[c-nsp] Better way of finding out the source of process switched traffic?

Rodney Dunn rodunn at cisco.com
Thu Jan 27 09:09:37 EST 2005


Tidbit: When you are collecting command outputs to
help troubleshoot enable this for your terminal
session:

terminal exec prompt timestamp

Then do:

clear counters
sh int stat
sh int | incl protocol|bits/sec

wait 30 seconds

clear counters
sh int stat
sh int | incl protocol|bits/sec


what percentage of the traffic is being
punted to process level?

Run the 'sh buff' commands like I gave you
and let's see a few of the packets.

Rodney




tOn Thu, Jan 27, 2005 at 08:58:05AM -0500, Dave Temkin wrote:
> Thanks Rodney.
> 
> The one thing I'm hesitant to blame it on is the fact that the actual
> NAT'ed traffic is very very little (it's AIM conversations, that's it).
> So I'm wondering why on a box that's as big as this one (NPE-400) it'd
> choke on that...
> 
> -Dave
> 
> -- 
> David Temkin
> 
> On Thu, 27 Jan 2005, Rodney Dunn wrote:
> 
> > Your problem is almost surely that the packets
> > being punted are TCP control packets where
> > we punt to create/tear down the translations.
> > SYN, FIN, RST.
> >
> > If you want to see the packets at process
> > level you can either turn on:
> > debug ip packet <acl> to limit the granularity of
> > the debug since that only prints packets at process
> > level. /*not true for 12.2S with the right commands*/
> >
> > You can also do "sh buffers input-interface <name> packet"
> > a few times and catch some packets in the buffer and
> > manually decode the TCP header to see if the flags are set
> > in the header.
> >
> > Now, in 12.3(4)T and later we made some NAT enhancements
> > where we create the flows in the CEF path without punting
> > traffic.  That is the suggested way to go if you are seeing
> > a high number of process switched traffic with NAT enabled.
> >
> > Rodney
> >
> > On Thu, Jan 27, 2005 at 07:42:33AM -0500, Dave Temkin wrote:
> > > I've got an internet-facing router that's seeing a very high rate of
> > > process switched traffic.  Nothing too crazy is configured on this router
> > > - a little bit of NAT, a couple of route maps, BGP.  That's about it.
> > > Aside from doing a debug ip packet and killing the router (it's passing
> > > about 30-40mbit of traffic), are there any other options for tracking down
> > > what's in the process queue?  Router is running 12.3.6a
> > >
> > > FastEthernet0/0
> > >           Throttle count          4
> > >                    Drops         RP          5         SP          0
> > >              SPD Flushes       Fast       3103        SSE          0
> > >              SPD Aggress       Fast          0
> > >             SPD Priority     Inputs   83215964      Drops          0
> > >
> > >     Protocol  IP
> > >           Switching path    Pkts In   Chars In   Pkts Out  Chars Out
> > >                  Process 1803602701 4025634609 1661069368  456573125
> > >             Cache misses          0          -          -          -
> > >                     Fast 2713542052 1802705001 3837108389  304620460
> > >                Auton/SSE          0          0          0          0
> > >
> > >
> > > FastEthernet1/0 Outside
> > >           Throttle count          0
> > >                    Drops         RP          0         SP          0
> > >              SPD Flushes       Fast       1796        SSE          0
> > >              SPD Aggress       Fast          0
> > >             SPD Priority     Inputs    6927146      Drops          0
> > >
> > >     Protocol  IP
> > >           Switching path    Pkts In   Chars In   Pkts Out  Chars Out
> > >                  Process  543622379 2397426796  317919218 1743487367
> > >             Cache misses          0          -          -          -
> > >                     Fast 3071349692 1923264716 1211037578 2505497398
> > >                Auton/SSE          0          0          0          0
> > >
> > >
> > > FastEthernet2/0 Outside 2
> > >           Throttle count          0
> > >                    Drops         RP          0         SP          0
> > >              SPD Flushes       Fast       1480        SSE          0
> > >              SPD Aggress       Fast          0
> > >             SPD Priority     Inputs   42435822      Drops          0
> > >
> > >     Protocol  IP
> > >           Switching path    Pkts In   Chars In   Pkts Out  Chars Out
> > >                  Process 1056561152 1934756549 1414955036 1939153311
> > >             Cache misses          0          -          -          -
> > >                     Fast  819752907  318162363 1502399074 1302221329
> > >                Auton/SSE          0          0          0          0
> > >
> > >
> > > !
> > > interface FastEthernet0/0.101
> > >  encapsulation dot1Q 101
> > >  ip address x.x.x.x x.x.x.x.x
> > >  no ip redirects
> > >  no ip proxy-arp
> > >  ip nat inside
> > >  ip policy route-map RM101
> > >  no cdp enable
> > >  standby 101 ip x.x.x.y
> > >  standby 101 timers 1 3
> > >  standby 101 priority 250
> > >  standby 101 preempt
> > >  standby 101 name HSRP101
> > > !
> > >
> > > !
> > > interface FastEthernet1/0
> > >  description Outside 1
> > >  ip address x.x.x.x x.x.x.x
> > >  ip access-group Yipes-Outside in
> > >  ip nat outside
> > >  load-interval 30
> > >  duplex full
> > >  ntp disable
> > >  hold-queue 300 in
> > >  hold-queue 300 out
> > >
> > >
> > > -Dave
> > > _______________________________________________
> > > cisco-nsp mailing list  cisco-nsp at puck.nether.net
> > > https://puck.nether.net/mailman/listinfo/cisco-nsp
> > > archive at http://puck.nether.net/pipermail/cisco-nsp/
> >


More information about the cisco-nsp mailing list