09-20-2020 08:52 PM
Hi,
I see a lot of inbound discards on my ISP interfaces attached to my vEdge 5ks. Is there any commands I can use to narrow it down? There is a command - show interfaces errors, but is the error the actual discard?
Brad
09-21-2020 02:13 AM
yes, most of the times, see this example from the TAC lab:
vEdge1# show interface statistics ge0/0 PPPOE PPPOE DOT1X DOT1X AF RX RX RX TX TX TX RX RX TX TX TX RX TX RX VPN INTERFACE TYPE PACKETS RX OCTETS ERRORS DROPS PACKETS TX OCTETS ERRORS DROPS PPS Kbps PPS Kbps PKTS PKTS PKTS PKTS ----------------------------------------------------------------------------------------------------------------------------------------------- 0 ge0/0 ipv4 3765674 651559865 0 404487 3228700 594411312 0 2 16 21 13 17 - - 0 0 vEdge1# show interface errors ge0/0 interface vpn 0 interface ge0/0 af-type ipv4 arp-add-fails 72991 rx-arp-reply-drops 0 rx-arp-rate-limit-drops 0 tx-arp-rate-limit-drops 1 rx-arp-non-local-drops 399704 tx-arp-request-fail 0 tx-no-arp-drops 1 rx-ip-ttl-expired 0 interface-disabled 0 rx-policer-drops 0 rx-non-ip-drops 0 filter-drops 0 mirror-drops 0 cpu-policer-drops 4791 tx-icmp-policer-drops 0 tx-icmp-mirrored-drops 0 split-horizon-drops 0 route-lookup-fail 0 bad-label 0 rx-policer-remark 0 vEdge1#
If you sum up cpu-policer-drops and rx-arp-non-local-drops drops, you will get RX drops from the interface statistics.
09-21-2020 02:35 AM
09-21-2020 03:57 AM
yes it's normal.
rx-arp-non-local-drop — Received ARP packets that do not match the destination IP address of any local IP address.
These packets may be counted under broadcast counter as well most likely, but not sure.
> Is there any debugs to capture discards?
tcpdump ?
09-21-2020 04:24 PM
I tired this, but found discrepancy.
RX Drops - 57
NON Local - 45
No policer yet.
Ill keep my eye on it. As long as it does not impact any performance?
11-09-2023 01:29 AM - edited 11-09-2023 01:52 AM
Sometimes just double-check if switch and VPN0 trunk a and service VPN subint configurations match as was my today case greatly overlooking that due to some forgotten experiments the switch was in access and vEdge in trunk, so ARPs were plain dropped.
04-24-2025 04:27 AM
I have a serious issue getting drops on Nmobile VPN3 interface o vEdge 1100-6G , my customer is only concerned about these errors and basis upon this customer keeping bad eyes on us. He is not letting us know how it is service impacting , but he is pushing us to see ourself on router and NMS tools Solarwinds the dicards errors everytime.
We already advised him taht this is non-service impacing as per cisco TAC guidelines, but still no compromise from his side .
I reallly dont want these errors on interface , anyone/anywhere/TAC/ can provide a resolution anyhow ?
05-07-2025 02:04 AM
Dear All,
Through collaboration within our TDA community, we were able to identify a solution by implementing an implicit ACL on the SD-WAN device. This implicit ACL enabled us to precisely determine the sources of packet drops, including rx_arp_non_local_drops and filter_drops. Additionally, we observed rx_implicit_acl_drop counts, which are categorized as NAT drops. Due to the DIA interface present on both SD-WAN sides, and through the TLOC extension, LAN packets are re-NATed (for example, on the secondary DIA via the TLOC interface). We noticed that the number of BFD sessions on the primary device was significantly lower compared to the secondary device. The port-hopping between both interfaces made a notable difference; consequently, discards on the interface have been drastically reduced. This outcome is highly satisfactory, and the discard issue on the WAN interface is now resolved. Cisco still needs to investigate how port-hopping functioned and why NAT drops were occurring.
Best regards.
show log tmplog/vdebug
show system statistics | in drop
--More-- rx_drops : 0
rx_urpf_drops : 0
ip_v6_mcast_drops : 0
ip_fwd_mcast_life_exceeded_drops : 0
rx_mcast_policy_fwd_drops : 0
rx_mcast_mirror_fwd_drops : 0
ip_fwd_to_cpu_nat_drops : 0
nat_xlate_outbound_drops : 54
--More-- rx_gre_drops : 0
rx_gre_policer_drops : 0
rx_implicit_acl_drops : 363848
rx_ip6_ipsec_drops : 0
rx_sa_ipsec_drops : 0
rx_spi_ipsec_drops : 105
rx_replay_drops : 4
rx_replay_integrity_drops : 2
rx_next_hdr_ipsec_drops : 0
rx_mac_compare_ipsec_drops : 0
rx_err_pad_ipsec_drops : 0
rx_ipsec_policer_drops : 0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide