Brkarc 3465
Brkarc 3465
Brkarc 3465
BRKARC-3465
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Session Goal
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Agenda
Chassis and Power Supplies
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Catalyst 6500 Chassis Architecture
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Catalyst 6500 Supervisors
Supervisor 32: Some Facts
Supervisor 32 Quick Facts
NO Switch Fabric
Classic BUS
L2 CAM
FIB TCAM
FIB Table
MET
Replication QOS ACL
ASIC
Security ACL
Layer 3 Counters
FWD
SP SP Netflow TCAM
SP Engine
Flash DRAM Netflow Table
Port ASIC Netflow Stats
RP RP Adjacency
Flash DRAM RP
Adj Stats
Classic BUS
L2 CAM
MET
Replication FIB TCAM
QOS ACL
Security ACL
MUX Layer 3 Counters
FWD
SP SP Netflow TCAM
SP Engine
Flash DRAM Netflow Table
Port Port
Netflow Stats
ASIC ASIC
RP RP Adjacency
Flash DRAM RP
Adj Stats
Classic BUS
Crossbar Fabric Channels
L2 CAM
FIB TCAM
Switch Fabric
FIB Table
QOS ACL
Security ACL
MET
Fabric / Layer 3 Counters
Replication FWD
Netflow TCAM
ASIC Engine
Netflow Table
RP RP
Flash DRAM RP Port Port
Netflow Stats
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Supervisor 720-10G Backplane Architecture
Classic BUS
Crossbar Fabric Channels
FIB TCAM
L2 CAM
Fabric Switch Fabric FIB Table
Security ACL
Layer
2/3 Counters
Fabric /
FWD Netflow TCAM
MET Replication Engine
Netflow Table
RP SP ASIC
Netflow Stats
RP SP Adjacency
Port Port
Flash Flash
ASIC ASIC Adj Stats
RP SP
DRAM DRAM Quad Port PHY Policy Feature Card
MSFC3 (PFC3)
10G 1G 1G 1G 10G
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Catalyst 6500 Supervisors
Supervisor 2T: Some Facts
Supervisor 720 Quick Facts
Integrated 2-Tbps Switch Fabric
Classic BUS
Crossbar Fabric Channels
FIB TCAM
L2
NetFlow
Fabric Switch Fabric CAM CL1 FIB Table
CL2
TCAM TCAM
ASIC QOS ACL
Security ACL
Layer FIB
2/3 Counters
L3/4 Engine
Fabric / LIF FWD
Netflow TCAM ADJ
MET Replication Table
Engine
Netflow Table
ASIC RPF
Netflow Stats Table
CPU
Port Port Adjacency
LIF ACE
ASIC ASIC DB Adj Stats
L2 Engine Counter
DRAM Flash LIF
Quad Port PHY
Stats
L2 CAM (128K)
MSFC5 10G 10G Policy Feature Card (PFC4)
1G 1G 1G PFC4
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Supervisor Chassis Requirements
3-Slot : 1 and 2
4-slot : 1 and 2
Supervisor
6-slot : 5 and 6
Slots
9-slot : 5 and 6
13-slot : 7 and 8
Switch Fabric
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Catalyst 6500 Supervisor 2T
The 2Tbps Switch Fabric
Switch Fabric
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Catalyst 6500 Supervisors
Switch Fabric
The Supervisor 720 and Supervisor 2T support a Switch Fabric which offers
each connected linecard a set of discrete communication paths into the
switch backplane…
Linecard Linecard
Slot #9 Slot #8
Linecard Linecard
Slot #1 Slot #7
Linecard Linecard
Slot #2 Slot #6
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Catalyst 6500 CLI Example
6509E#show platform hardware capacity fabric
Switch Fabric Resources
Bus utilization: current: 25%, peak was 75% at 19:28:31 UTC Mon Feb 2 2009
Fabric utilization: Ingress Egress
Module Chanl Speed rate peak rate peak
1 0 20G 10% 50% @13:49 06Jan09 20% 50% @13:49 06Jan09
1 1 20G 20% 50% @13:49 06Jan09 10% 50% @13:49 06Jan09
2 0 20G 0% 1% @20:30 13Jan09 0% 1% @20:46 06Jan09
2 1 20G 0% 1% @20:47 16Jan09 0% 1% @16:52 06Jan09
3 0 20G 20% 40% @13:49 06Jan09 0% 0% @13:49 06Jan09
6 0 20G 0% 1% @17:44 06Jan09 0% 1% @00:36 08Jan09
8 0 8G 0% 3% @16:33 09Feb09 50% 100% @13:49 06Jan09
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Catalyst 6500 Multilayer Switch Feature Card
MSFC Serves as Control Plane for 6500 MSFC3
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Catalyst 6500 Supervisor 2T
MSFC5: Connectivity Management Processor (CMP)
The Connectivity Management Processor (CMP) supports new
capabilities that will aid Network Administrators in managing the
system:
USB Support
- USB serial console access
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Catalyst 6500 Policy Feature Card
PFC3 PFC Serves as Data Plane for 6500
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Agenda
Module Architecture
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Catalyst 6500 Classic Linecards
Dbus
Rbus
EoBC
Linecard
Port
ASIC
Dbus is path over which header and Rbus is path over which forwarding
data is forwarded to the supervisor for result is sent back to linecards
forwarding lookup
Ethernet Out of Band Channel
DBUS runs at 16Gbps provides control path for Supervisor
to control linecards
RBUS runs at 4Gbps
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Catalyst 6500 CEF256 Linecards
Dbus 8Gb Fabric Channel to Switch Fabric
Rbus
EoBC
Fabric ASIC
Linecard
Dbus
Rbus
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Catalyst 6500 CEF720 Linecards
20Gbps Fabric 20Gbps Fabric
Channel Dbus Channel
Rbus
EoBC
Linecard
ASIC ASIC
Linecard
ASIC L2 FWD ASIC
L3 FWD
dCEF720 uses DFC for local DFC contains same hardware and logic
forwarding as PFC on Supervisor
FABRIC INTERFACE
Distributed
Forwarding Card
Linecard
FIRE FIRE FIRE FIRE
ASIC ASIC L2 FWD ASIC ASIC
L3 FWD
POR POR POR POR POR POR POR POR
T T T T T T T T
ASIC ASIC ASIC ASIC ASIC ASIC ASIC ASIC
dCEF2T uses DFC for local forwarding DFC contains same hardware and logic as PFC on Supervisor
Linecard has no connection to BUS CTS ASICs provide wire-rate encryption / decryption
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Catalyst 6500 Linecards
Centralized Forwarding Cards (CFC)
The Centralized Forwarding Card (CFC) provides BUS connectivity for the
CEF720 linecards…
The CFC is
available on
CEF720 linecards
and provides the
connection to the
Classic BUS
CFC is used to
communicate with
the Supervisor
when centralized
forwarding is used
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Catalyst 6500 Linecards
Distributed Forwarding Card 3 (DFC3)
The DFC3 is an option- it is used to provide local forwarding lookups for the
linecard to incrementally boost overall switch performance - if installed on a
CEF720 linecard, it takes the place of the CFC…
DFC3s work only with PFC3s, and DFC4s work only with PFC4s.
When mixing DFCs and PFCs of different capabilities, the lower common
denominator is in effect:
Example 1 : A PFC3BXL on the Supervisor with a DFC3B on the module will result in the PFC3BXL
running in PFC3B mode.
Result : The larger FIB and NetFlow tables of the XL will not be used as they will need to be
programmed to match the smaller tables sizes of the non-XL.
Example 2: A PFC3C on the Supervisor with a DFC3B on the module will result in the PFC3C
running in PFC3B mode.
Result : The VSS capability of the PFC3C will be disabled when it runs in PFC3B mode since
PFC3B mode does not support VSS.
When inserting a module with a lower level DFC than the PFC on the
Supervisor, the system must be reloaded for the PFC to reprogram itself to the
lower mode.
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Mixing Different Linecard Architectures
When utilizing Centralized Forwarding, the backplane will operate in one of
three modes—these modes are determined by the combination of linecards
installed in the chassis, from which module the traffic is sourced from and to
which module the traffic is destined.
Layer 2 Forwarding
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Layer 2 Forwarding Logic
Frame received
L2 flooding
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Catalyst 6500 Internals MAC Table
Layer 2 Forwarding on PFC Table Port
MAC
A 1
B 2
C 3
The PFC has an D 4
E 5
integrated CAM Table F 6
that supports 4096
rows * X pages =
MAC address space
16, 24,
or 32
PFC pages
4096
rows
MAC Table
MAC Table
HIT!!!
1. Hash result identifies the starting Page and Row in MAC table
2. Lookup key (VLAN + MAC) compared to contents of indexed line on each page, sequentially
3. Destination lookup: Match returns destination interface(s), Miss results in Flood
4. Source lookup: Match updates age of matching entry, Miss installs new entry in table
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Displaying the Layer 2 Table
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
EtherChannel Load Sharing
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
EtherChannel “Power-of-2” Ports
PFC3 Flow Distribution
Frame 1 2 3 4 5 6 7 8
IP Unicast Forwarding
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Catalyst 6500 IP Unicast Forwarding
Note
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Catalyst 6500 Interface Management
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Catalyst 6500 PFC3/DFC3 Lookup Process
L3 Engine
Netflow TCAM 5 4 FIB TCAM &
SSRAM
3 8 IP Packet Parse
L2 Engine
2 IP Packet Parse
1 8 L2 MAC Table
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Catalyst 6500 PFC4/DFC Lookup Process
Input Forwarding Engine Lookup
Architecturally, the PFC/DFC4 is almost the same as the PFC/DFC3
What changes is the Dual-Cycle Input (IFE) and Output (OFE) Processing
IFE process:
What changes is the Dual-Cycle Input (IFE) and Output (OFE) Processing
OFE process:
L2 L3
Engine Engine
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Catalyst 6500 IP Unicast Forwarding
Layer 3 Forwarding on PFC
Routing Protocols receive routing updates from the
network... Control Plane (RP)
Holds routing tables in
Routing information Base
(RIB) from Static Routes
Routing Protocols and all running
OSPF, EIGRP, ISIS, BGP, etc
Routing Protocols
1 Packet 172.20.45.1
10.1.1.100
MASK (/32)
IF, MACs, MTU
2 Key Gen …
10.1.3.0 IF, MACs, MTU
10.1.2.0
7
Load-Sharing
6 IF, MACs, MTU
3 Lookup Key MASK (/24) Hash
… IF, MACs, MTU
4
HIT! 10.1.0.0
172.16.0.0
5
MASK (/16)
… Adjacency Table
0.0.0.0
MASK (/0)
FIB TCAM
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Supervisor FIB TCAM Resources
IPv6 and IPv4 multicast require
2 entries
NON-XL PFCs XL PFCs
MPLS and IPv4 only one
IPv4, MPLS 192k 512k
XL PFCs = 1M entries
IPv6, Multicast 32k 256k
Non-XL PFCs = 256K entries
By default TCAM is allocated as
seen in the table
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Displaying IPv4 Forwarding Summary
6509E#show platform hardware capacity forwarding
<snip>
L3 Forwarding Resources
FIB TCAM usage: Total Used %Used
72 bits (IPv4, MPLS, EoM) 196608 28 1%
144 bits (IP mcast, IPv6) 32768 7 1%
IPv6 1 1%
IPv4 mcast 3 1%
IPv6 mcast 3 1%
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Displaying Hardware IPv4 Prefix Entries
6509E#show platform hardware cef
Codes: decap - Decapsulation, + - Push Label
Index Prefix Adjacency
68 255.255.255.255/32 receive
75 10.10.1.1/32 receive
76 10.10.1.0/32 receive
77 10.10.1.255/32 receive
78 10.10.1.2/32 Gi1/1, 0030.f272.31fe
3200 224.0.0.0/24 receive
3201 10.10.1.0/24 glean
3202 10.100.0.0/24 Gi1/1, 0030.f272.31fe
3203 10.100.1.0/24 Gi1/1, 0030.f272.31fe
3204 10.100.2.0/24 Gi1/1, 0030.f272.31fe
3205 10.100.3.0/24 Gi1/1, 0030.f272.31fe
<…>
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Finding the Longest-Match Prefix Entry
6509E#show platform hardware cef 171.1.1.0
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
IPv4 CEF Load Sharing
Up to 16* hardware load-sharing paths per prefix
Use maximum-paths command in routing protocols
to control number of load-sharing paths 10.10.0.0/16
IPv4 CEF load-sharing is per-IP flow via Rtr-A
via Rtr-B
Per-packet load-balancing not supported
Load-sharing based on Source and Destination
IP addresses by default
―Unique ID‖ in PFC3 and PFC4 prevents polarization
A B
Configuration option supports inclusion of
L4 ports in the hash
mls ip cef load-sharing full 10.10.0.0/16
Unique ID not included in hash in ―full‖ mode
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Load-Sharing Prefixes and Paths
6509E#show platform hardware cef lookup 10.100.20.1
Interface: Gi1/1, Next Hop: 10.10.1.2, Vlan: 1019, Destination Mac: 0030.f272.31fe
Interface: Gi2/2, Next Hop: 10.40.1.2, Vlan: 1018, Destination Mac: 000d.6550.a8ea
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Agenda
NetFlow
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Catalyst 6500 NetFlow
Netflow is a process designed to collect information about traffic flows that
pass through the switch - Netflow collection of flow records is a hardware
process while the exporting of flow records to an external collector is a control
plane process…
Netflow
Collection
Server
Netflow
Data Flow
Exported Netflow
Record
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Catalyst 6500 NetFlow
PFC3 Flow Masks
The Catalyst 6500 supports the following flow masks - these are used to
identify which pieces of information in the header will be used as input into
generating a key for flow lookups…
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Catalyst 6500 NetFlow
TCAM Lookup on PFC3
Key Flow Data
Packet Key Flow Data
1 Key Flow Data
Key 6 Flow DataHIT!
2 Mask Compare Statistics
Key Flow Data
7
FlowKey
Flow Key Key Flow Data
Key Flow Data
Key Flow Data
NetFlow
HIT! Key Table Index Flow Data
3 Key 5 Flow Data
Key Result Flow Data
Hash Function
Flow Data
Mask
4
Hash Key
Hash Key Compare 128K/256K 128K/256K
entries rows
Supervisor
Netflow
Export Netflow
Data
Netflow
Data
EOBC
WS-X6908-10G-2T\2TXL
Netflow
Data
Egress NetFlow
Provides support for collecting flow statistics for packets after they have had ingress processing applied to
them.
Sampled NetFlow
Allows users to to have NetFlow records created based on a sample of traffic matching the flow.
Flexible NetFlow
Supports the NetFlow V9 Record Format including new fields for IPV6 and Multicast information.
TCP Flags
TCP Flags (SYN, FIN, RST, ACK, URGENT, PUSH) are now collected as part of a flow record.
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Catalyst 6500 NetFlow
PFC4 NetFlow Processing
IFE Process
OFE Process
Outgoing Egress Egress Egress
Packet QoS NetFlow ACL
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Catalyst 6500 NetFlow
TCAM Lookup on PFC4
DST IP SRC IP Proto DST Port SRC Port
10.1.2.11 10.1.1.10 0x6 80 33992
DataKey
Data Key Index
Index Flow Data Statistics
Data
Data Key
KeyKey Index
Index
Data
Data Key Index
Index Flow Data Statistics
DataKey
Data Key Index
Index
1 Data Key
DataKey
Key Index
Index Flow Data Statistics
Data
Data KeyKey Index
Index
Data
Data Key Index
Index Flow Data Statistics
Flow
FlowKey
Key DataKey
Key Index Compare
Data
DataKey
Key Index
Index Flow Data Statistics
Data
Data Key Index
Index Flow Data
Data KeyKey
Data Index
Index Flow Data Statistics
Data Key
DataKey
Key Index
Index 6
Data Index Flow Statistics
DataKey
HIT!
Data Key Index
Index HIT! Data 7
Data
Data Key
KeyKey Index
Index
2 Data
Data Key Index
Index Flow Data Statistics
DataKey
Data Key Index
Index 5 Update
DataKey
Data Key Index
Index Flow Data Statistics
Hash Function Compare Data Key Index Stats
all pages Data KeyKey
Data Index
Index Index to Flow Data Statistics
Data Key
DataKey
Key Index
Index
Data
DataKey
Key Index
Index NF Data Flow Data Statistics
4 Data
Data Key Index
Index Table
Data Key Index
Lookup Data Key
Key
512K
entries
3 Indexes row in Lookup Table
NetFlow Data Table NetFlow
NetFlow Lookup Table Statistics
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Table 76
Catalyst 6500 NetFlow
PFC4 Sampled NetFlow
• Supervisor 2T supports up to 1K Hardware based M:N Samples
For every N packets, the sampler selects M packets (M<N)
To be
Exported
NetFlow Cache
Netflow
Table
Copy-based (or deep-packet sampling)
will be supported in later releases
…
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Catalyst 6500 NetFlow
PFC4 Flexible NetFlow Configuration
Flow Export
Flow Record
Export Profile
Key Field Non-Key Field
Multiple Exporters can
be associated with a Export Profile
Key Field Non-Key Field single FNF monitor
… … …
Interfaces
Ingress Ingress Same Flow Monitor can be
or/and …. or/and associated with multiple
Interfaces.
Egress Egress
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
Catalyst 6500 NetFlow
MSFC5 Yielding NDE
Supervisor 2T and Direct Export capable Line Cards support a Yielding NDE
capability to provide more optimal CPU utilization when using NDE
Supervisor
Netflow
Export Netflow
Data
Netflow Collector
WS-X6748-GE-TX w\DFC4 Netflow Data Export process begins
1
Netflow
Data Yielding NDE monitors the CPU Utilization
2
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Displaying NetFlow Utilization
6509E#show platform hardware capacity netflow
Netflow resources:
3 10% 10%
7 25% 25%
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Agenda
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Catalyst 6500 Access Control Lists
ACL Types and Feature Support
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Catalyst 6500 Access Control Lists
ACLs in Hardware
Hardware Support
1 DFC Policy Feature Card (PFC)
Distributed Forwarding
Create the ACL or DFC Card (DFC)
traffic classification
policy using CLI or Router ACLs
Vlan ACLs
Network Management Port Based ACLs 2
PFC
System Role Based ACLs
PFC
IP Access-List extended
Internet DFC
permit ip any host 10.2.2.4
permit ip any host 10.5.2.33
Hardware- Assist
permit ip any host 10.11.0.0 Features 3
permit ip any host 10.4.0.0
Netflow
WCCP
Reflexive ACLs
Network Address
Translation
Cisco Trust Sec
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
Catalyst 6500 Access Control Lists
Three Forms of Security ACLs
The PFC3/PFC4 supports three forms of Security ACLs: the RACL, VACL and
PACL…
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Catalyst 6500 Access Control Lists
ACL Order of Processing
Should a RACL, VACL and PACL all be configured at the same time, there is a
distinct order in which each form of ACL is processed…
VACL VACL
Input PACL
Destination
Source
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Catalyst 6500 ACLs
PFC3 TCAM Entry Population
Protocol
xxxxxxxx 10.1.2.100 xx xxxx xxxx 1 Permit
Dest IP Source IP xxxxxxxx 10.1.68.101 xx xxxx xxxx 2 Deny
00000000 FFFFFFFF 00 0000 0000
xxxxxxxx 10.33.2.25 xx xxxx xxxx 3 Deny
Dest Port Source Port 4
5
1=―Compare‖ 6
0=―Mask‖ 7
ip access-list extended example 8
1
permit ip any host 10.1.2.100 xxxxxxxx xxxxxxxx 06 xxxx 0016 Permit
2
deny ip any host 10.1.68.101
xxxxxxxx xxxxxxxx 06 xxxx 0017 Deny
xxxxxxxx xxxxxxxx 11 xxxx 0202 3
deny ip any host 10.33.2.25 00000000 00000000 FF 0000 FFFF Deny
xxxxxxxx xxxxxxxx 06 xxxx 0080 4 Permit
permit tcp any any eq 22
5
xxxxxxxx xxxxxxxx 11 xxxx 00A1 Permit
deny tcp any any eq 23 6
permitBRKARC-3465
udp any any eq © 161 Masks Values
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
Catalyst 6500 ACLs
TCAM Lookup
Generate Compare 3
Lookup
xxxxxxxx
xxxxxxxx
10.1.1.10 xxxxxxxx
10.1.2.11
| 10.1.2.11 xx|xxxx
| 06 xxxx
84C80050
xxxx
| 0050 xxxxxxxx 10.1.2.100 xx xxxx xxxx
Key 1
Lookup Key 2 xxxxxxxx 10.1.68.101 xx xxxx xxxx
2
xxxxxxxx 10.33.2.25 xx xxxx xxxx
SIP=10.1.1.10 00000000 FFFFFFFF 00 0000 0000 3
DIP=10.1.2.11 4
Protocol=TCP (6)
SPORT=33992 5
DPORT=80
1 Entries 6
matching only 7
Packet
destination IP 8
ip access-list extended example xxxxxxxx xxxxxxxx 06 xxxx 0016
1
permit ip any host 10.1.2.100 xxxxxxxx xxxxxxxx 06 xxxx 0017 2
xxxxxxxx xxxxxxxx 11 xxxx 0202
deny ip any host 10.1.68.101 00000000 00000000 FF 0000 FFFF 3
HIT! xxxxxxxx xxxxxxxx 06 xxxx 0050
deny ip any host 10.33.2.25 4 Permit
xxxxxxxx xxxxxxxx 11 xxxx 00A1 45
permit tcp any any eq 22
Entries matching Result
deny tcp any any eq 23 only protocol and 6
deny udp any any eq 514
destination port 7
permit tcp any any eq 80 8
permit BRKARC-3465
udp any any eq 161
Masks Values
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Catalyst 6500 ACLs
PFC4 Mask Utilization
permit ip 10.1.1.0 0.0.0.255 any
permit ip 10.2.1.0 0.0.0.255 any
permit ip 10.3.0.0 0.0.255.255 any
Implements 8:1 Mask to Entry ratio Total 256K Masks, 256K Entries
Total 4K Masks, 32K Entries
Mask resource is limited Mask resource is no longer a
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved.
limited resource
Cisco Confidential 92
Catalyst 6500 SUP2T/PFC4 Enhancements
Access Control List Lookup Example
TCAM A TCAM B
BANK 0 BANK 1 BANK 2 BANK 3 Forwarding Engine
VACL (PFC4 or DFC4)
RACL
SGT
QoS
3 ACE
Counters
TCAM Controller (L2 ASIC)
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
Catalyst 6500 ACLs
PFC4 ACL Dry Run
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Catalyst 6500 ACLs
PFC4 ACL Hitless Update
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
Catalyst 6500 ACLs
PFC4 ACL Hitless Update
TCAM A TCAM B
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Agenda
Packet Walks
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
Centralized Forwarding:
Classic to Classic
L3/4 Supervisor
Engine Engine 2T D
Port Port4
Classic
L2 Engine 720Gbps ASIC ASIC
Module B
2 Switch
3 PFC4 Fabric
DBUS
RBUS
Source S
Destination D
Classic Port Port
Module A ASIC ASIC
Blue VLAN
1 Orange VLAN
S
Entire Packet
Packet Header
Result
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
Centralized Forwarding:
Classic to CEF720
D
Port Port
L3/4 Supervisor CEF720
ASIC ASIC CFC
Engine Engine 2T Module B
Fabric Interface/
6
L2 Engine 4 720Gbps Replication Bus
2 Switch5 20Gbps Engine Interface
3 PFC4 Fabric
DBUS
RBUS
Source S
Destination D
Classic Port Port
Module A ASIC ASIC
Blue VLAN
1 Orange VLAN
S
Entire Packet
Packet Header
Result
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
Centralized Forwarding with Fabric:
CEF720 to Classic
L3/4 Supervisor D
Engine Engine 2T
Port Port
Classic
720Gbps ASIC 8
ASIC
L2 Engine Module B
63 74 Switch
PFC4 Fabric
DBUS
RBUS
20Gbps
Source S
CEF720
Fabric Interface/
5 2Bus Module A Destination D
Replication Interface
Blue VLAN
Engine
Orange VLAN
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
Centralized Forwarding with Fabric:
CEF720 to CEF720
D
Port Port
L3/4 Supervisor CEF720
ASIC ASIC CFC
Engine Engine 2T Module B
Fabric Interface/
6
L2 Engine 720Gbps Replication Bus
3 4 Switch 20Gbps Engine Interface
PFC4 Fabric
DBUS
RBUS
20Gbps
Source S
CEF720
Fabric Interface/
5 2Bus Module A Destination D
Replication Interface
Blue VLAN
Engine
Orange VLAN
Port Port
CEF720
ASIC ASIC DFC4
Supervisor Engine 2T L3/4 Module B
Engine w/DFC4
5
Fabric Interface/
720Gbps
PFC4 Switch 20Gbps Replication Layer 2
Fabric Engine Engine
20Gbps
Source S
CEF720
4 Destination D
Module A
Fabric Interface/ 2 Layer 2 Blue VLAN
w/DFC4
Replication 3Engine
Orange VLAN
Engine
L3/4
Engine Entire Packet
Port Port DFC4
ASIC ASIC Packet Header
1 Result
S
NOTE: Forwarding from CEF720 w/DFC3 to CEF720 is the same process
except CEF720 has a Bus connections
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Summary
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110
Conclusion
Any Questions?
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111
Complete Your Online
Session Evaluation
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112
Visit the Cisco Store for
Related Titles
http://theciscostores.com
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114
Thank you.
BRKARC-3465 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115