09-03-2020 07:58 PM - edited 09-03-2020 08:09 PM
We are seeing input-drops on one specific sub-interface of a Bundle-Ether:
Bundle-Ether2.333 is up, line protocol is up
Interface state transitions: 11
Hardware is VLAN sub-interface(s), address is 5087.896d.e392
Internet address is xx.xx.88.94/30
MTU 9196 bytes, BW 15000000 Kbit (Max: 30000000 Kbit)
reliability 255/255, txload 0/255, rxload 0/255
Encapsulation 802.1Q Virtual LAN, VLAN Id 333, loopback not set,
Last link flapped 04:36:57
ARP type ARPA, ARP timeout 04:00:00
Last input 00:00:00, output 00:00:00
Last clearing of "show interface" counters never
30 second input rate 1000 bits/sec, 1 packets/sec
30 second output rate 0 bits/sec, 1 packets/sec
1301507775597 packets input, 1049536070526007 bytes, 168006588 total input drops
So I went to check the following:
RP/0/RSP0/CPU0:GP1#sho controll np count all loca 0/0/cpu0 | incl DROP
Fri Sep 4 05:35:31.185 IDT
101 RSV_DROP_EGR_UIDB_NO_MATCH 705 0
103 RSV_DROP_EGR_UIDB_DOWN 65 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 997 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 6 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 173023112 8
137 RSV_DROP_IPV4_DROP_RP_DEST 3436315 0
141 RSV_DROP_IPV4_RXADJ_DROP 2915267 0
155 RSV_DROP_ING_LAG_NO_MATCH 945526 0
157 RSV_DROP_EGR_LAG_NO_MATCH 1 0
163 RSV_DROP_QOS_DENY 59842111 0
171 RSV_DROP_IPV4_URPF_CHK 330 0
173 RSV_DROP_IPV6_URPF_CHK 4359144 0
289 RSV_DROP_IFIB_TTL_CHECK 62 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 28 0
630 MDF_PUNT_POLICE_DROP 10788586126 0
637 MODIFY_PUNT_REASON_MISS_DROP 3 0
1074 DROP_FRM_CRC_ERR_XAUI4 209 0
1075 DROP_FRM_FRM_ERR_XAUI4 535 0
1078 DROP_FRM_CRC_ERR_XAUI6 15 0
1080 DROP_FRM_CRC_ERR_XAUI7 1452 0
1081 DROP_FRM_FRM_ERR_XAUI7 134 0
1215 DROP_FRM_RUNT 183 0
1292 PARSE_DROP_IN_UIDB_TCAM_MISS 376 0
1298 PARSE_DROP_IN_UIDB_DOWN 334 0
1302 PARSE_DROP_IPV4_DISABLED 4051 0
1339 PARSE_DROP_IPV6_LENGTH 1 0
1442 L2TP_ING_DECAP_VER_DROP 70 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 312 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 304 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 279 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 304 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 23 0
103 RSV_DROP_EGR_UIDB_DOWN 44 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 8583 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 1599 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 5 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 51588147 1
137 RSV_DROP_IPV4_DROP_RP_DEST 66906156 8
141 RSV_DROP_IPV4_RXADJ_DROP 2741044 0
155 RSV_DROP_ING_LAG_NO_MATCH 468907 0
157 RSV_DROP_EGR_LAG_NO_MATCH 7 0
161 RSV_DROP_ACL_DENY 6697138 0
277 RSV_DROP_NHINDEX 1510 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 1 0
630 MDF_PUNT_POLICE_DROP 1120222 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 17 0
1075 DROP_FRM_FRM_ERR_XAUI4 8 0
1076 DROP_FRM_CRC_ERR_XAUI5 23 0
1077 DROP_FRM_FRM_ERR_XAUI5 6 0
1080 DROP_FRM_CRC_ERR_XAUI7 2712 0
1081 DROP_FRM_FRM_ERR_XAUI7 279 0
1292 PARSE_DROP_IN_UIDB_TCAM_MISS 40330 0
1298 PARSE_DROP_IN_UIDB_DOWN 43 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 1797 0
103 RSV_DROP_EGR_UIDB_DOWN 169 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 3 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 1180 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 143632503 11
137 RSV_DROP_IPV4_DROP_RP_DEST 3326871 0
141 RSV_DROP_IPV4_RXADJ_DROP 1612571 0
155 RSV_DROP_ING_LAG_NO_MATCH 446948 0
157 RSV_DROP_EGR_LAG_NO_MATCH 23 0
171 RSV_DROP_IPV4_URPF_CHK 8063285 0
173 RSV_DROP_IPV6_URPF_CHK 3751447 0
289 RSV_DROP_IFIB_TTL_CHECK 118 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 265 0
630 MDF_PUNT_POLICE_DROP 12963392090 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 5807218 1
1075 DROP_FRM_FRM_ERR_XAUI4 146232 0
1076 DROP_FRM_CRC_ERR_XAUI5 15 0
1077 DROP_FRM_FRM_ERR_XAUI5 5 0
1078 DROP_FRM_CRC_ERR_XAUI6 120 0
1079 DROP_FRM_FRM_ERR_XAUI6 1235 0
1080 DROP_FRM_CRC_ERR_XAUI7 27 0
1081 DROP_FRM_FRM_ERR_XAUI7 8 0
1215 DROP_FRM_RUNT 703 0
1298 PARSE_DROP_IN_UIDB_DOWN 1157 0
1302 PARSE_DROP_IPV4_DISABLED 105 0
1339 PARSE_DROP_IPV6_LENGTH 28 0
1442 L2TP_ING_DECAP_VER_DROP 58 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 98 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 116 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 101 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 103 0
101 RSV_DROP_EGR_UIDB_NO_MATCH 145 0
103 RSV_DROP_EGR_UIDB_DOWN 1661 0
109 RSV_DROP_IPV4_LEAF_NO_MATCH 425 0
113 RSV_DROP_IPV4_NRLDI_NO_MATCH 746 0
125 RSV_DROP_IPV4_TXADJ_NO_MATCH 42 0
131 RSV_DROP_IPV4_DROP_NULL_RTE 32538545 1
137 RSV_DROP_IPV4_DROP_RP_DEST 5883316 0
141 RSV_DROP_IPV4_RXADJ_DROP 1218269 0
155 RSV_DROP_ING_LAG_NO_MATCH 197803 0
157 RSV_DROP_EGR_LAG_NO_MATCH 719 0
161 RSV_DROP_ACL_DENY 6698807 0
163 RSV_DROP_QOS_DENY 37257510 0
171 RSV_DROP_IPV4_URPF_CHK 71020 0
173 RSV_DROP_IPV6_URPF_CHK 8114060 0
289 RSV_DROP_IFIB_TTL_CHECK 197 0
450 RSV_EGR_LAG_NOT_LOCAL_DROP_CNT 2401 0
630 MDF_PUNT_POLICE_DROP 50209728832 0
637 MODIFY_PUNT_REASON_MISS_DROP 2 0
1074 DROP_FRM_CRC_ERR_XAUI4 55 0
1075 DROP_FRM_FRM_ERR_XAUI4 74 0
1078 DROP_FRM_CRC_ERR_XAUI6 380 0
1079 DROP_FRM_FRM_ERR_XAUI6 46 0
1080 DROP_FRM_CRC_ERR_XAUI7 700 0
1081 DROP_FRM_FRM_ERR_XAUI7 1946 0
1215 DROP_FRM_RUNT 283 0
1298 PARSE_DROP_IN_UIDB_DOWN 867 0
1302 PARSE_DROP_IPV4_DISABLED 2585 0
1339 PARSE_DROP_IPV6_LENGTH 41 0
1442 L2TP_ING_DECAP_VER_DROP 124 0
1480 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0 764 0
1481 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0_MONITOR 775 0
1482 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1 751 0
1483 PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1_MONITOR 797 0
But I cannot find any documentation on MDF_PUNT_POLICE_DROP nor on any SRV_DROP string. The document: https://community.cisco.com/t5/service-providers-documents/asr9000-xr-troubleshooting-packet-drops-and-understanding-np/ta-p/3126715
which documents what the various fields mean does not document anything on these 2 strings.
So I am at a loss to figure out why I am seeing input drops on one specific bundle sub-interface.
We are running 5.3.3 on ASR9010 and the config for the sub-interface is as follows:
interface Bundle-Ether2.333
bandwidth 15000000
service-policy input limit-ddos-in
ipv4 mtu 1500
ipv4 address xx.xx.88.94 255.255.255.252
ipv4 verify unicast source reachable-via any allow-self-ping allow-default
ipv6 nd dad attempts 5
ipv6 mtu 1500
ipv6 verify unicast source reachable-via any allow-self-ping allow-default
ipv6 address xxx:798:1::72/126
ipv6 address xxx:7f8:3c::6e/126
ipv6 enable
monitor-session No1 ethernet
Any help or clue would appreciated.
09-04-2020 10:01 AM
A lot of these would cause drops, the problem being its an aggregate on the NP and of course the bundle could be spread out on multiple NPs or LCs.
The easiest way is to check the NP buffer for dropped packets or do a manual np capture to look for drops. show controller np capture or monitor np.
The punt police is related to show lpts pifib hardware police loc <> drops for punted control plane traffic, and the qos deny is due to policer etc, show qos int <>. If you have a support contract we can help you easier by having someone in TAC check the box for you and find the cause of the drops.
Sam
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: