09-03-2020 07:58 PM - edited 09-03-2020 08:09 PM
We are seeing input-drops on one specific sub-interface of a Bundle-Ether:
Bundle-Ether2.333 is up, line protocol is up
Interface state transitions: 11
Hardware is VLAN sub-interface(s), address is 5087.896d.e392
Internet address is xx.xx.88.94/30
MTU 9196 bytes, BW 15000000 Kbit (Max: 30000000 Kbit)
reliability 255/255, txload 0/255, rxload 0/255
Encapsulation 802.1Q Virtual LAN, VLAN Id 333, loopback not set,
Last link flapped 04:36:57
ARP type ARPA, ARP timeout 04:00:00
Last input 00:00:00, output 00:00:00
Last clearing of "show interface" counters never
30 second input rate 1000 bits/sec, 1 packets/sec
30 second output rate 0 bits/sec, 1 packets/sec
1301507775597 packets input, 1049536070526007 bytes, 168006588 total input drops
So I went to check the following:
RP/0/RSP0/CPU0:GP1#sho controll np count all loca 0/0/cpu0 | incl DROP
Fri Sep 4 05:35:31.185 IDT
101 RSV_DROP_EGR_UIDB_NO_MATCH 705 0
103 RSV_DROP_EGR_UIDB_DOWN 65 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 997 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 6 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 173023112 8
137 RSV_DROP_IPV4_DROP_RP_DEST 3436315 0
141 RSV_DROP_IPV4_RXADJ_DROP 2915267 0
155 RSV_DROP_ING_LAG_NO_MATCH 945526 0
157 RSV_DROP_EGR_LAG_NO_MATCH 1 0
163 RSV_DROP_QOS_DENY 59842111 0
171 RSV_DROP_IPV4_URPF_CHK 330 0
173 RSV_DROP_IPV6_URPF_CHK 4359144 0
289 RSV_DROP_IFIB_TTL_CHECK 62 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 28 0
630 MDF_PUNT_POLICE_DROP 10788586126 0
637 MODIFY_PUNT_REASON_MISS_DROP 3 0
1074 DROP_FRM_CRC_ERR_XAUI4 209 0
1075 DROP_FRM_FRM_ERR_XAUI4 535 0
1078 DROP_FRM_CRC_ERR_XAUI6 15 0
1080 DROP_FRM_CRC_ERR_XAUI7 1452 0
1081 DROP_FRM_FRM_ERR_XAUI7 134 0
1215 DROP_FRM_RUNT 183 0
1292 PARSE_DROP_IN_UIDB_TCAM_MISS 376 0
1298 PARSE_DROP_IN_UIDB_DOWN 334 0
1302 PARSE_DROP_IPV4_DISABLED 4051 0
1339 PARSE_DROP_IPV6_LENGTH 1 0
1442 L2TP_ING_DECAP_VER_DROP 70 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 312 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 304 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 279 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 304 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 23 0
103 RSV_DROP_EGR_UIDB_DOWN 44 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 8583 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 1599 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 5 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 51588147 1
137 RSV_DROP_IPV4_DROP_RP_DEST 66906156 8
141 RSV_DROP_IPV4_RXADJ_DROP 2741044 0
155 RSV_DROP_ING_LAG_NO_MATCH 468907 0
157 RSV_DROP_EGR_LAG_NO_MATCH 7 0
161 RSV_DROP_ACL_DENY 6697138 0
277 RSV_DROP_NHINDEX 1510 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 1 0
630 MDF_PUNT_POLICE_DROP 1120222 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 17 0
1075 DROP_FRM_FRM_ERR_XAUI4 8 0
1076 DROP_FRM_CRC_ERR_XAUI5 23 0
1077 DROP_FRM_FRM_ERR_XAUI5 6 0
1080 DROP_FRM_CRC_ERR_XAUI7 2712 0
1081 DROP_FRM_FRM_ERR_XAUI7 279 0
1292 PARSE_DROP_IN_UIDB_TCAM_MISS 40330 0
1298 PARSE_DROP_IN_UIDB_DOWN 43 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 1797 0
103 RSV_DROP_EGR_UIDB_DOWN 169 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 3 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 1180 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 143632503 11
137 RSV_DROP_IPV4_DROP_RP_DEST 3326871 0
141 RSV_DROP_IPV4_RXADJ_DROP 1612571 0
155 RSV_DROP_ING_LAG_NO_MATCH 446948 0
157 RSV_DROP_EGR_LAG_NO_MATCH 23 0
171 RSV_DROP_IPV4_URPF_CHK 8063285 0
173 RSV_DROP_IPV6_URPF_CHK 3751447 0
289 RSV_DROP_IFIB_TTL_CHECK 118 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 265 0
630 MDF_PUNT_POLICE_DROP 12963392090 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 5807218 1
1075 DROP_FRM_FRM_ERR_XAUI4 146232 0
1076 DROP_FRM_CRC_ERR_XAUI5 15 0
1077 DROP_FRM_FRM_ERR_XAUI5 5 0
1078 DROP_FRM_CRC_ERR_XAUI6 120 0
1079 DROP_FRM_FRM_ERR_XAUI6 1235 0
1080 DROP_FRM_CRC_ERR_XAUI7 27 0
1081 DROP_FRM_FRM_ERR_XAUI7 8 0
1215 DROP_FRM_RUNT 703 0
1298 PARSE_DROP_IN_UIDB_DOWN 1157 0
1302 PARSE_DROP_IPV4_DISABLED 105 0
1339 PARSE_DROP_IPV6_LENGTH 28 0
1442 L2TP_ING_DECAP_VER_DROP 58 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 98 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 116 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 101 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 103 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 145 0
103 RSV_DROP_EGR_UIDB_DOWN 1661 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 425 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 746 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 42 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 32538545 1
137 RSV_DROP_IPV4_DROP_RP_DEST 5883316 0
141 RSV_DROP_IPV4_RXADJ_DROP 1218269 0
155 RSV_DROP_ING_LAG_NO_MATCH 197803 0
157 RSV_DROP_EGR_LAG_NO_MATCH 719 0
161 RSV_DROP_ACL_DENY 6698807 0
163 RSV_DROP_QOS_DENY 37257510 0
171 RSV_DROP_IPV4_URPF_CHK 71020 0
173 RSV_DROP_IPV6_URPF_CHK 8114060 0
289 RSV_DROP_IFIB_TTL_CHECK 197 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 2401 0
630 MDF_PUNT_POLICE_DROP 50209728832 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 55 0
1075 DROP_FRM_FRM_ERR_XAUI4 74 0
1078 DROP_FRM_CRC_ERR_XAUI6 380 0
1079 DROP_FRM_FRM_ERR_XAUI6 46 0
1080 DROP_FRM_CRC_ERR_XAUI7 700 0
1081 DROP_FRM_FRM_ERR_XAUI7 1946 0
1215 DROP_FRM_RUNT 283 0
1298 PARSE_DROP_IN_UIDB_DOWN 867 0
1302 PARSE_DROP_IPV4_DISABLED 2585 0
1339 PARSE_DROP_IPV6_LENGTH 41 0
1442 L2TP_ING_DECAP_VER_DROP 124 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 764 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 775 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 751 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 797 0
But I cannot find any documentation on MDF_PUNT_POLICE_DROP nor on any SRV_DROP string. The document: https://community.cisco.com/t5/service-providers-documents/asr9000-xr-troubleshooting-packet-drops-and-understanding-np/ta-p/3126715
which documents what the various fields mean does not document anything on these 2 strings.
So I am at a loss to figure out why I am seeing input drops on one specific bundle sub-interface.
We are running 5.3.3 on ASR9010 and the config for the sub-interface is as follows:
interface Bundle-Ether2.333
bandwidth 15000000
service-policy input limit-ddos-in
ipv4 mtu 1500
ipv4 address xx.xx.88.94 255.255.255.252
ipv4 verify unicast source reachable-via any allow-self-ping allow-default
ipv6 nd dad attempts 5
ipv6 mtu 1500
ipv6 verify unicast source reachable-via any allow-self-ping allow-default
ipv6 address xxx:798:1::72/126
ipv6 address xxx:7f8:3c::6e/126
ipv6 enable
monitor-session No1 ethernet
Any help or clue would appreciated.