[c-nsp] Re: FE ignored errors

Jon Lewis jlewis at lewis.org
Sun Dec 19 18:50:38 EST 2004


I forgot to mention, IOS versions in use are:

rsp-k91pv-mz.122-18.S5.bin
rsp-k91pv-mz.122-18.S6.bin

On Sun, 19 Dec 2004, Jon Lewis wrote:

> I've recently started seeing large bursts (sometimes tens, usually
> thousands) of input ignored errors on several 7500 routers FE
> interfaces (rsp4, vip2-50, PA-FE-TX).  It's even happening on relatively
> low traffic ones that are only doing about 1/5 line rate traffic.
>
> I've seen Rodney's post from 11-24-04 warning not to try tuning the
> buffers, and have removed all custom hold-queue settings from the config
> on the least busy of the 7500s, and it's still having this problem.
>
> We're seeing this primarily on FE internet transit connections, but also
> to some degree on internal portchannel interfaces between our routers and
> 3550 switches that fan out to customer aggregation 3550 switches.
>
> The feature I'm guessing could be to blame is policy routing.  Ever since
> the nachi/welchia outbreak that followed blaster, I've had policy routing
> setup on all our transit connections to block the 92 byte echo/echo-reply
> packets nachi was famous for sending to pretty much the whole internet.
>
> I also have a short input ACL on all our transit interfaces that blocks
> SQL slammer and the DoS mentioned at http://www.lurhq.com/cisco-dos.html
>
> i.e. here's some config snippets from one of the routers.
>
> ip cef distributed
> interface FastEthernet6/0/0
>  ip access-group slammer+ciscodosopt in
>  ip verify unicast source reachable-via any
>  no ip unreachables
>  ip route-cache flow
>  no ip mroute-cache
>  ip policy route-map nachiworm
>  load-interval 30
>  full-duplex
>
> route-map nachiworm permit 10
>  match ip address nachilist
>  match length 92 92
>  set interface Null0
>
> ip access-list extended nachilist
>  permit icmp any any echo
>  permit icmp any any echo-reply
>
> ip access-list extended slammer+ciscodosopt
>  permit tcp any any
>  deny   udp any any eq 1434
>  permit udp any any
>  permit icmp any any
>  deny   53 any any log-input
>  deny   55 any any log-input
>  deny   77 any any log-input
>  deny   pim any any log-input
>  permit ip any any
>
> We still get quite a few hits on 1434/udp, and what could either be nachi
> or just people doing windows traceroute, and relatively few on the odd
> protos DoS.
>
> Short of just pulling all this (the policy routing and ACL) out and hoping
> our network isn't destroyed from within by infected customers, is there
> any way to diagnose whats causing the ignored errors?  I'm not seeing
> anything from show buffer fail (either on the RSP or VIPs) when we get
> bursts of ignores.  Show int stat shows what I think are normal values
> (most traffic being dcef switched, orders of magnitude less being
> processor switched).
>
> FastEthernet6/0/0
>           Switching path    Pkts In   Chars In   Pkts Out  Chars Out
>                Processor       9661    2256916      12471    1185150
>              Route cache          0          0          0          0
>        Distributed cache   34054578 10195735908   18164802 8416631117
>                    Total   34064239 10197992824   18177273 8417816267
>
> Processor load and memory (either on the RSP or VIPs) doesn't look
> problematic.
>
> ----------------------------------------------------------------------
>  Jon Lewis                   |  I route
>  Senior Network Engineer     |  therefore you are
>  Atlantic Net                |
> _________ http://www.lewis.org/~jlewis/pgp for PGP public key_________
>

----------------------------------------------------------------------
 Jon Lewis                   |  I route
 Senior Network Engineer     |  therefore you are
 Atlantic Net                |
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________


More information about the cisco-nsp mailing list