[f-nsp] Multicast is being switched by LP CPU on MLXe?
Eldon Koyle
ekoyle+puck.nether.net at gmail.com
Wed Mar 30 00:32:55 EDT 2016
I remember having a lot of trouble with multicast. I don't have the docs
handy, but I think there are some multicast cpu-protection commands you
could try.
--
Eldon Koyle
On Mar 29, 2016 9:21 PM, "Eldon Koyle" <ekoyle at gmail.com> wrote:
> I remember having a lot of trouble with multicast. I don't have the docs
> handy, but I think there are some multicast cpu-protection commands you
> could try.
>
> --
> Eldon Koyle
> On Mar 29, 2016 6:20 AM, "Alexander Shikoff" <minotaur at crete.org.ua>
> wrote:
>
>> Hello!
>>
>> I have some VLANs configured between certain ports on MLXe box (MLXe-16,
>> 5.7.0e).
>> All ports are in 'no route-only' mode. For example:
>>
>> telnet at lsr1-gdr.ki(config)#show vlan 720
>>
>> PORT-VLAN 720, Name V720, Priority Level 0, Priority Force 0, Creation
>> Type STATIC
>> Topo HW idx : 65535 Topo SW idx: 257 Topo next vlan: 0
>> L2 protocols : NONE
>> Statically tagged Ports : ethe 7/1 ethe 9/5 ethe 10/6 ethe 11/6 ethe
>> 13/3
>> Associated Virtual Interface Id: NONE
>> ----------------------------------------------------------
>> Port Type Tag-Mode Protocol State
>> 7/1 TRUNK TAGGED NONE FORWARDING
>> 9/5 TRUNK TAGGED NONE FORWARDING
>> 10/6 TRUNK TAGGED NONE FORWARDING
>> 11/6 TRUNK TAGGED NONE FORWARDING
>> 13/3 PHYSICAL TAGGED NONE FORWARDING
>> Arp Inspection: 0
>> DHCP Snooping: 0
>> IPv4 Multicast Snooping: Enabled - Passive
>> IPv6 Multicast Snooping: Disabled
>>
>> No Virtual Interfaces configured for this vlan
>>
>>
>>
>> As you may notice, passive multicast snooping is enabled on that VLAN.
>> The problem is that multicast traffic is being switched by LP CPU,
>> causing high CPU utilization and packet loss.
>>
>> It is clearly seen on rconsole:
>>
>> LP-11#debug packet capture rx include src-port me/6 vlan-id 720
>> dst-address 233.191.133.96
>> [...]
>> **********************************************************************
>> [ppcr_tx_packet] ACTION: Forward packet using fid 0xa06d
>> [ppcr_rx_packet]: Packet received
>> Time stamp : 56 day(s) 20h 48m 05s:,
>> TM Header: [ 0564 0aa3 0080 ]
>> Type: Fabric Unicast(0x00000000) Size: 1380 Class: 0 Src sys port: 2723
>> Dest Port: 0 Drop Prec: 2 Ing Q Sig: 0 Out mirr dis: 0x0 Excl src: 0 Sys
>> mc: 0
>> **********************************************************************
>> Packet size: 1374, XPP reason code: 0x000095cc
>> 00: 05f0 0003 5c50 02d0-7941 fffe 8000 0000 FID = 0x05f0
>> 10: 0100 5e3f 85b0 e4d3-f17d a7c5 0800 4516 Offset = 0x10
>> 20: 0540 0000 4000 7e11-f89f b060 df26 e9bf VLAN = 720(0x02d0)
>> 30: 85b0 04d2 04d2 052c-0000 4701 3717 8134 CAM = 0x0ffff(R)
>> 40: 01d0 92de c56f 18f6-dc4f 8d00 1273 cdb3 SFLOW = 0
>> 50: c3ff 3da8 2600 5a37-cfbe 993f dbfd c927 DBL TAG = 0
>> 60: 8000 8290 ef9b 7638-9089 9a50 5000 8611
>> 70: 2026 0079 8de2 a404-1013 dffd 04e0 1404
>> Pri CPU MON SRC PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
>> 0 0 0 11/6 3 0 1 0 1 1 1 0 0 0 1 0
>>
>> 176.96.223.38 -> 233.191.133.176 UDP [1234 -> 1234]
>> **********************************************************************
>>
>> As far as I understand documentation that should not happen.
>> The situation remains the same if I disable IGMP snooping.
>>
>> Any ideas/suggestions is kindly appreciated!
>>
>> Thanks in advance.
>>
>> --
>> MINO-RIPE
>> _______________________________________________
>> foundry-nsp mailing list
>> foundry-nsp at puck.nether.net
>> http://puck.nether.net/mailman/listinfo/foundry-nsp
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/foundry-nsp/attachments/20160329/32d49187/attachment.html>
More information about the foundry-nsp
mailing list