03-03-2022 01:23 AM
Hi Folks
i'm quite new to ACI & need quick support on better understanding of SPAN feature on fabric leaf.
i've read about configuration under Tenant>Policy>Troubleshooting>SPAN but not quite clear about destination group where we have to point point source IP.
I understand source IP as IP on leaf from where leaf will send captured data to the destination IP (wireshark or whatever else ERSPAN capable collector). m i correct? what r the applicable options with source IP then? & does ACI really leverage ERSPAN mechanism for this transfer?
thanks in advance
Solved! Go to Solution.
03-03-2022 02:27 AM
Hi @andrii.oliinyk ,
Stolen from a lab guide used by Housley Communications (but written by me) - links are in my bio
It assumes your tenant is called TenantX, your tenant has an Application Profile called 2Tier_AP and two EPGs - WebServers_EPG and AppServers_EPG.
AppServerBM is one of the AppServers and has an IP of 10.111.11.10 and will be the destination for your SPAN traffic - you will run Wireshark on this PC
Name: AppServerBM_SPAN.DstGrp
Destination EPG: TenantX 2Tier_AP AppServers_EPG
SPAN Version: Version 2
Destination IP: 10.111.11.10
Your AppServerBM
Source IP/prefix: 1.0.0.0/16
Note:
Name: EPGsToApp_SPAN.SrcGrp
Destination Group: AppServerBM_SPAN.DstGrp
Click [+] adjacent Create Sources
Name: WebServers_SPAN.Src
Direction: Both
Source EPG: WebServers_EPG
Click Submit
A problem you are going to have is that when the GRE (ERSPAN) packets start arriving, your Linux monitoring PC is going to send ICMP Type 3 Code 2 (Destination Protocol Unreachable) packets back to either 1.0.4.177 or 1.0.8.153 because your host has no process listening for protocol 47.
You will use two different strategies to overcome this:
user@appserverbm:~$ sudo route add -net 1.0.0.0/8 reject
That should be enough to get you started. However, there are some Wireshark tweaks you might want to know about.
If you notice that you have captured a collection of UDP packets with destination port 48879 then this indicates that have collected packets with iVXLAN encapsulation, and Wireshark must be directed how to interpret these packets.
Your Wireshark output should now reveal the iVXLAN headers and the encapsulated IP packets.
If you notice that Wireshark does not decode the encapsulated payload, complete the following steps.
You should now be able to interpret your Wireshark capture.
03-03-2022 02:27 AM
Hi @andrii.oliinyk ,
Stolen from a lab guide used by Housley Communications (but written by me) - links are in my bio
It assumes your tenant is called TenantX, your tenant has an Application Profile called 2Tier_AP and two EPGs - WebServers_EPG and AppServers_EPG.
AppServerBM is one of the AppServers and has an IP of 10.111.11.10 and will be the destination for your SPAN traffic - you will run Wireshark on this PC
Name: AppServerBM_SPAN.DstGrp
Destination EPG: TenantX 2Tier_AP AppServers_EPG
SPAN Version: Version 2
Destination IP: 10.111.11.10
Your AppServerBM
Source IP/prefix: 1.0.0.0/16
Note:
Name: EPGsToApp_SPAN.SrcGrp
Destination Group: AppServerBM_SPAN.DstGrp
Click [+] adjacent Create Sources
Name: WebServers_SPAN.Src
Direction: Both
Source EPG: WebServers_EPG
Click Submit
A problem you are going to have is that when the GRE (ERSPAN) packets start arriving, your Linux monitoring PC is going to send ICMP Type 3 Code 2 (Destination Protocol Unreachable) packets back to either 1.0.4.177 or 1.0.8.153 because your host has no process listening for protocol 47.
You will use two different strategies to overcome this:
user@appserverbm:~$ sudo route add -net 1.0.0.0/8 reject
That should be enough to get you started. However, there are some Wireshark tweaks you might want to know about.
If you notice that you have captured a collection of UDP packets with destination port 48879 then this indicates that have collected packets with iVXLAN encapsulation, and Wireshark must be directed how to interpret these packets.
Your Wireshark output should now reveal the iVXLAN headers and the encapsulated IP packets.
If you notice that Wireshark does not decode the encapsulated payload, complete the following steps.
You should now be able to interpret your Wireshark capture.
03-08-2022 07:07 AM - edited 03-08-2022 07:09 AM
thanks for clear navigation. just couple of Qs:
what r cons & pros of configuring SPAN under Tenant vs doing this under the Fabric (Access policies)?
we can apply different filters on the SPAN Source Group & under SPAN Source. does filter applied under SPAN Source overrides filter applied in SPAN Source Group?
03-08-2022 11:57 AM
Hi @andrii.oliinyk ,
There are three places you can configure SPAN,
Sidenote: When you do this, if open another tab in your browser and navigate to Fabric > Access Policies > Policies > Troubleshooting > SPAN, you will see that ACI has created temporary Source, Target and Filters for you |
You will see a lot of duplicated packets, (oops - I should have specified 1.0.0.0/16, not 1.0.0.0 as the source IP Prefix so I could filter my Wireshark to show just packets captured for ONE of the leaves...) but that can be the case in all SPANs.
03-09-2022 04:11 AM
Thanks man for best details ever. Could u pls shad on "we can apply different filters on the SPAN Source Group & under SPAN Source. does filter applied under SPAN Source overrides filter applied in SPAN Source Group" Q?
i have such a configuration implemented by currently unreachable person under Fabric>AccessPolicy>T/S>SPAN
03-15-2022 08:49 AM
Wow, thanks! I did not know the visibility and tshoot tool allowed you to download a pcap! I got a new wrinkle in my brain
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide