192.168.200.11
set inner ipv4 dst_ip 192.168.100.10
start
stat
Leaf Leaf Leaf ELAM STATUS
===========
Asic 0 Slice 0 Status Triggered
Asic 0 Slice 1 Status Armed
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Bridge Domain Settings:
Known Unicast – Egress Leaf Unicast Routing Enabled
Inner L2 Header
---------------------------------------
Inner Destination MAC : 000C.0C0C.0C0CContracts have already been
applied. No need to check.
Inner L3 Header
---------------------------------------
Destination IP : 192.168.100.10 IP lookup done in VRF with this VNID
Outer L4 Header
---------------------------------------
L4 Type : iVxLAN
Src Policy Applied Bit : 1 show platform internal hal l2 port gpd
Dst Policy Applied Bit : 1 =========================================
VRF or BD VNID : 2523136( 0x268000 )
IfId Ifname As AP Sl Sp Ss Ovec
Sideband Information =========================================
---------------------------------- 1a021000 Eth1/34 0 32 1 9 12 92
ovector : 146( 0x92 )
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
Lookup dst IP in ingress VRF
1a
show endpoint ip 192.168.100.10
Spine Spine +---------------+-----------------+-------------+ No endpoint learn,
VLAN/ MAC Address Interface check route table!
Domain IP Address
+---------------+-----------------+-------------+
<empty> 1b show ip route 192.168.100.10 vrf CL2022:vrf1
192.168.100.0/24, attached, direct, pervasive
*via 10.0.176.66%overlay-1, [1/0], static
recursive next hop: 10.0.176.66/32%overlay-1
Send to
1c show isis dtep vrf overlay-1
spine proxy!
Leaf Leaf Leaf DTEP-Address Role Type
10.0.176.66 SPINE PHYSICAL,PROXY-ACAST-V4
1
Dst mac is router mac so Route!
Ping 192.168.100.10
Lookup dest IP in vrf of source IP.
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
Spine Spine
3
Leaf forwards packet to spine
proxy TEP with VRF VNID set
2
Leaf Leaf Leaf Contract not applied for proxy lookups.
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications ACI Router Mac. Route this packet!
Outer L2 Header
-------------------------------------
Make sure this is the expected vlan
Destination MAC : 0022.BDF8.19FF
Access Encap VLAN : 3769( 0xEB9 )
Outer L3 Header
------------------------------------- Dest is tunnel
Destination IP : 192.168.100.10
Source IP : 192.168.200.11
show plat internal hal tunnel rtep apd
Other Forwarding Information =================================
--------------------------------------- ifId IP RwEncapIdx
Encap Index is valid : yes =================================
Encap Index : 1( 0x1 )
18010007 10.0.176.66 1
FINAL FORWARDING LOOKUP
------------------------------------------------------------------------ Forward to this overlay TEP
Bits set in Final Forwarding Block: IFABRIC_IG UC TENANT MYTEP ROUTE HIT
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications
=========================================
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Bridge Domain Settings:
Proxied Unicast – Ingress Leaf Unicast Routing Enabled
Contract Verification
Contract Lookup Key
------------------------------------------------
IP Protocol : ICMP( 0x1 ) Dest EPG is 1 for fabric
L4 Src Port : 2048( 0x800 ) owned subnets
L4 Dst Port : 31219( 0x79F3 )
sclass (src pcTag) : 32771( 0x8003 )
dclass (dst pcTag) : 1( 0x1 )
src pcTag is from local table : yes
Unknown Unicast / Flood Packet : no
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Bridge Domain Settings:
Proxied Unicast – Spine Unicast Routing Enabled
4 Since this is proxied, Spine does
COOP lookup. Since VRF vnid is set,
Spine looks up IP rather than mac
Spine Spine spine# show coop internal info ip-db | grep -B 1 -A 15 192.168.100.10
------------------------------
IP address : 192.168.100.10
Vrf : 2523136
Num tunnels : 1
Tunnel address : 10.0.176.67
Tunnel ref count : 1
Dest TEP of Leaf(s) that
Leaf Leaf Leaf own this Endpoint
apic1# moquery -c ipv4Addr -f 'ipv4.Addr.addr=="10.0.176.67"'
*node-101/*dom-overlay-1/if-[lo1]/addr-[10.0.176.67/32]
*node-102/*dom-overlay-1/if-[lo1]/addr-[10.0.176.67/32]
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Bridge Domain Settings:
Proxied Unicast – Egress Leaf Unicast Routing Enabled
6
Policy was NOT applied by
Leaf Leaf Leaf ingress leaf. Apply contracts!
Forward out portchannel
5 in vlan 3501!
