cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6611
Views
0
Helpful
23
Replies

How to make ASR9000 bridge domain forward traffic between sub interfaces of same physical interface?

colin.franco
Level 1
Level 1

Hi,

I regularly use bridge domains to connect sub interfaces on different vlans using this sort of configuration:

interface GigabitEthernet0/0/0/5.21 l2transport

description CUSTOMER A WAN

encapsulation dot1q 21

rewrite ingress tag pop 1 symmetric

interface GigabitEthernet0/0/0/10.3122 l2transport

description CUSTOMER A CORE

encapsulation dot1q 3122

rewrite ingress tag pop 1 symmetric

l2vpn

bridge group WANLINKS

  bridge-domain CUSTOMERA

   interface GigabitEthernet0/0/0/5.21

   interface GigabitEthernet0/0/0/10.3122


When I try to use the same method to bridge two sub interfaces on the same physical interface so as to create a L2 VPN no data flows:

interface GigabitEthernet0/0/0/5.21 l2transport

description CUSTOMER A WAN

encapsulation dot1q 21

rewrite ingress tag pop 1 symmetric

interface GigabitEthernet0/0/0/5.22 l2transport

description CUSTOMER A WAN2

encapsulation dot1q 22

rewrite ingress tag pop 1 symmetric

l2vpn

bridge group WANLINKS

  bridge-domain CUSTOMERA

   interface GigabitEthernet0/0/0/5.21

   interface GigabitEthernet0/0/0/5.22

If I add a BVI interface to the bridge domain then the CE devices at the remote end of the WAN interface can both ping the BVI IP but they remain unable to ping each other.

Is this because tag rewrites are not happening since packets don't leave the physical interface?

How can I work around this and establish a L2 connection between the two subinterfaces?

Thank you

23 Replies 23

Eddie Chami
Cisco Employee
Cisco Employee

Colin,

This should work regardless of if its on the same physical interface or otherwise, just like your original config. I suspect there is an ARP problem, assume this is a lab and these two L3 ends terminate on the device? You'll need to troubleshoot this step by step on the 4 ends with pings/arp debugs and show commands on the subinterfaces.

Eddie.

Thank you very much for your contribution. We will stop looking for our imaginary split horizon / tagging problem and investigate ARP. It's a production device but traffic levels are low, it shouldn't be a problem to do the debugging.

I'll post back in due course to confirm our success.

Best wishes,

Colin

Actually, there are purely L2 circuits ... no L3 involved on the ASR9000.

a vlan is usually the equivalent of an l3 subnet, so linking 2 vlans together in the same bridge domain, likely needs to come with some sort of routing (eg a BVI interface).

If these 2 vlans are still in the same subnet, then there is still arp going on, from one host to the other that traverses the bD.

you will need to verify the state of the AC, the forwarding in the BD and see if something gets dropped somewhere and follow the generic packet troubleshooting guides (see support forums for that also).

that might give a hint to what the precise issue in your forwarding is.

regards

xander

Christer Lind
Level 1
Level 1

Sorry for bumping such an old thread but did you ever get this resolved?

I'm trying a to bridge exactly as you do but i'm running into the same issue and I can't get it working.

Hi

I have the same setup in my lab box and it works without any problem. Can you post your interface, bd configuration and these show commands?

show l2vpn bridge-domain bd-name xxxxxx

show l2vpn bridge-domain bd-name xxxxxx detail

show l2vpn forwarding bridge-domain xxxxx:xxxxx mac-address location x/x/cPU0

Regards Peter

Yeah. I can't wrap my head around it either. 

My interface configs are as followed.

interface Bundle-Ether100.40050 l2transport
  encapsulation dot1q 400 second-dot1q 50 exact
  rewrite ingress tag pop 2 symmetric

interface Bundle-Ether100.40064 l2transport
  encapsulation dot1q 400 second-dot1q 64 exact
  rewrite ingress tag pop 2 symmetric

l2vpn
  bridge group BG
    bridge-domain BD
      interface Bundle-Ether100.40050
      interface Bundle-Ether100.40064

show l2vpn bridge-domain bd-name BD
Legend: pp = Partially Programmed.
Bridge group: BG, bridge-domain: BD, id: 3, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
Filter MAC addresses: 0
ACs: 2 (2 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
List of ACs:
BE100.40050, state: up, Static MAC addresses: 0
BE100.40064, state: up, Static MAC addresses: 0
List of Access PWs:
List of VFIs:

show l2vpn bridge-domain bd-name BD
Legend: pp = Partially Programmed.
Bridge group: BG, bridge-domain: BD, id: 3, state: up, ShgId: 0, MSTi: 0
Aging: 300 s, MAC limit: 4000, Action: none, Notification: syslog
Filter MAC addresses: 0
ACs: 2 (2 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
List of ACs:
BE100.40050, state: up, Static MAC addresses: 0
BE100.40064, state: up, Static MAC addresses: 0
List of Access PWs:
List of VFIs:
RP/0/RSP0/CPU0:Sav9kCORE#show l2vpn bridge-domain bd-name BD detail
Wed Apr 20 09:02:39.668 CEST
Legend: pp = Partially Programmed.
Bridge group: BG, bridge-domain: BD, id: 3, state: up, ShgId: 0, MSTi: 0
Coupled state: disabled
MAC learning: enabled
MAC withdraw: enabled
MAC withdraw for Access PW: enabled
MAC withdraw sent on: bridge port up
MAC withdraw relaying (access to access): disabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
MAC port down flush: enabled
MAC Secure: disabled, Logging: disabled
Split Horizon Group: none
Dynamic ARP Inspection: disabled, Logging: disabled
IP Source Guard: disabled, Logging: disabled
DHCPv4 snooping: disabled
IGMP Snooping: enabled
IGMP Snooping profile: none
MLD Snooping profile: none
Storm Control: disabled
Bridge MTU: 1500
MIB cvplsConfigIndex: 4
Filter MAC addresses:
P2MP PW: disabled
Create time: 19/04/2016 16:20:59 (16:40:07 ago)
No status change since creation
ACs: 2 (2 up), VFIs: 0, PWs: 0 (0 up), PBBs: 0 (0 up)
List of ACs:
AC: Bundle-Ether100.40050, state is up
Type VLAN; Num Ranges: 1
Outer Tag: 400
VLAN ranges: [50, 50]
MTU 8986; XC ID 0xa0000006; interworking none
MAC learning: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
MAC port down flush: enabled
MAC Secure: disabled, Logging: disabled
Split Horizon Group: none
Dynamic ARP Inspection: disabled, Logging: disabled
IP Source Guard: disabled, Logging: disabled
DHCPv4 snooping: disabled
IGMP Snooping: enabled
IGMP Snooping profile: none
MLD Snooping profile: none
Storm Control: disabled
Static MAC addresses:
Statistics:
packets: received 21062, sent 471
bytes: received 6505263, sent 33744
Storm control drop counters:
packets: broadcast 0, multicast 0, unknown unicast 0
bytes: broadcast 0, multicast 0, unknown unicast 0
Dynamic ARP inspection drop counters:
packets: 0, bytes: 0
IP source guard drop counters:
packets: 0, bytes: 0
AC: Bundle-Ether100.40064, state is up
Type VLAN; Num Ranges: 1
Outer Tag: 400
VLAN ranges: [64, 64]
MTU 8986; XC ID 0xa0000007; interworking none
MAC learning: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
MAC port down flush: enabled
MAC Secure: disabled, Logging: disabled
Split Horizon Group: none
Dynamic ARP Inspection: disabled, Logging: disabled
IP Source Guard: disabled, Logging: disabled
DHCPv4 snooping: disabled
IGMP Snooping: enabled
IGMP Snooping profile: none
MLD Snooping profile: none
Storm Control: disabled
Static MAC addresses:
Statistics:
packets: received 446, sent 232
bytes: received 32530, sent 63662
Storm control drop counters:
packets: broadcast 0, multicast 0, unknown unicast 0
bytes: broadcast 0, multicast 0, unknown unicast 0
Dynamic ARP inspection drop counters:
packets: 0, bytes: 0
IP source guard drop counters:
packets: 0, bytes: 0
List of Access PWs:
List of VFIs:

show l2vpn forwarding bridge-domain BG:BD mac-address location 0/0/CPU0
Wed Apr 20 09:03:33.750 CEST
To Resynchronize MAC table from the Network Processors, use the command...
l2vpn resynchronize forwarding mac-address-table location <r/s/i>

Mac Address Type Learned from/Filtered on LC learned Resync Age Mapped to
--------------------------------------------------------------------------------
ac87.a324.4e93 dynamic BE100.40050 0/RSP0/CP 0d 0h 6m 30s N/A
d4ca.6d19.2ed8 dynamic BE100.40050 0/RSP0/CP 0d 0h 0m 4s N/A
7058.12e0.92cc dynamic BE100.40064 0/RSP0/CP 0d 0h 0m 2s N/A

Hi

Think everything looks ok, this should work. Have you checked the ip configuartion of equipment that are connected on the different vlans?

You could do a l2 access list to see if the far-end equipment generates any arp-packets.

Like this

ethernet-services access-list mupp
 10 permit any any 806
 20 permit any any
!

Apply on interface

To show matches use

show access-lists ethernet-services mupp hardware ingress location 0/0/cPU0 

/Peter

the config looks good you have, and also I see the mac addresses learnt in teh bridge domain.

can you send a string of traffic and check the np counters (show controller np counters npX loc Y) that way we can possibly see if we are dropping in the datapath.

also what version are you testing this with? it is a supported config and should work.

can you see on teh end stations via an arp -a to see if the remote mac is in the tables also?

cheers!

xander

We're running 5.24

Output from show controller np counters np0

show controller np counters np0 location 0/0/CPU0
Wed Apr 20 14:21:03.006 CEST

Node: 0/0/CPU0:
----------------------------------------------------------------

Show global stats counters for NP0, revision v2

Read 156 non-zero NP counters:
Offset Counter FrameValue Rate (pps)
-------------------------------------------------------------------------------
16 MDF_TX_LC_CPU 312395655087 198
17 MDF_TX_WIRE 2081651414772 84095
21 MDF_TX_FABRIC 2075470052288 83935
33 PARSE_FAB_RECEIVE_CNT 2078300846531 84033
37 PARSE_INTR_RECEIVE_CNT 15443321011 524
41 PARSE_INJ_RECEIVE_CNT 3480498950 131
45 PARSE_ENET_RECEIVE_CNT 2092760054531 83980
49 PARSE_TM_LOOP_RECEIVE_CNT 9004146303 235
53 PARSE_TOP_LOOP_RECEIVE_CNT 338004832148 1614
62 PARSE_ING_DISCARD 6077302261 4
64 PARSE_FRM_ERR_CNT 14609 0
67 PRS_HEALTH_MON 142942868 5
72 INTR_FRAME_TYPE_3 632852 0
74 INTR_FRAME_TYPE_5 81 0
76 INTR_FRAME_TYPE_7 322663179 14
89 DBG_PRS_EP_L_PRS_PL_L2TP_DECAP_PASS2 1 0
96 PARSE_ING_8023 221209163 0
100 PARSE_ING_SLOW_PROTO 1068302 0
105 PARSE_RSP_INJ_FAB_CNT 3775883840 135
108 PARSE_EGR_INJ_PKT_TYP_UNKNOWN 156710287 5
109 PARSE_EGR_INJ_PKT_TYP_IPV4 764160328 34
113 PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTE 39095595 1
119 PARSE_LC_INJ_FAB_CNT 860098680 36
120 PARSE_LC_INJ_PORT_CNT 2471981017 90
121 PARSE_LC_INJ_DIAGS_CNT 493915 0
133 PARSE_DROP_IN_UIDB_TCAM_MISS 808478845 74
136 PARSE_DROP_IN_UIDB_DOWN 11145 0
138 PARSE_DROP_IPV4_DISABLED 4414126210 0
139 PARSE_DROP_IPV4_MCAST_NOT_ENABLED 24045101 0
140 PARSE_DROP_IPV4_CHECKSUM_ERROR 110712 0
141 PARSE_IPV4_SANITY_ADDR_CHK_FAILURES 2581 0
142 PARSE_DROP_IPV4_LENGTH_ERROR 1177 0
152 PARSE_INJECT_NATIVE 147925708 5
157 PARSE_DROP_IPV6_DISABLED 1417024468 3
164 PARSE_MSTP_DOT1D 14834561 1
195 LISP_ING_DECAP_P2_PRS 1 0
196 LISP_ING_DECAP_P2_UNSUPPORTED 1 0
211 UNKNOWN_L2_ON_L3_DISCARD 221969707 0
213 PARSE_BFD_NOT_MY_MAC 36889 0
221 L2TP_ING_DECAP_VER_DROP 1 0
223 PARSE_BVI_L3_ING 15034971011 804
224 PARSE_BVI_L3_EGR 2817747787 20
225 PARSE_BVI_L2_ING 13037353340 789
228 PARSE_UDLD 494266 0
242 PARSE_MAC_NOTIFY_RCVD 932327 0
244 PARSE_REV_MAC_NOTIFY_RCVD 141 0
247 PARSE_DROP_PPPOE_NOT_ENABLED 11162 0
249 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 604 0
250 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 619 0
251 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_2 595 0
252 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_3 576 0
278 PARSE_ROUTED_SUB_LOOKUP_MISS 207 0
284 DBG_RSV_EP_L_RSV_ING_L3_IFIB 710529838 31
285 DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCH 710529838 31
286 DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL 294350088 31
288 DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCH 1126367458 32
289 DBG_RSV_EP_L_RSV_ING_PUNT 200417373500 72
296 DBG_RSV_EP_L_RSV_EGR_L2_FLD_LPBK 8851809455 229
297 DBG_RSV_EP_L_RSV_EGR_FLOOD 2288724261 77
311 DBG_RSV_ING_LEARN_LOOP 301452 0
312 DBG_RSV_EGR_LEARN_LOOP 634 0
319 RSV_DROP_EGR_UIDB_DOWN 105 0
333 RSV_DROP_IPV4_DROP_NULL_RTE 126932079 0
338 RSV_DROP_IPV4_RXADJ_DROP 263825592 0
345 RSV_DROP_ING_LAG_NO_MATCH 25048 0
346 RSV_DROP_EGR_LAG_NO_MATCH 504 0
350 RSV_DROP_IPV4_TXADJ_DROP 3 0
353 RSV_DROP_IPV4_URPF_CHK 208356529 6
407 RSV_DROP_IFIB_TTL_CHECK 10 0
412 RSV_DROP_IN_L3_NOT_MYMAC 373495757 1
413 RSV_PUNT_PIT_MISS 16 0
414 RSV_PUNT_IP_MTU_EXCEEDED 32 0
416 RSV_ING_PUNT_AND_FWD 416008688 0
418 RSV_ING_L2_SMAC_MISS 36060 0
420 RSV_ING_L2_PORT_FLUSH 18 0
421 RSV_ING_L2_LEARN 36060 0
422 RSV_ING_L2_MOVE 262743 0
423 RSV_ING_L2_FLUSH 18 0
426 RSV_VPLS_ING_MAC_MOVE_SKIPPED_CNT 21149 0
427 RSV_VPLS_EGR_MAC_MOVE_SKIPPED_CNT 23802 0
428 RSV_NO_RFD_DROP 275854 0
429 RSV_ING_L2_FLOOD_BLOCK 1277558 0
439 RSV_ING_VPWS_INVALID_XID_DROP 15223 0
440 RSV_ING_L2_BD_MISS 73885 0
441 RSV_ING_L2_REFLECT_FILTER 5129 0
442 RSV_EGR_L2_REFLECT_FILTER 7860199 2
457 RSV_VPLS_MAC_MOVE_CNT 262743 0
459 RSV_LEARN_FROM_NOTIFY_CNT 280 0
465 RSV_VPLS_MAC_REFRESH_BY_SCAN_MSG 632852 0
470 RSV_REFRESH_FROM_NOTIFY_CNT 907891 0
471 RSV_MAC_MOVE_FROM_NOTIFY_CNT 354 0
474 RSV_AGE_REFRESH_SEND_CNT 632852 0
478 RSV_EGR_EFP_FILTER_TCAM_MISS_DROP_CNT 23492 0
497 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 1877548 0
516 RSV_L2BC_BVI 1111296 0
524 RSV_SNF_SAMPLE_PKT 306992892165 0
525 RSV_SNF_IPV4 307133733280 0
526 RSV_SNF_ING_PUNT 187741596193 0
527 RSV_SNF_EGR_PUNT 119392135463 0
603 RSV_L2_FLD_0_FGID_FILTER 38 0
774 CDP 494266 0
776 ARP 341682492 18
777 ARP_EXCD 10687052916 0
778 RARP 61478 0
782 LOOP 4205 0
783 LOOP_EXCD 394 0
786 BUNDLE_PROTO_PUNT 1068301 0
790 DIAGS 493914 0
806 MSTP 3735 0
822 IPv4_OPTIONS 385 0
824 IPV4_PLU_PUNT 75 0
832 PUNT_NO_MATCH 3525357 0
833 PUNT_NO_MATCH_EXCD 396540 0
840 IPV4_TTL_ERROR 99486419 5
841 IPV4_TTL_ERROR_EXCD 95432 0
842 IPV4_FRAG_NEEDED_PUNT 32 0
850 PUNT_ADJ 994038093 21
851 PUNT_ADJ_EXCD 71525164 0
902 PUNT_STATISTICS 322663166 14
903 PUNT_STATISTICS_EXCD 39 0
908 NETIO_RP_TO_LC_CPU_PUNT 8921373 0
909 NETIO_RP_TO_LC_CPU_PUNT_EXCD 1 0
924 MSTP_RSP_PUNT 14830819 1
925 MSTP_RSP_PUNT_EXCD 5 0
936 PUNT_NETFLOW 307114504348 0
937 PUNT_NETFLOW_EXCD 19267804 0
944 PUNT_IPV4_ADJ_NULL_RTE 9 0
970 PUNT_NETIO_LC_TO_RSP 147788931 5
971 PUNT_NETIO_LC_TO_RSP_EXCD 1 0
974 PUNT_CLUSTER_LINKMON 2964588842 100
975 PUNT_CLUSTER_LINKMON_EXCD 506 0
982 PUNT_PTP_IPV4 1 0
998 PUNT_MAC_CACHE_MSG 81 0
1010 PUNT_UNCLASSIFIED_RSP 26082403 2
1011 PUNT_UNCLASSIFIED_RSP_EXCD 240914 0
1036 PUNT_IFIB_OSPF_OPT 171060 0
1040 PUNT_DHCP_BCAST 5332040 0
1042 PUNT_DHCP_BCAST_REPLY 1725515 0
1043 PUNT_DHCP_BCAST_REPLY_EXCD 942060 0
1066 DROP_FRM_CRC_ERR_XAUI8 65 0
1067 DROP_FRM_FRM_ERR_XAUI8 53 0
1068 DROP_FRM_CRC_ERR_XAUI9 13305 0
1069 DROP_FRM_FRM_ERR_XAUI9 1186 0
1195 MDF_PIPE_LPBK 338004792405 1612
1198 MDF_PIPE_LPBK_BUFFER_PREFETCH 2453805033 459
1212 MDF_PUNT_POLICE_DROP 11600814449 0
1218 MDF_PUNT_RSP_VIA_HOST_PORT 48968198 1
1219 MODIFY_PUNT_REASON_MISS_DROP 2 0
1250 MODIFY_PUNT_NF_MSG 307114355889 0
1251 MODIFY_PUNT_NF_IPV4 307114365664 0
1252 MODIFY_SEND_TO_INTER_RACK_NP_CNT 570533166 1
1270 DBG_LRN_EP_L_ON_DEMAND 482 0
1276 LRN_ON_DEMAND_FLUSH_DELETE_ENTRY 201 0
1278 LRN_PERIODIC_AGING_DELETE_XID_MISMATCH 21 0
1279 LRN_PERIODIC_AGING_DELETE_ENTRY 35822 0
1289 VIRTUAL_IF_GENERIC_INPUT_DROP 73885 0


I do see the arp show up on end stations _sometimes_, but they don't stick, but i've also tried with static arps on the end stations and no IP connectivity between them, very odd..

are there many other circuits on this np0 active? there is a lot of traffic coming in from the attached enets and from the fabric. it is generally best to have a defined traffic stream at say 1000 pps, clear the counters, capture the show controller np, and 3 secs later the same command run.

this so on the 2nd run of the show command we have some good rate counters and we can correlate the 1000pps to a particular counter more easily. the clear before would help to remove all old stale counts.

one thing that stands out to me is the UIDB_TCAM MISS this generally means we are getting packets in for a vlan combo that we dont have an EFP defined for.

Also there is a lot of BD flooding going on, which is generally because of no macs learnt or broadcast packets.

one thing to try is, to eliminate the BD piece from being an issue is to convert this design into a p2p xcon isntead of a BD. Xcon is merely what comes in goes out and gives some good details too.

another thing to evaluate is having a wireshark on the stations to see what the incoming/outgoing is seen from the stations. this to ensure that the right vlan headers are set (relating to the uidb tcam miss).

needless to ask maybe, but the vlan imposition at the end stations is there right? or are they connecting via a switch that adds the vlan headers to it? if so, then we should also look at the switches to see if they are messing with something.

cheers

xander

Yes, this is attempted on our production equipment where we already have BNG running but where we need to bridge a few VLANs together, there's no other way I can't test this out unfortunately.

This is a few minutes after resetting the counters

show controller np counters np0 location 0/0/CPU0
Wed Apr 20 14:46:23.200 CEST

Node: 0/0/CPU0:
----------------------------------------------------------------

Show global stats counters for NP0, revision v2

Read 69 non-zero NP counters:
Offset Counter FrameValue Rate (pps)
-------------------------------------------------------------------------------
16 MDF_TX_LC_CPU 54222 192
17 MDF_TX_WIRE 26855836 94810
21 MDF_TX_FABRIC 26797876 94668
33 PARSE_FAB_RECEIVE_CNT 26825026 95265
37 PARSE_INTR_RECEIVE_CNT 142800 534
41 PARSE_INJ_RECEIVE_CNT 40654 114
45 PARSE_ENET_RECEIVE_CNT 26803057 94229
49 PARSE_TM_LOOP_RECEIVE_CNT 86374 212
53 PARSE_TOP_LOOP_RECEIVE_CNT 677645 2421
62 PARSE_ING_DISCARD 770 3
67 PRS_HEALTH_MON 1312 5
72 INTR_FRAME_TYPE_3 10 0
76 INTR_FRAME_TYPE_7 3937 15
96 PARSE_ING_8023 39 0
100 PARSE_ING_SLOW_PROTO 10 0
105 PARSE_RSP_INJ_FAB_CNT 34615 127
108 PARSE_EGR_INJ_PKT_TYP_UNKNOWN 1454 5
109 PARSE_EGR_INJ_PKT_TYP_IPV4 7032 26
113 PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTE 305 1
119 PARSE_LC_INJ_FAB_CNT 7732 28
120 PARSE_LC_INJ_PORT_CNT 31563 80
121 PARSE_LC_INJ_DIAGS_CNT 4 0
133 PARSE_DROP_IN_UIDB_TCAM_MISS 18845 72
152 PARSE_INJECT_NATIVE 1355 5
157 PARSE_DROP_IPV6_DISABLED 719 3
164 PARSE_MSTP_DOT1D 136 0
211 UNKNOWN_L2_ON_L3_DISCARD 51 0
223 PARSE_BVI_L3_ING 303632 1047
224 PARSE_BVI_L3_EGR 8367 20
225 PARSE_BVI_L2_ING 368354 1331
228 PARSE_UDLD 5 0
242 PARSE_MAC_NOTIFY_RCVD 13 0
284 DBG_RSV_EP_L_RSV_ING_L3_IFIB 6845 26
285 DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCH 6845 26
286 DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL 6767 26
288 DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCH 6923 26
289 DBG_RSV_EP_L_RSV_ING_PUNT 16757 62
296 DBG_RSV_EP_L_RSV_EGR_L2_FLD_LPBK 84664 203
297 DBG_RSV_EP_L_RSV_EGR_FLOOD 28456 69
311 DBG_RSV_ING_LEARN_LOOP 3 0
353 RSV_DROP_IPV4_URPF_CHK 1321 4
412 RSV_DROP_IN_L3_NOT_MYMAC 171 1
416 RSV_ING_PUNT_AND_FWD 78 0
422 RSV_ING_L2_MOVE 3 0
442 RSV_EGR_L2_REFLECT_FILTER 398 2
457 RSV_VPLS_MAC_MOVE_CNT 3 0
465 RSV_VPLS_MAC_REFRESH_BY_SCAN_MSG 10 0
470 RSV_REFRESH_FROM_NOTIFY_CNT 13 0
474 RSV_AGE_REFRESH_SEND_CNT 10 0
516 RSV_L2BC_BVI 92 0
774 CDP 5 0
776 ARP 4517 16
778 RARP 2 0
786 BUNDLE_PROTO_PUNT 10 0
790 DIAGS 4 0
840 IPV4_TTL_ERROR 416 1
850 PUNT_ADJ 8736 21
902 PUNT_STATISTICS 3937 15
908 NETIO_RP_TO_LC_CPU_PUNT 100 0
924 MSTP_RSP_PUNT 136 0
970 PUNT_NETIO_LC_TO_RSP 1354 5
974 PUNT_CLUSTER_LINKMON 27228 100
1010 PUNT_UNCLASSIFIED_RSP 463 2
1040 PUNT_DHCP_BCAST 111 0
1042 PUNT_DHCP_BCAST_REPLY 20 0
1195 MDF_PIPE_LPBK 677635 2398
1198 MDF_PIPE_LPBK_BUFFER_PREFETCH 207965 832
1218 MDF_PUNT_RSP_VIA_HOST_PORT 343 1
1252 MODIFY_SEND_TO_INTER_RACK_NP_CNT 78 0

show controller np counters np0 location 0/0/CPU0
Wed Apr 20 14:46:26.680 CEST

Node: 0/0/CPU0:
----------------------------------------------------------------

Show global stats counters for NP0, revision v2

Read 69 non-zero NP counters:
Offset Counter FrameValue Rate (pps)
-------------------------------------------------------------------------------
16 MDF_TX_LC_CPU 54939 207
17 MDF_TX_WIRE 27172587 91283
21 MDF_TX_FABRIC 27114004 91103
33 PARSE_FAB_RECEIVE_CNT 27141503 91204
37 PARSE_INTR_RECEIVE_CNT 144620 524
41 PARSE_INJ_RECEIVE_CNT 41152 144
45 PARSE_ENET_RECEIVE_CNT 27119275 91129
49 PARSE_TM_LOOP_RECEIVE_CNT 87292 265
53 PARSE_TOP_LOOP_RECEIVE_CNT 682813 1489
62 PARSE_ING_DISCARD 775 1
67 PRS_HEALTH_MON 1329 5
72 INTR_FRAME_TYPE_3 10 0
76 INTR_FRAME_TYPE_7 3986 14
96 PARSE_ING_8023 39 0
100 PARSE_ING_SLOW_PROTO 10 0
105 PARSE_RSP_INJ_FAB_CNT 35091 137
108 PARSE_EGR_INJ_PKT_TYP_UNKNOWN 1472 5
109 PARSE_EGR_INJ_PKT_TYP_IPV4 7158 36
113 PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTE 307 1
119 PARSE_LC_INJ_FAB_CNT 7865 38
120 PARSE_LC_INJ_PORT_CNT 31911 100
121 PARSE_LC_INJ_DIAGS_CNT 4 0
133 PARSE_DROP_IN_UIDB_TCAM_MISS 19068 64
152 PARSE_INJECT_NATIVE 1372 5
157 PARSE_DROP_IPV6_DISABLED 724 1
164 PARSE_MSTP_DOT1D 138 1
211 UNKNOWN_L2_ON_L3_DISCARD 51 0
223 PARSE_BVI_L3_ING 306134 721
224 PARSE_BVI_L3_EGR 8452 24
225 PARSE_BVI_L2_ING 370936 744
228 PARSE_UDLD 5 0
242 PARSE_MAC_NOTIFY_RCVD 13 0
284 DBG_RSV_EP_L_RSV_ING_L3_IFIB 6971 36
285 DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCH 6971 36
286 DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL 6893 36
288 DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCH 7049 36
289 DBG_RSV_EP_L_RSV_ING_PUNT 17015 74
296 DBG_RSV_EP_L_RSV_EGR_L2_FLD_LPBK 85557 257
297 DBG_RSV_EP_L_RSV_EGR_FLOOD 28759 87
311 DBG_RSV_ING_LEARN_LOOP 3 0
353 RSV_DROP_IPV4_URPF_CHK 1340 5
412 RSV_DROP_IN_L3_NOT_MYMAC 173 1
416 RSV_ING_PUNT_AND_FWD 78 0
422 RSV_ING_L2_MOVE 3 0
442 RSV_EGR_L2_REFLECT_FILTER 406 2
457 RSV_VPLS_MAC_MOVE_CNT 3 0
465 RSV_VPLS_MAC_REFRESH_BY_SCAN_MSG 10 0
470 RSV_REFRESH_FROM_NOTIFY_CNT 13 0
474 RSV_AGE_REFRESH_SEND_CNT 10 0
516 RSV_L2BC_BVI 92 0
774 CDP 5 0
776 ARP 4580 18
778 RARP 2 0
786 BUNDLE_PROTO_PUNT 10 0
790 DIAGS 4 0
840 IPV4_TTL_ERROR 422 2
850 PUNT_ADJ 8823 25
902 PUNT_STATISTICS 3986 14
908 NETIO_RP_TO_LC_CPU_PUNT 101 0
924 MSTP_RSP_PUNT 138 1
970 PUNT_NETIO_LC_TO_RSP 1371 5
974 PUNT_CLUSTER_LINKMON 27574 100
1010 PUNT_UNCLASSIFIED_RSP 470 2
1040 PUNT_DHCP_BCAST 114 1
1042 PUNT_DHCP_BCAST_REPLY 21 0
1195 MDF_PIPE_LPBK 682865 1507
1198 MDF_PIPE_LPBK_BUFFER_PREFETCH 208969 289
1218 MDF_PUNT_RSP_VIA_HOST_PORT 348 1
1252 MODIFY_SEND_TO_INTER_RACK_NP_CNT 78 0

The end stations are plugged into an old catalyst at the moment, regular access port, and are being doubletagged "further up" in the network by a ASR920 where they are transported doubletagged the rest of the way to the ASR9k

I'll convert the config to a p2p xconnect and see what happens. Thank you so far

No luck p2p xconnect either

in that case I suspect pieces that are attached to this interfaces that are acting up, p2p simply does in<>out without any packet processing whatsoever.

I just tested the scenario you have in 524 and it seems to be working perfectly.

unless the interfaecs are not created correctly or the XID's for that matter, there is no sw defect in play and from the earlier outputs you had I saw the XID's set correctly.

I am thinking that the switch used may not impose the vlan stack correctly or is dropping something for whatever reason.

it might be best to focus on that guy and do some verifications there.

is this a cat switch? 

xander

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: