03-21-2013 08:52 PM - edited 03-07-2019 12:24 PM
Hi,
We are running Cisco 6509-e and we are running load test and when traffic reach 80 mbps switch start reponding very slow. I checked CPU usage and it was using 100% and connection to the switch from outside to inside are 80K. once connection dropp Cisco release CUP and it start responding normal.
CPU utilization for five seconds: 99%/17%; one minute: 84%; five minutes: 74%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
IP NAT Ager using very high CPU.
I am running
sup-bootflash:s72033-ipservicesk9-mz.122-33.SXH8.bin
Regards,
HM
03-21-2013 10:09 PM
Hi Himanshu,
CPU will be higher on the Supervisor as there are some functions of NAT that
require CPU in order to build a flow. NAT is stored in the Netflow portion
of the TCAM. In order to program NAT into hardware the first packet of
_every_ new flow has to be process-switched. Likewise when a flow is aged
out you will see some CPU utilization at "IP NAT Ager" process, which is the
process that is run to age out the old NAT entries. So when timers are set
to something low like 5 mins, you may run into a situation where we see a
lot of process-switching and a lot of NAT aging.
We can raise the timers to a higher timeout value and IF you aren't constantly building
new entries the CPU usgae should go down. I am not quite sure what timeouts you have configured on the device.
eg:-
ip nat translation timeout 3600
ip nat translation tcp-timeout 3600
ip nat translation finrst-timeout 3600
ip nat translation syn-timeout 3600
ip nat translation icmp-timeout 3600
Also kinldy have a check at the limitation of TCAM on your Sup installed on the device if that is exceeding you see the cpu to go high.
HTH
Regards
Inayath
03-23-2013 04:45 PM
Hi Inayath,
Thank you so much for the information. We are getting approximately 80000 connection and it create very long nat list so how we can handel this hugh IP NAT list. Can we bring down timeout for NAT Translation to low.
HM
03-23-2013 04:54 PM
Hi Inayath,
Please check following limit of TCAM.
CISCO#show tcam counts
Used Free Percent Used Reserved
---- ---- ------------ --------
Labels:(in) 4 4092 0
Labels:(eg) 3 4093 0
ACL_TCAM
--------
Masks: 124 3972 3 72
Entries: 128 32640 0 576
QOS_TCAM
--------
Masks: 22 4074 0 18
Entries: 22 32746 0 144
LOU: 0 128 0
ANDOR: 0 16 0
ORAND: 0 16 0
ADJ: 3 2045 0
Thank You,
HM
03-24-2013 05:21 PM
Hi Himanshu,
Let me try to explain you this in details. Please spare some time and go through this and you will understand how this NAT will be impacted.
Feature Manager Troubleshooting
On the sup720 when a feature is configured it needs to be determined if this feature is supported by the hardware. This is accomplished by Feature Manager. Feature Manager is a software entity that keeps track of all features that have impact on hardware forwarding, and will resolve conflicts as well as share hardware resources among multiple interfaces.
If a feature cannot be programmed due to a conflict with another feature OR due to the fact that it is not supported in hardware FM will display this information and generate a message to the syslog.
ACL and Netflow TCAM:
Throughout this document ACL TCAM and Netflow TCAM will be referenced. Each of these are independent of each other and are stored on different locations on the PFC.
ACL TCAM is the location where features are blocked/allowed or redirected, based on the configuration of the switch. This is stored on the PFC and has a finite number of available entires for information to be stored. You can read about ACL TCAM on the 6500 more in depth via the following link:
http://www.cisco.com/en/US/products/hw/switches/ps708/products_white_paper09186a00800c9470.shtml
Neflow TCAM is the location where features such as NDE/NAT/WCCP program their forwarding information. These features need to punt the first packet of every flow in order to program entires into Netflow TCAM. This will hold the adjancey for the flow installed in order to forward this traffic in hardware.
FM and ACL merge:
FM is needed because there is only one ACL lookup per-direction on the 6500. If traffic needs to be processed by two different features, that need to take different paths in hardware, the traffic will need to be software switched to accomplish this task.
An example of merging two ACLs based features: RACL (Routed ACL) and PBR (Policy-Based Routing), the logic is:
– If RACL ACE drops the packet then PBR is not concerned, i.e. merged action is DROP
– If RACL ACE permits the packet and PBR ACE doesn’t match this packet then merged action is PERMIT
– If RACL ACE permits the packet and PBR ACE does match this packet then merged action is REDIRECT (for PBR)
Below is a chart explaining further explaning this logic:
Above you can see the merge result when a RACL and PBR match the same traffic.
Common FM issues:
When troubleshooting FM, there are two common issues that are typically seen:
Below I will go through how to look at ACL TCAM programmed on a layer 3 interface as well as how to find and resolve a feature conflisct as well as TCAM overutilization.
Looking at ACL TCAM when a Feature is configured:
When a feature is configured on an interface the sup720 may need to adjust the ACL TCAM on the interface in order to satisfy the requirement for that feature.
We can view how ACL TCAM is currently programmed with the “show tcam interface” command, as seen below:
6500-2#show run interface vlan 10
Building configuration...
Current configuration : 85 bytes
!
interface Vlan10
ip address 10.100.101.1 255.255.255.0
end
6500-2#show tcam interface vlan 10 acl in ip
* Global Defaults shared
Entries from Bank 0
Entries from Bank 1
permit ip any any
Above we can see that all traffic is being forward in hardware due to the "permit ip any any" programmed. This works by the same logic as an ACL, where this will permit all traffic passing through this interface. Since we have not features programmed on this interface on ingress this is expected.
We can also see that since we have no features programmed on egress that nothing will be seen in ACL TCAM:
6500-2#show tcam interface vlan 10 acl out ip
Now if we applied the following access-list with a log keyword on input we will see the following:
6500-2#sh access-list 1
Standard IP access list 1
10 permit 10.10.10.20 log
20 permit any
6500-2#sh run int vlan 10
Building configuration...
Current configuration: 85 bytes
!
interface Vlan10
ip address 10.100.101.1 255.255.255.0
ip access-group 1 in
end
6500-2#sh tcam interface vlan 10 acl in ip
* Global Defaults shared
Entries from Bank 0
Entries from Bank 1
punt ip host 10.10.10.20 any
permit ip any any
Now we can see a punt installed for any traffic from host 10.10.10.20, due to the log keyword on input. The punt represents traffic that needs to be sent to the RP CPU. In this case, all this traffic that is sources from 10.10.10.20 will be sent to the RP CPU to be processed switched.
Keep in mind that this is only configured on ingress.
Under normal operation we should not see any punt adjacencies installed in ACL TCAM on the interface. A punt implies that the operation cannot be performed in hardware and must be punted to the RP CPU in order to be software switched.
**Note that there are times when you will see a punt in ACL TCAM, but a Netflow entry has been installed overrriding this punt. If traffic matches both an entry in ACL TCAM and a Netflow entry, the Netflow entry takes precendence. This may occur with netflow assisted features which need to punt the first packet of every flow to create a netflow entry
If we configured a deny statement for this IP on ACL 1 we would see a "deny ip any any" installed irrepsective to the log keyword. This can be seen below:
6500-2#sh access-list 1
Standard IP access list 1
5 deny 10.10.10.0 0.0.0.255
10 permit 10.10.10.20 log
20 permit any
6500-2#sh run int vlan 10
Building configuration...
Current configuration: 85 bytes
!
interface Vlan10
ip address 10.100.101.1 255.255.255.0
ip access-group 1 in
end
6500-2#sh tcam interface vlan 10 acl in ip
* Global Defaults shared
Entries from Bank 0
Entries from Bank 1
deny ip host 10.10.10.0 0.0.0.255 any
permit ip any any
Note that only a deny statement was installed. This is due to the fact there is no reason to install duplicate entries in hardware. The deny for the network of 10.10.10.0/24 also encompasses the permit statement for the 10.10.10.20 entry, hence the log statement is not installed in hardware to save space.
Looking at a feature configured on an interface:
Lets take a look at the same interface and see what FM (Feature Manager) says about the features configured on this interface:
6500-2#sh access-list 1
Standard IP access list 1
10 permit 10.10.10.20 log
20 permit any
6500-2#sh run int vlan 10
Building configuration...
Current configuration : 85 bytes
!
interface Vlan10
ip address 10.100.101.1 255.255.255.0
ip access-group 1 in
end
Lets take a look at FM via FIE (Feature Interaction engine) with an ACL configured. FIE is the component of Feature Manager which implements the feature onto an interface.
6500-2#sh fm fie interface vlan 10
Interface Vl10:
Feature interaction state created: Yes
Flowmask conflict status for protocol IP : FIE_FLOWMASK_STATUS_SUCCESS
Flowmask conflict status for protocol OTHER : FIE_FLOWMASK_STATUS_SUCCESS
Interface Vl10 [Ingress]:
Slot(s) using the protocol IP : 2
FIE Result for protocol IP : FIE_SUCCESS_NO_CONFLICT
Features Configured : RACL - Protocol : IP
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank2 = RACL
+-------------------------------------+
Action Merge Table
+-------------------------------------+
RACL RSLT R_RSLT COL
+-------------------------------------+
L2R L2R P 0
SB HB P 0
HB HB P 0
L3D L3D L3D 0
P P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: FALSE
Bank1 Only Features: [empty]
Bank2 Only Features: [empty]
Banks Swappable: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = 32730
num# of merged VMRs in bank 2 = 2
num# of free TCAM entries in Bank2 = 32758
Slot(s) using the protocol OTHER : 2
FIE Result for protocol OTHER : FIE_SUCCESS_NO_CONFLICT
Features Configured : OTH_DEF - Protocol : OTHER
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank2 = OTH_DEF
+-------------------------------------+
Action Merge Table
+-------------------------------------+
OTH_DEF RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: FALSE
Bank1 Only Features: [empty]
Bank2 Only Features: [empty]
Banks Swappable: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = 32730
num# of merged VMRs in bank 2 = 1
num# of free TCAM entries in Bank2 = 32757
Interface Vl10 [Egress]:
No Features Configured
No IP Guardian Feature Configured
No IPv6 Guardian Feature Configured
No QoS Feature Configured
Above we can see that the feature “RACL” (Routed ACL) is configured as ingress feature. We can see that this has invoked FM label 52 to be applied to this interface. The FM label is dynamically selected and used as a pointer. This is done so that the same label can be applied to multiple interfaces. This allows the 6500 to only have to determine the merge required for the same features one time.
We can also see the IP Guardian has not been triggered. IP Guardian is a portion of feature manager that determines what flowmask is needed on an interface for the features configured. This is used when netflow assistance is needed for a feature. It will also protect from having incompatible features programmed into hardware.
Some features require specific flowmasks in order to be put into hardware. This can be seen at the following link:
If no flowmask is configured, the 6500 will dynamically choose the appropriate flowmask via IP Guardian. If a flow mask is configured using the "mls ip flow
You can look at the specific label with command "show fm label <label #>", which will show us where this label is applied.
6500-2#sh fm label 52
Label 52:
Hardware state is Not Reduced
Force merge is FALSE
Protocol number 0:
Protocol switching is enabled
Configured features:
FM_GUARDIAN (ingress)
IPV4 Default Result Feature (ingress)
Protocol number 2:
Protocol switching is enabled
Configured features:
OTHER Default Result Feature (ingress)
Interfaces (I/E = Ingress/Egress; * = associate pending)
I Vlan10
In this case we can see that this label is only applied to interface Vlan 10.
Troubleshooting a Feature Conflict:
A common issue with FM is having a netflow based feature and an ACL based feature matching the same traffic, configured on the same interface. Keep in mind that not all ACL/Netflow combinations will cause an issue, such as a security ACL and NAT. However this would be an issue with NAT and PBR, due to the fact that PBR needs to redirect this traffc on a different path.
The problem is traffic cannot be sent on two different paths in hardware, as the sup720 only makes one pass through ACL TCAM per-direction(ingress/egress). We can not send the traffic down one path for netflow creation and one for the dection made by the ACL otherwise duplicate traffic would occur. The following is an example how this would look if you had NAT (netflow assisted) and PBR (ACL based) configured to match the same traffic on the same interface.
Below we can see that NAT and PBR are matching the same set of traffic. We know that this will not work due to the fact that the traffic can not both be punted to create a netflow entry AND be redirected to specific hop via PBR.
ip nat pool test 10.10.101.3 10.10.101.4 prefix-length 24
ip nat inside source list 7 pool test
access-list 7 permit 10.10.10.0 0.0.0.255
route-map PBR permit 10
match ip address 1
set ip next-hop 10.10.101.1
!
access-list 1 permit 10.10.10.0 0.0.0.255
!
ip route 0.0.0.0 0.0.0.0 10.10.101.10
!
interface Vlan10
ip address 10.100.101.1 255.255.255.0
ip nat inside
ip policy route-map PBR
!
interface Vlan20
ip address 10.10.101.2 255.255.255.0
ip nat outside
end
Lets take a look at FM on SVI 10 to see how this would be displayed when both PBR and NAT are applied:
6500-2#show fm fie interface vlan 10
Interface Vl10:
Feature interaction state created: Yes
Flowmask conflict status for protocol IP : FIE_FLOWMASK_STATUS_SUCCESS
Flowmask conflict status for protocol OTHER : FIE_FLOWMASK_STATUS_SUCCESS
Interface Vl10 [Ingress]:
Slot(s) using the protocol IP : 2
FIE Result for protocol IP : FIE_SUCCESS_NO_CONFLICT
Features Configured : PBR - Protocol : IP
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank1 = PBR
+-------------------------------------+
Action Merge Table
+-------------------------------------+
PBR RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
AdR AdR P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 12
num# of free TCAM entries in Bank1 = Unknown
num# of merged VMRs in bank 2 = 0
num# of free TCAM entries in Bank2 = Unknown
Slot(s) using the protocol OTHER : 2
FIE Result for protocol OTHER : FIE_SUCCESS_NO_CONFLICT
Features Configured : OTH_DEF - Protocol : OTHER
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank2 = OTH_DEF
+-------------------------------------+
Action Merge Table
+-------------------------------------+
OTH_DEF RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: FALSE
Bank1 Only Features: [empty]
Bank2 Only Features: [empty]
Banks Swappable: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = 32730
num# of merged VMRs in bank 2 = 1
num# of free TCAM entries in Bank2 = 32760
Interface Vl10 [Egress]:
No Features Configured
IP Guardian Feature Configured
Current IP Guardian flowmask : Intf Full Flow
FIE guardian interaction : Done
FIE guardian interaction result : SUCCESS
FIE guardian flowmask conflict status : FIE_FLOWMASK_NO_CONFLICT
num# of features that bump this interface : 1
features that bump this interface : NAT
No IPv6 Guardian Feature Configured
No QoS Feature Configured
Above we can see that FM label of 52 was selected and that PBR is only listed as a feature programmed in hardware. If we look further down, we can see the IP guardian has selected to use the “Interface Full Flow” flowmask. This is a requirment for NAT to work correct in hardware. We can also see that NAT is listed as a cause for the interface to be bumped. This siginifies that traffic matching this feature needs to be sent to the RP CPU to either be software switched OR for a the creation of a netflow entry in hardware.
For the creation of a netflow entry to occur the first packet in every flow needs to be punted, after which it will match on the netflow entry.
***Note netflow always takes precedence to whatever is configured in ACL TCAM. Typically a “redirect” in hardware will demonstrate this traffic is being pushed to the netflow path. However, this could also be seen a punt. Please check for a netflow entry for the traffic if a “punt “ is installed and the feature is a netflow assisted feature. An example of this is demonstrated below.
Lets also take a look at what the TCAM would look like with these features configured.
6500-2#sh tcam int vlan 10 acl in ip
* Global Defaults shared
Entries from Bank 0
Entries from Bank 1
redirect ip any any fragments
redirect ip any any fragments
redirect ip any any
permit ip any 224.0.0.0 15.255.255.255 fragments
permit ip any 224.0.0.0 15.255.255.255 fragments
permit ip any 224.0.0.0 15.255.255.255
policy-route ip 10.10.10.0 0.0.0.255 any fragments
policy-route ip 10.10.10.0 0.0.0.255 any fragments
policy-route ip 10.10.10.0 0.0.0.255 any
permit ip any any fragments
permit ip any any fragments
permit ip any any
We can see that a redirect is installed for all traffic. This would cause all traffic to be sent to the netflow path, including the traffic matched for PBR. Though we see the “policy-route” statement installed for PBR, this traffic will never be hit in hardware due to the redirect statement matching all traffic.
Now I am going to send a flow from an Ixia from 10.10.10.2 to 10.10.102.10.
The redirect installed for NAT will cause this traffic to be redirected to the RP CPU for a netflow entry to be installed. However, If we look at netflow we will see the entry installed for this traffic:
6500-2#sh mls netflow ip
Displaying Netflow entries in Active Supervisor EARL in module 2
DstIP SrcIP Prot:SrcPort:DstPort Src i/f :AdjPtr
-----------------------------------------------------------------------------
Pkts Bytes Age LastSeen Attributes
---------------------------------------------------
0.0.0.0 0.0.0.0 0 : 0 : 0
-- :0x0
30 1380 72 13:31:25 L3 - Dynamic
10.10.102.10 10.10.10.2 tcp : 0 : 0 Vl10 :0x0
0 0 82 13:31:25 L3 - Dynamic
We can see in red above that no packets/bytes have hit this entry. This is because this traffic is being software forwarded. This is due to the fact that PBR is configured for the same subnet (10.10.10.x). This traffic can not both be redirect to the next-hop via PBR and go through the netflow patch in hardware. This traffic is pushed to the RP CPU in an attempt to perform both operations. We can also see that the CPU is high due to this traffic from IXIA:
6500-2#sh processes cpu
CPU utilization for five seconds: 57%/57%; one minute: 13%; five minutes: 7%
**Note all this will cause the CPU to be drive by interrupts not a process.
Notice that as soon as we remove PBR we can see that this entry is now being hit:
6500-2(config)#int vlan 10
6500-2(config-if)#no ip policy route-map PBR
6500-2(config-if)#do sh mls netflow ip
Displaying Netflow entries in Active Supervisor EARL in module 2
DstIP SrcIP Prot:SrcPort:DstPort Src i/f :AdjPtr
----------------------------------------------------------------------------
Pkts Bytes Age LastSeen Attributes
---------------------------------------------------
10.10.102.10 10.10.10.2 tcp : 0 : 0 Vl10 :0x80002
77239 3552994 6 13:36:03 L3 - SwInstalled
0.0.0.0 0.0.0.0 0 : 0 : 0 -- :0x0
126 5796 351 13:35:57 L3 – Dynamic
We can also see that the netflow entry has moved from SwInstalled compared to Dynamic as well as an AdjPtr created for this traffic, which will be used for any further traffic in this flow.
***Note - When NAT is configured, we need to drive a different flowmask for fragment packets so that the fragment packets (basically the first fragments which have L4 port information) are not hardware shortcut by matching the NAT netflow shortcut (by driving different flow mask for fragment packets, fragment packets are prevented from matching the NAT netflow shortcut installed with L4 port information) and these packets need to be translated in software (first fragment and later fragments). We will continue to see high CPU if the traffic is fragemented.
We have one option supported for PFC3B and later: "mls ip nat netflow-frag-l4-zero" which when configured, the netflow lookup key formed to lookup/match the netflow table would have the L4 information zeroed out for fragment packets (including first fragments) so that the first fragment (which has L4 information) does not match the netflow short installed for NAT in this case.
We can also see that the CPU has dropped, as expected:
6500-2#sh proc cpu | ex 0.00
CPU utilization for five seconds: 0%/0%; one minute: 45%; five minutes: 20%
Now, lets take a look to see if FM has changed:
6500-2#sh fm fie int vlan 10
Interface Vl10:
Feature interaction state created: Yes
Flowmask conflict status for protocol IP : FIE_FLOWMASK_STATUS_SUCCESS
Flowmask conflict status for protocol OTHER : FIE_FLOWMASK_STATUS_SUCCESS
Interface Vl10 [Ingress]:
Slot(s) using the protocol IP : 2
FIE Result for protocol IP : FIE_SUCCESS_NO_CONFLICT
Features Configured : [empty] - Protocol : IP
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
num# of strategies tried : 1
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = Unknown
num# of merged VMRs in bank 2 = 6
num# of free TCAM entries in Bank2 = Unknown
Slot(s) using the protocol OTHER : 2
FIE Result for protocol OTHER : FIE_SUCCESS_NO_CONFLICT
Features Configured : OTH_DEF - Protocol : OTHER
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank2 = OTH_DEF
+-------------------------------------+
Action Merge Table
+-------------------------------------+
OTH_DEF RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: FALSE
Bank1 Only Features: [empty]
Bank2 Only Features: [empty]
Banks Swappable: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = 32730
num# of merged VMRs in bank 2 = 1
num# of free TCAM entries in Bank2 = 32746
Interface Vl10 [Egress]:
No Features Configured
IP Guardian Feature Configured
Current IP Guardian flowmask : Intf Full Flow
FIE guardian interaction : Done
FIE guardian interaction result : SUCCESS
FIE guardian flowmask conflict status : FIE_FLOWMASK_NO_CONFLICT
num# of features that bump this interface : 1
features that bump this interface : NAT
No IPv6 Guardian Feature Configured
No QoS Feature Configured
Notice that FM still shows that NAT is listed as a feature that is bumping the interface. This is due to the fact that the first flow for all traffic that needs to be NATed must be punted to the CPU for the creation of a netflow entry. However, as we can see above this netflow entry is now being used in preference to what is configured in ACL TCAM.
Notice that the flowmask is still the same, due to the fact that an interface-full flowmask is required for NAT to work in hardware.
We can also see that PBR is no longer listed as an installed feature and is now listed as “empty” since this feature was removed from this interface.
**Note that the FM lael has not changed in this case. This is due to the fact that FM assigns these dynamially and no other feature had already reserved this label. This is due to the fact that this is the only interfaces on this 6500 with features configured.
If we look at ACL TCAM we can see that only a redirect is now installed for NAT.
6500-2#sh tcam int vlan 10 acl in ip
* Global Defaults not shared
Entries from Bank 0
Entries from Bank 1
redirect ip any any fragments
redirect ip any any fragments
redirect ip any any
permit ip any any fragments
permit ip any any fragments
permit ip any any
Traffic that does not match the redirect will be forwarded normally.
Below shows what this would look like if NAT were removed rather than PBR.
The TCAM would look like the following:
6500-2#sh tcam int vlan 10 acl in ip
* Global Defaults shared
Entries from Bank 0
Entries from Bank 1
permit ip any 224.0.0.0 15.255.255.255
policy-route ip 10.10.10.0 0.0.0.255 any
permit ip any any
If you look at FM we can see that PBR is only listed in hardware and NAT is no longer listed as a feature that is configured:
6500-2#sh fm fie interface vlan 10
Interface Vl10:
Feature interaction state created: Yes
Flowmask conflict status for protocol IP : FIE_FLOWMASK_STATUS_SUCCESS
Flowmask conflict status for protocol OTHER : FIE_FLOWMASK_STATUS_SUCCESS
Interface Vl10 [Ingress]:
Slot(s) using the protocol IP : 6
FIE Result for protocol IP : FIE_SUCCESS_NO_CONFLICT
Features Configured : PBR - Protocol : IP
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank1 = PBR
+-------------------------------------+
Action Merge Table
+-------------------------------------+
PBR RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
AdR AdR P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 3
num# of free TCAM entries in Bank1 = Unknown
num# of merged VMRs in bank 2 = 0
num# of free TCAM entries in Bank2 = Unknown
Slot(s) using the protocol OTHER : 6
FIE Result for protocol OTHER : FIE_SUCCESS_NO_CONFLICT
Features Configured : OTH_DEF - Protocol : OTHER
FM Label when FIE was invoked : 52
Current FM Label : 52
Last Merge is for slot: 0
Features in Bank2 = OTH_DEF
+-------------------------------------+
Action Merge Table
+-------------------------------------+
OTH_DEF RSLT R_RSLT COL
+-------------------------------------+
SB HB P 0
X P P 0
+-------------------------------------+
num# of strategies tried : 1
Description of merging strategy used:
Serialized Banks: FALSE
Bank1 Only Features: [empty]
Bank2 Only Features: [empty]
Banks Swappable: TRUE
Merge Algorithm: ODM
num# of merged VMRs in bank 1 = 0
num# of free TCAM entries in Bank1 = 32734
num# of merged VMRs in bank 2 = 1
num# of free TCAM entries in Bank2 = 32742
Interface Vl10 [Egress]:
No Features Configured
No IP Guardian Feature Configured
No IPv6 Guardian Feature Configured
No QoS Feature Configured
TCAM overutilization from a feature configuration:
In certain cases the sup720 will not be able to fit all of the required parametes into the TCAM on the switch. This most commonly an issue with overutilization of the ACL or Netflow TCAM. When the traffic can not be fit into hardware it is fowarding in software via the RP CPU.
If we attempt to install an ACL that is to large to fit into TCAM we will see the following messages. We can also see via the "show fm summary" command that the interfaces where these ACL's were reduced FM is inactive, which means this traffic is being software switched.
If we see an issue like this occur we need to confirm the space that is left with in TCAM. This can be done via the "show tcam counts" command will which show ACL and QOS TCAM space available:
In order to look at this information for a DFC module (which will hold independet TCAM from the supervisor), you need to specify the module after the "show tcam counts" command. For example, "show tcam counts module <mod#>"
**Note that TCAM counts displayed above may be after the TCAM merge has failed and may not show the TCAM has been overutilized.
If you have run out of Netflow TCAM, you will see the following error message:
%EARL_NETFLOW-SP-4-TCAM_THRLD: Netflow TCAM threshold exceeded, TCAM Utilization [99%]
You can check your TCAM utilization with the "show mls netflow table-contention detailed" command.
6500#show mls netflow table-contention detailed
Earl in Module 6
Detailed Netflow CAM (TCAM and ICAM) Utilization
================================================
TCAM Utilization : 0%
ICAM Utilization : 0%
Netflow TCAM count : 3
Netflow ICAM count : 0
Netflow Creation Failures : 0
Netflow CAM aliases : 0
The above shows us the Netflow TCAM utilization as a percentage, as well as the number of entires that are currently in TCAM.
**Note the ICAM listed above is used when two TCAM entries resolve to the same HASH, the ICAM is used to resolve these common entires by adding an additional parameter to distinguish these flows.
If you still need assistance troubleshooting FM, please open a Cisco TAC case to investigate your issue further.
HTH
Regards
Inayath
*Plz rate the usefull posts.
04-28-2023 09:34 AM
04-28-2023 09:39 AM
Apr 28 19:38:09: %SYS-2-CHUNKEXPANDFAIL: Could not expand chunk pool for ipnat node. No memory available -Process= "Chunk Manager", ipl= 2, pid= 1
-Traceback= 4169851C 41684214 41684200
Apr 28 19:38:19: %SYS-2-CHUNKEXPANDFAIL: Could not expand chunk pool for ipnat node. No memory available -Process= "Chunk Manager", ipl= 2, pid= 1
-Traceback= 4169851C 41684214 41684200
Apr 28 19:38:29: %SYS-2-CHUNKEXPANDFAIL: Could not expand chunk pool for FM FLow Info C. No memory available -Process= "Chunk Manager", ipl= 2, pid= 1
-Traceback= 4169851C 41684214 41684200
Apr 28 19:38:39: %SYS-2-MALLOCFAIL: Memory allocation of 65536 bytes failed from 0x416C6C98, alignment 8
Pool: Processor Free: 3168116 Cause: Memory fragmentation
Alternate Pool: None Free: 0 Cause: No Alternate pool
-Process= "IP Input", ipl= 0, pid= 278
-Traceback= 4169979C 4169FF54 416C6CA0 416987F0 416C83EC 416986A0 40D4A610 40D4B754 40D4C1FC 40D4E8A8 40D49EA0 40D2E25C 40B25954 40B14454 40B132E8 40B134C4
Apr 28 19:38:39: %SYS-2-CHUNKEXPANDFAIL: Could not expand chunk pool for ipnat node. No memory available -Process= "Chunk Manager", ipl= 2, pid= 1
-Traceback= 4169851C 41684214 41684200
Apr 28 19:38:49: %SYS-2-CHUNKEXPANDFAIL: Could not expand chunk pool for FM FLow Info C. No memory available -Process= "Chunk Manager", ipl= 2, pid= 1
04-30-2023 07:24 AM
This your same issue @MHM Cisco World and I have been looking at in the Routing topic?
If so, these syslog message likely are very relevant to your CPU high usage. The errors, themselves, are bad stuff.
Interesting, NAT related(?).
Assuming you don't have a memory leak (bug), and since Cisco platforms (still?) don't do memory garbage collection, the normal solutions are, try to configure your device to use less memory (if possible) and/or add RAM to the device (if possible).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide