Professional Documents
Culture Documents
This chapter contains the following sections that explain how to troubleshoot these conditions:
Understanding Problems with VLAN Traffic and L2 TCAM Classification, page 9-182
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-181
Chapter 9
Incorrect classification (tagging) of the trafficIf traffic has the wrong VLAN tag, it cannot reach
the intended subinterface. Furthermore, the main interface cannot route the traffic, because it does
not classify or forward tagged traffic.
A remote peer could be sending messages with an unknown VLAN number or encapsulation type.
Drop counters on the main interface and subinterface indicate where the traffic is being dropped.
If a packet has an incorrect VLAN tag, the main interface drops the packet and the main interface
drop counter increments.
If the packet has a correct VLAN tag, it reaches the intended subinterface, but if the subinterface
drops the packet for any reason, the subinterface drop counter increments.
We recommend as a best practice that you assign the same VLAN tag to all the ACs in a bridge
domain.
When you create a main interface for the AC (in interface config mode):
You cannot configure an encapsulation statement
You must include the l2transport keyword on a separate command line
Example:
interface GigabitEthernet0/1/0/1
l2transport
When you create a subinterface for the AC (in interface config mode):
You must include the l2transport keyword on the same command line
You must configure an encapsulation statement
Example:
interface GigabitEthernet0/2/0/2.2 l2transport
encapsulation dot1q 100
Review your running configuration to verify that it is complete and the necessary interfaces are up.
(show running-config).
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-182
OL-23591-02
Chapter 9
Ensure that the interfaces and subinterfaces for the ACs are actually up. View the up/down status of
the bridge domain, ACs, and PWs (if present) by means of the show l2vpn bridge-domain
summary command. Verify that the counts are incrementing, which means that the ACs are up.
Make sure that bridge ports (for example, ACs and PWs) are assigned to the bridge domains.
Verify that a unique main or subinterface is assigned to each AC in the bridge domain.
Display the main interface state and subinterface state. (The main interface is also called the trunk
interface, and it is identified as trunk in some of the CLI commands.)
RP/0/RSP0/CPU0:router# show interface
RP/0/RSP0/CPU0:router# show running-config interface
RP/0/RSP0/CPU0:router# show ethernet trunk
Run this command a second time to verify that counters are being incremented.
Verify that the port settings (for example, MTU, duplex) are as expected.
Verify that traffic is being directed to the correct subinterfaces. If it is not, the configuration of the
classification might be incorrect.
Verify that there is no traffic running on the main (trunk) interface; traffic that is misclassified might
default to run on the main interface.
Verify that the encapsulations match what you expect on the subinterfaces.
Use the interface statistics for the subinterface to determine whether packets are being
demultiplexed to the correct subinterface. Use the interface statistics on the parent physical/bundle
interface to determine whether traffic is being sent/received out of the trunk port. The Layer 2
statistics for the physical/bundle interface sum over all of the child/subinterfaces.
The counters on the main interface count packets as they are sent/received physically on the wire.
On the other hand, the subinterface counters are located in the forwarding engine.
Step 2
Check the interface packet drop counters to determine if packets are being dropped and if they are,
where and why.
Display the state of interface as recognized by the L2VPN object. Verify that L2VPN packets are being
forwarded on interface and subinterface (if applicable).
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface gigabitEthernet interface-id
hardware ingress location node-id
Step 3
Display the Ethernet tags and check for any errors or mismatches. This command gives tag information
in a very concise format, if you want to check the encapsulation on multiple subinterfaces.
RP/0/RSP0/CPU0:router# show ethernet tags
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-183
Chapter 9
Step 4
Verify that the subinterface matching order is as expected. The match-order option lists the subinterfaces
in the order that they match traffic. If the traffic is being classified to a different interface than you
expect, this command can help you determine why.
RP/0/RSP0/CPU0:router# show ethernet tags match-order
Step 5
Display the interface debug counters for each network processor unit. The following example shows the
NP counters.
RP/0/RSP0/CPU0:router# show controllers np counters {all | np0 | np1 | np2 | np3}
Step 6
If the output of the command in Step 5 shows that the UIDB_TCAM_MISS_AGG_DROP counter is
incrementing, it is possible that the physical port is receiving tagged traffic that does not match the
encapsulation statement of any subinterface. The parent/main interface is an untagged Layer 3 interface,
and rejects any tagged traffic that fails classification against any of its subinterfaces/children.
RP/0/RSP0/CPU0:router# clear controllers np counters all location node-id
RP/0/RSP0/CPU0:router# show controllers np counters {all | np0 | np1 | np2 | np3}
a.
Verify that there is incoming tagged traffic that does not match the encapsulation statement of any
subinterface, and that this traffic is not needed (that is, you do not intend to configure a subinterface
to receive and forward this traffic).
Encapsulation not matched but the traffic is neededCreate the necessary subinterface or
configuredGo to Substep b.
Encapsulation not matched, traffic not needed, and there is an encapsulation default currently
configuredGo to Substep c.
b.
Add an encapsulation default subinterface to receive all of the tagged traffic with unwanted
encapsulation statements. Check whether the UIDB_TCAM_MISS_AGG_DROP goes to zero, and
the default subinterface counters start going up. This process shifts the incrementing of counters
away from the main interface and isolates it on the default subinterface.
c.
