Re: [c-nsp] Understanding ASR1k / ESP40 capacity

2014-12-18 Thread Ruslan Pustovoytov

Think not only throughput but about pps also.
According to cisco doc ESP40 has ~20Mpps capacity, ESP20 has the same 
limitation.

So, you pick out all resources from QFP.
RA write the report where you can see this limitation - 
http://www.slideshare.net/RouterAnalysis/cisco-asr-1000-series-testing-results-and-analysis



04.10.2014 18:56, Pete Lumbis пишет:

All,

I'm banging my head against a brick wall trying to get sensible answers
from
Cisco TAC, so thought I'd ask the educated masses who may have come across
this before...

I've got a Cisco ASR1004 with RP2, ESP40, 2 * SIP40's, and 8 * 10GE ports.

A snapshot of usage on these ports at peak is:

Interface RxBps RxPps  TxBps TxPps
Te0/0/0   4,385,563,000   515,508906,118,000   339,997
Te0/1/0   3,942,338,000   419,696984,150,000   358,436
Te0/2/0   3,949,993,000   425,192933,257,000   349,145
Te0/3/0   4,375,526,000   512,858873,284,000   334,751
Te1/0/0   1,186,440,000   454,714  5,474,029,000   630,916
Te1/1/0 622,154,000   244,056  3,181,689,000   338,190
Te1/2/0 711,493,000   253,275  3,211,560,000   340,950
Te1/3/0   1,218,873,000   437,195  4,831,708,000   568,488

TOTAL20,392,380,000 3,262,494 20,395,795,000 3,260,873

I'm seeing throughput issues on a portchannel consisting of Te0/0/0 and
Te0/3/0
(it won't go over 10Gbps aggregate)

Cisco TAC are telling me if I add TxBps and RxBps totals together, I get
40Gbps,
so I've reached capacity of the QFP (i.e. ESP40).

My arguement against this is that a packet which enters the router on
Te0/0/0,
goes through the SIP40 in slot 0, through the ESP40, through the SIP40 in
slot
1, and out through Te1/0/0 is still just one packet, so should only need
to be
counted once through the ESP, and once for each SIP. Hence, the throughput
on
the ESP is only 20.3Gbps on those numbers above.

If I poll ceqfpUtilProcessingLoad by SNMP, I see peaks of around 65%, which
would correlate with this level of throughput.

I'm assuming there are others of you using this platform. What sort of
throughput are you seeing? Am I right, or is the Cisco TAC engineer?

TIA,

Simon


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Re: [c-nsp] ASR9k question

2014-12-18 Thread Vitkovský Adam


 Nick Hilliard
 Sent: Wednesday, December 17, 2014 6:11 PM
 On 17/12/2014 09:14, R LAS wrote:
  does anybody knows the maximum number of VPLS instances supported
 on
  ASR9k ?
 
  Is there a reference on cisco.com ?
  I was able to find numbers of pseudowires but I'm not currently sure
  i'ts the same...
 
 Router# show l2vpn capability
 
 note that there are a pile of line-card dependencies here, and that the
 documentation says: To achieve the scale values, subinterfaces must be
 evenly allocated between the line card's physical ports.
 
 Nick
 
Also if you have Trident LCs it also depends on whether you have L2 or L3 scale 
profile enabled. 

adam
 

___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


[c-nsp] newbie questions about jumbo packets

2014-12-18 Thread Scott Voll
I'm working on my Nexus 5k's. I need to adjust QoS for the first time.  I'm
following the white papers about input QoS, Network QoS, and Queuing QoS.
I currently have a very simple network QoS with MTU of 9216 to allow jumbo
frames on the pair of Nexus (storage).

But now that I'm adjusting QoS I will be classifying my traffic, rather
than just using the default.  What happens if I add jumbo frames to all my
network classifications and it's not enabled everywhere (other switches
connected(Ethernet))?  I Believe on networks where the MTU is smaller it
will just down size to the standard 1500.  Is that correct?

TIA

Scott
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] SDN

2014-12-18 Thread Federico Cossu
LOL. after so many years, this list does not stop making me more and more
surprised, thank you, you made my day.


2014-12-18 7:35 GMT+01:00 cool hand luke coolhandl...@coolhandluke.org:

 On 12/17/2014 04:21 AM, GNANESH wrote:

 I need to understand and setup SDN in my office environment. Can you help
 me out with necessary videos and installation guides ?


 1. could you be a little more vague?

 2. is google broken? if google doesn't have what you need, then...

 3. reply w/ your timeline and your training budget.

 /chl

 ___
 cisco-nsp mailing list  cisco-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/cisco-nsp
 archive at http://puck.nether.net/pipermail/cisco-nsp/



-- 
++
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] newbie questions about jumbo packets

2014-12-18 Thread Tim Stevenson

Hi Scott, please see inline below:

At 07:09 AM 12/18/2014  Thursday, Scott Voll announced:

I'm working on my Nexus 5k's. I need to adjust QoS for the first time.  I'm
following the white papers about input QoS, Network QoS, and Queuing QoS.
I currently have a very simple network QoS with MTU of 9216 to allow jumbo
frames on the pair of Nexus (storage).

But now that I'm adjusting QoS I will be classifying my traffic, rather
than just using the default.


On n5k you use the network-qos (NQ) policy to adjust the MTU for all 
ports in the box. This does not change any other QoS behaviors, 
either internal or external to the box. For example, it does not 
cause the switch to mark/remark packets or classify/queue any 
differently than before.


Note that on nexus in general, there is some level of 'baseline' 
classification for queuing purposes, typically at least a low/high 
priority queue to ensure network control traffic is prioritized. More 
granular configs are possible but out of the box it's pretty basic.




  What happens if I add jumbo frames to all my
network classifications and it's not enabled everywhere (other switches
connected(Ethernet))?



If you enable jumbos on some switches but not all, obviously if a 
jumbo passes to a switch with it disabled, it will be dropped.




  I Believe on networks where the MTU is smaller it
will just down size to the standard 1500.  Is that correct?



Most network gear does not fragment, or only fragments in software, 
so this is something to avoid.



Hope that helps,
Tim





TIA

Scott
___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/






Tim Stevenson, tstev...@cisco.com
Routing  Switching CCIE #5561
Distinguished Engineer, Technical Marketing
Data Center Switching
Cisco - http://www.cisco.com
+1(408)526-6759


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] ASR1006 Memory issue

2014-12-18 Thread Ivan

Hi Tim,

Could you elaborate on rommon version comment please.  I will be 
upgrading myself shortly.


Thanks
Ivan

On 16/Dec/2014 2:39 a.m., Tim Warnock wrote:

Watch your rommon version too.


-Original Message-
From: cisco-nsp [mailto:cisco-nsp-boun...@puck.nether.net] On Behalf Of
Jordi Magrané Roig
Sent: Monday, 15 December 2014 11:34 PM
To: mark.ti...@seacom.mu; cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ASR1006 Memory issue

Hello,

Lukas and Mark, thanks for the information. I'm planning to upgrade
  the device but it will take some weeks. My worry is to check now if the
  device has problems.

Somebody knows how I could check if the device is working fine?

Thanks!


From: mark.ti...@seacom.mu
To: cisco-nsp@puck.nether.net
Subject: Re: [c-nsp] ASR1006 Memory issue
Date: Mon, 15 Dec 2014 13:51:32 +0200
CC: luky...@hotmail.com; jordimagr...@hotmail.com

On Monday, December 15, 2014 01:08:32 PM Lukas Tribus wrote:


I suggest you ugprade to the latest rebuild of a
supported long-term support branch (3.10S?).


I'd say go to 3.10(4)S, which is 15.3(3)S4.

We were on 15.4(2)S earlier and that has some serious BGP
bugs that lead to router crashes, as well as other random
crashes.

Suffice it to say, Cisco say 3.10(4)S is their recommended
release for this platform.

Mark.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] TCN's - Causing brief outages on ASR1K

2014-12-18 Thread Marco Marzetti

On 18/12/2014 05:59, Blake Dunlap wrote:

This seems like...interesting advice. At that point, you might as
well just turn spanning-tree off. This is somewhere around cutting off
your foot to stop your toe bleeding.

That said: This seems like design problem not so much gear
problem. Why are you running spanning tree with devices you don't
administratively control? And if you do control them, why the hell are
you seeing TCNs so often if your network is stable?



That happens very often when you buy inter-pops links from your town's 
metro ethernet carrier.


___
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/


Re: [c-nsp] TCN's - Causing brief outages on ASR1K

2014-12-18 Thread Will Tardy
Switches can have rate-limiters (aka storm-control measures) to control 
broadcast, multicast and unknown-unicast. BPDU's are layer-2 multicast. Your 
issues sounds like you're losing BPDUs.

Try debug spanning-tree root to see if it's causing root changes.

If you are running a lot of VLANs worth of BPDUs, you might be bumping into a 
limit somewhere on your network or a peer's. 

It's because of problems like this, that STP shouldn't cross 
administrative-domains.


On 18 Dec 2014, at 4:09 pm, CiscoNSP List cisconsp_l...@hotmail.com wrote:

 
 This seems like...interesting advice. At that point, you might as
 well just turn spanning-tree off. This is somewhere around cutting off
 your foot to stop your toe bleeding.
 
 That said: This seems like design problem not so much gear
 problem. Why are you running spanning tree with devices you don't
 administratively control? And if you do control them, why the hell are
 you seeing TCNs so often if your network is stable?
 
 
 We dont control the device this port is connected to, and when the port was 
 configured, bpdufilter was not enabled(12months ago)TCN's have only 
 recently been arriving on this port.
 
 
 
 -Blake
 
 On Wed, Dec 17, 2014 at 8:35 PM, CiscoNSP List
 cisconsp_l...@hotmail.com wrote:
 Another update on thisTAC are recommending that we enable bpdufilter on 
 all ports, as any port that is root and receives a TCN will cause an 
 outagewe have bpdufilter enabled on customer facing ports(to other 
 switches), but some of our legacy equipment/connections would be missing 
 this command Im sureI find it incredibly difficult to believe that we 
 have not been hit by this in the past, if this is expected behaviour on 
 any switch.
 
 Would love to hear from any switching experts on TAC's recommendation, and 
 have we just been lucky not to be impacted by this in the past?
 
 
 Cheers.
 
 From: cisconsp_l...@hotmail.com
 To: peteli...@templin.org; mrantoinemonn...@gmail.com; luky...@hotmail.com; 
 cisco-nsp@puck.nether.net
 Subject: RE: [c-nsp] TCN's - Causing brief outages on ASR1K
 Date: Tue, 16 Dec 2014 10:51:07 +1100
 
 
 
 
 Thanks for all the replies.
 
 Just an update to this - No issues for 4 days (with  spanning-tree portfast 
 trunk enabled on trunk port from 4948 - ASR), then this morning, another 
 TCN was received on an AGG port(On the 4948) to a carrier (The TCN's (Since 
 we are now looking for them)) seem to only arrive on 2 ports...both being 
 carrier AGG ports, with multiple vlans, and to the same carrier.we do 
 not have any visibility into the carriers network
 
 This TCN did also cause OSPF+LDP flaps on the ASRagain, only for a 
 ~5seconds
 
 It's RRR(So highest priority) with TAC, but we are still in the same 
 place we were over a week ago.as you can imagine, customers are not 
 impressed!
 
 
 
 Date: Mon, 15 Dec 2014 09:04:43 -0800
 From: peteli...@templin.org
 To: mrantoinemonn...@gmail.com; luky...@hotmail.com; 
 cisconsp_l...@hotmail.com; cisco-nsp@puck.nether.net
 Subject: Re: [c-nsp] TCN's - Causing brief outages on ASR1K
 
 You can run RSTP or MST all day long on a switch to get rapid STP
 convergence, but you'll only gain the rapidness of RSTP/MST on ports
 where they neighbor is actually participating in the correct STP
 variant. Routers don't participate in STP, so the 4948 has to treat
 those ports as legacy STP. Whenever there's a root placement event, the
 4948 has to block the port until the STP process/timers can confirm that
 there's no superior root bridge hiding inside or behind the router.
 
 Now, if there's a small enough event going on that SHOULDN'T be causing
 a root placement event but IS, that could be a bug in the 4948 code.
 
 However, I'd say very strongly that you SHOULD have portfast [trunk]
 towards any devices that aren't participating in the STP process, unless
 those devices are capable of creating an L2 loop.
 
 On 12/15/2014 1:18 AM, Antoine Monnier wrote:
 A TCN will cause all the learned MAC addresses to be flushed by the
 switiches, but it will not block traffic. So the TCN on its own should
 not be the cause of OSPF and LDP flaps.
 
 Is your switch running out of space for all the learned MAC addresses?
 
  I dont see how enabling portfast trunk would help in that scenario (it
 should only change the behavior if an interface flaps).
 Has the source of TCN being identified? Configuring ports as portfast
 will lower the probability of generating TCN, that may be why they advised
 you to do this. However applying to a port that is stable (no interface
 flap) is not really going to help for this specific problem.
 
 
 
 On Mon, Dec 15, 2014 at 9:06 AM, Lukas Tribus luky...@hotmail.com 
 wrote:
 
 Is it expected behaviour for a TCN to cause a flap on an ASR...We have
 many other POP's with switches
 4948's/4500's etc(trunk)-ASR+7200's and do not have spanning-tree
 portfast trunk enabled, and
 they do not experience any flaps?
 This has nothing todo with the