1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Cisco networkers 2009 session BRKAPP 3006 troubleshooting cisco wide area application services DDU

104 46 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 104
Dung lượng 2,48 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Redirect access-list: Total Packets Denied Redirect: 0-none-Total Packets Unassigned: 0 Group access-list: -none- Total Messages Denied to Group: 0 Total Authentication failures: 0 Total

Trang 1

Troubleshooting Cisco Wide Area

Application Services

BRKAPP-3006

Trang 2

Data Center Building Blocks

Application Networking Services

Application Delivery and Application Optimization

Network, Server, Storage and Management

Trang 3

Application data cache

Meta data cache

Network-based app recognition

Queuing, policing, shaping

Visibility, monitoring, control

Application Optimization Infrastructure

WAN

Trang 5

Wide Area Application Engine (WAE)

Object Storage

Wide Area Application Services (WAAS) Version 4.1

IOS Platform with Services and CLI

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash

IOS Shell

Linux

Application Storage

Virtual Blades

Configuration Management System (CMS)

SSL AO

Video

Virtual Blade

# 2

Virtual Blade

# 3

NFS AO

DRE Storage

Virtual Blade Storage /vbspace

Ethernet Network I/O

Trang 6

Diagnostic Reports

Trang 7

Self Diagnostic Tool

A Good Place to Start…

Trang 8

Self Diagnostic Tool

Trang 9

WAE674# show alarms major

-0 Thu Jun 19 19:12:18 2 -0 -08 core.exec_show_stats…

1074 Thu Jun 19 19:19:11 2008 diagnostic_report.txt

1216 Thu Jun 19 19:19:11 2008 diagnostic_report.xml WAE674#

Device Alarms

Core file causing alarm

Local copy of last diagnostic report

Trang 10

WAAS System Report

ƒ The WAAS system report (sysreport) contains a

compressed archive containing all relevant support

and system health information

ƒ The sysreport includes the following:

CLI command output, platform configuration and logs, platform state information, print services configuration and logs,

authentication configuration and logs, logs for internal services and acceleration, CMS configuration and logs, system logs, etc.

ƒ The sysreport can be generated from the WAE

Manager GUI or CLI:

Help Us Help You

WAE612# copy sysreport <disk | ftp | tftp>

Trang 11

Physical Components

Trang 12

Wide Area Application Engine (WAE)

Wide Area Application Services (WAAS) Version 4.1

IOS Platform with Services and CLI

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Virtual Blades

Configuration Management System (CMS)

SSL AO

Video

Virtual Blade

# 2

Virtual Blade

# 3

NFS AO

Object Storage

Flash

IOS Shell

Linux

Application Storage

DRE Storage

Virtual Blade Storage /vbspace

Ethernet Network I/O

Trang 13

Disk Health and Status

Online Defunct Missing

<null>

Rebuilding

Trang 14

Failed Disk Replacement

ƒ Disk failures are automatically detected by the system

Failed disks are automatically removed from service Not present or not responding (Shutdown) (*)

ƒ Administrator can also shutdown disk for scheduled

replacement:

WAE7326(config)# disk disk-name disk01 shutdown

Device maybe busy while going offline please wait!

mdadm: set /dev/sdb1 faulty in /dev/md0

mdadm: set /dev/sdb2 faulty in /dev/md1

Trang 15

Disk Partitions

WAE674# show disks details

RAID Physical disk information:

disk00: Online J8WM2DTC 286102 MB

disk01: Rebuilding J8WMPV9C 286102 MB

disk02: Online J8WMYG6C 286102 MB

RAID Logical drive information:

Enabled (read-cache) Enabled (write-back)

Mounted file systems:

MOUNT POINT TYPE DEVICE SIZE INUSE FREE USE%

/state internal /dev/sda3 7935MB 176MB 7759MB 2% /local/local1 SYSFS /dev/sda6 22318MB 139MB 22179MB 0% /local1/spool PRINTSPOOL /dev/data1/spool 991MB 32MB 959MB 3% /obj1 CONTENT /dev/data1/obj 248221MB 130MB 248091MB 0% /dre1 CONTENT /dev/data1/dre 248221MB 130MB 248091MB 0% /ackq1 internal /dev/data1/ackq 991MB 32MB 959MB 3% /plz1 internal /dev/data1/plz 2975MB 64MB 2911MB 2% Disk encryption feature is disabled.

WAE674#

Trang 16

Important Directories and Log Files

ƒ The following directories are used by Cisco WAAS

for log files:

/local1—Root directory for all log files /local1/logs—Service log files (aka “admin” logs) /local1/errorlog—Service log files (aka “debug” logs) /local1/core_dir—Process core dump files

ƒ File system navigation commands:

cd pwd dir type-tail <filename> <lines> [| | follow]

find-pattern

Trang 17

WAE7341# show int gi 1/0

Input Packets Dropped: 0

Input Packets Overruns: 0

Input Packets Frames: 0

Packet Sent: 12946

Output Errors: 0

Output Packets Dropped: 0

Output Packets Overruns: 0

Output Packets Carrier: 0

Output Queue Length:1000

Collisions: 64

Interrupts:16

Flags:UP BROADCAST RUNNING MULTICAST

Mode: autoselect, half-duplex, 100baseTX

Trang 18

Ethernet Interface Speed / Duplex

WAE7341# show int gi 1/0

Input Packets Dropped: 0

Input Packets Overruns: 0

Input Packets Frames: 0

Packet Sent: 12946

Output Errors: 0

Output Packets Dropped: 0

Output Packets Overruns: 0

Output Packets Carrier: 0

Output Queue Length:1000

Collisions: 64

Interrupts:16

Flags:UP BROADCAST RUNNING MULTICAST

Mode: autoselect, half-duplex, 100baseTX

WAE7341#

Verify Interface State, Speed and Duplex

Trang 19

CPU Utilization (Real Time)

WAE612# show processes system count 10 delay 5

< >

procs -memory - -swap -io system

cpu r b swpd free buff cache si so bi bo in cs us sy id wa

Subtract ‘id’ Column

from 100 to Get Current CPU Utilization

Trang 20

CPU Utilization (Historical)

Trang 21

Platform

Trang 22

Wide Area Application Engine (WAE)

Object Storage

Wide Area Application Services (WAAS) Version 4.1

IOS Platform with Services and CLI

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash

IOS Shell

Linux

Application Storage

Virtual Blades

Configuration Management System (CMS)

SSL AO

Video

Virtual Blade

# 2

Virtual Blade

# 3

NFS AO

DRE Storage

Virtual Blade Storage /vbspace

Ethernet Network I/O

Trang 23

Redirect access-list: Total Packets Denied Redirect: 0

-none-Total Packets Unassigned: 0 Group access-list: -none- Total Messages Denied to Group: 0

Total Authentication failures: 0 Total Bypassed Packets Received: 0 More

Client = WAE

Trang 24

Redirect access-list: Total Packets Denied Redirect: 0

-none-Total Packets Unassigned: 0 Group access-list: -none- Total Messages Denied to Group: 0

Total Authentication failures: 0 Total Bypassed Packets Received: 0 More

Verify That Counters Are Incrementing on Software- Based Platforms

Trang 25

Service Identifier: 61

Number of Service Group Clients: 1 Number of Service Group Routers: 1 Total Packets s/w Redirected: 68755 Process: 2

CEF: 68753 Service mode: Open Service access-list: -none- Total Packets Dropped Closed: 0

Redirect access-list:

-none-Total Packets Denied Redirect: 0

Total Packets Unassigned: 0 Group access-list: -none- Total Messages Denied to Group: 0

Total Authentication failures: 0 Total Bypassed Packets Received: 0 More

Counter Will Increment for Packets That Match

Service Group but Do Not Match Redirect-List

Trang 26

Service Identifier: 61

Number of Service Group Clients: 1 Number of Service Group Routers: 1 Total Packets s/w Redirected: 68755 Process: 2

CEF: 68753 Service mode: Open Service access-list: -none- Total Packets Dropped Closed: 0

Redirect access-list: Total Packets Denied Redirect: 0

-none-Total Packets Unassigned: 0 Group access-list: -none- Total Messages Denied to Group: 0

Total Authentication failures: 0

Total Bypassed Packets Received: 0 More

Increments for Every Packet Received with Incorrect Service Group Password

Trang 27

Interception Verification (IOS) - SW

Router# show ip wccp 61 detail

WCCP Client information:

WCCP Client ID: 10.88.81.242 Protocol Version: 2.0

State: Usable Redirection: GRE Packet Return: GRE Assignment: HASH Initial Hash Info: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF Assigned Hash Info: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF Hash Allotment: 256 (100.00%)

Packets s/w Redirected: 68755 Connect Time: 3w6d Bypassed Packets

Process: 2 CEF: 68753 Errors: 0

Verify WAE State in Service Group

% of Hash Buckets Assigned Current Time in the Service Group

Trang 28

Interception Verification (IOS) - SW

Router# show ip wccp 61 hash 0.0.0.0 10.88.81.10 0 0

WCCP hash information for:

Primary Hash: Src IP: 10.88.81.10

Trang 29

Interception Verification (IOS) - HW

Cat6k# sh ip wccp 61 det

WCCP Client information:

WCCP Client ID: 10.88.80.135 Protocol Version: 2.0

State: Usable

Redirection: L2

Packet Return: GRE Packets Redirected: 0 Connect Time: 1d18h

Service group mask

Trang 30

Interception Verification (IOS) - HW

Cat6k# show tcam interface Vlan900 acl in ip

* Global Defaults not shared

Entries from Bank 0

Entries from Bank 1

permit tcp host 10.88.80.135 any

punt ip any any (8 matches)

Cat6k#

‘Punt’ entries caused by: Hash Assignment

Outbound Redirection Redirect Exclude In Unknown WAE MAC

ƒ Catalyst 6500 / 7600 platforms are capable of WCCP in both software and hardware forwarding paths

ƒ Inspecting TCAM programming shows whether WCCP

is handled in software or hardware

Trang 31

Interception Verification (IOS) - HW

Cat6k# show ip wccp 61 internal

Internal WCCP client information (1):

Index: 0 WCCP Client ID: 10.88.80.135 Protocol Version: 2.0

State: 0007 (AUV ) Connect Time: 00:00:05 Redirection: L2

MAC: 0000.0000.0000 Packet Return: GRE

L2 Address Changes: 0 Assignment: MASK Redirect Assignments:

Received: 0 Invalid: 0 Duplicate: 0

< snip >

Cat6k#

HIA from WAE must enter same interface that WAE MAC is known through

Cat6k# configure terminal

Enter configuration commands, one per line End with CNTL/Z.

Cat6k(config)# service internal

Cat6k(config)# end

Cat6k#

Trang 32

Interception Verification (IOS) - HW

Cat6k# sh tcam int vlan 900 acl in ip

* Global Defaults not shared

Entries from Bank 0

Entries from Bank 1

permit tcp host 10.88.80.135 any

policy-route tcp any 0.0.0.0 255.255.232.190 (60 matches)

policy-route tcp any 0.0.0.1 255.255.232.190 (8 matches)

policy-route tcp any 0.0.0.64 255.255.232.190 (16 matches)

policy-route tcp any 0.0.0.65 255.255.232.190 (19 matches)

policy-route tcp any 0.0.2.65 255.255.232.190 (75 matches)

policy-route tcp any 0.0.3.0 255.255.232.190 (222195 matches)

‘policy-route’ entries = full hardware redirection

Trang 33

WCCPv2 Interception Verification (WAE)

WAE-612# show wccp services

Services configured on this File Engine

TCP Promiscuous 61 TCP Promiscuous 62

WAE-612# show wccp status

WCCP version 2 is enabled and currently active

WAE-612# show wccp routers

Router Information for Service: TCP Promiscuous 61

Routers Seeing this Wide Area Engine(1)

Router Id Sent To Recv ID AssKeyIP AssKeyCN MemberCN

Verify Bi-Directional Communication with WCCP- Enabled Routers

Trang 34

WAE-612# show wccp gre

Transparent GRE packets received: 5531561

Transparent non-GRE packets received: 0

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted: 5051

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 0

Packets sent to another WAE: 0

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More Either of These Counters Should Be Incrementing If WCCP Redirection Is Working

show wccp gre

Trang 35

WAE-612# show wccp gre

Transparent GRE packets received: 0

Transparent non-GRE packets received: 234624

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted: 72511

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 0

Packets sent to another WAE: 0

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More For Packets Redirected Using WCCP L2-Redirect Forwarding Method

show wccp gre

Trang 36

WAE-612# show wccp gre

Transparent GRE packets received: 0

Transparent non-GRE packets received: 0

Transparent non-GRE non-WCCP packets received: 102764

Total packets accepted: 98723

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 0

Packets sent to another WAE: 0

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More For Packets L2 Redirected Using Non-WCCP (L4, PBR, Etc.) Interception Method

show wccp gre

Trang 37

WAE-612# show wccp gre

Transparent GRE packets received: 753110

Transparent non-GRE packets received: 0

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted: 505123

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 0

Packets sent to another WAE: 0

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More Packets Accepted for Optimization (I.E Auto- Discovery Found

Peer WAE)

show wccp gre

Trang 38

WAE-612# show wccp gre

Transparent GRE packets received: 345678

Transparent non-GRE packets received: 0

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted: 5051

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 234514

Packets sent to another WAE: 0

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More Only Includes Packets Handled Using WCCP Return Egress Method

show wccp gre

Trang 39

WAE-612# show wccp gre

Transparent GRE packets received: 23534

Transparent non-GRE packets received: 0

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted: 5051

Invalid packets received: 0

Packets received with invalid service: 0

Packets received on a disabled service: 0

Packets received too small: 0

Packets dropped due to zero TTL: 0

Packets dropped due to bad buckets: 0

Packets dropped due to no redirect address: 0

Packets dropped due to loopback redirect: 0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load: 0

Packets sent back to router: 0

GRE packets sent to router (not bypass) 0

Packets sent to another WAE: 1444

GRE fragments redirected: 0

GRE encapsulated fragments received: 0

Packets failed encapsulated reassembly: 0

Packets failed GRE encapsulation: 0

More show wccp gre

Packets Forwarded Directly Between WAE’s Due to WCCP Flow Protection

Trang 40

WAE674# show egress-methods

Intercept method : WCCP

TCP Promiscuous 61 :

WCCP negotiated return method : WCCP GRE

Egress Method Egress Method Destination Configured Used - - - any WCCP Negotiated Return WCCP GRE

TCP Promiscuous 62 :

WCCP negotiated return method : WCCP GRE

Egress Method Egress Method Destination Configured Used - - - any WCCP Negotiated Return WCCP GRE

< snip >

WAE674#

Egress Method

IP Forwarding WCCP GRE Generic GRE

Ngày đăng: 27/10/2019, 21:56

TỪ KHÓA LIÊN QUAN