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
Bridge Domain Settings:
Proxied Unicast – Egress Leaf Unicast Routing Enabled
Spine Spine
Elam
debug plat internal tah elam asic 0
trigger reset
trigger init in-select 14 out-select 0
set inner ipv4 src_ip 192.168.200.11
set inner ipv4 dst_ip 192.168.100.10
start
stat
Leaf Leaf Leaf ELAM STATUS
===========
Asic 0 Slice 0 Status Triggered
Asic 0 Slice 1 Status Armed
Ping 192.168.100.10
EP1 EP2
192.168.100.10/24 192.168.200.11/24
0000.cccc.dddd 0000.aaaa.bbbb
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Bridge Domain Settings:
Proxied Unicast – Egress Leaf Unicast Routing Enabled
Forwarding Verifications
Inner L3 Header Contracts have not been applied yet!
---------------------------------------
Destination IP : 192.168.100.10
IP lookup done in VRF with this VNID
Outer L4 Header
---------------------------------------
L4 Type : iVxLAN
Src Policy Applied Bit : 0 show platform internal hal l2 port gpd
Dst Policy Applied Bit : 0 =========================================
VRF or BD VNID : 2523136( 0x268000 ) IfId Ifname As AP Sl Sp Ss Ovec
=========================================
Sideband Information
1a021000 Eth1/34 0 32 1 9 12 92
----------------------------------
ovector : 146( 0x92 )
Forward out Eth1/34!
FINAL FORWARDING LOOKUP
-------------------------------------------------------------------------
Bits set in Final Forwarding Block: IFABRIC_EG UC INFRA ENCAP MYTEP ROUTE HIT
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Bridge Domain Settings:
Proxied Unicast – Egress Leaf Unicast Routing Enabled
Contract Verification
Contract Lookup Key
------------------------------------------------
IP Protocol : ICMP( 0x1 )
L4 Src Port : 2048( 0x800 ) Source and Dest EPG used
L4 Dst Port : 33226( 0x81CA ) for contract lookup.
sclass (src pcTag) : 32771( 0x8003 )
dclass (dst pcTag) : 49154( 0xC002 )
src pcTag is from local table : no
Unknown Unicast / Flood Packet : no
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Bridge Domain Settings:
Proxied Unicast – Egress Leaf Unicast Routing Enabled
Contract Verification
Contract Result
-------------------------------- Hardware Index of
Contract Drop : no matching contract
Contract Applied : yes
Contract Hit : yes
Contract Aclqos Stats Index : 81836
Run this from vsh_lc
show sys int aclqos zoning-rules | grep -B 9 "Idx: 81836"
===========================================
Rule ID: 4234 Scope 16 Src EPG: 32771 Dst EPG: 49154 Filter
Zoning-rule ID
532
=============================
=== SDK Info ===
Result/Stats Idx: 81836
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Lookup dst IP in ingress VRF
2a
show endpoint ip 10.99.99.100
Spine Spine +---------------+-----------------+-------------+ No endpoint learn,
VLAN/ MAC Address Interface check route table!
Domain IP Address
+---------------+-----------------+-------------+
<empty> show ip route 10.99.99.100 vrf CL2022:vrf1
2
Since dst mac is the router (GW) mac, 10.99.99.0/24, ubest/mbest: 1/0
2b *via 10.0.64.70%overlay-1, [200/20], bgp-65100
leaf does IP lookup in VRF of source IP
recursive next hop: 10.0.64.70/32%overlay-1
Send to BL
acidiag fnvread | grep 10.0.64.70 PTEP!
Leaf Leaf Leaf Name IP Address Role
2c -----------------------------
leaf103 10.0.64.70/32 leaf
1
Leaf looks at the dst mac to
Ping determine if it should route or switch
10.99.99.100
EP1
External IP
192.168.100.10/24
10.99.99.100
0000.cccc.dddd
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Spine Spine
3
Leaf derives dest pcTag for contract
lookup based on l3out policy prefix 4 Leaf forwards packet to
remote TEP with VRF VNID set
EP1
External IP
192.168.100.10/24
10.99.99.100
0000.cccc.dddd
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
ELAM
Spine Spine vsh_lc
debug plat internal tah elam asic 0
trigger reset
trigger init in-select 6 out-select 0
set outer ipv4 src_ip 192.168.100.10
set outer ipv4 dst_ip 10.99.99.100
start
stat
ELAM STATUS
Leaf Leaf Leaf ===========
Asic 0 Slice 0 Status Triggered
Asic 0 Slice 1 Status Armed
Ping
10.99.99.100
EP1
External IP
192.168.100.10/24
10.99.99.100
0000.cccc.dddd
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications ACI Router Mac. Route this packet!
