Sunteți pe pagina 1din 63

Implementing Cisco IP Routing (ROUTE)

Chapter 5:
Implementing Path Control

Elaborated by: Ing. Ariel Germn


For: ITLA
Based on: Foundation Learning Guide
CCNP ROUTE 300-101
Diane Teare, Bob Vachon, Rick Graziani
2015

ROUTE v6 Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 1
Chapter 5 Topics
Using Cisco Express Forwarding Switching

Understanding Path Control

Summary

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 2
Using Cisco Express
Forwarding Switching

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 3
Upon completing this section, you will be able to do the
following:

Describe the different switching mechanisms that a Cisco router uses

Describe how Cisco Express Forwarding (CEF) works

Describe how to verify that CEF is working

Describe how to verify the content of the CEF tables

Describe how to enable and disable CEF by interface and globally

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 4
Control and Data Plane
The exchange of routing protocol information is performed
in the control plane by the route processor.

Data packets are forwarded in the data plane by an


interface microcoded processor.

Control plane and data plane are relatively independent.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 5
Cisco Switching Mechanisms

Process switching
Is the slowest method.
Every packet is examined by the CPU in the control plane and all
forwarding decisions are made in software.
It greatly degrades performance and is generally used only as a last
Chapter 5 resort or during troubleshooting.
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 6
Cisco Switching Mechanisms

Fast switching
Is faster than process switching.
The first packet is process switched, subsequent frames in the flow
arrive, the destination is found in the hardware fast-switching cache
and the frames are then forwarded without interrupting the CPU.
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 7
Cisco Switching Mechanisms

Cisco Express Forwarding


Is the fastest method.
Two tables are created beforehand: Forwarding Information Base (FIB)
and adjacency table.
The contain all the information the router need to consider when
Chapter 5
forwarding the packet. 8
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
Process and Fast Switching
An EIGRP update containing a new route to 10.0.0.0/8 is added to the
EIGRP topology table.

Process switching might trigger an ARP request or find the Layer 2


address in the ARP cache.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 9
Cisco Express Forwarding
It caches the information that is generated by the Layer 3
routing engine even before the router encounters any data
flows.

The control plane is responsible for building the FIB table


and adjacency tables in software.

The data plane is responsible for forwarding IP unicast


traffic using hardware.

The FIB is arranged for maximum lookup speed (most


specific entry first).

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 10
Cisco Express Forwarding

Chapter 5 Cisco Public 11


Analyzing Cisco Express Forwarding

Chapter 5
12
Analyzing Cisco Express Forwarding

Chapter 5
sco Public 13
Analyzing Cisco Express Forwarding

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 14
Enable and Disable CEF by Interface and Globally

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 15
Understanding
Path Control

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 16
Upon completing this section, you will be able to do the
following:

Identify the need for path control.

Describe how to use policy-based routing (PBR) to control path


selection.

Describe how to use IP service-level agreement (IP SLA) to control


path selection.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 17
The Need for Path Control
Path control is required to
avoid performance issues
and to optimize paths.

Path control tools can be


used to change the default
destination forwarding and
optimize the path of the
packets for some specific
application.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 18
Implementing Path Control Using Policy-Based
Routing
PBR enables the administrator to define a routing policy
other than basic destination-based routing using the routing
table.

With PBR, route maps can be used to match source and


destination addresses, protocol types, and end-user
applications.

When a match occurs, a set command can be used to


define items, such as the interface or next-hop address to
which the packet should be sent.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 19
PBR Features
PBR adds flexibility in a difficult-to-manage environment by
providing the ability to route traffic that is based on network
needs.

Benefits of implementing PBR in a network include the


following:

Source-based transit-provider selection


QoS
Cost savings
Load sharing

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 20
Steps for Configuring PBR
1. Enable PBR by configuring a route map using the route-map global
configuration command.

2. Implement the traffic-matching configuration, specifying which traffic


will be manipulated. This is done using the match commands.

3. Define the action for the matched traffic. This is done using the set
commands.

4. Optionally, fast-switched PBR or CEF-switched PBR can be enabled.

5. Apply the route map to incoming traffic or to traffic locally generated


on the router.

6. Verify PBR configuration with basic connectivity and path verification


commands

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 21
Configuring PBR
The route-map map-tag [permit | deny] [sequence-
number] global configuration command is used to create a
route map.

If the statement is marked as permit, packets that meet all the match
criteria are policy-based routed.

If the statement is marked as deny, packet meeting the match criteria


is not policy-based routed. Instead, it is sent through the normal
forwarding channels and destination-based routing.

If no match is found in the route map, the packet is not dropped. It is


forwarded through the normal routing channel

Note: To drop a packet, forward it to the interface null 0.


Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 22
PBR match Commands
The match condition route map configuration commands
are used to define the conditions to be checked.

match ip address {access-list-number | name} [...access-list-number


| name] | prefix-list prefix-list-name [..prefix-list-name]

match length min max Matches based

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 23
PBR set Commands
If the match statements are satisfied, you can use the set
ip next-hop or set interface commands.

set ip next-hop ip-address [...ip-address]

set interface type number [...type number]

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 24
Configuring PBR on an Interface
To identify a route map to use for policy routing on an interface,
use the ip policy route-map map-tag interface configuration
command.

Remember that policy-based routing is configured on the


interface that receives the packets, not on the interface from
which the packets are forwarded.

Packets originating on the router are not normally policy routed.

To identify a route map to use for local policy routing, use the ip
local policy route-map map-tag global configuration command.

This command applies the specified route map to packets originating on


the router.
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 25
Verifying PBR
To display the route maps used for policy routing on the
routers interfaces, use the show ip policy EXEC
command.

To display configured route maps, use the show route-map


[map-name] EXEC command.

Use the debug ip policy EXEC command to display IP


policy routing packet activity.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 26
Configuring PBR Example

In the example, you will:


Verify normal traffic paths as selected by the traditional destination-
based routing.
Configure PBR to alter the traffic flow for one client station.
Verify both the PBR configuration and the new traffic path
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 27
Verify Normal Traffic Paths

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 28
Configure PBR to Alter the Traffic Flow from the
Notebook

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 29
Verify the PBR Configuration and Traffic Path

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 30
Verify the PBR Configuration and Traffic Path

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 31
Verify the PBR Configuration and Traffic Path

Chapter 5
Verify the PBR Configuration and Traffic Path

Notebook

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 33
Implementing Path Control Using Cisco IOS IP
SLAs
PBR is a static path control mechanism.

It cannot respond dynamically to changes in network health.

If a policy states that when packet loss on primary exceeds


5%, backup should be used, It cant be done with PBR
alone.
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 34
IP SLA Features
Cisco IOS IP SLAs perform network performance measurement
within Cisco devices.

Cisco IOS IP SLAs actively send simulated data across the


network to measure performance between multiple network
locations or across multiple network paths.

The information collected includes data about:


Response time
One-way latency
Jitter
Packet loss
Voice-quality scoring
Network resource availability
Application performance
Server response time.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 35
Cisco IOS IP SLA Sources and Targets
All the IP SLA measurement probe operations are configured on the IP
SLAs source, such as a Cisco IOS router.

If the target is another Cisco IOS device, the target can be configured as
an IP SLA responder. A responder can provide accurate measurements
without the need for dedicated probes or any complex or per-operation
configuration.

Chapter 5
co Public 36
Cisco IOS IP SLA Operations
An IP SLA operation is a measurement that includes
protocol, frequency, traps, and thresholds.

This operation can be used with both types of target devices


(source and responder).

When the operation is finished and the response has been


received, the results are stored in the IP SLA MIB on the
source.

These results can be retrieved and viewed using command


line interface (CLI) commands or using Simple Network
Management Protocol (SNMP).

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 37
Cisco IOS IP SLA Operation with Responders
Using an IP SLA responder provides enhanced
measurement accuracy and additional statistics that are not
otherwise available via standard ICMP-based
measurement.

When a network manager configures an IP SLA operation


on the IP SLA source, reaction conditions can also be
defined.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 38
Steps for Configuring IP SLAs
The following steps are required to configure Cisco IOS IP
SLAs functionality:

1. Define one or more IP SLA operations (or probes).

2. Define one or more tracking objects to track the state of IOS IP SLA
operations.

3. Define the action associated with the tracking object.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 39
Step 1: Configuring Cisco IOS IP SLA
Operations

Use the ip sla operation-number global configuration


command to begin configuring a Cisco IOS IP SLA
operation and to enter IP SLA configuration mode.

The operation-number is the identification number of the IP


SLA operation to be configured.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 40
IP SLA Configuration Mode Commands

The focus of this section is on the icmp-echo command


The complete command syntax is:
icmp-echo {destination-ip-address | destination-hostname} [source-
ip {ip-address | hostname} | source-interface interface-name].
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 41
IP SLA ICMP Echo Configuration Mode
Commands

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 42
Schedule the IP SLA Operation
Once a Cisco IP SLA operation is configured, it needs to be
scheduled using the ip sla schedule global configuration
command.

The complete command syntax is


ip sla schedule operation-number [life {forever | seconds}] [start-
time {hh:mm [:ss] [month day | day month] | pending | now | after
hh:mm:ss}] [ageout seconds] [recurring]

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 43
Step 2: Configuring Cisco IOS IP SLA Tracking
Objects

Use the global configuration command:


track object-number ip sla operation-number {state | reachability}

Use this optional command to specify the period of time to


delay communicating states changes:
delay {up seconds [down seconds] | [up seconds] down seconds}

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 44
Step 3: Defining an Action Associated with a
Tracking Object
Many types of actions can be associated with a tracked
object.

A simple path control action is to use the global


configuration command:
ip route prefix mask {ip-address | interface-type interface-number [ip-
address]} [track number]

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 45
Configuring IP SLA Example

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 46
Configuring an IP SLA Operation with the ISP 1
DNS Server

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 47
Defining a Tracking Object and Assigning an
Action

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 48
Configuring an IP SLA Operation with the ISP 2
DNS Server

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 49
Configuring an IP SLA Operation with the ISP 2
DNS Server

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 50
Configuring PBR and IP SLA Example

-Web traffic to the HQ site should be redirected over the serial link.

-All other traffic from Notebook should go via BR2 but only if BR2 is
reachable.
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 51
Redirecting Web Traffic from BR1 to HQ Using
PBR

Chap
ter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public
52
Redirecting Web Traffic from BR1 to HQ Using
PBR

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 53
Ensuring That BR2 Is Reachable Using IP SLA

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 54
Redirect Traffic from Notebook to BR2 If
Reachable

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 55
Verifications

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 56
Verifications

Chapter 5
57
Verifications

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 58
Summary

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 59
Summary
Packet-switching mechanisms on a Cisco IOS platform, including
process switching, fast switching, and CEF switching.

Overview of path control tools, including PBR and Cisco IOS IP


SLAs.

Using PBR to control path selection, providing benefits including


source-based transit provider selection, QoS, cost savings, and
load sharing.

PBR is applied to incoming packets; enabling PBR causes the


router to evaluate all packets incoming on the interface using a
route map configured for that purpose.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 60
Summary
Configuring and verifying PBR, including the following
steps:
Choose the path control tool to use; for PBR, route-map commands
are used
Implement the traffic-matching configuration, specifying which traffic
will be manipulated; match commands are used within route maps
Define the action for the matched traffic, using set commands within
route maps
Apply the route map to incoming traffic or to traffic locally generated
on the router
Verify path control results, using show commands

Cisco IOS IP SLAs, which use active traffic monitoring,


generating traffic in a continuous, reliable, and predictable
manner, to measure network performance.
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 61
Summary
Cisco IOS IP SLA terminology, including the following:

All the Cisco IOS IP SLA measurement probe operations are


configured on the IP SLA source.

There are two types of IP SLA operations: those in which the target
device is running the IP SLA responder component.

An IP SLA operation is a measurement that includes protocol,


frequency, traps, and thresholds.

Configuring and verifying IOS IP SLAs.

Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 62
Chapter 5
2007 2010, Cisco Systems, Inc. All rights reserved. Cisco Public 63

S-ar putea să vă placă și