Ace Ts Guide
Ace Ts Guide
Ace Ts Guide
com users to contribute to this wiki to collaborate on Cisco product documentation. You do not need to log in to read the text. However, you must log in to edit the text. Select the "edit" tab to edit an article or select the "discussion" tab to submit questions or comments about documentation content. See Terms of Use and About DocWiki for more information about Cisco DocWiki. Click here to go to the Cisco ACE Module documentation on www.cisco.com. Click here to go to the Cisco ACE Appliance documentation on www.cisco.com.
Contents
1 Audience 2 Organization 3 Creating a PDF of the ACE Troubleshooting Wiki 4 Related Documentation 4.1 ACE Module Documentation 4.2 ACE Appliance Documentation
This article provides a systematic approach to identifying and remedying problems that may arise as you use your ACE over a period of time. This guide is not intended to replace configuration best practices or to be an all-inclusive guide for every application. Rather, it is an attempt to provide you with the knowledge and skills necessary to correct the most common issues that you may encounter.
Audience
This article is intended for all trained network administrators who have experience with the configuration and maintenance of the ACE.
Organization
This article consists of the following major sections: Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting Ethernet Ports (ACE appliance) Troubleshooting Remote Access Contents 1
Cisco Application Control Engine (ACE) Troubleshooting Guide Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing Resources Show Counter Reference
Related Documentation
ACE Module Documentation
Customer Documentation for the Cisco Application Control Engine (ACE) Module Cisco Application Control Engine (ACE) Configuration Examples on DocWiki
Cisco Application Control Engine (ACE) Troubleshooting Guide Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of the ACE Troubleshooting Process 2 Verifying the ACE Image 3 Enabling ACE Logging 4 Gathering ACE Troubleshooting Information 4.1 Rebooting the ACE 4.2 Using show Commands 4.3 Capturing Packets in Real Time 4.4 Copying Core Dumps 4.5 After Gathering Troubleshooting Information 5 Verifying the Physical Connectivity Between the ACE and the End Hosts 6 Verifying the ACE Layer 2 Connectivity 7 Verifying the ACE Layer 3 Connectivity 8 Contacting Cisco Technical Support
12.2[121] A2(2.0) [build 3.0(0)A2(2.0)] <-------[LCP] disk0:c6ace-t1k9-mzg.A2_2_0.bin <-------no feature license is installed
Hardware Cisco ACE (slot: 5) cpu info: number of cpu(s): 2 cpu type: SiByte cpu: 0, model: SiByte SB1 V0.2, speed: 700 MHz cpu: 1, model: SiByte SB1 V0.2, speed: 700 MHz memory info: total: 955396 kB, free: 289704 kB shared: 0 kB, buffers: 2336 kB, cached 0 kB
configuration register: 0x1 ACE_module5 kernel uptime is 4 days 22 hours 42 minute(s) 41 second(s)
This command provides other useful information, for example: Slot in which the ACE resides in the Catalyst 6500 series switch (in this case, slot 5) Available control plane memory Last boot reason Configuration register (confreg) value (0x0 boot to rommon, 0x1 boot using boot string) ACE uptime
Note: Use the terminal no monitor command to stop viewing log messages in your remote session. For more information about logging, see the "Troubleshooting with ACE Logging" section.
Note: Ensure that the ACL you specify in the capture command is for an input interface. If you configure the packet capture on the output interface, the ACE will fail to match any packets. 3. Display the capture status to determine the capture status and the buffer size by entering the following command:
ACE_module5/Admin# show capture CAPTURE1 status Capture session Buffer size Circular Buffer usage Status : : : : : TEST 64 K no 0.00% stopped
Notice that the capture has not started yet. The default buffer size is 64 KB. You can specify a maximum of buffer size of 5000 KB and you can specify a circular buffer. 4. Start the packet capture on the ACE by entering the following command:
ACE_module5/Admin# capture CAPTURE1 start 11:56:15.354930 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 62: 209.165.201.10.4144 > 172.16.1.100.80: S [bad tcp cksum 2ae 11:56:15.355257 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 62: 209.165.201.10.4144 > 192.168.1.11.80: S [bad tcp cksum c6 11:56:15.355669 0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 58: 192.168.1.11.80 > 209.165.201.10.4144: S [tcp sum ok] 118 11:56:15.355979 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 58: 172.16.1.100.80 > 209.165.201.10.4144: S [bad tcp cksum 641 11:56:15.356442 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 56: 209.165.201.10.4144 > 172.16.1.100.80: . [tcp sum ok] ack 1 11:56:15.356839 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 56: 209.165.201.10.4144 > 192.168.1.11.80: . [bad tcp cksum 9b 11:56:15.357203 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 494: 209.165.201.10.4144 > 172.16.1.100.80: P [tcp sum ok] 1:44 11:56:15.357918 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 494: 209.165.201.10.4144 > 192.168.1.11.80: P [bad tcp cksum 9
0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 56: 192.168.1.11.80 > 209.165.201.10.4144: . [tcp sum ok] ack 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 56: 172.16.1.100.80 > 209.165.201.10.4144: . [bad tcp cksum 641 0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 272: 192.168.1.11.80 > 209.165.201.10.4144: P [tcp sum ok] 1: 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 272: 172.16.1.100.80 > 209.165.201.10.4144: P [bad tcp cksum 64 0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 407: 192.168.1.11.80 > 209.165.201.10.4144: P [tcp sum ok] 21 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 407: 172.16.1.100.80 > 209.165.201.10.4144: P [bad tcp cksum 64 0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 56: 192.168.1.11.80 > 209.165.201.10.4144: F [tcp sum ok] 572 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 56: 172.16.1.100.80 > 209.165.201.10.4144: F [bad tcp cksum 641 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 56: 209.165.201.10.4144 > 172.16.1.100.80: . [tcp sum ok] ack 5 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 56: 209.165.201.10.4144 > 192.168.1.11.80: . [bad tcp cksum 9b 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 56: 209.165.201.10.4144 > 172.16.1.100.80: . [tcp sum ok] ack 5 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 56: 209.165.201.10.4144 > 192.168.1.11.80: . [bad tcp cksum 9b 0:1c:f9:9:18:0 0:b:fc:fe:1b:1 0800 56: 209.165.201.10.4144 > 172.16.1.100.80: F [tcp sum ok] 441:4 0:b:fc:fe:1b:1 0:c:29:f3:cd:e6 0800 56: 209.165.201.10.4144 > 192.168.1.11.80: F [bad tcp cksum 9b 0:c:29:f3:cd:e6 0:18:b9:a6:89:d 0800 56: 192.168.1.11.80 > 209.165.201.10.4144: . [tcp sum ok] ack 0:b:fc:fe:1b:1 0:1c:f9:9:18:0 0800 56: 172.16.1.100.80 > 209.165.201.10.4144: . [bad tcp cksum 641
You can also copy the packet capture to an FTP, SFTP, or TFTP server. 6. Display the messages and connections within a packet capture by entering the following command:
ACE_module5/Admin# show capture CAPTURE1 0001: msg_type: ACE_HIT ace_id: 637 0002: msg_type: CON_SETUP con_id: 1308623156 0003: msg_type: PKT_RCV con_id: 1308623156 0004: msg_type: PKT_XMT con_id: 167772463 0005: msg_type: PKT_RCV con_id: 167772463 0006: msg_type: PKT_XMT con_id: 1308623156 <snip> 0025: msg_type: PKT_RCV con_id: 167772463 0026: msg_type: PKT_XMT con_id: 1308623156 0027: msg_type: CON_CLOSE con_id: 167772463 0028: msg_type: CON_CLOSE con_id: 1308623156 action_flag: out_con_id: other_con_id: other_con_id: other_con_id: other_con_id: other_con_id: other_con_id: reason: reason: 0x3 167772463 0 0 0 0 0 0 0 0
7. Display the details of each packet within a capture by entering the following command:
ACE_module5/Admin# show capture CAPTURE1 detail 0001: msg_type: ACE_HIT ace_id: 637 action_flag: 0x3 src_addr: 209.165.201.10 src_port: 4144 dst_addr: 172.16.1.100 dst_port: 80 l3_protocol: 0 l4_protocol: 6 message_hex_dump: 0x0000: 0006 0104 0000 027d 0000 0000 d1a5 c90a .......}........ 0x0010: ac10 0164 0609 0013 1030 0050 0000 0000 ...d.....0.P.... 0x0020: 0052 0000 05b4 0000 0000 027d 0300 0000 .R.........}.... 0x0030: 0000 0040 0000 0000 0000 0000 0000 0000 ...@............ 0x0040: 0000 0000 0000 0001 ........ 0002: msg_type: CON_SETUP con_id: 1308623156 out_con_id: 167772463 src_addr: 209.165.201.10 src_port: 4144 dst_addr: 172.16.1.100 dst_port: 80
0003: msg_type: PKT_RCV con_id: 1308623156 message_hex_dump: 0x0000: 0500 0050 0050 8034 0x0010: 0020 000b fcfe 1b01 0x0020: 4500 0030 0933 4000 0x0030: ac10 0164 1030 0050 0x0040: 7002 faf0 18fd 0000 0004: msg_type: PKT_XMT con_id: 167772463 message_hex_dump: 0x0000: 4010 0050 0050 8034 0x0010: 0004 000c 29f3 cde6 0x0020: 4500 0030 0933 4000 0x0030: c0a8 010b 1030 0050 0x0040: 7002 faf0 18fd 0000 0005: msg_type: PKT_RCV con_id: 167772463 message_hex_dump: 0x0000: 0500 004c 0050 8034 0x0010: 0020 0018 b9a6 890d 0x0020: 4500 002c 0000 4000 0x0030: d1a5 c90a 0050 1030 0x0040: 6012 16d0 6df5 0000 0006: msg_type: PKT_XMT con_id: 1308623156 message_hex_dump: 0x0000: 4010 004c 0050 8034 0x0010: 0004 001c f909 1800 0x0020: 4500 002c 0000 4000 0x0030: d1a5 c90a 0050 1030 0x0040: 6012 16d0 6df5 0000 0007: msg_type: PKT_RCV con_id: 1308623156 message_hex_dump: 0x0000: 0500 004a 0050 8034 0x0010: 0020 000b fcfe 1b01 0x0020: 4500 0028 0934 4000 0x0030: ac10 0164 1030 0050 0x0040: 5010 faf0 05ad 0000 0008: msg_type: PKT_XMT con_id: 167772463 message_hex_dump:
other_con_id: 0 0008 001c 7f06 3008 0204 0014 f909 aa70 e684 05b4 0010 1800 d1a5 e5b3 0101 1488 0800 c90a f25e 0101 ...P.P.4........ ................ E..0.3@....p.... ...d.0.P0......^ p...............
other_con_id: 0 0000 000b 7f06 4a54 0204 0028 fcfe aa70 f426 05b4 0000 1b01 d1a5 0000 0101 0088 0800 c90a 0000 0101 @..P.P.4...(.... ....)........... E..0.3@....p.... .....0.PJT.&.... p...............
other_con_id: 0 0008 000c 4006 46ca 0204 0028 29f3 de68 2127 05b4 0010 cde6 c0a8 4a54 2888 0800 010b f427 ...L.P.4...(..(. ..........)..... E..,..@.@..h.... .....P.0F.!'JT.' `...m.......
other_con_id: 0 0000 000b 4006 2c7e 0204 0014 fcfe de68 1385 05b4 0000 1b01 ac10 3008 0088 0800 0164 e685 @..L.P.4........ ................ E..,..@.@..h...d .....P.0,~..0... `...m.......
other_con_id: 0 0008 001c 7f06 3008 0000 0014 f909 aa77 e685 0010 1800 d1a5 2c7e 1488 0800 c90a 1386 ...J.P.4........ ................ E..(.4@....w.... ...d.0.P0...,~.. P.........
other_con_id: 0
0009: msg_type: PKT_RCV con_id: 1308623156 message_hex_dump: 0x0000: 0500 0200 0050 8034 0x0010: 0020 000b fcfe 1b01 0x0020: 4500 01e0 0935 4000 0x0030: ac10 0164 1030 0050 0x0040: 5018 faf0 a0bb 0000 0x0050: 6c6c 2e68 746d 6c20 0x0060: 0d0a 486f 7374 3a20 0x0070: 2e31 3030 0d0a 5573 0010: msg_type: PKT_XMT con_id: 167772463 message_hex_dump: 0x0000: 4010 0200 0050 8034 0x0010: 0004 000c 29f3 cde6 0x0020: 4500 01e0 0935 4000 0x0030: c0a8 010b 1030 0050 0x0040: 5018 faf0 a0bb 0000 0x0050: 6c6c 2e68 746d 6c20 0x0060: 0d0a 486f 7374 3a20 0x0070: 2e31 3030 0d0a 5573 <snip>
other_con_id: 0 0008 001c 7f06 3008 4745 4854 3137 6572 0014 f909 a8be e685 5420 5450 322e 2d41 0010 1800 d1a5 2c7e 2f73 2f31 3136 6765 1488 0800 c90a 1386 6d61 2e31 2e31 6e74 .....P.4........ ................ E....5@......... ...d.0.P0...,~.. P.......GET./sma ll.html.HTTP/1.1 ..Host:.172.16.1 .100..User-Agent
other_con_id: 0 0000 000b 7f06 4a54 4745 4854 3137 6572 0028 fcfe a8be f427 5420 5450 322e 2d41 0000 1b01 d1a5 46ca 2f73 2f31 3136 6765 0088 0800 c90a 2128 6d61 2e31 2e31 6e74 @....P.4...(.... ....)........... E....5@......... .....0.PJT.'F.!( P.......GET./sma ll.html.HTTP/1.1 ..Host:.172.16.1 .100..User-Agent
Note: If you view the ACE capture file in a third-party sniffer (for example, Wireshark), you will notice only the messages or type PKT_RCV and PKT_XMT are displayed. This situation is expected because the sniffer is not aware of the ACE's internal messaging.
You can copy the contents of the core: directory to several locations by using the copy core: command. The syntax of this command is as follows: copy {core:filename | disk0:[path/]filename | running-config | startup-config} {ftp://server/path[/filename] | sftp://[username@]server/path[/filename] | tftp://server[:port]/path[/filename]} The ACE provides core dumps for both the control plane and the data plane. Each core dump file contains the following information: Version Time of failure Copying Core Dumps 9
Cisco Application Control Engine (ACE) Troubleshooting Guide Number of CPUs Current CPU BKL status IRQ lock status Buffers
Verifying the Physical Connectivity Between the ACE and the End Hosts
To verify the physical connectivity of the ACE, follow these steps: 1. Check all cable connections on the Catalyst 6500 series switch or Cisco 7600 series router that may impact the ACE. 2. Use the extended ping command to send an ICMP Echo request to the end devices.
ACE_module5/Admin# ping Target IP address: 10.1.1.2 Repeat count [5]: 4 Datagram size [100]: 200 Timeout in seconds [2]: 10 Extended commands [n]: 4 Pinging 10.1.1.2 with timeout = 10, count = 4, size = 200 .... Response Response Response Response 4 packet from 10.1.1.2 : seq 1 time from 10.1.1.2 : seq 2 time from 10.1.1.2 : seq 3 time from 10.1.1.2 : seq 4 time sent, 4 responses received, 0.494 ms 0.367 ms 0.264 ms 0.237 ms 0% packet loss
If a host is one hop away and you are unable to reach the host, then ping the intermediary gateway. If the gateway is not reachable, enter the show ip route command and check to make sure that the correct route is displayed. For example, enter:
ACE_module5/Admin# show ip route Routing Table for Context Admin (RouteId 0) Codes: H - host, I - interface S - static, N - nat A - need arp resolve,
E - ecmp
Destination Gateway Interface Flags -----------------------------------------------------------------------0.0.0.0 10.2.2.1 vlan130 S [0xc] 10.2.2.0/24 0.0.0.0 vlan130 IA [0x30] 172.27.15.0/24 0.0.0.0 vlan100 IA [0x30] 172.27.16.0/24 0.0.0.0 vlan200 IA [0x30] 172.19.110.0/26 0.0.0.0 vlan55 IA [0x30] 172.27.16.16/29 0.0.0.0 vlan200 N [0x280] 172.27.16.33/32 0.0.0.0 vlan100 N [0x280]
2. Verify that the ACE is connected to the switch fabric of the Catalyst 6500 series switch or the Cisco 7600 series router. The ACE uses a 10-Gigabit Ethernet switch fabric interface (SFI) to connect to the chassis backplane as opposed to the CSM, which uses a port channel. The ACE uses the following format for this interface: Te<slot>/1 For example, if the ACE is in slot 5, you can see the status of the backplane connection by entering the following command on the Catalyst 6500 series switch or the Cisco 7600 series router:
cat6k# show interface te5/1 status Port Te5/1 Name Status connected Vlan trunk Duplex Speed Type full 10G MultiService Module
If there is no output from this command, then either the ACE is not installed properly or the ACE is powered down. 3. Verify the association of the ACE MAC entries with the allocated VLAN interfaces. Enter the following command at the Supervisor CLI:
cat6k# show Legend: * age n/a mac-address-table dynamic primary entry - seconds since last seen - not available
vlan mac address type learn age ports ------+----------------+--------+-----+----------+-------------------------. . . * 130 0018.b9a6.9115 dynamic Yes 40 Te5/1 <------- MAC address should be in the range displayed by . . .
Verifying the Physical Connectivity Between the ACE and the EndHosts
11
4. Check the status of the Te5/1 port to ensure that it is in the forwarding state by entering the following command:
cat6k# show spanning-tree vlan 130 MST0 Spanning tree enabled protocol mstp Root ID Priority 32768 Address 0001.632f.2c17 Cost 200019 Port 642 (GigabitEthernet6/2) Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Bridge ID Priority Address Hello Time Role ---Desg Desg Desg Desg Root Desg Sts --FWD FWD FWD FWD FWD FWD 32768 (priority 32768 sys-id-ext 0) 0011.bc06.f800 2 sec Max Age 20 sec Forward Delay 15 sec Cost --------20000 200000 2000 2000 200000 2000 Prio.Nbr -------128.142 128.165 128.257 128.513 128.642 128.897 Type -------------------------------P2p P2p Edge P2p Edge P2p Shr Bound(STP) Edge P2p
12
Cisco Application Control Engine (ACE) Troubleshooting Guide Date that you received the ACE Chassis serial number (located on a label on the right side of the rear panel of the chassis) Type of software and release number (if possible, enter the show version command) Maintenance agreement or warranty information Brief description of the problem Brief explanation of the steps that you have already taken to isolate and resolve the problem For information on steps to take before calling Technical Support, see the "Gathering ACE Troubleshooting Information" section. You can reach TAC in several ways as follows: Create a service request online Call the TAC at the telephone numbers on this page. Contact the Cisco Small Business Support Center
This article describes the ACE architecture and how data flows into, gets processed, and flows out of the ACE. It provides a basic understanding of these concepts to assist you in troubleshooting the ACE.
Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Understanding the ACE Architecture 1.1 Overview of the ACE Hardware Architecture 1.2 Control Plane 13
Cisco Application Control Engine (ACE) Troubleshooting Guide 1.3 Data Plane 1.3.1 Classification and Distribution Engine 1.3.2 Network Processors 1.3.3 SSL Crypto Module 2 Understanding the ACE Traffic Flow 2.1 To-the-ACE Traffic 2.2 Through-the-ACE Traffic
Contents
14
A console connection allows direct access to the ACE control plane (CP) for initial configuration, management, and troubleshooting. The supervisor engine connection allows you to determine the status of the ACE, to load images into the ACE, to reboot the ACE, and to provide remote access to the ACE from the Catalyst 6500 series switch or Cisco 7600 series router when you use the session command. Because the ACE has no external ports, packets enter the ACE through the Switch Fabric Interface (SFI) connected to the Catalyst 6500 series switch or Cisco 7600 series router back plane. The two major functional areas of the ACE are as follows: Control plane Data plane
Control Plane
The control plane (CP) is used to configure the ACE and for management traffic, syslogs, ARP, DHCP, and so on. You can access the CP directly by using the console port. For remote management, you must configure a management interface and enable remote access using a management policy to permit Telnet or SSH access, for example. The CP is responsible for the following ACE functions: Device management and control Configuration management (CLI or XML interface) Server health monitoring syslogs SNMP Address Resolution Protocol (ARP) DHCP relay Redundancy (also known as high availability or fault tolerance) Access control list (ACL) compilation
15
Data Plane
The data plane (DP) is responsible for distributing and processing packets and connections that do not match a management policy. In the ACE, the CP and the DP are separated and run on different processors for maximum performance. See Figure 2.
The DP is responsible for the following ACE functions: Access control lists (ACLs) Connection management TCP termination Network address translation (NAT) SSL processing (termination, initiation, encryption, and decryption) Regular expression matching Load balancing and forwarding Application protocol inspection The DP consists of the following functional areas: Classification distribution engine (CDE) Data Plane 16
Cisco Application Control Engine (ACE) Troubleshooting Guide Network processors (NPs) SSL Crypto Module Daughter card interfaces (for future feature expansion) Classification and Distribution Engine The Classification and Distribution Engine (CDE) is the traffic controller for the ACE. Its main purpose is to forward packets that it receives from the SFI to the two network processors (NPs). It also acts as the central point of contact among all the major subsystems within the ACE. The CDE computes, and if necessary, adjusts the IP, TCP, and UDP checksums of every packet that it receives. The CDE appends a special header known as the IMPH header to each packet before sending it to the fast path. The IMPH header is 18 bytes long and contains information from the DBUS header (the header sent to the ACE Module by the Catalyst 6500 series switch or Cisco 7600 series router) as well as special messaging directly understood by the fast path. Fields in the IMPH header can include notification of a checksum error, Layer 3 or Layer 4 offsets, source and destination ports of the CDE, the VLAN for determining the interface that the fast path will use, and so on. Network Processors The ACE has two network processors (NP1 and NP2) that perform most of the packet processing in the ACE. All traffic entering the ACE must traverse one or both NPs after being forwarded by the CDE. Each NP contains a CPU (XScale) and several components called microengines (MEs). See Figure 3.
Each microengine can handle eight simultaneous threads or processes and performs a specific function for the NP as follows: Receive - One ME for receiving incoming packets
Cisco Application Control Engine (ACE) Troubleshooting Guide Fast Path - Four MEs for the hardware accelerated data path that is used for MAC rewrite, NAT, TCP normalization, and so on (essentially all operations performed on a per-packet basis) ICM - One ME for the inbound connection manager OCM - One ME for the outbound connection manager CCM - One ME for the connection close manager TCP - Two MEs for TCP termination with a full TCP stack HTTP - Two MEs for HTTP parsing Unused (future expansion) - One ME SSL Record Layer - One ME for the SSL record layer IP fragmentation timers - One ME for IP fragmentation reassembly and timer management DNS and ICMP Inspection - One ME for DNS and ICMP packet inspection The XScale microprocessor is programmed to handle the following features: Load-balancing algorithms SSL handshake FTP and Real-Time Streaming Protocol (RTSP) inspection HTTP inspection (although a considerable part is performed by the microengines) High-availability heartbeat generation Returned statistics for most connection-related commands Each network processor has RDRAM memory to store ACL entries, routing table entries, ARP entries, and inspection policies. Additional SRAM memory provides faster access times and is used to store regular expressions and statistics on a per?virtual system basis, among other things. SSL Crypto Module The SSL Crypto Module is responsible for SSL record layer processing. This processing includes encrypting and decrypting data for SSL flows.
To-the-ACE Traffic
To-the-ACE traffic is traffic that is destined to an interface VLAN IP address on the ACE. This traffic must match a class map of type management, which is associated with a policy map and applied as a service policy on an interface VLAN. The management
Cisco Application Control Engine (ACE) Troubleshooting Guide class map supports the following protocols: Hypertext Transfer Protocol (HTTP) Hypertext Transfer Protocol Secure (HTTPS) Internet Control Message Protocol (ICMP) Keepalive Application Protocol (KAL-AP) User Datagram Protocol (UDP) Simple Network Management Protocol (SNMP) Secure Shell (SSH) Protocol Telnet This management traffic is called control plane traffic because it is destined to the CP. Because of the separation of the CP traffic from the data plane traffic on different processors, the control plane traffic will never interfere with data plane traffic, even if the control plane is oversubscribed.
Through-the-ACE Traffic
The CDE sends traffic that requires load balancing, forwarding, routing, or other processing by the ACE to one of the NPs. The NPs comprise two parallel forwarding paths that maintain their own connection state information and forward traffic independently.
This article describes some basic troubleshooting steps that you can perform to rule out some of the simpler issues before delving deeper into the troubleshooting process.
Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
To-the-ACE Traffic
19
Contents
1 Preliminary ACE Troubleshooting Steps 2 Checking the ACE Status from the Supervisor Engine 3 Verifying the MSFC VLAN Configuration 4 Establishing a Session with the ACE from the Supervisor Engine 5 Verifying the ACE is Receiving VLAN Allocations from the MSFC 6 Verifying the ACE Image 7 Verifying Your ACE Licenses 8 Configuring an ACL to Permit Input Traffic to the ACE 9 Verifying that the ACE is Sending and Receiving Traffic 10 Verifying to-the-ACE Traffic
Mod Sub-Module Model Serial Hw Status --- --------------------------- ------------------ ----------- ------- ------6 Policy Feature Card 3 WS-F6K-PFC3A SAL09094NUB 2.5 Ok 6 MSFC3 Daughterboard WS-SUP720 SAL09094N33 2.5 Ok
To verify that the VLANs that you intend to use in your ACE have been configured and allocated to the ACE in the MSFC, follow these steps: 1. Check the VLANs configured and allocated to the ACE by entering the following command from the supervisor engine:
2. Ensure that the VLAN groups that you intend to use for your ACE are allocated properly in the MSFC configuration by entering the following commands:
cat6k# show svclc module 5 vlan-group Module Vlan-groups ------ ----------05 123,130,133
cat6k# show svclc vlan-group Display vlan-groups created by both ACE module and FWSM commands
21
3. Verify that the VLANs you intend to use in your ACE are configured in the MSFC by entering the following command:
cat6k# show interface te5/1 trunk Port Te5/1 Port Te5/1 Port Te5/1 Port Te5/1 Mode on Encapsulation 802.1q Status trunking Native vlan 1
Vlans allowed on trunk 100,103,105,107,111-112,119,130,134,160,171,194,200,203,205,207,211-212,221,226,253,256-257,260 Vlans allowed and active in management domain 100,103,105,107,111-112,119,130,134,160,171,194,200,203,205,207,211-212,221,226,253,256-257 Vlans in spanning tree forwarding state and not pruned 100,103,105,107,111-112,119,130,134,160,171,194,200,203,205,207,211-212,221,226,253,256-257
4. Ensure that traffic is routed to two ACEs in the same chassis when both client- and server-side VLANs are configured as switched virtual interfaces (SVIs) on the MSFC in routed mode by entering the following command:
cat6k# show svclc multiple-vlan-interfaces Multiple ACE vlan interfaces feature is enabled
If interface VLANs are already assigned on the ACE you can use the show interface vlan <num> command to verify the interface is properly assigned on the MSFC and up on the MSFC:
22
12.2[121] A2(2.0) [build 3.0(0)A2(2.0)] <-------[LCP] disk0:c6ace-t1k9-mzg.A2_2_0.bin <-------no feature license is installed
Hardware Cisco ACE (slot: 5) cpu info: number of cpu(s): 2 cpu type: SiByte cpu: 0, model: SiByte SB1 V0.2, speed: 700 MHz cpu: 1, model: SiByte SB1 V0.2, speed: 700 MHz memory info: total: 955396 kB, free: 289704 kB shared: 0 kB, buffers: 2336 kB, cached 0 kB cf info: filesystem: /dev/cf total: 1000000 kB, used: 494912 kB, available: 505088 kB last boot reason: NP 1 Failed : NP ME Hung
configuration register: 0x1 ACE_module5 kernel uptime is 4 days 22 hours 42 minute(s) 41 second(s)
This command provides other useful information, for example: Verifying the ACE is Receiving VLAN Allocations from the MSFC 23
Cisco Application Control Engine (ACE) Troubleshooting Guide Slot in which the ACE resides in the Catalyst 6500 series switch (in this case, slot 5) Available memory Last boot reason Configuration register (confreg) value ACE uptime
ACE_module5/Admin# show license status Licensed Feature Count ---------------------------------SSL transactions per second 1000 Virtualized contexts 250 Module bandwidth in Gbps 4
You can also see the licenses that reside on the Flash disk by entering the following command:
ACE_module5/Admin# dir disk0: 236 Oct 17 09:18:26 2006 235 Oct 17 09:16:58 2006 1024 Sep 28 19:11:11 2006 1654606 Oct 26 12:56:16 2006 Usage for disk0: 2759552 8405120 11164672 ACE-SSL-05K-K9.lic <-------ACE-VIRT-250.lic <-------cv/ dplug
Cisco Application Control Engine (ACE) Troubleshooting Guide In the above example, there is an SSL 5K TPS license on the Flash disk that has not yet been installed in the ACE. To install the license, enter the following command:
ACE_module5/Admin# license install disk0:ACE-SSL-05K-K9.lic Installing license... done ACE_module5/Admin#
A trace of the Te?/1 (10-Gbps switch fabric interface, where ? = the module number) interface will show you whether packets are arriving at the switch fabric interface (SFI). Another useful command is the show cde health command on the ACE. This command shows the current state of the Classification Distribution Engine (CDE). The network processors (NP1 and NP2) are represented by IXP0 and IXP1,
Cisco Application Control Engine (ACE) Troubleshooting Guide respectively. You should not observe any drops, errors, or flow control issues in the output of this command. If the Packets Received or the Packets Transmitted counters of the CDE Hyperion Interface are not increasing, then packets are not coming into or going out of the ACE.
ACE_module5/Admin# show cde health CDE BRCM INTERFACE ====================== Packets received Packets transmitted Broadcom interface CRC error count BRCM VOQ status BRCM pull status
[empty]
CDE HYPERION INTERFACE ====================== Packets received Packets transmitted Short packets drop count Fifo Full drop count Protocol error drop count FCS error drop count CRC error drop count Num times flow control triggered on hyp interface Num self generated multicast packets filtered HYP IXP0 VOQ status [empty] HYP IXP1 VOQ status [empty] HYP SLOW VOQ status [empty] HYP tx pull status CDE IXP0 INTERFACE ====================== Packets received Packets transmitted Num bad pkts recvd on fast Num bad pkts recvd on slow Num bad pkts recvd on fast Num bad pkts recvd on slow IXP0 Fast VOQ status IXP0 BRCM VOQ status IXP0 pull status IXP0 spi src status IXP0 spi snk status
29913371 <------8034 <------0 0 0 0 0 0 1880 [not full] [not full] [not full] [pulling]
CDE1 SWITCH1 INTERFACE ====================== Packets received (hyp, ixp0) Packets received (bcm) Packets received (daughter card 0) Packets received (daughter card 1) Packets Errors received (hyp, ixp0) Packets Errors received (bcm) Packets Errors received (daughter card 0) Packets Errors received (daughter card 1) Packets transmitted (ixp1) Packets transmitted (nitrox) Packets Errors transmitted (ixp1) Packets Errors transmitted (nitrox) CDE2 SWITCH2 INTERFACE ====================== Packets received (ixp1) Packets received (nitrox) Packets Errors received (ixp1) Packets Errors received (nitrox)
2089360 0 0 0
CDE IXP1 INTERFACE ====================== Packets received Packets transmitted Num bad pkts recvd on fast Num bad pkts recvd on slow Num bad pkts recvd on fast Num bad pkts recvd on slow IXP1 Fast VOQ status IXP1 BRCM VOQ status IXP1 pull status IXP1 spi src status IXP1 spi snk status
CDE NITROX INTERFACE ====================== Packets received Packets transmitted Num bad pkts recvd on fast spi channel0 Num bad pkts recvd on slow spi channel8 Num bad pkts recvd on fast spi channel2 Num bad pkts recvd on slow spi channel4 NTX Fast VOQ status NTX BRCM VOQ status NTX pull status NTX spi src status NTX spi snk status == Backplane == ITASCA_SYS_CNTL1 0x300 data 0x61f0000 ITASCA_SYS_CNTL2 0x304 data 0x80c30000
[empty] [empty]
You can also use the show interface command on the ACE to display traffic that is sent and received on the interface for each VLAN that is configured on the ACE.
ACE_module5/Admin# show interface bvi2 is administratively down Hardware type is BVI MAC address is 00:18:b9:a6:91:15 Mode : unknown FT status is non-redundant Description:not set MTU: 1500 bytes Last cleared: never Alias IP address not set Peer IP address not set 0 unicast packets input, 0 bytes 0 multicast, 0 broadcast 0 input errors, 0 unknown, 0 ignored, 0 unicast RPF drops 0 unicast packets output, 0 bytes 0 multicast, 0 broadcast 0 output errors, 0 ignored vlan100 is administratively down
27
224 17528 0 0 0 0 0 0 0 0
: 0
: 5213
28
IPC Tx Packets IPC Tx Bytes IPC Tx Fifo Errors Client Rx Queue Full Pseudo Rx Queue Full
: 76 : 17638 : 0 : 0 : 0
IPC Tx Packets IPC Tx Bytes IPC Tx Fifo Errors Client Rx Queue Full Pseudo Rx Queue Full
: 0 : 0 : 0 : 0 : 0
ACE_module5/Admin# show fifo stats High Priority (Control) ----------------------Rx Packets : 224 Rx Bytes : 17528 Rx DMA Errors : 0 Rx Drop Events : 0 Rx Descr Errors : 0 Rx Bad Descrs : 0 Rx Length Errors : 0 Tx Tx Tx Tx Tx Packets Bytes Drops DMA Errors SOP Errors : : : : : 76 17682 0 0 0 Normal Priority (Data) ---------------------Rx Packets : 2524886 Rx Bytes : 196952927 Rx DMA Errors : 0 Rx Drop Events : 0 Rx Descr Errors : 0 Rx Bad Descrs : 0 Rx Length Errors : 0 Tx Tx Tx Tx Tx Packets Bytes Drops DMA Errors SOP Errors : : : : : 5241 464991 0 0 0
Global Errors ------------Rx Underflows Rx Overflows Tx Underflows Tx Overflows Resets Zbuff alloc fail
: : : : : :
0 0 0 0 0 0
Guide Contents
29
Cisco Application Control Engine (ACE) Troubleshooting Guide Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Understanding ROMMON Mode and the ACE Boot Configuration 1.1 Setting the Boot Method from the Configuration Register 1.2 Booting the ACE from the ROMMON Prompt 1.3 Setting the BOOT Environment Variable 1.4 Displaying the ACE Boot Configuration 2 Restarting the ACE 2.1 Restarting the ACE from the ACE CLI 2.2 Restarting the ACE from the Supervisor Engine 3 Establishing a Console Connection to the ACE 4 Troubleshooting ACE Boot Problems
Contents
30
The value argument-supported entries are as follows: 0?ACE boots to the ROMMON prompt. The ACE remains in ROMMON mode at startup. 1?ACE boots from the system image identified in the BOOT environment variable. If the ACE encounters an error or if the image is not valid, it will try the second image (if one is specified). If the second image also fails to boot, the ACE returns to ROMMON mode. For example, to set configuration register to boot the system image identified in the BOOT environment variable, enter the following command:
ACE_module5/Admin(config)# config-register 1
31
Cisco Application Control Engine (ACE) Troubleshooting Guide For example, to use the confreg command at the ROMMON prompt to instruct the ACE to boot from the c6ace-t1k9-mzg.3.0.0_A2_2_0.bin system image, enter the following command:
rommon 1 > confreg 1 rommon 2 > BOOT=disk0:c6ace-t1k9-mzg.3.0.0_A2_2_0.bin rommon 3 > sync
To instruct the ACE to automatically boot from the image specified in the BOOT variable, use the confreg command without specifying a configuration register value to launch the Configuration Summary menu-based utility. You can then instruct the ACE to boot from the system image identified in the BOOT environment variable. See the "Setting the BOOT Environment Variable" section. For example, to use the confreg command to display the onscreen prompts for changing the boot characteristics of the ACE and change the configuration register to boot from an image on disk0:, enter the following command:
rommon 4 > confreg
Configuration Summary (Virtual Configuration Register: 0x2000) enabled are: ignore system config info console baud: 9600 boot: the ROM monitor
do you wish to change the configuration? y/n [n]: disable "ignore system config info"? y/n [n]: change the boot characteristics? y/n [n]: y enter to boot: 0 = ROM Monitor 1 = boot file specified in BOOT variable [0]: 1
Configuration Summary (Virtual Configuration Register: 0x2001) enabled are: ignore system config info console baud: 9600 boot: the file specified in BOOT variable do you wish to change the configuration? y/n [n]: You must reset/power cycle for new config to take effect rommon 7 > dir disk0: Directory of disk0: 23951 31071143 -rwc6ace-t1k9-mzg.A2_2_0.bin 2 74448896 -rwTN-CONFIG 4546 32505856 -rwTN-CERTKEY-STORAGE 6530 11534336 -rwTN-LOGFILE 7234 11534336 -rwTN-HOME 7938 209715200 -rwTN-COREFILE 20738 1048576 -rwlkcddump 22689 250 -rwscripted_hm.txt 24584 30337516 -rwc6ace-t1k9-mz.A2_1_1.bin 29540 1048640 -rwACE_FUR_BOOT_ROM.img.rel.2008Apr01_ver121 29605 1048640 -rwACE_BOOT_ROM.img.rel.2008Apr01_ver121 rommon 8 > BOOT=disk0:c6ace-t1k9-mzg.A2_2_0.bin variable name contains illegal (non-printable) characters rommon 9 > sync
The image_name argument specifies the name of the system image file. If the file does not exist (for example, if you entered the wrong filename), then the filename is appended to the bootstring, and the "Warning: File not found but still added in the bootstring" message appears. If the file does exist, but is not a valid image, the file is not added to the bootstring, and the "Warning: file found but it is not a valid boot image" message appears. For example, to set the BOOT environment variable, enter the following command:
ACE_module5/Admin(config)# boot system image:c6ace-t1k9-mzg.3.0.0_A2_2.0.bin
33
For example, to use the supervisor engine CLI to reset the ACE located in slot 5 of the chassis, enter the following command:
cat6k# hw-module module 5 reset Proceed with reload of module?[confirm] % reset issued for module 5
9. If the ACE does not find a valid software image on disk0: or if the ACE is configured to enter ROMMON mode upon booting up, the ROMMON prompt appears. Restarting the ACE from the Supervisor Engine 34
Password: cat6k>enable Password: cat6k# show module 5 Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------ ----------5 1 Application Control Engine Module ACE10-6500-K9 SAD1031044S <------- Module is receiving power
Mod MAC addresses Hw Fw Sw Status --- ---------------------------------- ------ ------------ ------------ ------5 0018.b9a6.9114 to 0018.b9a6.911b 1.1 Unknown Unknown Other <------- Firmware and software image Mod Online Diag Status ---- ------------------5 Unknown <------- Diagnostics status is Unknown
The first row of information is populated, so you know that the ACE is powered up. The firmware and software versions are Unknown and the Status is Other. At this point, you cannot session into the ACE from the supervisor engine. 2. Power cycle the ACE from the supervisor engine to attempt to boot the ACE by entering the following commands:
cat6k# config t Enter configuration commands, one per line. cat6k(config)# no power enable module 5 cat6k(config)# power enable module 5 End with CNTL/Z.
Wait long enough for the ACE to boot up. Try to Telnet or session to the ACE. If you still cannot Telnet or session to the ACE, continue with Step 3. 3. Establish a console connection to the ACE. For details about establishing a console connection to the ACE, see the "Establishing a Console Connection to the ACE" section.
rommon 1>
4. Check the ACE configuration register (confreg) by entering the following command:
rommon 2> confreg Configuration Summary (Virtual Configuration Register: 0x1) enabled are: console baud: 9600 boot: the file specified in BOOT variable
A value of 0x1 instructs the ACE to boot from the image in disk0:. A value 0x0 instructs the ACE to boot to the ROMMON prompt. If the image specified in the BOOT variable is not in disk0:, then the ACE boots to the ROMMON prompt as shown in
Cisco Application Control Engine (ACE) Troubleshooting Guide this example issue. 5. Check the BOOT variable by entering the following command:
rommon 3> set PS1=rommon ! > RELOAD_REASON=reload command by admin BOOT=disk0:c6ace-t1k9-mz.3.0.0_A2_2_0.bin ARGV0=quiet ?=0
6. Ensure that the software image specified in the BOOT variable is present in disk0: by entering the following command:
rommon 4> dir disk0: 31071143 250 30337516 1048640 1048640 Dec Feb Jul Aug Aug 1 17:01:06 2008 c6ace-t1k9-mzg.A2_2_0.bin 8 20:04:44 2008 scripted_hm.txt 31 05:47:42 2008 c6ace-t1k9-mz.A2_1_3.bin 8 11:45:06 2008 ACE_FUR_BOOT_ROM.img.rel.2008Apr01_ver121 8 13:27:32 2008 ACE_BOOT_ROM.img.rel.2008Apr01_ver121 filesystem bytes total used bytes free total bytes
7. If the specified image is not in disk0:, then you can boot from another image in disk0: by entering the following command:
rommon 5> boot system disk0:image_name
8. If there is no image on the ACE disk0: to boot from, you can still boot from the supervisor engine. Copy the image to the supervisor engine's disk0: or disk1:, and then from the supervisor CLI, enter the following command:
cat6k(config)# boot device module slot_number disk[0 | 1]:image_name
9. At the ROMMON prompt on the ACE console, enter the following command to boot the ACE from the Ethernet Out-of-Band Channel (EOBC) between the ACE and the Catalyst 6500 series switch or the Cisco 7600 series router:
10. If the ACE is not local or you cannot establish a console connection for any other reason, use the following procedure to finish booting the ACE from the supervisor engine with the boot eobc: command:
cat6k# remote login switch Trying Switch ... Entering CONSOLE for Switch
cat6k-sp# svclc console 5 Entering svclc ROMMON of slot 5 ... Type "end" to end the session.
This article describes the ACE system logging facility, how to enable logging, and how to use system messages as troubleshooting tools. 36
Cisco Application Control Engine (ACE) Troubleshooting Guide Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE System Logging 2 Enabling ACE Logging 3 Logging Severity Levels 4 Adding Information to syslogs 5 Troubleshooting ACE Logging 5.1 Displaying Logging Statistics 5.2 Displaying the Logging History 5.3 Displaying Logging Messages 5.4 Displaying Logging Persistence 5.5 Displaying the Logging Rate Limit
Contents
37
38
Use the logging monitor severity_level command only when you are troubleshooting problems on the ACE or when there is minimal load on the network. Using this command at other times when the ACE is active may degrade performance.
Note: logging trap defines the severity sent to the syslog server.
Note: If you do not see syslog messages on the console after enabling logging with the logging enable and logging monitor 7 commands, log out of the ACE and then log in again. To enable logging to a syslog server, use the following command syntax:
logging host ip_address [tcp | udp [/port#]] | [default-udp] | [format emblem]
Note: If you specify the default-udp option and TCP logging fails, the ACE sends logging messages over UDP. You can verify that the ACE defaults to UDP by entering the following command:
ACE_module5/Admin# show logging Syslog logging: enabled Facility: 20 History logging: disabled Trap logging: enabled (level - debugging) Timestamp logging: disabled Fastpath logging: disabled Persist logging: disabled Standby logging: disabled Rate-limit logging: disabled (min - 0 max 100000 msgs/sec) Console logging: disabled Monitor logging: disabled Logging to 5.1.0.40 tcp/514 default-udp (sending on UDP) Device ID: disabled Message logging: none Buffered logging: enabled (level - debugging) maximum size 681984 Buffer info: current size - 681984 global pool - 1048576 used pool - 1048576 min - 0 max - 681984 cur ptr = 42894 wrapped - yes
Use the logging supervisor command to allow the aggregation of critical syslogs from multiple virtual devices to the Catalyst 6500 series switch or to the Cisco 7600 series router syslog. For example, enter the following command:
ACE_module5/Context(config)# logging supervisor ? <0-7> 0-emerg;1-alert;2-crit;3-err;4-warn; 5-notif;6-inform;7-debug cat6k# show logging . . . cat6k#17w3d: %TRINITY-7-TRINITY_SYSLOG_DEBUG:
39
To identify messages that are sent to a syslog server by severity level, enter the following command:
ACE_module5/Admin(config)# logging trap severity_level
For example, to identify the ACE device ID in messages that are sent to a syslog server, use the following command syntax:
ACE_module5/Admin(config)# logging device-id {context-name | hostname | ipaddress interface_name | string text}
ACE_module5/Admin# show logging queue Logging Queue length limit : 80 msg(s), 59 msg(s) discarded. Current 0 msg on queue, 80 msgs most on queue CP messages received: 426 IXP messages received: 82 Xscale messages received: 0 , 59 msg(s) discarded.
System Max Queue size: 20080 System Free Queue size for allocation: 19920
In the above example, the ACE has discarded 59 control plane (CP) messages. By default, the syslog message queue can hold 80 messages. You can increase the size of the syslog message queue by using the logging queue command in configuration mode. Set the queue size before you start collecting syslog messages. When traffic is heavy, messages may be discarded if the queue size is too small. The maximum number of messages that the queue can hold is 8192.
ACE-5-111008:User 'admin' ACE-5-111008:User 'admin' ACE-7-111009:User 'admin' ACE-7-111009:User 'admin' ACE-4-405001:Received ARP ACE-4-405001:Received ARP ACE-4-405001:Received ARP ACE-4-405001:Received ARP ACE-7-111009:User 'admin'
executed the 'logging history 7' command. executed the 'logging console 7' command. executed cmd: do sho logging history executed cmd: do show logging message REQUEST collision from 10.1.1.240 00.0c.29. RESPONSE collision from 10.1.1.240 00.0b.fc REQUEST collision from 10.1.1.240 00.0c.29. RESPONSE collision from 10.1.1.240 00.0b.fc executed cmd: telnet 10.1.1.130
Cisco Application Control Engine (ACE) Troubleshooting Guide disabled system messages, enter the following command:
ACE_module5/Admin# show logging message message_id | all | disabled
For example, to display all disabled system messages in the ACE, enter the following command:
ACE_module5/Admin# show logging message disabled Message logging: message 111008: default-level 5 (disabled) message 111009: default-level 7 (disabled)
REQUEST collision from 10.1.1.240 00.0c.29.74.51.fa on int RESPONSE collision from 10.1.1.240 00.0b.fc.fe.1b.03 on in REQUEST collision from 10.1.1.240 00.0c.29.74.51.fa on int RESPONSE collision from 10.1.1.240 00.0b.fc.fe.1b.03 on in
This article describes how the ACE establishes connections and how to troubleshoot connectivity issues with your ACE. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Displaying Logging Messages 42
Cisco Application Control Engine (ACE) Troubleshooting Guide Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Connection Handling 2 Internal Mapping of ACE TCP and UDP Flows 3 ACE Connection Table Entries 4 Tracking Connections Through the ACE 5 Troubleshooting Connections
43
Cisco Application Control Engine (ACE) Troubleshooting Guide Figure 1. Layer 4 Flow Setup
For L7 flows (for example, L7 load balancing, URL parsing, and generic TCP payload parsing), the ACE acts as a proxy (spoofs the server), intercepts the client's VIP request that matches an L7 rule, and terminates the TCP connection. See Figure 2. The ACE sends a SYN-ACK to the client in response to the client's TCP SYN. The client responds with an ACK to complete the TCP handshake and an L7 request method (for example, HTTP GET or POST).
44
After the ACE receives the L7 information (for example, HTTP GET), it sets up the back-end connection to the real server based on the load-balancing method and other criteria. See Figure 3.
45
Finally, the ACE unproxies the connection with the client and splices it together with the back-end connection to the server. For the life of the HTTP flow, the client communicates directly with the server through the fast path (hardware-accelerated path in the network processors), which is depicted in the figures as "Shortcut." See Figures 4.
46
Figure 5 shows how the ACE adjusts the sequence numbers and ACK numbers when it splices the two flows together.
Figure 5. Layer 7 Flow Setup -- Adjusting the Sequence and ACK Numbers
47
With the persistence rebalance (connection keepalive) command configured, the ACE reproxies and parses subsequent HTTP 1.1 requests over the same TCP connection. In this case, the ACE again spoofs the server and ACKs the HTTP GET as shown in Figure 6. The sequence shown in Figure 2 through Figure 5 repeats for each new HTTP 1.1 request over the same TCP connection.
48
For SSL termination, TCP server reuse, application protocol inspection, and HTTP 1.1 pipelining, the ACE fully terminates the client TCP connection. This connection remains fully proxied because the ACE is acting on behalf of the real server. For SSL termination, the ACE completes an SSL handshake after it establishes the TCP connection with the server. See Figure 7.
49
For SSL termination, TCP server reuse, application protocol inspection, and HTTP 1.1 pipelining, the client and server connections are completely independent and flows are handled in the software, not in the fast path. See Figure 8.
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
You can display both the front-end and the back-end connection statistics by entering the "-v" (verbose) option of the show np command as follows:
ACE_module5/Admin# show np 1 me-stats "-c 9 -v" Connection ID:seq: 9[0x9].2 Other ConnID : 7[0x7].14 Proxy ConnID : 0[0x0].0 Next Q : 0[0x0] 10.1.1.5:23 -> 172.27.16.143:4837 [RX-NextHop: TX] [TX-NextHop: CP] Flags: PAT: No DynNAT: No Implicit PAT: No On_Reuse: No L3 Protocol : IPv4 L4 Protocol : 6 Inbound Flag : 0 Interface Match : Yes Interface MatchID: 7 EncapsID:ver : 3:0 TCP ACK delta : 0x0 MSS : 1260 TOS Stamp : 0 Repeat mode : No ARP Lookup : No TOS Stamp : No TCP Window Check: No ACE ID : 148 NAT Policy ID : 0 Post NAT hop : 4 Packet Count : 347 Byte Count : 24476 TCP Information: (State = 3) Window size : 5840 Window scale : 0 FIN seen : No FIN/ACK seen : No FIN/ACK exp : No Close initiator : No FIN/ACK expval: 5b40000 Last seq : 53768a51 timestamp_delta: 0 Last ack : 658c1f72 No Trigger : 0 Trigger Status : 0 Timestamp : 459f781e TCP options negotiated: Sack:Clear TS:Clear Windowscale: Clear Reserved: Allow Exceed MSS: Deny Window var: Allow Flags: debug: 0 TCP Normalize: Yes Syslog: No Reproxy Request: No Policying Reqd: No Inbound IPSec: No Replicated: No Data Channel: No L7: No Fin Detect: Yes FP Timeout: No Standby: No ConnState: 2 ACA Method: 0 ReqTS: 00000000 RspTS: 00000000 Raw Connection Entry 0000 0x00000000 0x0a56d786 0010 0x001712e5 0x00000000 0020 0x4e000007 0x00000000 0030 0x0000015b 0x00005f9c 0040 0x53768a51 0x658c1f72 0050 0x00000094 0x00000000 0060 0x00000000 0x00000000
68
Doing verbose output for proxy id: 0 No No No No No valid valid valid valid valid proxy entry. TCB proxy entry. HTTP proxy entry. SSL proxy entry. AI proxy entry.
Troubleshooting Connections
To troubleshoot suspected connectivity issues, follow these steps:
Cisco Application Control Engine (ACE) Troubleshooting Guide 1. Check the ACL hit count by entering the show access-list acl_name command. If the hit count is increasing, go to Step 2. Otherwise, verify that the access list is configured properly to permit traffic.
ACE_module5/Admin# show access-list anyone detail access-list:anyone, elements: 1, status: ACTIVE remark : access-list anyone line 8 extended permit ip any any (hitcount=3438) [0x44c2baf1] <------- Hit count
2. Check the service policy hit count by entering the show service-policy detail command. If the hit count is 0, verify that the service policy is active (show service-policy command) and the server farm is up (show server-farm detail command). If the service policy is large, use the show service-policy policy_name summary command for more information as follows:
ACE_module5/Admin# show service-policy VIP summary service-policy: VIP Class State Curr Conns VIP IN-SRVC 0 IN-SRVC IN-SRVC IN-SRVC VIP2 IN-SRVC IN-SRVC 0 0 0 0 0
Hit Count 0 0 0 0 0 0
3. Check the load-balancing statistics by entering the show stats loadbalance command. If the Layer 4 or Layer 7 rejections or the Layer 4 or Layer 7 policy misses are increasing, check the configured class maps for any misconfiguration.
ACE_module5/Admin# show stats loadbalance
+------------------------------------------+ +------- Loadbalance statistics -----------+ +------------------------------------------+ Total version mismatch : 0 Total Layer4 decisions : 0 Total Layer4 rejections : 3 <-------| Total Layer7 decisions : 0 |------- Failed connections due to traffic not matching the conf Total Layer7 rejections : 7 <-------| Total Layer4 LB policy misses : 0 Total Layer7 LB policy misses : 0 Total times rserver was unavailable : 10 <------- Failed connections due to no real server' Total ACL denied : 0 Total IDMap Lookup Failures : 0
To clear the load-balancing statistical information stored in the ACE buffer, enter the clear stats loadbalance command. 4. If none of the error statistics is increasing, check the connection record by entering the show conn detail command and checking the connections for the affected VIP.
ACE_module5/Admin# show conn detail total current connections : 6 conn-id np dir proto vlan source destination state ----------+--+---+-----+----+---------------------+---------------------+------+ 7 1 in TCP 130 10.1.1.2:1171 10.1.1.134:23 ESTAB [ idle time : 00:00:00, byte count : 60055 ]
+------------------------------------------+ +------- Connection statistics ------------+ +------------------------------------------+ Total Connections Created : 628950 Total Connections Current : 7 Total Connections Destroyed: 389 Total Connections Timed-out: 3958 Total Connections Failed : 624596 <------- Server did not reply to a SYN within the pending timeout period or i
The Total Connection Failed counter increases when the ACE cannot set up the back-end connection with the server. To clear the statistical information stored in the ACE buffer, enter the clear stats connection command. 6. Display service policy statistics by entering the following command:
ACE/Context# show service-policy client-vips detail Status : ACTIVE Description: ----------------------------------------Interface: vlan 211 service-policy: client-vips class: VIP-HTTPS VIP Address: Protocol: Port: 172.16.11.190 tcp eq 443 <------- Shows the VIP address, port, and protocol loadbalance: L7 loadbalance policy: HTTPS-POLICY VIP Route Metric : 77 VIP Route Advertise : DISABLED VIP ICMP Reply : ENABLED-WHEN-ACTIVE VIP State: INSERVICE <------- Service is INSERVICE curr conns : 22 , hit count : 22 dropped conns : 0 client pkt count : 0 , client byte count: 0 server pkt count : 0 , server byte count: 0 max-conn-limit : 0 , drop-count : 0 conn-rate-limit : 0 , drop-count : 0 bandwidth-rate-limit : 0 , drop-count : 0 L7 Loadbalance policy : HTTPS-POLICY class/match : class-default LB action : primary serverfarm: backend-ssl backup serverfarm : hit count : 22 <------- Shows the hit count dropped conns : 0
Troubleshooting Connections
71
description : state : ACTIVE predictor : ROUNDROBIN <------- Shows the load-balancing predictor that was used failaction : back-inservice : 0 partial-threshold : 0 num times failover : 0 num times back inservice : 0 total conn-dropcount : 0 ------------------------------------------connections----------real weight state current total failures ---+---------------------+--------+---------------------+-----------+----------+--------rserver: linux-1 192.168.1.11:0 8 OPERATIONAL 0 0 0 <------- Shows connection s each real server max-conns : , out-of-rotation count : min-conns : conn-rate-limit : , out-of-rotation count : bandwidth-rate-limit : , out-of-rotation count : retcode out-of-rotation count : -
The Connections Failures counter for a real server in a server farm may increment for one of the following reasons: SYN timeout (the three-way handshake fails to complete) RST received (a client sends an RST to the server) Internal exception (internal software issue) 8. Display the statistics for a connection parameter map by entering the following command:
ACE_module5/Admin# show parameter-map CONN_PARAMMAP Number of parameter-maps : 1
Parameter-map : CONN_PARAMMAP Type : connection nagle : slow start : buffer-share size : inactivity timeout (seconds) : embryonic timeout (seconds) : ack-delay (milliseconds) : WAN Optimization RTT (milliseconds): half-closed timeout (seconds) : TOS rewrite : syn retry count : TCP MSS min : TCP MSS max : tcp-options drop range : tcp-options allow range : tcp-options clear range : selective-ack : timestamp : window-scale : window-scale factor : reserved-bits : random-seq-num : SYN data : exceed-mss : urgent-flag : conn-rate-limit : bandwidth-rate-limit :
disabled disabled 32768 TCP: 3600, UDP: 120, ICMP: 2 5 200 65535 3600 disabled 4 0 1460 0-0 0-0 1-255 clear clear clear 0 allow enabled drop drop allow disabled disabled
Troubleshooting Connections
72
Cisco Application Control Engine (ACE) Troubleshooting Guide 9. Reset the ACE connection statistics by entering the following commands: clear conn [all | flow {icmp | tcp | udp} | rserver server_name] clear stats conn clear tcp statistics clear udp statistics
This article describes how to troubleshoot issues involving ACE remote access. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Remote Access 2 Configuring a Management Policy for Remote Access 3 Troubleshooting Remote Access 3.1 Troubleshooting Telnet 3.2 Troubleshooting SSH 3.3 Troubleshooting KAL-AP
Contents
73
Cisco Application Control Engine (ACE) Troubleshooting Guide 1. Beginning with ACE software release A2(1.1), by default, the ACE CLI is only locally accessible either using the ACE console port or through the supervisor by entering the session command. Remote access to the ACE (for example, Telnet, SSH, and so on) is disabled until you change the admin user account password from the default. Access to the XML API is also disabled until you change the www user account password from the default. The ACE will display these warnings each time you access the CLI using the the console port or the supervisor until you change these passwords.
cat6k#session slot 5 processor 0 The default escape character is Ctrl-^, then x. You can also type 'exit' at the remote prompt to end the session Trying 127.0.0.20 ... Open ACE_module5 login: admin Password: Cisco Application Control Software (ACSW) TAC support: http://www.cisco.com/tac Copyright (c) 2002-2009, Cisco Systems, Inc. All rights reserved. The copyrights to certain works contained herein are owned by other third parties and are used and distributed under license. Some parts of this software are covered under the GNU Public License. A copy of the license is available at http://www.gnu.org/licenses/gpl.html. Please change the password for admin user. Admin user is allowed to login only from supervisor until the password is changed. User 'www' is disabled. Please change the password to enable the user.
Use the following commands to change the passwords of the admin and www user accounts:
ACE_module5/Admin# config Enter configuration commands, one per line. End with CNTL/Z. ACE_module5/Admin(config)# username admin password 0 cisco123 role Admin domain default-domain ACE_module5/Admin(config)# username www password 0 cisco123 role Admin domain default-domain ACE_module5/Admin(config)# exit
Note that, although the passwords were entered in clear text above, they will be stored in the ACE configuration in an encrypted format:
ACE_module5/Admin# show run | i username Generating configuration.... username admin password 5 $1$M7gtcvBC$9ca78Q.ZH5jZpqDVuLnkN0 role Admin domain default-domain username www password 5 $1$ulc7KHL5$2HlgNTEez03.ElmbiWKyY/ role Admin domain default-domain
2. Ensure that the remote access method protocol (for example, Telnet or SSH) that you are trying to use is configured in the management class map and that the management class has been permitted in the management policy. If necessary, correct your ACE configuration. To display your management policy configuration elements, enter the following Exec mode commands:
ACE_module5/Admin# show running-config class-map Generating configuration.... class-map 2 match 3 match 4 match type management match-any MGMT_CLASS protocol icmp any protocol ssh any protocol telnet any
ACE_module5/Admin# show running-config policy-map MGMT_POLICY Generating configuration.... policy-map type management first-match MGMT_POLICY class MGMT_CLASS permit class class-default
75
Cisco Application Control Engine (ACE) Troubleshooting Guide 3. Ensure that the management policy is applied to the correct interface and that you are using the correct IP address for that interface. If necessary, correct your configuration. Enter the following command:
ACE_module5/Admin# show running-config interface interface vlan 100 ip address 192.168.12.15 255.255.255.0 access-group input ACL1 access-group output ACL1 service-policy input MGMT_POLICY no shutdown
4. Check the status of the management interface by entering the following command:
ACE_module5/Admin# show interface vlan 100 vlan100 is up Hardware type is VLAN MAC address is 00:18:b9:a6:91:15 Mode : routed IP address is 192.168.12.15 netmask is 255.255.255.0 FT status is non-redundant Description:not set MTU: 1500 bytes Last cleared: never Alias IP address not set Peer IP address not set Assigned from the Supervisor, up on Supervisor 115303 unicast packets input, 74570169 bytes 273637 multicast, 521226 broadcast 0 input errors, 0 unknown, 0 ignored, 0 unicast RPF drops 12591 unicast packets output, 2120271 bytes 0 multicast, 4604 broadcast 0 output errors, 0 ignored
5. If the interface is down, ensure that the no shutdown command is configured on the interface to enable it. If necessary, correct your configuration. Enter the following command:
ACE_module5/Admin# show running-config interface
6. Ensure that you have not exceeded the allocated resources for management connections or maximum management bandwidth by entering the following commands:
ACE_module5/Admin# show resource usage resource mgmt-connections Allocation Resource Current Peak Min Max Denied ------------------------------------------------------------------------------Context: Admin mgmt-connections 2 10 0 100000 0 Context: C1 mgmt-connections 0 0 0 100000 0 ACE_module5/Admin# show resource usage resource rate mgmt-traffic Allocation Resource Current Peak Min Max Denied ------------------------------------------------------------------------------Context: Admin mgmt-traffic rate 78 3588 0 125000000 0 Context: C1 mgmt-traffic rate 0 0 0 125000000 0
7. If necessary, allocate more resources to management connections by entering the following command: Troubleshooting Remote Access 76
680 52902 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
IPC Tx Packets IPC Tx Bytes IPC Tx Fifo Errors Client Rx Queue Full Pseudo Rx Queue Full
: 78 : 17766 : 0 : 0 : 0
IPC Tx Packets IPC Tx Bytes IPC Tx Fifo Errors Client Rx Queue Full Pseudo Rx Queue Full
: 0 : 0 : 0 : 0 : 0
Management traffic is considered to-the-ACE traffic or CP traffic. If traffic is reaching the CP, the Normal Priority (Data) Net Rx Packets, Net Rx Bytes, Net TX packets, and Net TX bytes counters should be increasing. If not, contact TAC. 9. If traffic is not arriving at the CP, ensure that traffic is reaching the classification and distribution engine (CDE) from the SFI by entering the following command:
ACE_module5/Admin# show cde health CDE BRCM INTERFACE ====================== Packets received Packets transmitted Broadcom interface CRC error count BRCM VOQ status BRCM pull status CDE HYPERION INTERFACE ====================== Packets received Packets transmitted Short packets drop count Fifo Full drop count Protocol error drop count
[empty]
77
<snip>
If traffic is reaching the CDE, the Packets received and the CDE Hyperion Interface Packets transmitted counters should be increasing. If not, contact TAC. 10. If packets are not reaching the CDE, ensure that the MSFC in the Catalyst 6500 series switch or the Cisco 7600 series router is sending packets to the switch fabric interface (SFI) by entering the following command on the supervisor engine:
cat6k# show svclc module 5 traffic ACE module 5: Specified interface is up line protocol is up (connected) Hardware is C6k 10000Mb 802.3, address is 0018.b9a6.9114 (bia 0018.b9a6.9114) MTU 1500 bytes, BW 10000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 10Gb/s input flow-control is on, output flow-control is unsupported Last input never, output never, output hang never Last clearing of "show interface" counters 1w2d Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 1000 bits/sec, 2 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 912150 packets input, 74727962 bytes, 0 no buffer Received 796374 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 input packets with dribble condition detected 17390 packets output, 2145844 bytes, 0 underruns 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out
If the MSFC is sending traffic to the SFI, the packets input and the packets output counters should be increasing. If not, contact TAC.
Troubleshooting Telnet
If you cannot Telnet to the ACE, ensure that you have not reached the maximum connection limit for Telnet by entering the following commands:
ACE_module5/Admin# show telnet Session ID 4254 Remote Host 127.0.0.51 :41985 Active Time 0: 8:13
The show telnet command output shows only one Telnet session. A maximum of 15 more users can potentially Telnet to the Admin context.
Troubleshooting Telnet
78
Cisco Application Control Engine (ACE) Troubleshooting Guide To display the maximum number of users allowed to Telnet to a particular context, enter the following command:
ACE_module5/Admin# show telnet maxsessions Maximum Sessions Allowed is 16
Troubleshooting SSH
If you attempt to connect to the ACE using SSH and receive the following error, follow these steps:
[linux]$ ssh admin@192.168.0.210 ssh_exchange_identification: Connection closed by remote host [linux]$
1. Ensure that SSH is enabled in the management policy by entering the following command:
ACE_module5/Admin# show running-config class-map class-map 2 match 3 match 4 match 6 match 7 match 8 match type management match-any MGMT_CLASS protocol http any protocol https any protocol icmp any protocol ssh any <------- SSH is enabled protocol telnet any protocol snmp any
switch/Admin# show running-config policy-map MGMT_POLICY Generating configuration.... policy-map type management first-match MGMT_POLICY class MGMT_CLASS permit <------- All protocols in the MGMT_CLASS class-map are permitted including SSH
2. Ensure that the SSH key has been generated by entering the following command:
switch/Admin# show ssh key ************************************** could not retrieve rsa1 key information ************************************** could not retrieve rsa key information ************************************** could not retrieve dsa key information ************************************** no ssh keys present. you will have to generate them **************************************
The show ssh key command output shows that no SSH key has been generated. 3. Generate an SSH key based upon your security requirements by entering the following commands:
ACE_module5/Admin# config Enter configuration commands, one per line. ACE_module5/Admin(config)# ssh key rsa 4096 generating rsa key(4096 bits)..... ......................... generated rsa key ACE_module5/Admin(config)# exit switch/Admin# show ssh key dsa rsa rsa1 ACE_module5/Admin# show ssh key ************************************** could not retrieve rsa1 key information End with CNTL/Z.
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAgEAr3z0MO0knoS6YwntSxUkWDWjHZfFE7Y6nLd8qQVcPMu0 XpvkabDswLwoEdC9nOWM4v4g4PDpUz+tk+2WHJ4MMgRVeomVbK/2+Zx0Eds1p2XlhiV9KPcV pflpNNt63Mr01oLHoHpjxJ8ubfJJ+gPhMoBmQyGKedQOk5tVlbOpyxS2f7yWGqzF26AzXTFFdS0xYEcN4GrtziduBlh4TYRxk99JR13 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+9C0i ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+uowK ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+gHaa ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+ryoo ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+iKsh ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+/cut ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+7OvN ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+w6ig ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+msEF ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+XvRo ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+w34s ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+mbRk ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+e9p2 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+PEAQ ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+D+Ty ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+GsLz ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+EaKa ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+MNQm ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+VVkV ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+4d21 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+x6VH ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+fEGT ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+64zM ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+Hf/a ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+e9Tu ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+W4nD ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+7SUP ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+leL+ ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+Tmwt ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+8ymk ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+20L0 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+ym2A ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+mfe5 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+A+Py ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+k/Dx ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+NeCF ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+mSK1 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+V747 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+M0xG ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+QiEP ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+CCTj ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+8lkb ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+GXOo ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+C094 ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+eDPM ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+F+xp ZAWROUVbRMFz1MjblIVX+C9nygSGeaMJ9KDosbUlQCBnOtWViPblov0lViwk4QEHAAL+eNj zsFzc1023QU8xwlrhgvL0xXKxUmITV4y2VaSmEc/0RH/c4XAinNy955X6w9ejqXG9aYFjljLBtCHKXgyAZbQ48E4UPtPwPTCC3R1pFapfNAJMQ55kf /6x/6XVFPBw4okLcz6tVDLqn7dGiTEjzYgfQBwKXiIPrGg9EmBgwmQKWuJpOde+jbMD9kU1WmUoUWvTvPtXQ0= bitcount:4096 fingerprint: 13:96:fe:f0:f7:d7:5f:9c:d7:2a:da:72:8a:93:53:a6 ************************************** could not retrieve dsa key information ************************************** Now SSH should work.
Cisco Application Control Engine (ACE) Troubleshooting Guide 4. Try connecting to the ACE via SSH again by entering the following command:
[linux]$ ssh admin@192.168.0.210 Warning: Permanently added '192.168.0.210' (RSA) to the list of known hosts.
Password: Cisco Application Control Software (ACSW) TAC support: http://www.cisco.com/tac Copyright (c) 1985-2009 by Cisco S The copyrights to certain works contained herein are owned by other third parties and are used and distributed und Some parts of this software are covered under the GNU Public License. A copy of the license is available at http:/ ACE_module5/Admin#
5. Confirm the SSH session from the ACE CLI by entering the following command:
ACE_module5/Admin# show ssh session-info Session ID 6986 Remote Host 10.76.248.6 :42116 Active Time 0: 0:46
Troubleshooting KAL-AP
To troubleshoot KAL-AP related issues, follow these steps: 1. Make sure that KAL-AP is enabled under the management policy by entering the following commands:
ACE_module5/Admin# show running-config class-map Generating configuration.... class-map 2 match 3 match 4 match 5 match 6 match 7 match 8 match type management match-any MGMT_CLASS protocol http any protocol https any protocol icmp any protocol kalap-udp any <------- KAL-AP is enabled protocol ssh any protocol telnet any protocol snmp any
ACE_module5/Admin# show running-config policy-map MGMT_POLICY Generating configuration.... policy-map type management first-match MGMT_POLICY class MGMT_CLASS permit <------- All protocols in the MGMT_CLASS class-map are permitted including SSH
2. Verify that traffic from the Cisco Global Site Selector (GSS) is reaching the ACE module. KAL-AP statistics should get incremented.
ACE_module5/Admin# sh stats kalap +-----------------------------------------------------+ +---------------- KAL-AP(UDP) statistics -------------+ +-----------------------------------------------------+ Total Total Total Total Total Total Total Total Total bytes received bytes sent requests received responses sent requests successfully received responses successfully sent secure requests received secure responses sent requests with errors : : : : : : : : : 243956 184884 5100 5100 5100 5100 0 0 0
Troubleshooting KAL-AP
81
3. Allow secure KAL-AP requests, and add the GSS IP address and the shared secret to the ACE by entering the following commands:
ACE_module5/Admin# config ACE_module5/Admin(config)# kalap udp ACE_module5/Admin(config-kalap-udp)# ip address 192.168.10.52 encryption md5 cisco (GSS IP)
4. Display information about the load VIP by entering the following command:
ACE_module5/Admin# show kalap udp load vip 10.1.1.1 Error: Vip object not found! ACE_module5/Admin#
If the VIP object is not found while displaying the load value as shown above, check whether the VIP got downloaded in the configuration manager internal table by entering the following command:
ACE_module5/Admin# show cfgmgr internal table vip VIP-Id VIP-Addr Ctx-Id Flags --------------------------------------------------------------------------1 10.1.1.1 1 DATA_VALID, L3Rule_list :-->: 41: 42 Load Value: 255 Load Time stamp: Wed Apr 8 05:10:20 2009
This article describes security access control lists (ACLs) in the ACE, how to configure them, and troubleshooting steps to follow if you encounter problems with ACLs.
Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues Troubleshooting KAL-AP 82
Cisco Application Control Engine (ACE) Troubleshooting Guide ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of Security Access Control Lists 1.1 ACL Types and Uses 1.2 ACL Configuration Guidelines 1.2.1 ACL Entry Order 1.2.2 ACL Implicit Deny 1.2.3 Maximum Number of ACL Entries 2 Configuring ACLs 3 ACL-Related syslogs 4 Troubleshooting ACLs
Cisco Application Control Engine (ACE) Troubleshooting Guide server load balancing (SLB), and so on). The ACE merges these individual ACLs into one large ACL called a merged ACL. The ACL compiler then parses the merged ACL and generates the ACL lookup mechanisms. A match on this merged ACL can result in multiple actions. Note: You can apply only one extended ACL to each direction (inbound or outbound) of an interface. You can also apply the same ACL on multiple interfaces. You can apply EtherType ACLs only in the inbound direction and only on Layer 2 interfaces.
Cisco Application Control Engine (ACE) Troubleshooting Guide The ACE supports a maximum of 256,000 Policy Action Nodes (PANs) entries. Some ACLs use more memory than others, such as an ACL that uses large port number ranges or overlapping networks (for example, one entry specifies 10.0.0.0/8 and another entry specifies 10.1.1.0/24). Depending on the type of ACL, the actual limit that the ACE can support may be less than 256,000 PANs entries. If you use object groups in ACL entries, you enter fewer actual ACL entries, but the same number of expanded ACL entries as you did when you entered entries without object groups. Expanded ACL entries count toward the system limit. To view the number of expanded ACL entries in an ACL, use the show access-list name command. If you exceed the memory limitations of the ACE, it generates a syslog message and increments the Download Failures counter in the output of the show interface vlan number command. The configuration remains in the running-config file and the interface stays enabled. The ACL entries stay the same as they were before the failing configuration was attempted. For example, if you add a new ACL with ten entries, but the addition of the sixth entry fails because the ACE runs out of memory, the ACE removes the five entries that you successfully entered. Note: You must allocate sufficient ACL memory resources for each virtual context in the ACE. The ACE does not generate a syslog if you exceed the maximum number of ACL entries.
Configuring ACLs
You can configure ACLs in one of two ways: Using the access-list command in configuration mode Using the match access-list command in a Layer 3 and Layer 4 class map You can permit or deny network connections based on the IP protocol, source and destination IP addresses, and TCP or UDP ports. To configure a non-ICMP extended ACL, enter the following command: access-list name [line number] extended {deny | permit} {protocol {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} [operator port1 [port2]] {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} [operator port3 [port4]]} | {object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} You can also permit or deny network connections based on the ICMP type (for example, echo, echo-reply, unreachable, and so on). To configure an ICMP extended ACL, enter the following command: access-list name [line number] extended {deny | permit} {icmp {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} [icmp-type code [operator code1 [code2]]]} | {object-group service_obj_grp_name} {any | host src_ip_address | src_ip_address netmask | object-group net_obj_grp_name} {any | host dest_ip_address | dest_ip_address netmask | object-group net_obj_grp_name} You can configure an ACL that controls traffic based on its EtherType. An EtherType is a subprotocol identifier. EtherType ACLs support Ethernet V2 frames; they do not do not support 802.3-formatted frames. To configure an Ethertype ACL, enter the following command: access-list name ethertype {deny | permit} {any | bpdu | ipv6 | mpls} Note: You can configure an EtherType ACL on a Layer 2 interface in the inbound direction only. If you are operating the ACE in bridge mode, be sure to configure an ACL on all interfaces that permit BPDUs. Otherwise, a bridge loop may result.
Cisco Application Control Engine (ACE) Troubleshooting Guide For example, to configure an extended ACL to permit all IP traffic from any source IP address and that is destined to any IP address on interface VLAN 200, enter the following commands:
ACE_module5/Admin(config)# access-list ACL1 extended permit ip any any ACE_module5/Admin(config)# interface vlan 200 ACE_module5/Admin(config-if)# ip address 192.168.1.1 255.255.255.0 ACE_module5/Admin(config)# access-group input ACL1
You can apply an ACL to all interfaces in a context at once, subject to the following conditions: No interface in the context has an ACL applied to it. You can globally apply one Layer 2 and one Layer 3 ACL in the inbound direction only. On Layer 2 bridged-group virtual interfaces (BVIs), you can apply both Layer 3 and Layer 2 ACLs. On Layer 3 virtual LAN (VLAN) interfaces, you can apply only Layer 3 ACLs. In a redundant configuration, the ACE does not apply a global ACL to the FT VLAN. For example, to apply ACL1 to all interfaces in the Admin context, enter the following command in configuration mode:
ACE_module5/Admin(config)# access-group input ACL1
To configure an ACL match statement in a class map, enter the following commands:
ACE_module5/Admin(config)# class-map match-any L4_CLASS ACE_module5/Admin(config-cmap)# match access-list ACL1 ACE_module5/Admin(config-cmap)# exit ACE_module5/Admin(config)# policy-map multi-match L4_POLICY ACE_module5/Admin(config-pmap)# class L4_CLASS ACE_module5/Admin(config-pmap-c)#
For more details about ACLs and how to configure them, see the Cisco Application Control Engine Module Security Configuration Guide.
ACL-Related syslogs
When a packet matches an ACL entry, a syslog message is generated based on the following rules: All ACL deny entries generate a syslog message unless logging is explicitly disabled using the no logging enable command in configuration mode. An ACL permit entry generates a syslog message only if logging is enabled using the logging enable command in configuration mode. All implicit deny entries generate the default deny syslog (%ACE-4-106023). To minimize syslog message generation, the ACE uses the flow cache as follows: 1. For the first packet hit on an ACL entry, the ACE generates a syslog and caches the flow (5-tuple) in the connection table. 2. For subsequent hits on the same ACL entry, the ACE checks the cache. If it finds the flow in the cache, the ACE increments a hit counter for this entry in the cache and does not generate a syslog. 3. After some time (the default is 300 seconds, which is configurable in the ACL entry definition in the CLI as the interval_secs option), the ACE generates a syslog and sets the hit count to 0.
Cisco Application Control Engine (ACE) Troubleshooting Guide 4. However, if at the expiry of the above time, the hit count is 0, the ACE deletes the cache entry silently. So by default, a cache entry is aged out 600 seconds after the last hit.
Troubleshooting ACLs
Many ACL issues manifest themselves by all traffic or only certain traffic being denied or permitted access to the ACE or out of the ACE. Remember that, initially, all traffic to the ACE is denied until you permit traffic using an ACL. Every ACL contains an implicit deny at the end of it, so only traffic that you explicitly permit will have access to the ACE. To troubleshoot ACLs, follow these steps: 1. Verify that your ACL configuration is correct for your network application. Make any required changes to the running-config file, and then test the configuration. If it is satisfactory, save it to the startup-config file using the copy runnning-config startup-config command. For example, to display the ACLs that you have configured in your ACE, enter the following command:
ACE_module5/Admin# show running-config access-list Generating configuration....
access-list ACL1 remark This ACL permits any IP traffic from any source going to any destination except for ICMP t 192.168.12.15 255.255.255.192. access-list ACL1 line 8 extended permit ip any any access-list ACL1 line 10 extended deny icmp 192.168.12.15 255.255.255.192 any echo code range 1 1 (hitcount=0) [0x access-list ANYONE line 8 extended permit ip any any
To verify that the configured ACLs are applied to the correct interfaces and in the right directions (input or output), enter the following command:
ACE_module5/Admin# show running-config interface Generating configuration.... interface vlan 100 ip address 10.2.1.1 255.255.255.0 access-group input ANYONE access-group output ANYONE no shutdown interface vlan 200 ip address 192.168.1.1 255.255.255.0 access-group input ACL1 service-policy input MGMT_POLICY no shutdown
2. Verify that you have allocated sufficient resources for ACLs. To display the allocated resources in your ACE, enter the following command:
ACE_module5/Admin# show resource usage Allocation Resource Current Peak Min Max Denied ------------------------------------------------------------------------------Context: Admin conc-connections 10 18 0 8000000 0 mgmt-connections 2 10 0 100000 0 proxy-connections 584 590 0 1048574 0 xlates 0 0 0 1048574 0 bandwidth 880 16194 0 625000000 0 throughput 880 12606 0 500000000 0 mgmt-traffic rate 0 3588 0 125000000 0
For example, to allocate a 10 percent minimum and a maximum of unlimited resources for ACL memory in the Admin virtual context, enter the following commands:
ACE_module5/Admin(config)# resource myclass ACE_module5/Admin(config-resource)# limit-resource acl-memory minimum 10 maximum unlimited ACE_module5/Admin(config-resource)# exit ACE_module5/Admin(config)# context Admin ACE_module5/Admin(config-context)# member myclass
3. Display the details of an individual ACL by using the show access-list acl_name detail command. This command displays every entry in the specified ACL, the hit counts for each entry, and a 32-bit hexadecimal MD5-hash value that the ACE computes from the access-list command immediately when you configure an ACL. The ACE includes this hash value in deny syslog messages (106023) to help you identify the ACL entry that caused the deny syslog. For example to display the details of the ACL1 access control list, enter the following command:
ACE_module5/Admin# show access-list ACL1 detail
access-list:ACL1, elements: 2, status: ACTIVE remark : This ACL permits any IP traffic from any source going to any destination except for ICMP traffic origin access-list ACL1 line 8 extended permit ip any any (hitcount=9) [0x894c1008] <------- 32-bit hexadecimal MD5-hash access-list ACL1 line 10 extended deny icmp 192.168.12.15 255.255.255.192 any echo code range 1 1 (hitcount=15) [0
%ACE-4-106023: Deny protocol number | name src incoming-interface:src-ip dst outgoing-interface:dst-ip by access-g An IP packet was denied by the ACL.
Explanation: This message displays even if you do not have the log option enabled for an ACL. If a packet hits an input ACL, the outgoing interface will not be known. In this case, the ACE prints the outgoing interface as undetermined. The source IP and destination IP addresses are the unmapped and mapped addresses for the input and output ACLs, respectively, when used with NAT.
Troubleshooting ACLs
88
Cisco Application Control Engine (ACE) Troubleshooting Guide Recommended Action: If messages persist from the same source address, messages may indicate a foot-printing or port-scanning attempt. Contact the remote host administrators. An ACL merged list is a large ACL that the CP compiles from multiple security ACL entries and policies. When the ACE executes an ACL merged list, it performs multiple actions on a flow that matches the merged list. 4. Display the actions that the ACE will perform on a flow by entering the show acl-merge merged-list command. For example, to display the merged list for VLAN 100, enter the following command:
ACE_module5/Admin# show acl-merge merged-list vlan 100 in non-redundant All ACEs in merged list 2 Total:18 Non-redundant:12 Priority:1000, Lineno:0, ACE-id:211 Action:PERMIT, Path-id:0x81/0x0/0x0:6/0[6/0] [6/0] Pmap:0x5, Log:FALSE/FALSE[FALSE][FALSE], Interval:0/0[0][0] Hash1:0x0 Hash2:0x0 Generated:TRUE, need-to-add-in-comp:NO_ACT_NEEDED, redundant:FALSE Parent:: feature:SECURITY ace-lineno:5 ACL priority:0[G:0,P:0,C:0,ACL:0] Parent:: feature:TO CP ace-lineno:2 ACL priority:16779265[G:0,P:1,C:8,ACL:1] Feature:SECURITY Policy:1[1][1] sec-level:0x0 Intratype:SKIP Feature:TO CP Policy:1[1][1] sec-level:0x0 Intratype:TERMINATE Intertype:TERMINATE IP address SRC:161.44.0.0/255.255.0.0 DST:10.86.215.134/255.255.255.255 Ports SRC:RANGE 0 65535 DST:RANGE 22 22 Protocol:6 Hit Count:0 Active:TRUE Timerange:0 . . . Feature:SECURITY Policy:0[0] sec-level:0x0 Intratype:TERMINATE . . . Feature:SLB Policy:14[14] sec-level:0x0 Intratype:TERMINATE . . . Feature:SRC NAT Policy:2[2] sec-level:0x0 Intratype:TERMINATE . . .
5. If the acl-memory Denied counter in the output of the show resource usage command is incrementing and the Peak (ACL) memory counter has not exceeded the Max Allocated ACL memory counter, the problem may lie with one of the nodes in the ACL merge tree. The ACL merge tree contains several different kinds of nodes (see the example output below), each of a different size and each with a maximum limit. If you allocate a minimum of 10 percent of the ACE resources to ACL memory, the ACE will guarantee 10% of the maximum number of each node. If your configuration causes the ACE to exceed the maximum value of one of these nodes, the ACL resource allocation will fail and the acl-memory Denied counter will increment. To monitor the ACL merge tree node usage in the ACE, enter the following command:
ACE_module5/Admin# show np 1 access-list resource ACL Tree Statistics for Context ID: Admin ========================================= ACL memory max-limit: None ACL memory guarantee: 10.00 % MTrie nodes(used/guaranteed/max-limit): 43 / 26214 / 262143 (compressed) <-------| 3 / 2199 / 21999 (uncompressed) <--------|
You can calculate the percentage of use for each node type by dividing the used nodes value by the maximum number of nodes and multiplying the result by 100. If any of these percentages exceeds the maximum value of allocated ACL memory for the context, increase the max value of allocated ACL memory using the limit-resource acl-memory command in resource class configuration mode so that that value is greater than or equal to the highest used nodes percentage that you calculated. Alternatively, if you are approaching the limits of ACL resource capacity, you may consider consolidating your ACL configuration. If the ACL nodes are depleted while the ACE is downloading ACL configurations for an interface, the complete ACL merged list for that interface is deleted and no traffic flows through that interface. The ACE increments the download failure counter in the output of the show interface command and the ACE logs a system message from the configuration manager. 6. To trace a packet through a specific ACL, enter the following command:
ACE_module5/Admin# show np 1 access-list trace vlan 130 in protocol 1 source 172.27.16.23 2000 destination 192.168 Root 0x2c01b00 Src Mtrie (0) offset 1 curr 0x2c01b00 child 0x0 leaf 0x10a840 Dst Mtrie (0) offset 2 curr 0x10a840 child 0x0 leaf 0x3c01330 proto ICMP head node 0x4004880 proto node 0x4004880 src op range port 0/65535 dst op range port 0/65535 lineno 112000 inner match line#:112000 inner match line#: 112000 packet matched priority 112000 action node 0x4c02460 Action Leaf-node version+aceid 0x99 (version 0 ace_id 153 dirty no) action_flag 0x10 (permit no log no punt_to_cp no capture no bridge yes) path ID 0x0 src nat 0x0 dst nat 0x0 vserver 0x0 fixup 0x0 TCP conn 0x0 AAA 0x0 Websense 0x0 QOS Policer 0x0 Syslog Info 0 Hitcount 130426 Syslog info: idx:[153:0] name_idx:[0:0] hash1:0x0 hash2:0x0 name_len:0 invalid Number of DRAM access: 6 (2 mtrie 4 non-mtrie)
Troubleshooting ACLs
90
Cisco Application Control Engine (ACE) Troubleshooting Guide This article describes ACE network address translation (NAT), how to configure it, and how to troubleshoot issues with NAT that you may encounter. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Network Address Translation 2 NAT Configuration Guidelines and Restrictions 3 Configuring Dynamic NAT and PAT 4 Configuring Server-Farm Based Dynamic NAT 5 Configuring Static NAT and Port Redirection 6 Configuring SNAT with Cookie and Load Balancing 7 Troubleshooting ACE NAT and PAT
Contents
91
92
93
policy-map type loadbalance first-match L7SLB_Cookie class L7SLB_Cookie serverfarm httpsf policy-map multi-match L7SLBCookie class vip4 loadbalance vip inservice loadbalance L7SLB_Cookie nat dynamic 1 vlan 2021 interface vlan 2020 ip address 20.11.0.2 255.255.0.0
95
Cisco Application Control Engine (ACE) Troubleshooting Guide 2. Use the show xlate command to verify that dynamic NAT and PAT, and static NAT and port redirection, are taking place properly. Dynamic NAT Example The following example output of the show xlate command shows dynamic NAT (SNAT in this example). When you use Telnet from IP address 172.27.16.5 in VLAN 2020, the ACE translates it to IP address 192.168.100.1 in VLAN 2021.
host1/Admin# show xlate global 192.168.100.1 192.168.100.10 NAT from vlan2020:172.27.16.5 to vlan2021:192.168.100.1 count:1
Dynamic PAT Example The following example shows dynamic PAT. When you use Telnet from IP address 172.27.16.5 port 38097 in VLAN 2020, the ACE translates it to IP address 192.168.201.1 port 1025 in VLAN 2021.
host1/Admin# show xlate TCP PAT from vlan2020:172.27.16.5/38097 to vlan2021:192.168.201.1/1025
Static NAT Example The following example shows static NAT. The ACE maps real IP address 172.27.16.5 to IP address 192.168.210.1.
host1/Admin# show xlate NAT from vlan2020:172.27.16.5 to vlan2021:192.168.210.1 count:1 host1/Admin# show conn total current connections : 2 conn-id dir prot vlan source destination state ----------+---+----+----+----------------+----------------+----------+ 7 in TCP 2020 172.27.16.5 192.168.100.1 ESTAB 6 out TCP 2021 192.168.100.1 192.168.210.1 ESTAB
Static Port Redirection (Static PAT) Example The following example shows static port redirection (DNAT in this example). A host at IP address 192.168.0.10:37766 uses Telnet to connect to IP address 192.168.211.1:3030 on VLAN 2021 on the ACE. The ACE maps IP address 172.27.0.5:23 on VLAN 2020 to IP address 192.168.211.1:3030 on VLAN 2021.
host1/Admin# show xlate TCP PAT from vlan2020:172.27.0.5/23 to vlan2021:192.168.211.1/3030 Mar 24 2006 20:05:41 : %ACE-7-111009: User 'admin' executed cmd: show xlate host1/Admin# show conn
3. To display the NAT policy and pool information for the current context, enter the show nat-fabric command. The syntax of this command is as follows: show nat-fabric {policies | src-nat policy_id mapped_if | dst-nat static_xlate_id | nat-pools | implicit-pat| global-static} policies -- Displays the NAT policies. src-nat policy_id mapped_if -- Displays the specified source NAT policy information. To obtain the values for the policy_id and mapped_if arguments, view the policy_id and mapped_if fields displayed by the show nat-fabric policies command. dst-nat static_xlate_id -- Displays the static address translation for the specified static XLATE ID. To obtain the value for the static_xlate_id argument, view the static_xlate_id field displayed by the show nat-fabric policies command. nat-pools -- Displays NAT pool information for a dynamic NAT policy. implicit-pat -- Displays the implicit PAT policies. global-static -- Displays global static NAT information when the static command in global configuration mode is configured.
ACE_module5/Admin# show nat-fabric policies Nat objects: NAT object Hash Bucket: 9 NAT object ID:2 mapped_if:8 policy_id:1 type:DYNAMIC nat_pool_id:4 Pool ID:4 PAT:1 pool_id:1 mapped_if:8 Ref_count:1 ixp_binding:in all IXPs lower:172.27.16.15 upper:172.27.16.24 Bitmap-ID:40 List of NAT object IDs: 2
This article describes ACE health monitoring (probes), how to configure it, and how to troubleshoot issues with probes that you may encounter. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE NAT and PAT 97
Cisco Application Control Engine (ACE) Troubleshooting Guide Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Health Monitoring 1.1 Configuring Probes 1.2 Example of a Probe Configuration 2 Troubleshooting ACE Health Monitoring 2.1 Troubleshooting an HTTP Probe Error 2.2 Troubleshooting an HTTPS Probe Error 2.3 Troubleshooting an SNMP Probe Issue 2.4 Using the Last Status Code Field
Cisco Application Control Engine (ACE) Troubleshooting Guide server response, the ACE can place the server in or out of service and can make reliable load-balancing decisions. You can also use health monitoring to detect failures for a gateway or a host in high-availability (redundant) configurations. For more information, see the Cisco Application Control Engine Module Administration Guide. The ACE evaluates the health of a server by marking the probes as follows: Passed?The server returns a valid response. Failed?The server fails to provide a valid response to the ACE and the ACE is unable to reach a server for a specified number of retries. By configuring the ACE for health monitoring, the ACE sends active probes periodically to determine the server state. The ACE supports 4096 unique probe configurations, which includes ICMP, TCP, HTTP, and other predefined health probes. The ACE can execute only up to 200 concurrent scripted probes at a time. The ACE also allows the opening of 2048 sockets simultaneously. You can associate the same probe with multiple real servers or server farms. Each time that you use the same probe again, the ACE counts it as another probe instance. You can allocate a maximum of 16,000 probe instances.
Configuring Probes
You can configure health probes on the ACE to actively make connections and explicitly send traffic to servers. The probes determine whether the health status of a server passes or fails by the server's response. Configuring active probes is a three-step process: 1. Configure the health probe with a name, type, and attributes. 2. Associate the probe with one of the following: A real server. A real server and then associate the real server with a server farm. You can associate a single probe or multiple probes with real servers within a server farm. A server farm. All servers in the server farm receive probes of the associated probe types. 3. Place the real server or server farm in service.
99
serverfarm host SFARM1 probe UDP rserver SERVER1 inservice rserver SERVER2 inservice rserver SERVER3 inservice class-map match-all L4UDP-VIP_114:UDP_CLASS 2 match virtual-address 192.168.120.114 udp eq 53 policy-map type loadbalance first-match L7PLBSF_UDP_POLICY class class-default serverfarm SFARM1 policy-map multi-match L4SH-Gold-VIPs_POLICY class L4UDP-VIP_114:UDP_CLASS loadbalance vip inservice loadbalance policy L7PLBSF_UDP_POLICY loadbalance vip icmp-reply nat dynamic 1 vlan 120 connection advanced-options 1SECOND-IDLE interface vlan 120 description Upstream VLAN_120 - Clients and VIPs ip address 192.168.120.1 255.255.255.0 fragment chain 20 fragment min-mtu 68 access-group input ACL1 nat-pool 1 192.168.120.70 192.168.120.70 netmask 255.255.255.0 pat service-policy input L4SH-Gold-VIPs_POLICY no shutdown ip route 10.1.0.0 255.255.255.0 192.168.120.254
The Last disconnect err field indicates that the ACE received an invalid status code. This error means that you have has not configured the expect status command for the probe. 2. Confirm this finding by entering the following command:
ACE_module5/Admin# show running-config probe Generating configuration.... probe http HTTP_PROBE interval 10 passdetect interval 10 open 1
line. End with CNTL/Z. HTTP_PROBE expect status 200 200 <------- 200 indicates the 200 OK message from the ser end
5. Display the probe status details again and observe that the server health status value is SUCCESS by entering the following command: Troubleshooting an HTTP Probe Error 101
102
CLOSED 0 No. Failed states : 0 0 Last status code : 0 0 No. Internal error: 30 Sum of weights don't add up to max weight value <------- Error condition Never Never Never 16000 <------- Note the server load value
The reason for this error is that the weight command needs to be configured when you have multiple OIDs configured for a single probe and from those OIDs if you want to give priority to a specific OID. The sum of the weights should equal 16000 (see the Server Load field). For a single OID, the weight command does not have any significance. 2. Display the probe configuration by entering the following command:
ACE_module5/Admin# show running-config probe probe snmp SNMP_PROBE description snmp probe port 161 interval 15 passdetect interval 10 version 2c community TEST_COMM oid .1.3.6.1.2.1.4.3.0 type absolute max 1000000000 weight 10000 <-------
In the above configuration, the weight is configured as 10000 for a single OID. The ACE is expecting another OID to be configured in the probe and the sum of both weights should equal 16000. The configuration is not complete and the ACE is expecting additional parameters in the probe configuration. Because there is not another OID in the configuration, the ACE is not able to calculate the load and that is why the "Sum of weights don't add up to max weight value" error message appears. 3. Resolve the issue by modifying the probe configuration as follows:
probe snmp SNMP_PROBE description test port 161 interval 15 passdetect interval 60 version 2c community test_comm oid .1.3.6.1.2.1.4.3.0 type absolute max 1000000000 weight 10000 oid .1.3.6.1.2.1.4.10.0 type absolute max 1000000000 weight 6000 <------- 10000 + 6000 = 16000
4. Display the probe status details again by entering the following command:
ACE_module5/test# show probe SNMP_PROBE detail probe : snmp1
103
No. Failed states : 5 Last status code : 30001 <------- Indicates success No. Internal error: 0
104
This article describes how to troubleshoot Layer 4 (L4) load balancing on the ACE. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE L4 Load Balancing 1.1 Classifying L4 Traffic for Server Load Balancing 1.2 Example of a Layer 4 Load-Balancing Configuration 2 Troubleshooting L4 Load Balancing on the ACE
Contents
105
106
Cisco Application Control Engine (ACE) Troubleshooting Guide Figure 1. SLB Flow Diagram
107
108
109
The dropped conns counter under a VIP in the output of the show service policy detail command is incremented whenever the ACE discards a connection request destined to that VIP. There are several reasons why the ACE discards such connection requests. For example: If all the real servers in the server farm associated with the VIP go down, then the VIP will go down. So, all the incoming connections to that VIP are discarded. If the URL in a connection request to the VIP is unknown, then the connection request is discarded. If the server to which the ACE load balances the connection does not respond to the request, then, after the maximum number of retries, the ACE discards the connection. The dropped conns counter is cumulative and the value may comprise entries from any of the following show command counters: show stats loadbalance - Total Layer4 rejections - Total Layer7 rejections - Total Layer4 LB policy misses - Total Layer7 LB policy misses - Total times rserver was unavailable show stats connection - Total Connections Timed-out - Total Connections Failed The failures counter of the show serverfarm serverfarm_name command The Total drop decisions counter of the show stats inspect command
4. Verify that the L4 policy is applied as a service policy to an active interface by entering the following command:
ACE_module5/Admin# show running-config interface Generating configuration.... interface vlan 100 ip address 192.168.120.1 255.255.255.0 access-group input ACL1 access-group output anyone service-policy input L4WEB_POLICY no shutdown . . .
5. Check the total conn-dropcount field for the primary server farm in the output of the following command. Also, check the IP address, state, and the connection statistics for each real server that is configured in the server farm.
ACE_module5/Admin# show serverfarm SFARM1 detail serverfarm : total rservers : active rservers: description : SFARM1, type: HOST 3 3 -
state : ACTIVE <------- Current state of the server farm predictor : ROUNDROBIN <------- Load-balancing method weight : autoadjust : MAXLOAD failaction : back-inservice : 40 partial-threshold : 40 num times failover : 0 num times back inservice : 0 total conn-dropcount : 0 <------- Total number of connection attempts to this server farm that the ACE discarded ------------------------------------------connections----------real weight state current total failures ---+---------------------+------+------------+----------+----------+--------rserver: SERVER1 192.168.252.245:0 10 INSERVICE 0 0 0 <------- Real server IP address, state, an max-conns : 4000000 , out-of-rotation count : 0 min-conns : 4000000 conn-rate-limit : , out-of-rotation count : bandwidth-rate-limit : , out-of-rotation count : retcode out-of-rotation count : load value : 0 rserver: SERVER2 192.168.252.246:0 20 INSERVICE 0 max-conns : 4000000 , out-of-rotation min-conns : 4000000 conn-rate-limit : , out-of-rotation bandwidth-rate-limit : , out-of-rotation retcode out-of-rotation count : load value : 0 rserver: SERVER3 192.168.252.247:0 30 INSERVICE 0 max-conns : 4000000 , out-of-rotation min-conns : 4000000 conn-rate-limit : , out-of-rotation bandwidth-rate-limit : , out-of-rotation retcode out-of-rotation count : load value : 0
Note: The ID Map is used to map real servers and server farms between the local and the remote peers in a redundant configuration. The Total IDMap Lookup Failures field increments if the local ACE fails to find the local ACE to peer ACE ID mapping. A failure can occur if the peer ACE did not send a proper remote ID for the local ACE to look up and so the local ACE could not perform a mapping or if the ID Map table was not created. Troubleshooting L4 Load Balancing on the ACE 111
This article describes how to diagnose and troubleshoot ACE L7 load-balancing issues. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Layer 7 Load Balancing 1.1 Load-Balancing Predictors 1.2 Classifying L7 Traffic for Server Load Balancing 2 Example of a L7 Load-Balancing Configuration 3 Troubleshooting Layer 7 Load Balancing
Contents
112
Load-Balancing Predictors
The ACE uses the following predictors to select the best server to fulfill a client request: Application response?Selects the server with the lowest average response time for the specified response-time measurement based on the current connection count and server weight (if configured). Hash address?Selects the server using a hash value based on either the source or destination IP address or both. Use these predictors for firewall load balancing (FWLB). For more information about FWLB, see Configuring Firewall Load Balancing in the Cisco Application Control Engine Module Server Load-Balancing Configuration Guide (Software Version A2(1.0)). Hash content?Selects the server using a hash value based on a content string in the Trusted Third Parties (TTP) packet body. Hash cookie?Selects the server using a hash value based on a cookie name. Hash header?Selects the server using a hash value based on the HTTP header name. Hash URL?Selects the server using a hash value based on the requested URL. You can specify a beginning pattern and an ending pattern to match in the URL. Use this predictor method to load balance cache servers.
113
Cisco Application Control Engine (ACE) Troubleshooting Guide Least bandwidth?Selects the server that processed the least amount of network traffic based on the average bandwidth that the server used over a specified number of samples. Least connections?Selects the server with the fewest number of active connections based on the server weight. For the least-connections predictor, you can configure a slow-start mechanism to avoid sending a high rate of new connections to servers that you have just put into service. Least loaded?Selects the server with the lowest load based on information obtained from Simple Network Management Protocol (SNMP) probes. To use this predictor, you must associate an SNMP probe with it. Round-robin?Selects the next server in the list of real servers based on the server weight (weighted round-robin). Servers with a higher weight value receive a higher percentage of the connections. This is the default predictor. Note: The hash predictor methods do not recognize the weight value that you configure for real servers. The ACE uses the weight that you assign to real servers only in the least-connections, application-response, and round-robin predictor methods.
Load-Balancing Predictors
114
115
116
policy-map type loadbalance first-match L7PLBSF_PRED-CONNS_POLICY class class-default serverfarm PRED-CONNS policy-map type loadbalance first-match L7PLBSF_PRED-CONNS-UDP_POLICY class class-default serverfarm PRED-CONNS-UDP policy-map type loadbalance first-match L7PLBSF_PREDICTOR_POLICY class class-default sticky-serverfarm STKY-GRP-43 policy-map multi-match L4SH-Gold-VIPs_POLICY class L4PREDICTOR_117:80_CLASS loadbalance vip inservice loadbalance policy L7PLBSF_PREDICTOR_POLICY loadbalance vip icmp-reply active nat dynamic 1 vlan 120 appl-parameter http advanced-options PERSIST-REBALANCE class L4PRED-CONNS-VIP_128:80_CLASS loadbalance vip inservice loadbalance policy L7PLBSF_PRED-CONNS_POLICY loadbalance vip icmp-reply active nat dynamic 1 vlan 120 appl-parameter http advanced-options PERSIST-REBALANCE class L4PRED-CONNS-UDP-VIP_128:2222_CLASS loadbalance vip inservice loadbalance policy L7PLBSF_PRED-CONNS-UDP_POLICY loadbalance vip icmp-reply active nat dynamic 1 vlan 120 appl-parameter http advanced-options PERSIST-REBALANCE connection advanced-options PRED-CONNS-UDP_CONN interface vlan 120 description Upstream VLAN_120 - Clients and VIPs ip address 192.168.120.1 255.255.255.0 fragment chain 20 fragment min-mtu 68 access-group input ACL1 nat-pool 1 192.168.120.70 192.168.120.70 netmask 255.255.255.0 pat service-policy input L4SH-Gold-VIPs_POLICY no shutdown ip route 10.1.0.0 255.255.255.0 192.168.120.254
117
Cisco Application Control Engine (ACE) Troubleshooting Guide 1. Ensure that your load-balancing configuration is correct and that the following conditions exist: Real servers have valid IP addresses and are in service Servers are associated with server farms of the same type L7 load-balancing policy exists with an associated server farm and that the L7 load-balancing policy is associated with a L4 multimatch policy An L4 class map contains a valid match virtual-address command and is associated with the L4 multimatch policy map The L4 policy is applied to the appropriate active interface using a service policy A static route is configured for the server network Use the following show commands to verify your load-balancing configuration: show running-config rserver show running-config serverfarm show running-config policy-map show running-config class-map show running-config interface show ip route 2. Check the ACE connectivity. See the Troubleshooting Connectivity section. 3. Verify that the L7 load-balancing policy is referenced in the L4 policy by entering the following command. Also, check the following fields: VIP address, protocol, and port VIP state Hit count Dropped connections
ACE_module5/Admin# show service-policy L4WEB_POLICY detail
Status : ACTIVE Description: ----------------------------------------Interface: vlan 100 service-policy: L4WEB_POLICY class: L4WEB_CLASS VIP Address: Protocol: Port: 192.168.120.112 tcp eq 80 <------- VIP address, protocol, and port loadbalance: L7 loadbalance policy: LB_WEB_POLICY <-------L7 load-balancing policy referenced in the L4 multimatch poli VIP Route Metric : 77 VIP Route Advertise : DISABLED VIP ICMP Reply : ENABLED VIP State: INSERVICE <------- VIP state should be INSERVICE curr conns : 0 , hit count : 56 dropped conns : 14 <------- Number of attempted connections to this VIP that the ACE discarded client pkt count : 6297 , client byte count: 1047583 server pkt count : 1238 , server byte count: 1325495 L7 Loadbalance policy : LB_WEB_POLICY <------- L7 policy statistics class/match : class-default LB action : serverfarm: SFARM1 hit count : 0 <-------|-- Check these counters to see if they are increasing dropped conns : 0 <-------|
4. Verify that the L4 policy is applied as a service policy to an active interface by entering the following command:
5. Check the total conn-dropcount field for the primary server farm in the output of the following command. Also, check the IP address, state, and the connection statistics for each real server that is configured in the server farm.
ACE_module5/Admin# show serverfarm SFARM1 detail
serverfarm : SFARM1, type: HOST total rservers : 3 active rservers: 3 description : state : ACTIVE <------- Current state of the server farm predictor : ROUNDROBIN <------- Load-balancing method weight : autoadjust : MAXLOAD failaction : back-inservice : 40 partial-threshold : 40 num times failover : 0 num times back inservice : 0 total conn-dropcount : 0 <------- Total number of connection attempts to this server farm that the ACE discarded ------------------------------------------connections----------real weight state current total failures ---+---------------------+------+------------+----------+----------+--------rserver: SERVER1 192.168.252.245:0 10 INSERVICE 0 0 0 <------- Real server IP address, state, an max-conns : 4000000 , out-of-rotation count : 0 min-conns : 4000000 conn-rate-limit : , out-of-rotation count : bandwidth-rate-limit : , out-of-rotation count : retcode out-of-rotation count : load value : 0 rserver: SERVER2 192.168.252.246:0 20 INSERVICE 0 max-conns : 4000000 , out-of-rotation min-conns : 4000000 conn-rate-limit : , out-of-rotation bandwidth-rate-limit : , out-of-rotation retcode out-of-rotation count : load value : 0 rserver: SERVER3 192.168.252.247:0 30 INSERVICE 0 max-conns : 4000000 , out-of-rotation min-conns : 4000000 conn-rate-limit : , out-of-rotation bandwidth-rate-limit : , out-of-rotation retcode out-of-rotation count : load value : 0
Cisco Application Control Engine (ACE) Troubleshooting Guide The connection failures counter increments only if the ACE attempts to load balance a connection and the ACE does not receive a SYN-ACK from the real server in response to a SYN or if the real server responds to the SYN with a RST. 6. Check the L7 load-balance statistics by entering the following command:
ACE_module5/Admin# show stats loadbalance +------------------------------------------+ +------- Loadbalance statistics -----------+ +------------------------------------------+ Total version mismatch : 0 Total Layer4 decisions : 0 Total Layer4 rejections : 0 Total Layer7 decisions : 0 Total Layer7 rejections : 0 Total Layer4 LB policy misses : 0 Total Layer7 LB policy misses : 0 Total times rserver was unavailable : 0 Total ACL denied : 0 Total IDMap Lookup Failures : 0
Note: The ID Map is used to map real servers and server farms between the local and the remote peers in a redundant configuration. The Total IDMap Lookup Failures field increments if the local ACE fails to find the local ACE to peer ACE ID mapping. A failure can occur if the peer ACE did not send a proper remote ID for the local ACE to look up and so the local ACE could not perform a mapping or if the ID Map table was not created. 7. If you are having problems with HTTP, check the HTTP statistics and error counters by entering the following command:
ACE_module5/Admin# show stats http +------------------------------------------+ +-------------- HTTP statistics -----------+ +------------------------------------------+ LB parse result msgs sent : 0 , TCP data msgs sent : Inspect parse result msgs : 0 , SSL data msgs sent : sent TCP fin/rst msgs sent : 0 , Bounced fin/rst msgs sent: SSL fin/rst msgs sent : 0 , Unproxy msgs sent : Drain msgs sent : 0 , Particles read : Reuse msgs sent : 0 , HTTP requests : Reproxied requests : 0 , Headers removed : Headers inserted : 0 , HTTP redirects : HTTP chunks : 0 , Pipelined requests : HTTP unproxy conns : 0 , Pipeline flushes : Whitespace appends : 0 , Second pass parsing : Response entries recycled : 0 , Analysis errors : Header insert errors : 0 , Max parselen errors : Static parse errors : 0 , Resource errors : Invalid path errors : 0 , Bad HTTP version errors : Headers rewritten : 0 , Header rewrite errors :
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
8. If you suspect a probe issue, for example, a TCP probe, check the probe statistics and error counters by entering the following command:
ACE_module5/Admin# show stats probe type tcp +------------------------------------------+ +----------- Probe statistics -------------+ +------------------------------------------+ ----- tcp probe ---Total probes sent : 0 Total Total probes passed : 0 Total Total connect errors : 0 Total Total RST received : 0 Total
: : : :
0 0 0 0
120
9. Check the parameter map statistics for an HTTP parameter map by entering the following command:
ACE_module5/Admin# show parameter-map HTTP_PMAP Number of parameter-maps : 1
Parameter-map : HTTP_PMAP Type : http server-side connection reuse case-insensitive parsing persistence-rebalance header modify per-request header-maxparse-length content-maxparse-length parse length-exceed action urlcookie-delimiters
: : : : : : : :
10. Clear the L7 load-balancing statistics by entering the following commands: clear stats loadbalance [radius | rdp] clear service-policy policy_name clear stats http clear rserver server_name clear serverfarm serverfarm_name
This article describes the procedures for troubleshooting redundancy issues with your ACE. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
121
Contents
1 Overview of ACE Redundancy 1.1 Redundancy Protocol 1.2 FT VLAN 1.3 Configuration Requirements and Restrictions 1.4 Example of a Redundancy Configuration 2 Troubleshooting ACE Redundancy 3 FT Peer and Group Status Details 3.1 FT Group Status Conditions 3.1.1 STANDBY_COLD 3.1.2 STANDBY_CONFIG 3.2 FT Peer Status Conditions 3.2.1 PEER_DOWN 3.2.2 TL_ERROR 3.2.3 FT_VLAN_DOWN 3.2.4 FSM_PEER_STATE_ERROR 3.3 About WARM_COMPATIBLE and STANDBY_WARM
Redundancy Protocol
You can configure a maximum of two ACE modules (peers) in the same Catalyst 6500 series switch or in different chassis for redundancy. You can also configure a maximum of two ACE 4710 appliances for redundancy. Each peer ACE can contain one or more fault-tolerant (FT) groups. Each FT group consists of two members: one active context and one standby context. For more information about contexts, see the Cisco Application Control Engine Module Virtualization Configuration Guide or the Cisco 4700 Series Application Control Engine Appliance Administration Guide (Software Version A3(2.4)). An FT group has a unique group ID that you assign. Both ACEs can be active at the same time, processing traffic for distinct virtual devices and backing up each other (stateful redundancy). An Active-Active configuration requires two FT groups and two virtual contexts on each ACE. See Figure 1. Figure 1. Example of an Active-Active Configuration Contents 122
The ACE uses the redundancy protocol to communicate between the redundant peers. The election of the active member within each FT group is based on a priority scheme. The member configured with the higher priority is elected as the active member. If a member with a higher priority is found after the other member becomes active, the new member becomes active because it has a higher priority. This behavior is known as preemption and is enabled by default. One virtual MAC address (VMAC) is associated with each FT group. The format of the VMAC is: 00-0b-fc-fe-1b-groupID. Because a VMAC does not change upon a switchover, the client and server ARP tables does not require updating. The ACE selects a VMAC from a pool of virtual MACs available to it. You can specify the pool of MAC addresses that the local ACE and the peer ACE use by configuring the shared-vlan-hostid command and the peer shared-vlan-hostid command, respectively. To avoid MAC address conflicts, be sure that the two pools are different on the two ACEs. For more information about VMACs and MAC address pools, see the Cisco Application Control Engine Module Routing and Bridging Configuration Guide. Each FT group acts as an independent redundancy instance. When a switchover occurs, the active member in the FT group becomes the standby member and the original standby member becomes the active member. A switchover can occur for the following reasons: The active member becomes unresponsive. A tracked host, interface, or HSRP group fails. You enter the ft switchover command to force a switchover.
FT VLAN
Redundancy uses a dedicated FT VLAN between redundant ACEs to transmit flow-state information and the redundancy heartbeat. You must configure this same VLAN on both peer ACEs. You also must configure a different IP address within the same subnet on each ACE for the FT VLAN. Cisco recommends two port-channeled 1-Gigabit Ethernet links for the FT VLAN. For the appliance, when you configure the ft-port-vlan command, the ACE modifies the associated Ethernet port or port-channel interface to a trunk port. Note: Do not use the FT VLAN for any other network traffic, including HSRP traffic and data. The two redundant ACEs constantly communicate over the FT VLAN to determine the operating status of each ACE. The standby member uses the heartbeat packet to monitor the health of the active member. The active member uses the heartbeat packet to monitor the health of the standby member. Communications over the switchover link include the following data: Redundancy protocol packets State information replication data Configuration synchronization information Redundancy Protocol 123
Cisco Application Control Engine (ACE) Troubleshooting Guide Heartbeat packets For multiple contexts, the FT VLAN resides in the system configuration file. Each FT VLAN on the ACE has one unique MAC address associated with it. The ACE uses these device MAC addresses as the source or destination MACs for sending or receiving redundancy protocol state and configuration replication packets. Note: The IP address and the MAC address of the FT VLAN do not change at switchover.
policy-map type management first-match L4_REMOTE-MGT_POLICY class L4_REMOTE-MGT_CLASS permit interface vlan 100 ip address 192.168.83.219 255.255.255.0 peer ip address 192.168.83.230 255.255.255.0 alias 192.168.83.200 255.255.255.0
FT VLAN
124
To verify the software (SRG) and license compatibility of the FT peer, enter the following command:
ACE_5/Admin# show ft peer status Peer Id State Maintenance mode SRG Compatibility License Compatibility FT Groups : : : : : : 1 FSM_PEER_STATE_MY_IPADDR MAINT_MODE_OFF COMPATIBLE COMPATIBLE 1
If the software or license is incompatible, install the appropriate software image or license in the peer to correct the problem. 2. Ensure that any SSL certificates (certs) and keys that exist in the active ACE are also configured in the standby ACE. SSL certs and keys are not synchronized automatically from the active to the standby. Use the crypto export and crypto import commands to accomplish this task. This requirement also applies to scripts and scripted probes. Failure to keep the active and standby configurations identical will cause configuration synchronization to fail and may cause the standby ACE to enter the STANDBY_COLD state. 3. The ACE sends heartbeat packets via UDP over the FT VLAN between peers. When heartbeats are not received during the specified interval (the interval and count are configurable), the ACE notifies the HA processor on the CP by sending a Peer_Down interprocess communication protocol (IPCP) message. If a peer is down or unreachable, you may receive one of the following Example of a Redundancy Configuration 125
4. Verify connectivity between the peers over the FT VLAN. If a peer device is physically up but connectivity is the problem, you may end up with two active devices. If connectivity is lost due to the peer going down, reboot the peer to restore redundancy between the two devices. 5. Display heartbeat statistics, including missed heartbeats, by entering the following command:
ACE_5/Admin# show ft stats HA Heartbeat Statistics -----------------------Number of Heartbeats Sent Number of Heartbeats Received Number of Heartbeats Missed Number of Unidirectional HB's Received Number of HB Timeout Mismatches Num of Peer Up Events Sent Num of Peer Down Events Sent Successive HB's miss Intervals counter Successive Uni HB's recv counter : : : : : : : : : 0 0 0 0 0 0 0 0 0
6. Provide an alternate path for the ACE to check the peer's status in case of missed heartbeats and configure a query interface using the followng commands:
ACE_5/Admin# config Enter configuration commands, one per line. End with CNTL/Z. ACE_5/Admin(config)# ft peer 1 ACE_5/Admin(config-ft-peer)# query-interface vlan 100
If the query interface is configured, upon receiving a PEER_DOWN message from the heartbeat process, the ACE data plane attempts to ping the peer using the Query VLAN. If the ping fails, the standby transitions to the ACTIVE state. If the ping is successful, the standby transitions to the STANDBY_COLD state. To recover from the STANDBY_COLD state, reboot the standby. 7. Each peer uses a VMAC that is dependent on the FT group number. If you are using multiple ACE modules in the same chassis, be careful when you configure the same FT groups in more than one module. Display the VMAC for an FT group by entering the following command:
ACE_5/Admin# show interface internal iftable vlan100 vlan100 -------ifid: 6 Context: 0 ifIndex: 16777316 physid: 100 rmode: 0 (unknown) iftype: 0 (vlan) bvi_bgid: 0 MTU: 1500 MAC: 00:18:b9:a6:91:15 VMAC: 00:00:00:00:00:00 <------- Virtual MAC Address Flags: 0x8a000800 (valid, down, admin-down, Non-redundant, tracked) ACL In: 0 ACL Out: 0
126
LastChange: 0 (Thu Jan 1 00:00:00 1970) iflookup index: 100 vlan-vmac index:0 Next Shared IF: 0 Lock: Unlocked, seq 5 Lock errors: 0 Unlock errors: 0 No. of times locked: 5 No. of times unlocked: 5 Current/last owner: 0x40a7fc
8. If the members of an FT group are unable to reach the ACTIVE or the STANDBY_HOT state, there may be a context name mismatch for the same FT group. You may receive the following syslog message:
%ACE-1-727003: HA: Mismatch in context names detected for FT group FTgroupID. Cannot be redundant.
Be sure that the context names within the same FT group are identical on both ACEs. 9. Check the FT group configuration on both devices. Make sure that both devices are associated with the same context. Enter the following command:
ACE_5/Admin# show running-config ft
10. Verify the FT peer status and configuration by entering the following command:
ACE_5/Admin# show ft peer detail Peer Id State Maintenance mode FT Vlan FT Vlan IF State My IP Addr Peer IP Addr Query Vlan Query Vlan IF State Peer Query IP Addr Heartbeat Interval Heartbeat Count Tx Packets Tx Bytes Rx Packets Rx Bytes Rx Error Bytes Tx Keepalive Packets Rx Keepalive Packets TL_CLOSE count FT_VLAN_DOWN count PEER_DOWN count SRG Compatibility License Compatibility FT Groups : : : : : : : : : : : : : : : : : : : : : : : : : 1 FSM_PEER_STATE_COMPATIBLE MAINT_MODE_OFF 100 DOWN 10.1.1.1 10.1.1.2 110 DOWN 172.25.91.202 300 20 318573 66301061 318540 66272840 0 318480 318480 0 0 0 COMPATIBLE COMPATIBLE 3
11. Verify the FT group status and configuration by entering the following command:
ACE_5/Admin# show ft group detail
127
For information on troubleshooting the FT group status, see the "FT Group Status Conditions"
128
Cisco Application Control Engine (ACE) Troubleshooting Guide To work around a bulk sync failure, perform these steps to remove the CLI commands that triggered the error (as identified from the preceding analysis) and then retrigger the bulk sync operation, as follows: 1. Retrigger bulk sync by disabling config sync with the no ft auto-sync running command. 2. Re-enable config sync with ft auto-sync running. If the problem persists, repeat the above sequence until you eliminate the CLI command that triggered the problem. FT VLAN Down with Query Interface Up This condition can be identified by: 1. Entering show ft peer detail, which shows a peer state of FT_VLAN_DOWN. 2. Entering show ft stats, which shows that heartbeats are being missed. In this case, check the physical connectivity of the device. It might be a physical port or cable issue. STANDBY_CONFIG If a device appears to be stuck in the STANDBY_CONFIG state: 1. Run show ft history cfg_cntlr to determine whether the peer devices successfully exchanged notifications regarding configuration synchronization. 2. Grep for the keywords MTS_OPC_REQ_CFG_DNLD_STATUS and MTS_OPC_CFG_DNLD_STATUS. If one or both of the messages are missing, an error occurred in the synchronization exchange process. Note that once it is stuck in the STANDBY_CONFIG state, configuration mode will be disabled on both the active and standby devices. It can be stuck in this state for up to 4 hours, after which a timeout period expires.
STANDBY_COLD
129
Cisco Application Control Engine (ACE) Troubleshooting Guide TL_ERROR This state may occur when the telnet connection used to exchange configuration information between the peers cannot be established but heartbeat packets are exchanged successfully. To identify this issue: 1. Verify that heartbeats are flowing by checking the statistics, show ft stats. 2. Attempt to connect by telnet or to ping the FT peer. The telnet connection attempt will likely fail. 3. Run show arp to see if the FT peer IP address can be resolved. If show arp indicates that the address is not resolvable and the ping or telnet connect attempts fail, it is likely an encapsulation issue on the ACE. FT_VLAN_DOWN This state typically occurs when the FT VLAN goes down while the query interface is up. If the heartbeat exchange fails and the query interface is determined to be up based on an ICMP message check, the status is FT_VLAN_DOWN. To verify, attempt to connect to the FT VLAN Peer IP address by ping or telnet. If running show ft stats indicates that heartbeats are being missed, it is likely a physical connectivity issue, such as the physical port or cable failure. FSM_PEER_STATE_ERROR This indicates a Software Relationship Graph (SRG) version inconsistency between the peers. See the relationship graph table in the following section.
A2(2.1)
A2(2.2)
A2(3.0)
A2(2.3) 130
Cisco Application Control Engine (ACE) Troubleshooting Guide A2(1.5) A2(1.6) A2(2.0) A2(2.1) A2(2.2) A2(3.0) C WC C C WC WC WC C C WC WC WC C C C C C C C WC C C WC WC WC WC C WC C WC WC A3(2.2) C C C C WC WC WC WC C WC WC C WC A3(2.3) WC WC WC WC C WC WC WC C WC WC WC C A3(2.4) WC WC WC WC WC C
A2(2.3) WC WC C WC ACE Appliance: C = COMPATIBLE / WC = WARM_COMPATIBLE Active(Column)/Standby(Row) A3(1.0) A3(2.0) A3(2.1) A3(1.0) A3(2.0) A3(2.1) A3(2.2) A3(2.3) A3(2.4) C C C C WC WC C C C C WC WC C C C C WC WC
This article describes the process and CLI commands for troubleshooting SSL in the ACE. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE SSL Troubleshooting 1.1 Example of an SSL Termination Configuration 1.2 Example of an SSL Initiation Configuration 2 Troubleshooting ACE SSL 131
132
The ACE supports the following SSL configurations (see Figure 2): SSL termination (ACE acts as an SSL server) SSL initiation (ACE acts as a client) End-to-end SSL (SSL termination plus SSL initiation)
133
Before you begin to troubleshoot potential SSL issues, be sure that the following conditions exist: You have configured basic SLB and SSL on your ACE. For details about configuring SLB, see the Cisco Application Control Engine Module Server Load-Balancing Configuration Guide or the Cisco ACE 4700 Series Appliance Server Load-Balancing Configuration Guide. For details about configuring SSL, see the Cisco Application Control Engine Module SSL Configuration Guide or the Cisco ACE 4700 Series Appliance SSL Configuration Guide. If you are running multiple ACEs in a redundant configuration, be sure that you have copied the SSL certificates (certs) and keys to the standby ACE. Certs and keys are not replicated in a redundant configuration from the active ACE to the standby ACE. Also, ensure that the configurations on the active and the standby are identical, including the same licenses and software versions. Be sure that the certs and keys are no larger than 4096 bits and that they are of an RSA type supported by the ACE. For details about configuring SSL, see the Cisco Application Control Engine Module SSL Configuration Guide or the Cisco ACE 4700 Series Appliance SSL Configuration Guide. The ACE supports the following RSA key pair sizes: 512 (least security) 768 (normal security) 1024 (high security, level 1) 1536 (high security, level 2) 2048 (high security, level 3) 4096 (high security, level 4) - For software release A2(2.4) and later in the ACE module and software release A3(2.6) and later in the ACE appliance, you can use 4096-bit SSL certificates in chaingroups and authgroups. You can also import public certificates and keys that are 4096 bits in length. Server certs are valid, installed, and have not expired
134
Cisco Application Control Engine (ACE) Troubleshooting Guide transmits the data as cipher text to the SSL server. On the reverse side, the ACE decrypts the cipher text that it receives from the SSL server and sends the data to the client as clear text.
access-list ACL1 line 10 extended permit ip any any probe http GEN-HTTP port 80 interval 50 faildetect 5 expect status 200 200 rserver SERVER1 ip address 10.1.0.11 inservice rserver SERVER2 ip address 10.1.0.12 inservice rserver SERVER3 ip address 10.1.0.13 inservice rserver SERVER4 ip address 10.1.0.14 inservice rserver SERVER5 ip address 10.1.0.15 inservice rserver SERVER6 ip address 10.1.0.16 inservice rserver SERVER7 ip address 10.1.0.17 inservice rserver SERVER8 ip address 10.1.0.18 inservice serverfarm host SFARM1 description SERVER FARM 1 FOR SSL INITIATION probe GEN_HTTP rserver SERVER1 443 inservice rserver SERVER2 443 inservice rserver SERVER3 443 inservice rserver SERVER4 443 inservice serverfarm host SFARM2 description SERVER FARM 2 FOR SSL TERMINATION probe GEN_HTTP rserver SERVER5 443 inservice rserver SERVER6 443 inservice rserver SERVER7 443 inservice rserver SERVER8 443 inservice parameter-map type http PARAMMAP_HTTP server-conn reuse case-insensitive persistence-rebalance parameter-map type ssl PARAMMAP_SSL_INITIATION
137
138
139
STX1 is a count of the number of packets transmitted by the Nitrox-II and IMX1 is the number of packets received by the Nitrox-II. On a normal system, these values should be the same once traffic has stopped. If the values are not the same, the Nitrox-II has become unresponsive. The Nitrox-II uses 0x500 TX buffers to transmit packets and 0x200 RX buffers to receive packets. If the [TR]X Buffers used count ever exceeds the amount available, the Nitrox-II has become unresponsive. The available cores field shows which of the 22 cores of the Nitrox-II are active. When no traffic is flowing, there should be no numbers following the Using: statement. If there are, as in the sample output above, then that core (0 in this case) is hung, and the Nitrox-II has become unresponsive.
Cisco Application Control Engine (ACE) Troubleshooting Guide For the POM count, there are two numbers, A(B). The "A" value is the number of outstanding packets to the Packet Order Manager, while the "B" value, counts the number of packets that have been processed in the last second. When no traffic is flowing, both of these values should be 0. If no traffic is flowing, and the value of "A" is nonzero as shown above, then there are outstanding requests to the POM that are not being processed, because the Nitrox-II has become unresponsive. 2. Ensure that appropriate ports are designated for PAT in an SSL termination configuration. By default, connections to the real server from the ACE will inherit the destination port from the client to VIP connection so that a connection to port 443 on the VIP will go to port 443 on the real server, unless otherwise specified in the server farm configuration. This will cause problems if you are using ACE to offload SSL between the client and the VIP and send clear-text traffic to the real servers. The following example demonstrates a port definition in a server farm configuration:
serverfarm host sf1 probe HTTP_PROBE rserver rs1 80 inservice rserver rs2 80 inservice
3. Verify that the SSL certificate and key are correct by entering the following command:
ACE_module5/Admin# crypto verify key cert
4. Verify that a certificate revocation list (CRL) has been downloaded, enter the following command:
ACE_module5/Admin# show crypto crl test1 test1: URL: http://192.168.12.23/test.crl Last Downloaded: not downloaded yet Total Number Of Download Attempts: 0 Failed Download Attempts: 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
+----------------------------------------------+ +------- Crypto client alert statistics -------+ +----------------------------------------------+ SSL alert CLOSE_NOTIFY rcvd: SSL alert UNEXPECTED_MSG rcvd: SSL alert BAD_RECORD_MAC rcvd: SSL alert DECRYPTION_FAILED rcvd: SSL alert RECORD_OVERFLOW rcvd: SSL alert DECOMPRESSION_FAILED rcvd: SSL alert HANDSHAKE_FAILED rcvd: SSL alert NO_CERTIFICATE rcvd: SSL alert BAD_CERTIFICATE rcvd: SSL alert UNSUPPORTED_CERTIFICATE rcvd: SSL alert CERTIFICATE_REVOKED rcvd: SSL alert CERTIFICATE_EXPIRED rcvd: SSL alert CERTIFICATE_UNKNOWN rcvd: SSL alert ILLEGAL_PARAMETER rcvd: SSL alert UNKNOWN_CA rcvd: SSL alert ACCESS_DENIED rcvd: SSL alert DECODE_ERROR rcvd: SSL alert DECRYPT_ERROR rcvd: SSL alert EXPORT_RESTRICTION rcvd: SSL alert PROTOCOL_VERSION rcvd: SSL alert INSUFFICIENT_SECURITY rcvd: SSL alert INTERNAL_ERROR rcvd: SSL alert USER_CANCELED rcvd: SSL alert NO_RENEGOTIATION rcvd: SSL alert CLOSE_NOTIFY sent: SSL alert UNEXPECTED_MSG sent: SSL alert BAD_RECORD_MAC sent: SSL alert DECRYPTION_FAILED sent: SSL alert RECORD_OVERFLOW sent: SSL alert DECOMPRESSION_FAILED sent: SSL alert HANDSHAKE_FAILED sent: SSL alert NO_CERTIFICATE sent: SSL alert BAD_CERTIFICATE sent: SSL alert UNSUPPORTED_CERTIFICATE sent: SSL alert CERTIFICATE_REVOKED sent: SSL alert CERTIFICATE_EXPIRED sent: SSL alert CERTIFICATE_UNKNOWN sent: SSL alert ILLEGAL_PARAMETER sent: SSL alert UNKNOWN_CA sent: SSL alert ACCESS_DENIED sent: SSL alert DECODE_ERROR sent: SSL alert DECRYPT_ERROR sent: SSL alert EXPORT_RESTRICTION sent: SSL alert PROTOCOL_VERSION sent: SSL alert INSUFFICIENT_SECURITY sent: SSL alert INTERNAL_ERROR sent: SSL alert USER_CANCELED sent: SSL alert NO_RENEGOTIATION sent:
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
+-----------------------------------------------+ +--- Crypto client authentication statistics ---+ +-----------------------------------------------+ Total SSL client authentications: 0 Failed SSL client authentications: 0 SSL client authentication cache hits: 0
142
+-----------------------------------------------+ +------- Crypto client cipher statistics -------+ +-----------------------------------------------+ Cipher sslv3_rsa_rc4_128_md5: Cipher sslv3_rsa_rc4_128_sha: Cipher sslv3_rsa_des_cbc_sha: Cipher sslv3_rsa_3des_ede_cbc_sha: Cipher sslv3_rsa_exp_rc4_40_md5: Cipher sslv3_rsa_exp_des40_cbc_sha: Cipher sslv3_rsa_exp1024_rc4_56_md5: Cipher sslv3_rsa_exp1024_des_cbc_sha: Cipher sslv3_rsa_exp1024_rc4_56_sha: Cipher sslv3_rsa_aes_128_cbc_sha: Cipher sslv3_rsa_aes_256_cbc_sha: Cipher tlsv1_rsa_rc4_128_md5: Cipher tlsv1_rsa_rc4_128_sha: Cipher tlsv1_rsa_des_cbc_sha: Cipher tlsv1_rsa_3des_ede_cbc_sha: Cipher tlsv1_rsa_exp_rc4_40_md5: Cipher tlsv1_rsa_exp_des40_cbc_sha: Cipher tlsv1_rsa_exp1024_rc4_56_md5: Cipher tlsv1_rsa_exp1024_des_cbc_sha: Cipher tlsv1_rsa_exp1024_rc4_56_sha: Cipher tlsv1_rsa_aes_128_cbc_sha: Cipher tlsv1_rsa_aes_256_cbc_sha:
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
143
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
+-----------------------------------------------+ +--- Crypto server authentication statistics ---+ +-----------------------------------------------+ Total SSL client authentications: Failed SSL client authentications: SSL client authentication cache hits: SSL static CRL lookups: SSL best effort CRL lookups: SSL CRL lookup cache hits: SSL revoked certificates: Total SSL server authentications: Failed SSL server authentications:
0 0 0 0 0 0 0 0 0
144
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
8. Display the number of SSL data messages sent and SSL FIN/RST messages sent by entering the following command:
ACE_module5/Admin# show stats http +------------------------------------------+ +-------------- HTTP statistics -----------+ +------------------------------------------+ LB parse result msgs sent : 0 , TCP data msgs sent : Inspect parse result msgs : 0 , SSL data msgs sent : sent TCP fin/rst msgs sent : 0 , Bounced fin/rst msgs sent: SSL fin/rst msgs sent : 0 , Unproxy msgs sent : Drain msgs sent : 0 , Particles read : Reuse msgs sent : 0 , HTTP requests : Reproxied requests : 0 , Headers removed : Headers inserted : 0 , HTTP redirects : HTTP chunks : 0 , Pipelined requests : HTTP unproxy conns : 0 , Pipeline flushes : Whitespace appends : 0 , Second pass parsing : Response entries recycled : 0 , Analysis errors : Header insert errors : 0 , Max parselen errors : Static parse errors : 0 , Resource errors : Invalid path errors : 0 , Bad HTTP version errors : Headers rewritten : 0 , Header rewrite errors :
0 0 <------0 0 <------0 0 0 0 0 0 0 0 0 0 0 0
9. Display session cache statistics for the current context by entering the following command:
switch/Admin# show crypto session SSL Session Cache Stats for Context -----------------Number of Client Sessions: Number of Server Sessions:
0 0
This article describes how to troubleshoot performance issues with your ACE. Troubleshooting ACE SSL 145
Cisco Application Control Engine (ACE) Troubleshooting Guide Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of Troubleshooting Performance Issues 2 Troubleshooting Performance Issues
Contents
146
syslog buffer
conc-connections
mgmt-connections
proxy-connections
bandwidth
connection rate
147
syslog rate
regexp
sticky
xlates
ssl-connections rate
mgmt-traffic rate
mac-miss rate
throughput
2. Display the resources allocated to the context in question by entering the following command:
ACE_module5/Admin# show resource usage context C1
Allocation Resource Current Peak Min Max Denied ------------------------------------------------------------------------------Context: C1 conc-connections 0 0 0 8000000 0 mgmt-connections 0 0 0 100000 0 proxy-connections 0 0 0 1048574 0 xlates 0 0 0 1048574 0 bandwidth 0 0 0 625000000 0 throughput 0 0 0 500000000 0 mgmt-traffic rate 0 0 0 125000000 0 <------- 1 GBps bandwidth reserved f connection rate 0 0 0 1000000 0 ssl-connections rate 0 0 0 5000 0 mac-miss rate 0 0 0 2000 0 inspect-conn rate 0 0 0 6000 0 acl-memory 0 0 0 78610432 0 sticky 0 0 209714 0 0 regexp 0 0 0 1048576 0 syslog buffer 0 0 0 4194304 0 syslog rate 0 0 0 100000 0
Note: All bandwidth values are in units of bytes per second. To convert to bits per second (bps), multiply the displayed bandwidth value by eight. The ACE reserves 1 Gbps of bandwidth for management (to-the-ACE) traffic. 3. From the supervisor CLI, check the connectivity to the back plane by entering the following command:
cat6k# show fabric status slot channel speed 2 3 4 5 6 8 0 0 0 0 0 0 8G 8G 8G 8G 20G 8G module status OK OK OK OK OK OK
148
Cisco Application Control Engine (ACE) Troubleshooting Guide 4. Check the fabric utilization by entering the following command:
cat6k# show fabric utilization slot channel speed 2 0 8G 3 0 8G 4 0 8G 5 0 8G 6 0 20G 8 0 8G Ingress % 3 0 0 0 0 2 Egress % 2 0 0 0 0 3
5. Display the load of the network processors (NPs) in terms of packets and connection processing for each microengine (ME) by entering the following command:
ACE_module5/Admin# show np 1 me-stats -cpu 0 proxies open. ME Utilization Statistics -------------RECEIVE: FASTPATH: SLOWTX: TCP_RX: HTTP: IH_RX SSL_ME: CM_CLOSE: X_TO_ME: FIXUP: REASSEMBLY: OCM: TCP_TX: ICM: ACE/Admin# show np 2 me-stats -cpu 0 proxies open. ME Utilization Statistics -------------RECEIVE: FASTPATH: SLOWTX: TCP_RX: HTTP: IH_RX SSL_ME: CM_CLOSE: X_TO_ME: FIXUP: REASSEMBLY: OCM: TCP_TX: ICM:
7 44 0 0 0 0 0 36 0 0 0 0 0 39
9 46 2 0 0 0 0 43 0 0 0 0 0 46
Note: All show np commands must be entered for both NP1 and NP2 to obtain the total combined results. NPs operate safely at any percentage of utilization. As ME functions within the NPs approach 100 percent, the traffic load is stressing the system close to its architectural limits. Any ME function that reaches 100 percent utilization can cause back pressure and lead to dropped packets or dropped connections. 6. Monitor the CDE queues and ensure that the Fifo Full drop count counter is not incrementing by entering the following command:
ACE_module5/Admin# show cde health | include Fifo Fifo Full drop count 0
149
Cisco Application Control Engine (ACE) Troubleshooting Guide Backpressure is the mechanism that the ACE uses to slow the system down if queues start to fill up internally. Queues that can be affected and create backpressure are as follows: FIFOs for the CDE, NPs, and the Crypto Module Internal queues for each ME It is possible that some packets that are received by the ACE could be dropped internally if backpressure is applied. 7. Monitor the Fastpath micro engine queues and ensure that the FastQ Transmit Backpressure, the SlowQ Transmit Backpressure, the Drop: Transmit Backpressure, and the Drop: Next-Hop queue full counters are not incrementing by entering the following command:
ACE_module5/Admin# show np 1 me-stats "-s fp" | include Backpressure FastQ Transmit Backpressure: 0 SlowQ Transmit Backpressure: 0 Drop: Transmit Backpressure: 0 ACE/Admin# show np 1 me-stats "-s fp" | include queue Drop: Next-Hop queue full: 0
8. Monitor the TCP micro engine queues and ensure the Drops due to FastTX queue full, Drops due to Fastpath queue full, Drops due to HTTP queue full, Drops due to SSL queue full, Drops due to AI queue full, and Drops due to Fixup queue full are not incrementing by entering the following command. If TCP receives backpressure, it can drop packets, fail to ACK packets, and fail to properly track the next packet in the TCP connection.
ACE/Admin# show np 1 me-stats "-s tcp" | include queue Drop reproxy msg queue full: 0 Drops due to FastTX queue full: 0 Drops due to Fastpath queue full: 0 Drops due to HTTP queue full: 0 Drops due to SSL queue full: 0 Drops due to AI queue full: 0 Drops due to Fixup queue full: 0
The control plane (CP) processor processes all CP traffic (ARP, HSRP, ICMP to VIPs, routing, syslogs, SNMP, probes, and so on) and handles configuration management to parse the CLI for syntactical errors and enforce configuration dependencies and requirements before pushing the configuration to the data plane. 9. Display a three-way moving average of the CP processor utilization (updated every five seconds) by entering the following command:
ACE_module5/Admin# show processes cpu | inc util CPU utilization for five seconds: 81%; one minute: 15%; five minutes: 10%
The ACE allocates data-plane memory to guarantee concurrent connection support for basic Layer 4 connections (such as TCP, UDP, IPsec), Layer 7 connections (proxied flows, typically for application aware load balancing or inspection, and SSL connection when using SSL acceleration). The ACE can support the maximum bidirectional concurrent connection limit regardless of the features enabled. Table 1. Concurrent Connection Support Connection Type ACE Module Limit Layer 4 Layer 7 4,000,000 512,000
150
The state for both directions (client-to-VIP/ACE and server-to-ACE) of a TCP connection is maintained with distinct connection objects. 10. Display the connection table by entering the following command:
ACE_module5/Admin# show conn total current connections : 6 conn-id np dir proto vlan source destination state ----------+--+---+-----+----+---------------------+---------------------+------+ 1 1 in TCP 130 161.44.67.242:2856 10.86.215.134:23 ESTAB 2 1 out TCP 130 10.86.215.134:23 161.44.67.242:2856 ESTAB 4 1 in TCP 130 161.44.67.242:2837 10.86.215.134:23 ESTAB 3 1 out TCP 130 10.86.215.134:23 161.44.67.242:2837 ESTAB 4 2 in TCP 130 161.44.67.242:2857 10.86.215.134:23 ESTAB 3 2 out TCP 130 10.86.215.134:23 161.44.67.242:2857 ESTAB
Note: You can add the detail command option to provide the following additional fields: connection idle time, elapsed time of the connection, byte count, and packet count for each connection object. The total current connections counter is also maintained in the output of the following command:
switch/Admin# show stats connection +------------------------------------------+ +------- Connection statistics ------------+ +------------------------------------------+ Total Connections Created : 124 Total Connections Current : 6 Total Connections Destroyed: 62 Total Connections Timed-out: 58 Total Connections Failed : 0
Note: The Total Connections Current counter counts the number of used connection objects, not the number of TCP flows. The number of TCP flows can be roughly determined as half the number of connection objects minus any UDP connections. The Total Connections Current counter is always up to date and the maximum value can be 8,000,000. Because of the Cisco ACE Module?s architecture, with distinct paths for new and established connections, the number of existing concurrent connections does not heavily impact the rate at which new connections can be set up. Nevertheless, a very large number of concurrent connections will eventually affect the performance of the system in setting up new connections. 11. Use the command "tcp wan-optimization rtt 0" for slow connections. The ACE module architecture includes a mechanism where connections can be moved to the fastpath in order to increase performance for a given connection. The LB decision is made in the software (proxy) and then moved to the fastpath (unproxy). In a persistence rebalance scenario, the proxy/unproxy can occur Many times on a given connection. It is possible that if a packet enters the system during the transition Between the proxy and unproxy states, a packet may not be forwarded as expected and a retransmission may be relied upon. This can affect performance. As a workaround, it is possible to configure the ACE such that fastpath forwarding is prohibited This can be accomplished by configuring a parameter map with the following:
"tcp wan-optimization rtt 0"
This article describes the ACE system limits and performance numbers for various resources and configuration objects.
151
Cisco Application Control Engine (ACE) Troubleshooting Guide Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 ACE Performance Numbers and Resource Limits 1.1 ACE Appliance Data Sheet 1.2 ACE Module Data Sheets 1.3 SLB-Related Limits 1.4 Security-Related Limits 1.5 Management-Related Limits
Contents
152
SLB-Related Limits
Scalability Numbers The scalability numbers provided here are intended to provide guidelines related to configuration scalability. The scalability numbers, however, are based on basic configurations. In order to obtain scalability numbers specific to your deployment, testing with your feature combination is strongly recommended. If there are any questions or concerns related to ACE performance, please contact your Cisco account team for guidance. SLB-Related Object ARP Entries Bridge Table Entries Bridge-Group Virtual Interfaces (BVIs) Concurrent Conns L4 (Unproxied) Concurrent Connections L7 (Proxied) Domains Domain Objects Logical Interfaces Resource Classes Roles Sticky Groups Sticky Table Entries Virtual Contexts VLANs ACE Module System Limit 32,768 32,768 4096 4,000,000 512,000 2,500 None 8,192 100 (99) 4,000 4,096 4,000,000 251 4,000 (2-4094) ACE Module Context Limit 32,768 32,768 2048 4,000,000 512,000 10 (9) None 8,192 1 16 (8) 4,096 4,000,000 N/A 4,000 (2-4094) ACE Appliance Additional Information Limit 32,768 32,768 512 1,000,000 128,000 10 (9 per context) One is used for the default domain. None 8,192 100 (99) 4,096 800,000 21 (1 Admin context) 4,000 (2-4094) 250 user contexts + 1 Admin context One is used for the default class. 16 (8) per context Eight are predefined. Any object within the virtual partition can be added to a domain. A few are reserved for L2 interafces, redundancy, and so on.
153
Security-Related Limits
Scalability Numbers The scalability numbers provided here are meant to provide guidelines related to configuration scalability. The scalability numbers, however, are based on basic configurations. In order to obtain scalability numbers specific to a particular customer, testing with that customer?s feature combination is strongly recommended before any commitment on ACE performance is made to the customer. If there are any questions or concerns related to ACE performance, please contact your Cisco account team for guidance. Security Related Object Static NAT Policies Dynamic NAT Policies Maximum of addresses in a NAT pool Maximum of addresses in a PAT pool PAT Entries Total NAT Pools Xlates Concurrent SSL Conns RSA key size SSL Certs/Key files ACE Module System Limit 4096 4096 64 ACE Module Context Limit 4096 4096 64 ACE Appliance Limit Additional Information 4096 4096 32
63k 4,000,000 8,192 1,000,000 100,000 up to 4096 bits 3800/3800 (A2(3.x) and earlier) 4096/4096
63k 4,000,000 8,192 1,000,000 100,000 up to 4096 bits 3800/3800 (A2(3.x) and earlier) 4096/4096
63l 1,000,000 8,192 64,000 100,000 up to 4096 bits Subset of L7 (proxied) connections Supported: 512, 786, 1536, 1024, 2048, and 4096 (imported public keys only) bits
3800/3800 (A3(1.x) and This number is strictly enforced in A220, earlier) A214, and A322 4096/4096 (A3(2.x) and later, incl. A4(1.0)) 154
Security-Related Limits
Cisco Application Control Engine (ACE) Troubleshooting Guide (A4(1.0) and later) (A4(1.0) and later)
Management-Related Limits
Scalability Numbers The scalability numbers provided here are meant to provide guidelines related to configuration scalability. The scalability numbers, however, are based on basic configurations. In order to obtain scalability numbers specific to a particular customer, testing with that customer?s feature combination is strongly recommended before any commitment on ACE performance is made to the customer. If there are any questions or concerns related to ACE performance, please contact your Cisco account team for guidance. Management-Related Object AAA LDAP Servers AAA RADIUS Servers ACE Module System Limit 6,144 2K (256*8) ACE Module Context Limit 8 (24 total) 8 (24 total) 8 (24 total) 64 (63) 30 (Admin context: 28) No limit Not applicable 16 (8) 10 4 4 MB 4 1 MB 100 16 (8) Eight are predefined and cannot be altered, leaving eight for you to customize ACE Appliance 8 8 8 64 (63) 31 (including admin, www, and dm) Any object within the virtual partition can be added to a domain One domain is used for the default-domain and cannot be removed Additional Information
Objects within a Domain No limit Resource-classes Roles SNMP Hosts SSH Sessions Syslog buffer size Syslog CP rate 252 4000 No Limit 256 4 MB 5,000 per seconds
Management-Related Limits
155
Cisco Application Control Engine (ACE) Troubleshooting Guide Syslog DP rate Syslog history table size Syslog Hosts Syslog persistence size Syslog rate limit table size Telnet Sessions 350,000 per second 256 x 500 256 1M 256 x 100 256 350,000 per second 500 2 10 MB 1M 100 4 10,000 messages per sec 4 2 8,192 messages 100,000 per second
This article describes how to manage and control the ACE system resources. Guide Contents Main Article Overview of ACE Troubleshooting Understanding the ACE Module Architecture and Traffic Flow Preliminary ACE Troubleshooting Troubleshooting ACE Boot Issues Troubleshooting with ACE Logging Troubleshooting Connectivity Troubleshooting ACE Appliance Ethernet Ports Troubleshooting Remote Access Troubleshooting Access Control Lists Troubleshooting Network Address Translation Troubleshooting ACE Health Monitoring Troubleshooting Layer 4 Load Balancing Troubleshooting Layer 7 Load Balancing Troubleshooting Redundancy Troubleshooting SSL Troubleshooting Compression Troubleshooting Performance Issues ACE Resource Limits Managing ACE Resources Show Counter Reference
Contents
1 Overview of ACE Resources 2 Managing ACE Resources 2.1 ACE Resource Planning 2.2 Creating a Resource Class for Resource Management 2.3 Allocating Resources Within a Resource Class 2.4 Changing the Resource Allocation of a Resource Class 2.5 Displaying the ACE Resource Allocation and Usage
Contents
156
157
Cisco Application Control Engine (ACE) Troubleshooting Guide For more information about managing ACE resources, see the Cisco Application Control Engine Module Virtualization Configuration Guide (Software Version A2(1.0)).
For the name argument, enter an unquoted text string with no spaces and a maximum of 64 alphanumeric characters. For example, to create the RC1 resource class, enter the following command:
ACE_module5/Admin(config)# resource-class RC1 ACE_module5/Admin(config-resource)
To remove the resource class from the configuration, enter the following command:
host1/Admin(config)# no resource-class RC1
When you remove a resource class from the ACE, any contexts that were members of that resource class automatically become members of the default resource class. The default resource class allocates a minimum of 0.00 percent to a maximum of 100.00 percent of all ACE resources to each context. You cannot modify the default resource class.
158
To restore resource allocation to the default values of 0 percent minimum and 100 percent maximum for all resources to all member contexts, enter the following command:
(config-resource)# no limit-resource all
Table 1 lists the managed system resources of the ACE. You can limit these resources per context or for all contexts associated with the resource class by using the limit-resource command. See the "Allocating Resources within a Resource Class" section. Table 1. System Resource Maximum Values Resource ACL Memory Buffer Memory (Syslog) Concurrent Connections (Layer 4) Concurrent Connections (SSL) Management Connections SSL Proxy Connections Rate ---Bandwidth 4 gigabits per second (Gbps) You can upgrade the ACE maximum bandwidth to 8 Gbps or 16 Gbps by purchasing a separate license from Cisco. For more information, see the Cisco Application Control Engine Module Administration Guide (Software Version A2(1.0)). ---Connections (any kind) 325,000 connections per second (CPS) 159 Maximum Value 78,610,432 bytes 4,000,000 bytes 4,000,000 connections 200,000 100,000 connections 200,000
Cisco Application Control Engine (ACE) Troubleshooting Guide ---MAC miss ---Management traffic ---SSL transactions 2000 packets per second (PPS) 1 Gbps 1000 transactions per second (TPS), upgradeable to 15000 TPS with a separate license. For more information, see the Cisco Application Control Engine Module Administration Guide (Software Version A2(1.0)). For traffic going to the ACE (control plane), 5000 messages per second For traffic going through the ACE (data plane), 350,000 messages per second Regular Expression Memory 1,048,576 bytes Sticky Entries Xlates (network and port address translation entries) 4,194,304 entries 524,286 translations
---Syslog
Cisco Application Control Engine (ACE) Troubleshooting Guide For example, suppose that context A is using 100 percent of the available resources of the class and you want to allocate 50 percent of the resources to context A and 50 percent of the resources to context B. Although the CLI accepts your resource allocation commands, context B cannot allocate 50 percent of the resources until context A deallocates 50 percent of its resources. In this case, you must perform the following: Inform the Context A administrator to start deallocating resources Inform the Context B administrator to start allocating resources after the Context A administrator releases the resources Note: As resources are released from other contexts, the ACE assigns the resources to resource-starved contexts (contexts where the resource-class minimum allocations have not been met).
Note: All bandwidth values are in bytes per second. To convert to bits per second (bps), multiply the values by eight. The ACE guarantees 1 Gbps of bandwidth for management traffic. So, the total bandwidth for a 4-Gbps ACE license is actually 5 Gbps. Throughput is still 4 Gbps. To display the data plane resource allocation and usage and to cross-check the output of the above two commands, enter the following command:
ACE_module5/Admin# show np 1 me-stats -L0 Resource limts for context : 0 Rate Configured Counters Policer Name Min Max min-toks bandwidth: 0 ee6b280 0 throughput: 0 ee6b280 0 mgmt-traffic rate: 0 3b9aca0 0 connection rate: 0 7a120 0 ssl-connections rate: 0 9c4 0 mac-miss rate: 0 3e8 0 inspect-conn rate: 0 bb8 0 Resource Configured Policer Name Min Max conc-connections: 0 3d0900 mgmt-connections: 0 c350 proxy-connections: 0 7ffff ip-reassemble buffer: 0 0 tcp-ooo buffer: 0 0 regexp: 0 0 xlates: 0 7ffff
deny 0 0 0 0 0 0 0
peak 0 4 0 0 0 0 0
deny 0 0 0 0 0 0 0
The Admin context has a context ID of 0. To display the resource allocation and and usage statistics for another context, change the "0" in the "-L<context_id>" parameter to the context ID of another context.
162