Outer L2 Header
-------------------------------------
Make sure this is the expected vlan
Destination MAC : 0022.BDF8.19FF
Access Encap VLAN : 3501( 0xDAD )
Outer L3 Header
------------------------------------- Dest is tunnel
Destination IP : 10.99.99.100
Source IP : 192.168.100.10
show plat internal hal tunnel rtep apd
Other Forwarding Information =================================
--------------------------------------- ifId IP RwEncapIdx
Encap Index is valid : yes =================================
Encap Index : 37( 0x25 )
18010004 10.0.64.70 25
FINAL FORWARDING LOOKUP
------------------------------------------------------------------------ Forward to this overlay TEP
Bits set in Final Forwarding Block: IFABRIC_IG UC TENANT MYTEP ROUTE HIT
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Forwarding Verifications
=========================================
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Contract Verification
Contract Lookup Key
------------------------------------------------
IP Protocol : ICMP( 0x1 ) Source and Dest EPG used
L4 Src Port : 2048( 0x800 ) for contract lookup
L4 Dst Port : 12063( 0x2F1F )
sclass (src pcTag) : 49154( 0xC002 )
dclass (dst pcTag) : 32772( 0x8004 )
src pcTag is from local table : yes
Unknown Unicast / Flood Packet : no
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Bridge Domain Settings:
L3Out Destination – Ingress Leaf Unicast Routing Enabled
Contract Verification
Contract Result
-------------------------------- Hardware Index of
Contract Drop : no matching contract
Contract Applied : yes
Contract Hit : yes
Contract Aclqos Stats Index : 81765
Run this from vsh_lc
show sys int aclqos zoning-rules | grep -B 9 "Idx: 81765"
===========================================
Rule ID: 4248 Scope 16 Src EPG: 0 Dst EPG: 32772 Filter 532
Zoning-rule ID
Curr TCAM resource:
=============================
=== SDK Info ===
Result/Stats Idx: 81765
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Bridge Domain Settings:
L3Out Destination – Egress Leaf Unicast Routing Enabled
Lookup dst IP in received VRF
5a
show endpoint ip 10.99.99.100
Spine Spine +---------------+-----------------+-------------+ No endpoint learn,
VLAN/ MAC Address Interface check route table!
Domain IP Address
+---------------+-----------------+-------------+
<empty> show ip route 10.99.99.100 vrf CL2022:vrf1
5
Since received VNID is the VRF VNID, 5b 10.99.99.0/24, ubest/mbest: 1/0
forward based on dest endpoint IP *via 10.55.0.100, vlan25, [110/20], ospf, type-2
show ip arp 10.55.0.100 vrf CL2022:vrf1
5c Address MAC Address Interface
Leaf Leaf Leaf 10.55.0.100 0005.73ff.593c vlan25
show mac address addr 0005.73ff.593c vl 25
5d VLAN MAC Address Ports
---------+----------------+----------
Ping * 25 0005.73ff.593c eth1/27/4
10.99.99.100
Forward based on ARP
EP1 6 and MAC Adajcencies
External IP Policy was applied by ingress
192.168.100.10/24
10.99.99.100 leaf. No need to apply contracts
0000.cccc.dddd
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Bridge Domain Settings:
L3Out Destination – Egress Leaf Unicast Routing Enabled
Spine Spine
Elam
debug plat internal app elam asic 0
trigger reset
trigger init in-select 14 out-select 0
set inner ipv4 src_ip 192.168.100.10
set inner ipv4 dst_ip 10.99.99.100
start
stat
Leaf Leaf Leaf ELAM STATUS
===========
Asic 0 Slice 0 Status Triggered
Asic 0 Slice 1 Status Armed
Ping
10.99.99.100
EP1
External IP
192.168.100.10/24
10.99.99.100
0000.cccc.dddd
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Bridge Domain Settings:
L3Out Destination – Egress Leaf Unicast Routing Enabled
Inner L2 Header
---------------------------------------
Inner Destination MAC : 000C.0C0C.0C0C
Contracts have already been
Inner L3 Header applied. No need to check.
---------------------------------------
Destination IP : 10.99.99.100
IP lookup done in VRF with this VNID
Outer L4 Header
---------------------------------------
L4 Type : iVxLAN
Src Policy Applied Bit : 1 show platform internal hal l2 port gpd
Dst Policy Applied Bit : 1
=========================================
VRF or BD VNID : 2523136( 0x268000 )
IfId Ifname As AP Sl Sp Ss Ovec
Sideband Information =========================================
---------------------------------- 4301a000 Eth1/27/4 0 54 2 13 13 93
ovector : 147( 0x93 )
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Bridge Domain Settings:
L3Out Source – Ingress Border Leaf Unicast Routing Enabled
Spine Spine
2b
If dest IP is not learned endpoint and
subnet is BD subnet, proxy!
ICMP Reply
EP1
192.168.100.10/24
External IP Refer back to the Routed Known Unicast
10.99.99.100
0000.cccc.dddd and Proxied Unicast for more verifications
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
Complete your Session Survey
• Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (open from Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events Mobile App or
by logging in to the Session Catalog and clicking the
"Attendee Dashboard” at
https://www.ciscolive.com/emea/learn/sessions/session-
catalog.html
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Continue Your Education
BRKDCN-3900 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Thank you
Early Access.
Yes, please.