cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1688
Views
0
Helpful
5
Replies

Cisco 3850 and "show route-map"

suenco_tyumen
Level 1
Level 1

Hello everyone!

Can anyone answer why, after entering the command "show route-map" packet counters show zero matches?

We have other Cisco 3850 switches in production, stand-alone switches and in the stack, but all of them shows zero in counters, but pbr is working correctly.

Versions are: 

Everest Version 16.6.5

Everest Version 16.6.6

For example:

 

tmn-od14-3850-cod#show route-map ODESS_27_INET_KSPD
route-map ODESS_27_INET_KSPD, permit, sequence 3
  Match clauses:
    ip address (access-lists): acl-to-check_point
  Set clauses:
    ip next-hop 10.172.251.33
  Policy routing matches: 0 packets, 0 bytes
route-map ODESS_27_INET_KSPD, permit, sequence 5
  Match clauses:
    ip address (access-lists): acl-vks_term-odess27
  Set clauses:
    ip next-hop 10.172.168.18
  Policy routing matches: 0 packets, 0 bytes

 

5 Replies 5

Deepak Kumar
VIP Alumni
VIP Alumni

Hi,

This is just a PBR and packets are hitting the access list. Please check:

 

show access-list acl-to-check_point

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Also no hitpoints:
show ip access acl-to-check_point
Extended IP access list acl-to-check_point
10 deny ip host 10.45.129.27 10.0.0.0 0.255.255.255
20 permit tcp host 10.45.129.27 eq www any
21 permit tcp host 10.45.129.27 eq 2071 any
22 permit tcp host 10.45.129.27 eq 18002 any
23 permit tcp host 10.45.129.27 eq 19002 any
30 deny ip host 10.45.129.139 10.0.0.0 0.255.255.255
40 permit ip host 10.45.129.139 any
50 deny ip host 10.45.129.22 10.0.0.0 0.255.255.255
60 permit tcp host 10.145.129.22 eq 2000 any

HI,

Have you applied this PBR correctly? Share your configuration with Source and Destination IP address & interfaces.

Regards,
Deepak Kumar,
Don't forget to vote and accept the solution if this comment will help you!

Hello,

 

you might be hitting the bug below. Check if it works when you remove the 'deny' statements from the access list, so it looks like this:

 

ip access-list extended acl-to-check_point
permit tcp host 10.45.129.27 eq www any
permit tcp host 10.45.129.27 eq 2071 any
permit tcp host 10.45.129.27 eq 18002 any
permit tcp host 10.45.129.27 eq 19002 any
permit ip host 10.45.129.139 any
permit tcp host 10.145.129.22 eq 2000 any

 

PBR: policy route map not working | WS-C3850-24T - 03.02.01.SE
CSCui59593
Description
Symptom:
PBR functionality does NOT seem to work the way it should in certain conditions as mentioned below, routing does NOT happen the way PBR is configured.

Conditions:
Policy based routing configured on 3850 switch with permit and deny statements in the route-map or in the access-list tied with route-map.
For eg: If your route-maps for PBR are applied in this way:

route-map VLAN2 deny 45 ------<<<< deny
match ip address 1
route-map VLAN2 permit 50 ------<<<< permit
match ip address 2
set ip next-hop 1.o.0.1

or ACL for PBR:

access-list 113 deny ip 1.1.e.0 0.0.0.255 1.2.e.0 0.0.0.255 ------<<<< deny
access-list 113 permit ip 1.1.e.0 0.0.0.255 any ------<<<< permit

Workaround:
Workaround:

Work this problem around by configuring route-map/acl with below technique:

the access-lists 3 permits the subnets that you want to DBR
(destination based routing with normal IP routing) as there is no set clause.

The access-list 4 should PBR the rest of the traffic to defined next-hop.

route-map VLAN3, permit, sequence 45
Match clauses:
ip address (access-lists): 3 -------<<<< normal routing table
Set clauses:
Policy routing matches: 0 packets, 0 bytes
route-map VLAN3, permit, sequence 50
Match clauses:
ip address (access-lists): 4 -------<<<< PBR
Set clauses:
ip next-hop 1.o.0.1

this problem is fixed in: IOS-XE: 3.3.0SE and later

vb10
Level 1
Level 1

Hello,

Most likely it's because of hardware switching. If traffic is switched or routed in hardware (ASIC), then there might some limitations in statistics and counters reporting. For ACL statistics it's written explicitly in documentation. I couldn't find it for PBR, but I believe reason is the same. 

"When you enter the show ip access-lists privileged EXEC command, the match count displayed does not account for packets that are access controlled in hardware. Use the show platform acl counters hardware privileged EXEC command to obtain some basic hardware ACL statistics for switched and routed packets. "
 
Please, note that for 16.x train command to check hardware counter most likely will be different.
 
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card