05-22-2018 08:49 AM - edited 03-01-2019 05:33 AM
Hi,
Do we have some CLI list for ACI ISIS/vxlan/vtep troubleshooting?
For example, I want to see all vxlan Tunnels/VTEPs IPs and summaries in the ACI fabric?
Thanks
Hongjun
Solved! Go to Solution.
05-22-2018 07:52 PM - edited 05-22-2018 07:53 PM
What are you specifically trying to tshoot? This would show some of what you are looking for
(This shows Leafs and Spines and the IP Agrees they have assigned)
APIC-01# acidiag fnvread
ID Pod ID Name Serial Number IP Address Role State LastUpdMsgId
--------------------------------------------------------------------------------------------------------------
101 1 Leaf-101-Int XXXXXXXXXXXXXX 100.64.40.95/32 leaf active 0
102 1 Leaf-102-Int XXXXXXXXXXXXXX 100.64.40.92/32 leaf active 0
103 1 Leaf-103-Int XXXXXXXXXXXXXX 100.64.40.91/32 leaf active 0
104 1 Leaf-104-Int XXXXXXXXXXXXXX 100.64.40.90/32 leaf active 0
105 1 Leaf-105-DMZ XXXXXXXXXXXXXX 100.64.144.95/32 leaf active 0
106 1 Leaf-106-DMZ XXXXXXXXXXXXXX 100.64.40.65/32 leaf active 0
107 1 Leaf-107-Int XXXXXXXXXXXXXX 100.64.40.72/32 leaf active 0
108 1 Leaf-108-Int XXXXXXXXXXXXXX 100.64.40.73/32 leaf active 0
109 1 Leaf-109 XXXXXXXXXXXXXX 100.64.144.92/32 leaf active 0
110 1 Leaf-110 XXXXXXXXXXXXXX 100.64.80.67/32 leaf active 0
111 1 Leaf-111 XXXXXXXXXXXXXX 100.64.40.70/32 leaf active 0
201 1 Spine-201 XXXXXXXXXXXXXX 100.64.40.94/32 spine active 0
202 1 Spine-202 XXXXXXXXXXXXXX 100.64.40.93/32 spine active 0
(stablished tunnel endpoints from leaf perspective)
Leaf-102-Int# show isis dteps vrf overlay-1
IS-IS Dynamic Tunnel End Point (DTEP) database:
DTEP-Address Role Encapsulation Type
100.64.40.93 SPINE N/A PHYSICAL
100.64.248.1 SPINE N/A PHYSICAL,PROXY-ACAST-MAC
100.64.248.2 SPINE N/A PHYSICAL,PROXY-ACAST-V4
100.64.248.0 SPINE N/A PHYSICAL,PROXY-ACAST-V6
100.64.192.66 LEAF N/A PHYSICAL
100.64.40.88 SPINE N/A PHYSICAL
100.64.40.89 SPINE N/A PHYSICAL
100.64.192.64 LEAF N/A PHYSICAL
100.64.40.90 LEAF N/A PHYSICAL
100.64.40.91 LEAF N/A PHYSICAL
100.64.40.94 SPINE N/A PHYSICAL
100.64.192.65 LEAF N/A PHYSICAL
100.64.40.95 LEAF N/A PHYSICAL
100.64.144.95 LEAF N/A PHYSICAL
100.64.40.65 LEAF N/A PHYSICAL
100.64.192.67 LEAF N/A PHYSICAL
100.64.144.92 LEAF N/A PHYSICAL
100.64.80.67 LEAF N/A PHYSICAL
100.64.192.68 LEAF N/A PHYSICAL
100.64.40.70 LEAF N/A PHYSICAL
100.64.80.69 LEAF N/A PHYSICAL
100.64.192.69 LEAF N/A PHYSICAL
100.64.40.72 LEAF N/A PHYSICAL
100.64.40.73 LEAF N/A PHYSICAL
100.64.80.72 LEAF N/A PHYSICAL
100.64.144.85 LEAF N/A PHYSICAL
100.64.192.70 LEAF N/A PHYSICAL
(This shows tunnel interfaces created for ivxlan)
Leaf-102-Int# vsh_lc
module-1# show system internal eltmc info interface brief |grep Tunnel
Tunnel1 0x18010001(402718721 ) 140 up
Tunnel2 0x18010002(402718722 ) 142 up
Tunnel3 0x18010003(402718723 ) 143 up
Tunnel4 0x18010004(402718724 ) 144 up
Tunnel5 0x18010005(402718725 ) 145 up
Tunnel9 0x18010009(402718729 ) 154 up
Tunnel10 0x1801000a(402718730 ) 2 up
Tunnel11 0x1801000b(402718731 ) 3 up
Tunnel12 0x1801000c(402718732 ) 4 up
Tunnel13 0x1801000d(402718733 ) 155 up
Tunnel14 0x1801000e(402718734 ) 132 up
Tunnel15 0x1801000f(402718735 ) 133 up
Tunnel16 0x18010010(402718736 ) 156 up
Tunnel22 0x18010016(402718742 ) 81 up
Tunnel23 0x18010017(402718743 ) 84 up
Tunnel24 0x18010018(402718744 ) 82 up
Tunnel25 0x18010019(402718745 ) 83 up
Tunnel26 0x1801001a(402718746 ) 85 up
Tunnel28 0x1801001c(402718748 ) 87 up
Tunnel29 0x1801001d(402718749 ) 88 up
Tunnel30 0x1801001e(402718750 ) 89 up
Tunnel31 0x1801001f(402718751 ) 90 up
Tunnel32 0x18010020(402718752 ) 91 up
Tunnel33 0x18010021(402718753 ) 92 up
Tunnel34 0x18010022(402718754 ) 93 up
Tunnel35 0x18010023(402718755 ) 94 up
Tunnel36 0x18010024(402718756 ) 86 up
Tunnel39 0x18010027(402718759 ) 134 up
Tunnel40 0x18010028(402718760 ) 139 up
(with previous output you can now check the specific tunnel)
Leaf-102-Int# cat /mit/sys/tunnel-[tunnel1]/summary
# Tunnel Interface
id : tunnel1
adminSt : up
cfgdMtu : 9000
childAction :
delInProg : no
descr :
dest : 100.64.80.67
dn : sys/tunnel-[tunnel1]
idRequestorDn : sys/isis/inst-default/dom-overlay-1/lvl-l1/db-dtep/dtep-[100.64.80.67]
iod : 140
keepAlvIntvl : 10
keepAlvRetries : 3
lcC : learned
lcOwn : local
mac : 00:00:00:00:00:00
modTs : 2017-12-21T22:39:11.390-05:00
monPolDn : uni/fabric/monfab-default
name :
operSt : up
operStQual : none
rn : tunnel-[tunnel1]
src : 100.64.40.92/32
status :
tLayer : l3
tType : ivxlan
tmCfgFailedBmp :
tmCfgFailedTs : 00:00:00:00.000
tmCfgState : 0
type : physical
underlayVrfName :
vrfName : overlay-1
(if part of a VPC who is the peer, and the ip assigned from the top pool to the VPC)
Leaf-102-Int# show system internal epm vpc
Local TEP IP : 100.64.40.92
Peer TEP IP : 100.64.40.95
vPC configured : Yes
vPC VIP : 100.64.192.65
MCT link status : Up
Local vPC version bitmap : 0x7
Peer vPC version bitmap : 0x7
Negotiated vPC version : 3
Peer advertisement received : Yes
Tunnel to vPC peer : Up
(DHCP scopes and usages)
admin@apic1:~> moquery -c dhcpPool
(My vpn got disconnected so I don’t have this one handy, but that would show the DHCP pools from the Top Pool and the usage)
05-22-2018 07:52 PM - edited 05-22-2018 07:53 PM
What are you specifically trying to tshoot? This would show some of what you are looking for
(This shows Leafs and Spines and the IP Agrees they have assigned)
APIC-01# acidiag fnvread
ID Pod ID Name Serial Number IP Address Role State LastUpdMsgId
--------------------------------------------------------------------------------------------------------------
101 1 Leaf-101-Int XXXXXXXXXXXXXX 100.64.40.95/32 leaf active 0
102 1 Leaf-102-Int XXXXXXXXXXXXXX 100.64.40.92/32 leaf active 0
103 1 Leaf-103-Int XXXXXXXXXXXXXX 100.64.40.91/32 leaf active 0
104 1 Leaf-104-Int XXXXXXXXXXXXXX 100.64.40.90/32 leaf active 0
105 1 Leaf-105-DMZ XXXXXXXXXXXXXX 100.64.144.95/32 leaf active 0
106 1 Leaf-106-DMZ XXXXXXXXXXXXXX 100.64.40.65/32 leaf active 0
107 1 Leaf-107-Int XXXXXXXXXXXXXX 100.64.40.72/32 leaf active 0
108 1 Leaf-108-Int XXXXXXXXXXXXXX 100.64.40.73/32 leaf active 0
109 1 Leaf-109 XXXXXXXXXXXXXX 100.64.144.92/32 leaf active 0
110 1 Leaf-110 XXXXXXXXXXXXXX 100.64.80.67/32 leaf active 0
111 1 Leaf-111 XXXXXXXXXXXXXX 100.64.40.70/32 leaf active 0
201 1 Spine-201 XXXXXXXXXXXXXX 100.64.40.94/32 spine active 0
202 1 Spine-202 XXXXXXXXXXXXXX 100.64.40.93/32 spine active 0
(stablished tunnel endpoints from leaf perspective)
Leaf-102-Int# show isis dteps vrf overlay-1
IS-IS Dynamic Tunnel End Point (DTEP) database:
DTEP-Address Role Encapsulation Type
100.64.40.93 SPINE N/A PHYSICAL
100.64.248.1 SPINE N/A PHYSICAL,PROXY-ACAST-MAC
100.64.248.2 SPINE N/A PHYSICAL,PROXY-ACAST-V4
100.64.248.0 SPINE N/A PHYSICAL,PROXY-ACAST-V6
100.64.192.66 LEAF N/A PHYSICAL
100.64.40.88 SPINE N/A PHYSICAL
100.64.40.89 SPINE N/A PHYSICAL
100.64.192.64 LEAF N/A PHYSICAL
100.64.40.90 LEAF N/A PHYSICAL
100.64.40.91 LEAF N/A PHYSICAL
100.64.40.94 SPINE N/A PHYSICAL
100.64.192.65 LEAF N/A PHYSICAL
100.64.40.95 LEAF N/A PHYSICAL
100.64.144.95 LEAF N/A PHYSICAL
100.64.40.65 LEAF N/A PHYSICAL
100.64.192.67 LEAF N/A PHYSICAL
100.64.144.92 LEAF N/A PHYSICAL
100.64.80.67 LEAF N/A PHYSICAL
100.64.192.68 LEAF N/A PHYSICAL
100.64.40.70 LEAF N/A PHYSICAL
100.64.80.69 LEAF N/A PHYSICAL
100.64.192.69 LEAF N/A PHYSICAL
100.64.40.72 LEAF N/A PHYSICAL
100.64.40.73 LEAF N/A PHYSICAL
100.64.80.72 LEAF N/A PHYSICAL
100.64.144.85 LEAF N/A PHYSICAL
100.64.192.70 LEAF N/A PHYSICAL
(This shows tunnel interfaces created for ivxlan)
Leaf-102-Int# vsh_lc
module-1# show system internal eltmc info interface brief |grep Tunnel
Tunnel1 0x18010001(402718721 ) 140 up
Tunnel2 0x18010002(402718722 ) 142 up
Tunnel3 0x18010003(402718723 ) 143 up
Tunnel4 0x18010004(402718724 ) 144 up
Tunnel5 0x18010005(402718725 ) 145 up
Tunnel9 0x18010009(402718729 ) 154 up
Tunnel10 0x1801000a(402718730 ) 2 up
Tunnel11 0x1801000b(402718731 ) 3 up
Tunnel12 0x1801000c(402718732 ) 4 up
Tunnel13 0x1801000d(402718733 ) 155 up
Tunnel14 0x1801000e(402718734 ) 132 up
Tunnel15 0x1801000f(402718735 ) 133 up
Tunnel16 0x18010010(402718736 ) 156 up
Tunnel22 0x18010016(402718742 ) 81 up
Tunnel23 0x18010017(402718743 ) 84 up
Tunnel24 0x18010018(402718744 ) 82 up
Tunnel25 0x18010019(402718745 ) 83 up
Tunnel26 0x1801001a(402718746 ) 85 up
Tunnel28 0x1801001c(402718748 ) 87 up
Tunnel29 0x1801001d(402718749 ) 88 up
Tunnel30 0x1801001e(402718750 ) 89 up
Tunnel31 0x1801001f(402718751 ) 90 up
Tunnel32 0x18010020(402718752 ) 91 up
Tunnel33 0x18010021(402718753 ) 92 up
Tunnel34 0x18010022(402718754 ) 93 up
Tunnel35 0x18010023(402718755 ) 94 up
Tunnel36 0x18010024(402718756 ) 86 up
Tunnel39 0x18010027(402718759 ) 134 up
Tunnel40 0x18010028(402718760 ) 139 up
(with previous output you can now check the specific tunnel)
Leaf-102-Int# cat /mit/sys/tunnel-[tunnel1]/summary
# Tunnel Interface
id : tunnel1
adminSt : up
cfgdMtu : 9000
childAction :
delInProg : no
descr :
dest : 100.64.80.67
dn : sys/tunnel-[tunnel1]
idRequestorDn : sys/isis/inst-default/dom-overlay-1/lvl-l1/db-dtep/dtep-[100.64.80.67]
iod : 140
keepAlvIntvl : 10
keepAlvRetries : 3
lcC : learned
lcOwn : local
mac : 00:00:00:00:00:00
modTs : 2017-12-21T22:39:11.390-05:00
monPolDn : uni/fabric/monfab-default
name :
operSt : up
operStQual : none
rn : tunnel-[tunnel1]
src : 100.64.40.92/32
status :
tLayer : l3
tType : ivxlan
tmCfgFailedBmp :
tmCfgFailedTs : 00:00:00:00.000
tmCfgState : 0
type : physical
underlayVrfName :
vrfName : overlay-1
(if part of a VPC who is the peer, and the ip assigned from the top pool to the VPC)
Leaf-102-Int# show system internal epm vpc
Local TEP IP : 100.64.40.92
Peer TEP IP : 100.64.40.95
vPC configured : Yes
vPC VIP : 100.64.192.65
MCT link status : Up
Local vPC version bitmap : 0x7
Peer vPC version bitmap : 0x7
Negotiated vPC version : 3
Peer advertisement received : Yes
Tunnel to vPC peer : Up
(DHCP scopes and usages)
admin@apic1:~> moquery -c dhcpPool
(My vpn got disconnected so I don’t have this one handy, but that would show the DHCP pools from the Top Pool and the usage)
05-22-2018 08:15 PM
Thank you gbrait85! that's very helpful.
I played around a bit and also found these two commands which have some useful summary info.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide