[c-nsp] Best practice - Core vs Access Router

Phil Mayers p.mayers at imperial.ac.uk
Tue Feb 9 10:22:50 EST 2010


On 09/02/10 13:45, Andy B. wrote:
>> Are these receive addresses in the router or transit?
>>
>> sh mls cef lookup x.x.160.112
>> sh mls cef lookup x.x.160.112 detail
>> <from output A:123>
>> sh mls cef adjacency entry 123 detail
>>
>
> #show buffers input-interface te9/1 header
>
> Buffer information for Small buffer at 0x50070DC8
>    data_area 0x80667C4, refcount 1, next 0x45475F58, flags 0x280
>    linktype 7 (IP), enctype 1 (ARPA), encsize 14, rxtype 1
>    if_input 0x4646B618 (TenGigabitEthernet9/1), if_output 0x0 (None)
>    inputtime 47w4d (elapsed 00:00:09.252)
>    outputtime 47w4d (elapsed 00:03:54.772), oqnumber 65535
>    datagramstart 0x806683A, datagramsize 62, maximum size 308
>    mac_start 0x806683A, addr_start 0x806683A, info_start 0x0
>    network_start 0x8066848, transport_start 0x8066878, caller_pc 0x4187C1F0
>
>    source: x.x.224.116, destination: y.y.176.97, id: 0x79FD, ttl: 121,
>    TOS: 0 prot: 6, source port 2844, destination port 445
>
> x.x = outside

Ok, so this is an inbound TCP packet to port 445, for a host which isn't 
in the ARP table, hence the glean:

> #sh mls cef lookup y.y.176.97
>
> Codes: decap - Decapsulation, + - Push Label
> Index  Prefix              Adjacency
> 20304  y.y.176.0/24    glean

Probably random malware/virus scanning.

Obviously the CPU will handle gleans (things which need an ARP lookup). 
As has been pointed out, you can enable the "glean" rate limiter but two 
points to bear in mind:

  1. It's box-global and there's no per-interface round-robin or 
anything. Basically you're telling it "only ever send me 200 packets 
which need an ARP lookup per second" and if some bad person on the 
internet sends you 201, they can crowd out legitimate local traffic (the 
glean rate-limiter should really be per input-SVI. Sigh...)

  2. It seems a bit unlikely that you'll suddenly get 5x more glean 
traffic at the exact peak of your forwarding rate, so this might be just 
random background traffic.


Personally I would use a SPAN or (E)RSPAN session monitoring the CPU 
during an outage to see what's actually hitting the CPU:

http://cisco.cluepon.net/index.php/6500_SPAN_the_RP

...this is a lot easier under later IOS, but can be done under SXF. Why 
guess what's hitting the CPU when you can *know*?


More information about the cisco-nsp mailing list