Note
See the example below with the CLI statement encapsulation default.
Example
In this example, the system displays information on the subinterface 0/0/0/0.1.
RP/0/RSP0/CPU0:router# show running-config interface
interface GigabitEthernet0/0/0/0.1 l2transport
encapsulation dot1q 10
!
interface GigabitEthernet0/0/0/0.2 l2transport
encapsulation dot1q 10 second-dot1q 20
.
.
.
RP/0/0/CPU0:router# show interfaces GigabitEthernet 0/0/0/0.1
GigabitEthernet0/0/0/0.1 is up, line protocol is up <<< This subinterface is up
Interface state transitions: 1
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-184
OL-23591-02
Chapter 9
In this example, Bundle-Ether16 is the main interface (also referred to as the trunk interface or Layer 3
interface), and Bundle-Ether16.160 and Bundle-Ether16.161 are subinterfaces.
RP/0/RSP0/CPU0:router# show interfaces
Bundle-Ether16 is up, line protocol is up <<< The main interface is up
Interface state transitions: 1
Hardware is Aggregated Ethernet interface(s), address is 001b.53ff.87f0
Description: Connect to P19_C7609-S Port-Ch 16
Internet address is Unknown
MTU 9216 bytes, BW 1000000 Kbit (Max: 1000000 Kbit) reliability 255/255, txload 0/255,
rxload 0/255
Encapsulation ARPA, loopback not set,
ARP type ARPA, ARP timeout 04:00:00
No. of members in this bundle: 2
GigabitEthernet0/1/0/16 Full-duplex
1000Mb/s
Active
GigabitEthernet0/1/0/17 Full-duplex
1000Mb/s
Standby
Last input 00:00:00, output 00:00:00
Last clearing of "show interface" counters never
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 1000 bits/sec, 0 packets/sec
202037 packets input, 18079605 bytes, 1 total input drops <<< Includes the sum of
packets on all the subinterfaces in addition to the packets on the main interface.
5964 drops for unrecognized upper-level protocol
Received 0 broadcast packets, 202037 multicast packets
0 runts, 0 giants, 0 throttles, 0 parity
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
490241 packets output, 53719536 bytes, 0 total output drops
Output 3 broadcast packets, 490238 multicast packets
0 output errors, 0 underruns, 0 applique, 0 resets
0 output buffer failures, 0 output buffers swapped out
0 carrier transitions
Bundle-Ether16.160 is up, line protocol is up <<< This subinterface is up
Interface state transitions: 1
Hardware is VLAN sub-interface(s), address is 001b.53ff.87f0
Description: Connect to P19_C7609-S Port-Ch 16 Service Instance 160
Layer 2 Transport Mode
MTU 9220 bytes, BW 1000000 Kbit (Max: 1000000 Kbit)
reliability Unknown, txload Unknown, rxload Unknown
Encapsulation 802.1Q, loopback not set, <<< Encapsulation is correct
ARP type ARPA, ARP timeout 04:00:00
Last input never, output never
Last clearing of "show interface" counters never
5425 packets input, 368952 bytes <<< Traffic is present on this subinterface
1 input drops, 0 queue drops, 0 input errors
161269 packets output, 11611364 bytes
0 output drops, 0 queue drops, 0 output errors
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-185
Chapter 9
19
17
L3
2
0
0
0
0
0
Sub states
Up
Down
4
0
5
0
6
0
2
0
1
0
1
0
19
Ad-Down
0
0
0
0
0
0
0
The following example shows the NP counters. For a description of how to interpret NP counter
information, see the Displaying Traffic Status in Line Cards and RSP Cards section on page 7-147.
Note
If you want to clear counters at any time during this procedure (to make it easier to see which counters
are incrementing), use the command clear controllers np counters all location node-id.
RP/0/RSP0/CPU0:router# show controllers np counters all
Fri Oct 29 10:49:57.377 DST
Node: 0/0/CPU0:
----------------------------------------------------------------
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-186
OL-23591-02
Chapter 9
This example shows that L2VPN packets are being forwarded on the interface and subinterface (if
applicable).
RP/0/RSP0/CPU0:router# show running-config l2vpn
l2vpn
bridge group BG
bridge-domain BD1
interface TenGigE0/1/0/0.0
!
interface TenGigE0/1/0/3.0
!
interface TenGigE0/1/0/4.0
!
neighbor 10.100.1.1 pw-id 2
!
!
!
!
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface Te0/1/0/0.0 detail loc 0/1/cpu0
Local interface: TenGigE0/1/0/0.0, Xconnect id: 0x440003, Status: up
Segment 1
AC, TenGigE0/1/0/0.0, status: Bound
Statistics:
packets: received 55749484, sent 1
bytes: received 3567966976, sent 42
packets dropped: PLU 0, tail 0
bytes dropped: PLU 0, tail 0
Segment 2
Bridge id: 0, Split horizon group id: 0
Storm control: disabled
MAC learning: enabled
MAC port down flush: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: none
MAC limit reached: no
MAC Secure: disabled, Logging: disabled
DHCPv4 snooping: profile not known on this node, disabled
Dynamic ARP Inspection: disabled, Logging: disabled
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-187
Chapter 9
St
Up
Up
MTU Ly Outer
1518 L2 .1Q:10
1522 L2 .1Q:10
Inner
.1Q:20
Xtra -,+
0 0
0 0
This example shows the configuration and query of the Ethernet tags.
RP/0/RSP0/CPU0:router# show run interface gig0/0/0/0.1
Thu Oct 14 08:57:16.831 EDT
interface GigabitEthernet0/0/0/0.1 l2transport
encapsulation dot1q 1
!
RP/0/RSP0/CPU0:router# show ethernet tags gigabitEthernet 0/0/0/0.1 detail location
0/0/CPU0
GigabitEthernet0/0/0/0.1 is up, service is L2
Interface MTU is 1518, switched L2 MTU is 1518
Outer Match: Dot1Q VLAN 1
Local traffic encap: Dot1Q VLAN 1
Pop 0 tags, push none
In this example, 0.2 is listed before 0.1. Any traffic with outer VLAN .1Q 10, and inner tag .1Q 20 would
match Gi0/0/0/0.2.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-188
OL-23591-02
Chapter 9
St
Up
Up
MTU Ly Outer
1522 L2 .1Q:10
1518 L2 .1Q:10
Inner
.1Q:20
-
Xtra -,+
0 0
0 0
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-189
Chapter 9
(2w4d ago)
This example shows how to set up an encapsulation default subinterface. in this scenario, you expect
incoming traffic on gig0/1/0/1 to be all single-tagged dot1q 100. However, you see some occasional
traffic with other encapsulations being dropped. These drops could be due to a few stray packets (for
example dot1q 200), and they are dropped without being processed on gig0/1/0/1; the
UIDB_TCAM_MISS_AGG_DROP counter is incremented. You can configure one default subinterface
to catch all the stray packets. Then the drops appear as counters on this isolated default interface, not as
UIDB_TCAM_MISS_AGG_DROP on the main interface.
interface gig0/1/0/1
mtu 1500
!
interface gig0/1/0/1.1 l2transport
encapsulation dot1q 100
!
interface gig0/1/0/1.2 l2transport
encapsulation default
!
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-190
OL-23591-02
Chapter 9
Figure 9-1
gig0/1/0/1
Router
gig0/5/0/8
bundle-ether1
Bridge port 1
gig0/1/0/1
Bridge port 3
bundle-ether1.1
gig0/2/0/2
Bridge port 2
gig0/2/0/2.2
gig0/5/0/9
EFPs
255023
EFPs
Verify that bundle members Gig0/5/0/8 and Gig0/5/0/9 are both Active, that is, that Link Aggregation
Control Protocol (LACP) indicates that they are connected with their adjacent neighbors.
RP/0/RSP0/CPU0:router# show bundle bundle-ether1
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-191
Chapter 9
Note
For additional information on troubleshooting bundles and LACP, see the Troubleshooting Problems
with Link Bundles section on page 5-118.
Step 2
Follow the steps in the Troubleshooting VLAN Traffic and L2 TCAM Classification section on
page 9-181 for the ACsGig0/1/0/1, Gig0/2/0/2, and Bundle-ether1.1.
Step 3
Display the bridge domain running configuration and ensure that it contains the appropriate commands
for your network.
RP/0/RSP0/CPU0:router# show run l2vpn bridge group bg_example
Step 4
Verify that the bridge domain, bridge ports, and ACs are all in Up state.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain bd-name mybd
Step 5
View additional details of the bridge domain, such as the feature settings and verify they are as expected.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain bd-name mybd detail
Determine whether a source MAC address been learned on a specific bridge domain.
Determine the specific bridge port on which the source MAC address was learned (either a PW or
an AC), and provide information about the status of that bridge port.
View the age timer on the learned MAC address, which is a statistic on the traffic stream. The system
periodically checks that it is updating learned MAC addresses, and, if it is updating MAC addresses
successfully, the system restarts the age timer at the initial value (0). This reset occurs at the half-age
time, and the system sends a MAC update notification. If the configured maximum time elapses
(default 5 minutes) without an update, the MAC address ages out, which means there is no
communication and traffic is not getting through.
To find out whether a MAC address is being learned, monitor the age repeatedly, for example, every
10 seconds for five iterations. If the MAC age continues to increment beyond the half-age time, it
means there is no traffic flowing during the time you monitored it.
Step 1
Display the MAC address table for the bridge domain. Verify that MAC addresses are being learned and
resynced. Include the specific bridge domain and MAC address of interest, so the output will display the
specific bridge-port (AC or PW) on which the specific MAC address was learned.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain bridge-group:bridge-domain
mac-address mac-address-id location node-id
If the MAC address was learned on a PW, the output shows the IP address of the neighbor. Otherwise it
shows the MAC address of the AC.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-192
OL-23591-02
Chapter 9
A bridge domain is an entity that exists on multiple LCs. However, the show command singles out one
LC. If the MAC address was learned on a bridge-port on a different LC, the display output reports the
LC on which it was learnednot the actual bridge-port. To get the bridge-port data, rerun the command
on the actual LC on which it was learned.
Step 2
(Optional) As an alternative to the procedure in Step 1, you can run a more general command without
specifying a specific bridge domain or MAC address. However, the output could flood your terminal
screen.
Caution
Before you run this command without specifying a particular bridge domain and MAC address, take
steps to limit the amount of data that can be output on your terminal screen. Otherwise the amount of
output could be extremely large.
This command displays all the MAC addresses learned on all bridge domains. As a safety mechanism,
before you enter this command, set your terminal length, for example:
RP/0/RSP0/CPU0:router# term length 20
If you need the full display, direct the output to a file, for example:
RP/0/RSP0/CPU0:router# loc 0/6/cpu0 | file disk0:bdoutput.txt
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location node-id
Step 3
Display the MAC table for the bridge domain and verify that the MAC address has been learned. Notice
the bridge port (the same as the attachment circuit [AC]) from which the MAC address was learned, and
whether it was learned through a pseudowire (PW).
Caution
Before you run this command without specifying a MAC address ID, take steps to limit the amount of
data that can be output on your terminal screen. Otherwise the amount of output could be extremely
large.
This command displays all the MAC addresses learned on a bridge domain. As a safety mechanism,
before you enter this command, set your terminal length, for example:
RP/0/RSP0/CPU0:router# term length 20
If you need the full display, direct the output to a file, for example:
RP/0/RSP0/CPU0:router# loc 0/6/cpu0 | file disk0:bdoutput.txt
One other approach to limit the output is to run the command with a pipe filter and CTRL-C after you
see the output you want.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain bridge-group:bridge-domain
mac-address detail location node-id [ | begin GigabitEthernet interface-id ]
Step 4
Use the following command to display the data for a specific bridge domain and MAC address.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain bridge-group:bridge-domain
mac-address mac-address detail location node-id
Example
RP/0/RSP0/CPU0:router# loc 0/6/cpu0 | file disk0:bdoutput.txt
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-193
Chapter 9
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-194
OL-23591-02
Chapter 9
Verifying MPLS PIE Activation, MPLS Configuration, and MPLS Connectivity, page 9-196
CE
N-PE
Ethernet
(VLAN/Port/EFP)
Attachment circuit
MPLS Core
N-PE
CE
Ethernet
(VLAN/Port/EFP)
Attachment circuit
208684
Figure 9-2
The VPLS network requires the creation of a bridge domain (Layer 2 broadcast domain) on each of the
PE routers. The VPLS PE device holds all the VPLS forwarding MAC tables and bridge domain
information. In addition, it is responsible for all flooding broadcast frames and multicast replications.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-195
Chapter 9
Caution
Verify that the MPLS PIE is installed, committed, and activated. It is not installed by default.
Verify that MPLS is configured in your running-config. After you install the MPLS PIE, you must
commit it. If you configure MPLS but you have not committed the MPLS PIE, the system deletes
all of your MPLS configuration if you reload the router image.
Verify that the MPLS PIE is committed before you configure MPLS. Otherwise all of your MPLS
configuration data will be lost if the image is reloaded.
PWs operate over the MPLS network, therefore, MPLS connectivity is a prerequite for bringing up a PW.
To verify MPLS connectivity, see the Troubleshooting Connectivity Over MPLS section on
page 8-174.
Check for the following underlying problems, which can cause failure of the multipoint Layer 2 services.
The bridge domain uses an attachment circuit (AC) for which the interfaces have not been created.
The AC is not configured as Layer 2 (the l2transport keyword is missing from the configuration
command).
The traffic on the AC interface is not classified properly (wrong encapsulation statement).
Step 2
Verify that you can ping the opposite interface (on the remote router) from the MPLS interface.
Step 3
Step 4
Verify that the remote router ID, typically the remote router loopback, is in the routing table.
show route ipv4
Step 5
Ping the remote router with the same IP address that is used for the PW (ping x.x.x.x).
Step 6
Verify that you can find the remote router ID in an MPLS command. It should be the ipv4 address for
the PW.
Step 7
Verify that the BGP neighbor is up. (This step is necessary only if BGP autodiscovery has been
configured.)
show bgp neighbors
Step 8
Verify that the VFI is advertized in both PEs, and that PWs are established.
show l2vpn bridge-domain [brief | detail]
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-196
OL-23591-02
Chapter 9
Step 9
Step 10
Verify that PWs are bound in the Layer 2 forwarding information base (L2FIB) with the proper
cross-connect ID.
show l2vpn forwarding detail location
Step 11
Example
The following example shows that autodiscovery is on, the PW is up, and NLRIs have been received from
the peer router. Check the cross-connect ID. Check the local and remote label and compare with the label
binding in the MPLS label switching database (LSD) by means of the show mpls forwarding command.
In this example, the local MPLS label ID is 16005.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain detail
Bridge group: bg1, bridge-domain: bg1_bd1, id: 0, state: up, ShgId: 0, MSTi: 0
MAC learning: enabled
MAC withdraw: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
MAC port down flush: enabled
Security: disabled
Split Horizon Group: none
DHCPv4 snooping: disabled
IGMP Snooping profile: none
Bridge MTU: 1500
ACs: 1 (1 up), VFIs: 1, PWs: 2 (2 up), PBBs: 0 (0 up)
List of ACs:
AC: GigabitEthernet0/6/0/1.1, state is up
Type VLAN; Num Ranges: 1
VLAN ranges: [2, 2]
MTU 1504; XC ID 0x2040001; interworking none
MAC learning: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
MAC port down flush: enabled
Security: disabled
Split Horizon Group: none
DHCPv4 snooping: disabled
IGMP Snooping profile: none
Storm Control: disabled
Static MAC addresses:
Statistics:
packets: received 5650000, sent 5650000
bytes: received 429400000, sent 429400000
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-197
Chapter 9
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-198
OL-23591-02
Chapter 9
16006
Pop
BD=0
point2point
PW(10.40.40.40:2814754062073957)
\
BD=0
point2point
214700000
214700000
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-199
Chapter 9
The following example shows that BGP is connected and active, and that there are VPNs and NLRIs on
the bridge domain.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-200
OL-23591-02
Chapter 9
The following example shows that the local router ID is advertised and that NLRIs are recieved from the
remote peers.
RP/0/RSP0/CPU0:router# show l2vpn discovery
Service Type: VPLS, Connected
List of VPNs (1 VPNs):
Bridge group: bg1, bridge-domain: bg1_bd1, id: 0, signaling protocol: LDP
VPLS-ID: 1:101
Local L2 router id: 10.10.10.10 <<< advertised
List of Remote NLRI (2 NLRIs): <<< NLRIs received from the remote peer address
Local Addr
Remote Addr
Remote L2 RID
Time Created
--------------- --------------- --------------- ------------------10.10.10.10
10.20.20.20
10.20.20.20
04/14/2010 23:10:51
10.10.10.10
10.40.40.40
10.40.40.40
04/14/2010 23:19:06
b.
c.
Configure LDP
d.
Configure BGP
e.
Example
####Sample Configuration from WEST:
####CONFIGURE LOOPBACKs and Links
Interface loopback0
Ipv4 address 10.10.10.10 255.255.255.255
!
Interface gig0/6/0/1.1 l2transport
Description Attachment Circuit connected to Customer site
Encapsulation dot1q 2
!
Interface gig0/6/0/21
Description Connected to EAST Node
Ipv4 address 10.0.0.1 255.255.255.0
!
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-201
Chapter 9
Interface gig0/6/0/3
Description Connected to CENTRAL Node
Ipv4 address 192.0.2.1 255.255.255.0
!
####CONFIGURE IGP
Router ospf 1
Router-id 10.10.10.10
Nsr
Nsf cisco
Area 0
interface loopback0
interface gig0/6/0/3
interface gig0/6/0/21
####CONFIGURE MPLS LDP
Mpls ldp
graceful-restart
log neighbor
interface gig0/6/0/21
interface gig0/6/0/3
router-id 10.10.10.10
####CONFIGURE BGP
Router bgp 1
bgp router-id 10.10.10.10
bgp graceful-restart
address-family ipv4 unicast
address-family l2vpn vpls-vpws <<< This shows you have configured this family in BGP so
it will be able to handle the discovery of the neighbor.
!
neighbor 192.0.2.20
remote-as 1
update-source loopback0
address-family ipv4 unicast
address-family l2vpn vpls-vpws
neighbor 172.30.30.30
remote-as 1
update-source loopback0
address-family ipv4 unicast
address-family l2vpn vpls-vpws
####CONFIGURE L2VPN
l2vpn
bridge group bg1
bridge-domain bg1_bd1
interface gig0/6/0/1.1
!
vfi bg1_bd1_vfi
vpn-id 101
autodiscovery bgp
rd 101:1
route-target 101:1
signaling-protocol ldp
vpls-id 1:101
Step 2
b.
c.
d.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-202
OL-23591-02
Chapter 9
e.
f.
Example
RP/0/RSP0/CPU0:router# show l2vpn atom-db
Wed Apr 14 23:28:41.905 EDT
Peer ID
VC ID
Encap
Signaling
FEC
Discovery
____________________________________________________________________________
192.0.2.20
192.168.40.40
1:101
1:101
MPLS
MPLS
LDP
LDP
129
129
BGP
BGP
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-203
Chapter 9
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-204
OL-23591-02
Chapter 9
Step 3
Verify the configuration of MPLS forwarding and Label Switching Database (LSD) parameters.
a.
b.
Example
RP/0/RSP0/CPU0:router# show mpls forwarding
Wed Apr 14 23:41:49.325 EDT
Local Outgoing
Prefix
Outgoing
Next Hop
Bytes
Label Label
or ID
Interface
Switched
------ ----------- ------------------ ------------ --------------- -----------16000 Pop
192.0.2.20/32
Gi0/6/0/21
10.0.0.2
226000292
16001 Pop
172.30.30.30/32
Gi0/6/0/3
192.0.2.2
0
16002 Pop
172.16.0/24
Gi0/6/0/3
192.0.2.2
0
16003 16003
192.168.40.40/32
Gi0/6/0/3
192.0.2.2
226000620
16004 Unlabelled 10.0.1.253/32
Mg0/RSP0/CPU0/0 10.2.0.4
0
16005 Pop
PW(192.0.2.20:2814754062073957)
\ <<< PW has label and traffic is
running
BD=0
point2point
214700000
16006 Pop
PW(192.168.40.40:2814754062073957)
\ <<< PW has label and traffic is
running
BD=0
point2point
214700000
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-205
Chapter 9
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-206
OL-23591-02
Chapter 9
Figure 9-3
gig0/2/0/1
gig0/1/0/1
Bridge port #1
gig0/1/0/1.5
xconnect
gig0/2/0/1.7
gig0/1/0/2
gig0/1/0/3
Bridge port #2
gig0/1/0/2.6
Bridge domain
mybd
gig0/2/0/2
gig0/3/0/1
gig0/3/0/2
Router3
Router2
MPLS/OSPF router ID
(loopback) 10.2.2.2
281922
Router1
MPLS/OSPF router ID
(loopback) 10.1.1.1
(AC/EFP) gig0/1/0/1.5
(AC/EFP) gig0/1/0/2.6
Router2 has an xconnect. The xconnect has two membersOne AC and one PW. The xconect is
represented by the dotted line inside the Router2 box. The dotted line also includes the AC/EFP:
(AC/EFP) gig0/2/0/1.7
The PW is represented by the circles (one in Router1 and one in Router2) connected by a dotted line. It
is a virtual point-to-point connection from Router1 to Router2. In reality, the traffic for the PW passes
through Router3, but Router1 and Router2 behave as if they are directly connected over the PW. The port
at the right of Router1 and the port at the left of Router2 are the MPLS connections to Router3.
The configurations for this deployment example are as follows. Make sure that your own configuration
is consistent with the applicable CLI structure and syntax shown in this example.
Router1
interface GigabitEthernet0/1/0/1
!
interface GigabitEthernet0/1/0/1.5 l2transport
encapsulation dot1q 100
!
interface GigabitEthernet0/1/0/2.6 l2transport
encapsulation dot1q 100
!
interface GigabitEthernet0/1/0/3
ipv4 address 10.0.13.1 255.255.255.0
!
interface Loopback0
ipv4 address 10.1.1.1 255.255.255.255
!
router ospf 1
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-207
Chapter 9
Router2
interface GigabitEthernet0/2/0/1
!
interface GigabitEthernet0/2/0/1.7 l2transport
encapsulation dot1q 100
!
interface GigabitEthernet0/2/0/2
ipv4 address 10.0.23.1 255.255.255.0
!
interface Loopback0
ipv4 address 10.2.2.2 255.255.255.255
!
router ospf 1
log adjacency changes
router-id 10.2.2.2
area 0
interface GigabitEthernet0/2/0/2
!
interface Loopback0
!
!
!
mpls ldp
router-id 10.2.2.2
log
neighbor
!
interface GigabitEthernet0/2/0/2
!
!
l2vpn
xconnect group examples
p2p myxc
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-208
OL-23591-02
Chapter 9
interface GigabitEthernet0/2/0/1.7
!
neighbor 10.1.1.1 pw-id 1
!
!
!
Router 3
interface GigabitEthernet0/3/0/1
ipv4 address 10.0.13.2 255.255.255.0
!
interface GigabitEthernet0/3/0/2
ipv4 address 10.0.23.2 255.255.255.0
!
interface Loopback0
ipv4 address 10.3.3.3 255.255.255.255
!
router ospf 1
log adjacency changes
router-id 10.3.3.3
area 0
interface GigabitEthernet0/3/0/1
!
interface GigabitEthernet0/3/0/2
!
interface Loopback0
!
!
!
mpls ldp
router-id 10.3.3.3
log
neighbor
!
interface GigabitEthernet0/3/0/1
!
interface GigabitEthernet0/3/0/2
!
!
Use the following procedure to locate any problems with traffic flow in this network. The IP addresses
are based on the sample configurations for Routers 1, 2, and 3 (above).
Step 1
Step 2
Verify that OSPF neighbor links are up on the links (the same links listed in Step 1).
RP/0/RSP0/CPU0:router# show ospf neighbor
Step 3
Verify that the Router1 routing table contains the loopback address of Router2 (10.2.2.2). Also verify
that the Router2 routing table contains the loopback address of Router1 (10.1.1.1).
RP/0/RSP0/CPU0:router# show route ipv4
Step 4
Verify that Router1 can ping the Router2 loopback address, and Router2 can ping the Router1 loopback
address.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-209
Chapter 9
Step 5
Verify that MPLS neighbors are established in the links (the same links listed in Step 1).
RP/0/RSP0/CPU0:router# show mpls ldp neighbor
Step 6
Verify that Router1 has an MPLS label to reach the Router2 loopback address. Also verify that Router2
has an MPLS label to reach the Router1 loopback address.
Note
The output of this command contains one additional MPLS label. This additional label
represents the pseudowire between Router1 and Router2.
Step 7
Verify that the status of the Router1 bridge domain is UP, and that all all ACs are up.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain mybd
Step 8
Step 9
Verify that the Router2 xconnect is UP, and all ACs are UP.
RP/0/RSP0/CPU0:router# show l2vpn xconnect group examples
Step 10
show l2vpn xconnect [detail | group | interface | neighbor | state | summary | type | state
unresolved]
2.
show l2vpn forwarding {detail | hardware | interface | location | message | resource | summary
| unresolved} location node-id
3.
show mpls forwarding [detail | {label label number} | interface interface-id | labels value |
location | prefix [network/mask | length] | summary | tunnels tunnel-id]
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-210
OL-23591-02
Chapter 9
DETAILED STEPS
Step 1
Command or Action
Purpose
Example:
detailDetailed information
neighborNeighbor
Step 2
Example:
RP/0/RSP0/CPU0:router# show l2vpn forwarding
location 0/2/cpu0
Step 3
AC Is Down
Step 1
Step 2
Step 3
Step 4
Step 5
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-211
Chapter 9
Pseudowire Is Down
Step 1
Step 2
On the MPLS-enabled interface that connects to the router at the remote end of the PW, view MPLS LDP
neighbor information. Check these conditions:
a.
Ensure that, if the MPLS router-id uses a loopback interface (it usually does), the loopback interface
is present in the OSPF configuration, so that a route to its address is advertised for the other router
to reach.
b.
Step 3
Ensure that the MPLS infrastructure has allocated a label for the mpls-id IP address on the opposite
router, and an additional label for the PW tunnel itself.
RP/0/RSP0/CPU0:router# show mpls forwarding
Step 4
(Perform this step if the MPLS LSP does not come up.) On the MPLS-enabled interface that connects to
the router at the remote end of the PW, view OSPF neighbor information. Verify that the IP address of
the MPLS router ID is reachable:
a.
b.
c.
Ensure that the PW ID (keyword "pw-id" in the configuration syntax) is identical on both ends of
the PW.
Step 5
Step 6
Step 7
Step 8
Step 9
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-212
OL-23591-02
Chapter 9
Step 2
View the bridge information about Broadcast, Multicast and Unknown Unicast.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain bd-name 1 det
Step 3
Step 4
Step 5
Step 6
Step 7
Step 2
Step 3
Step 4
Traffic Loss
Step 1
Step 2
bd-name-id detail
View segment counters to see if the packet and byte switched count increased.
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface GigabitEthernet node-id detail
location node-id
Step 3
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-213
Chapter 9
FO
Step 1
One thing to check immediately is if the next hop router also experienced an FO mechanism (Similar to
what is done on this router). If so, the OSPF may go down.
Step 2
If not, verify that nsf cisco is configured under the OSPF. If nsf cisco is configured, see if the next
hop is reachable during FO. If not, there may be a reachability issue like a link going down or negotiation
problems.
Step 2
bd-name-id detail
VPLS Not Forwarding Flooding Traffic from Pseudowire to AC, page 9-224
VPLS Not Forwarding Flooding Traffic from Pseudowire to AC, page 9-225
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-214
OL-23591-02
Chapter 9
2.
show l2vpn bridge-domain [bd-name bridge-domain name | brief | detail | group bridge-domain
group name | interface {type interface-id} | neighbor IP address [pw-id value] | summary]
3.
4.
DETAILED STEPS
Step 1
Command or Action
Purpose
Example:
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain
summary
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-215
Chapter 9
Step 2
Command or Action
Purpose
typeInterface type.
Example:
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain
neighbor
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain
group 12
show l2vpn bridge-domain interface
gigabitethernet 0/1/0/5
Step 3
Example:
RP/0/RSP0/CPU0:router# show l2vpn discovery
summary
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-216
OL-23591-02
Chapter 9
Step 4
Command or Action
Purpose
Example:
RP/0/RSP0/CPU0:router# show l2vpn forwarding
bridge-domain ABC mac-address interface
Gi0/1/2/1.2 detail hardware location 0/4/CPU0
bridge
Step 5
Example:
RP/0/RSP0/CPU0:router# show l2vpn forwarding
bridge-domain detail location 0/1/CPU0
Check the configuration is valid (show run l2vpn, show run bgp, show run mpls ldp).
Step 2
Check that the BGP output shows the remote prefix has been received (show bgp).
Step 3
Check L2VPN discovery to verify that the local router received the LDP NLRI update from the remote
VPLS router (show l2vpn discovery private).
Example
These examples show the output from the show bgp commands.
RP/0/RSP0/CPU0:router# show bgp l2vpn vpls
Status codes: s suppressed, d damped, h history, * valid, > best
i - internal, r RIB-failure, S stale
Origin codes: i - IGP, e - EGP, ? - incomplete
Network
Next Hop
Rcvd Label
Local Label
Route Distinguisher: 101:1 (default for vrf bg1:bg1_bd1)
*> 10.10.10.10/32
0.0.0.0
nolabel
nolabel
*>i192.0.2.20/32
192.0.2.20
nolabel
nolabel
*>i192.168.40.40/32
192.168.40.40
nolabel
nolabel
Processed 3 prefixes, 3 paths
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-217
Chapter 9
This example shows the output from the show l2vpn discovery command.
RP/0/RSP0/CPU0:router# show l2vpn discovery private
Service Type: VPLS, Connected
List of VPNs (1 VPNs):
Bridge group: bg1, bridge-domain: bg1_bd1, id: 0, signaling protocol: LDP
AD event trace history [Total events: 3]
----------------------------------------Time
Event
====
=====
04/14/2010 23:09:42 Add edge edge_id/type
04/14/2010 23:10:51 Rcv LDP nlri upd l2rid/nh
04/14/2010 23:19:06 Rcv LDP nlri upd l2rid/nh
VPLS-ID: 1:101
Local L2 router id: 10.10.10.10
List of Remote NLRI (2 NLRIs):
Local Addr
Remote Addr
--------------- --------------10.10.10.10
192.0.2.20
10.10.10.10
192.168.40.40
Remote L2 RID
--------------192.0.2.20
192.168.40.40
Status/PWID
Flags/PeerID
=============== ============
10.10.10.10
0
192.0.2.20
192.0.2.20
192.168.40.40
192.168.40.40
Time Created
------------------04/14/2010 23:10:51
04/14/2010 23:19:06
Status/PWID
===============
10.10.10.10
0
10.10.10.10
10.10.10.10
Flags/PeerID
============
0
0x0
192.0.2.20
192.168.40.40
AC Is Down
Step 1
Step 2
Step 3
Step 4
Step 5
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-218
OL-23591-02
Chapter 9
Pseudowire Is Down
A pseudowire (PW) is both an L2VPN component and an MPLS component. If a PW is down in one
node, it could be caused by a problem in the local or remote node. Follow these steps to troubleshoot a
problem with a PW in an L2VPN network.
Note
Step 1
Check the configuration is valid (show run l2vpn, show run bgp, show run mpls ldp).
Step 2
Verify that L2VPN discovery shows the received NLRI (show l2vpn discovery). If the NLRI is not
received, follow the procedure in the L2VPN Discovery Not Working section on page 9-217.
Step 3
View the local and remote labels in the bridge-domain (show l2vpn bridge-domain detail) and compare
these labels with the label binding in LSD (show mpls lsd forwarding labels). See the example below.
Step 4
Step 5
Step 6
Step 7
If PWs are involved, be sure they are properly configured on both PEs. See the Troubleshooting
Point-to-Point Layer 2 Services section on page 9-206.
Step 8
Step 9
Step 10
Step 11
Step 12
Example
These commands allow you to view the local and remote labels in the bridge-domain and compare them
with the label binding in LSD.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain detail
Signaling protocol: LDP
AS Number: 1
VPLS-ID: 1:101
L2VPN Router ID: 10.10.10.10
PW: neighbor 192.0.2.20, PW ID 1:101, state is up ( established )
PW class not set, XC ID 0xfffc0001
Encapsulation MPLS, Auto-discovered (BGP), protocol LDP
PW type Ethernet, control word disabled, interworking none
PW backup disable delay 0 sec
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-219
Chapter 9
Local
-----------------------------16005
10.10.10.10
10.10.10.10
10.10.10.10
1:101
0x0
bg1_bd1_vfi
1500
disabled
Ethernet
0x2
(LSP ping verification)
VCCV CC type 0x6
(router alert label)
(TTL expiry)
------------ ------------------------------
Remote
------------------------16006
192.0.2.20
192.0.2.20
192.0.2.20
1:101
0x0
bg1_bd1_vfi
1500
disabled
Ethernet
0x2
(LSP ping verification)
0x6
(router alert label)
(TTL expiry)
-------------------------
16005
Next Hop
Bytes
Switched
--------------- -----------\
point2point
214700000
Check the configuration is valid (show run l2vpn, show run bgp, show run mpls ldp, show run
interface).
Step 2
Step 3
View the local and remote label in the bridge-domain (show l2vpn bridge-domain detail) and compare
these labels with the abel binding in LSD (show mpls lsd forwarding labels). If the NLRI is not
received, follow the procedure in the L2VPN Discovery Not Working section on page 9-217. See the
example below.
Step 4
View the forwarding bridge-domain parameters (show l2vpn forwarding bridge-domain detail
location) to see which direction is experiencing a traffic loss. If you have PWs in the core, the PWs
should be in the bound state and traffic should be flowing in the bound PWs. See the example below.
Step 5
Display the MAC table for the bridge domain and verify that the MAC address has been learned. Notice
the bridge port (the same as the attachment circuit [AC]) from which the MAC address was learned, and
whether it was learned through a pseudowire (PW).
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-220
OL-23591-02
Chapter 9
Caution
Before you run this command without specifying a MAC address ID, take steps to limit the amount of
data that can be output on your terminal screen. Otherwise the amount of output could be extremely
large.
This command displays all the MAC addresses learned on a bridge domain. As a safety mechanism,
before you enter this command, set your terminal length, for example:
RP/0/RSP0/CPU0:router# term length 20
If you need the full display, direct the output to a file, for example:
RP/0/RSP0/CPU0:router# loc 0/6/cpu0 | file disk0:bdoutput.txt
One other approach to limit the output is to run the command with a pipe filter and CTRL-C after you
see the output you want.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain bridge-group:bridge-domain
mac-address detail location node-id [ | begin GigabitEthernet interface-id ]
Step 6
View the NP counters. Capture this output for both ingress and egress line cards. For a description of
how to interpret NP counter information, see the Displaying Traffic Status in Line Cards and RSP
Cards section on page 7-147.
RP/0/RSP0/CPU0:router# show controllers np counters all location
Step 7
Step 8
Step 9
If PWs are involved, be sure they are properly configured on both PEs. See the Troubleshooting
Point-to-Point Layer 2 Services section on page 9-206.
Step 10
Step 11
Step 12
Step 13
Step 14
Example
These commands allow you to view the local and remote labels in the bridge-domain and compare them
with the label binding in LSD.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain detail
Signaling protocol: LDP
AS Number: 1
VPLS-ID: 1:101
L2VPN Router ID: 10.10.10.10
PW: neighbor 192.0.2.20, PW ID 1:101, state is up ( established )
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-221
Chapter 9
Local
-----------------------------16005
10.10.10.10
10.10.10.10
10.10.10.10
1:101
0x0
bg1_bd1_vfi
1500
disabled
Ethernet
0x2
(LSP ping verification)
VCCV CC type 0x6
(router alert label)
(TTL expiry)
------------ ------------------------------
Remote
------------------------16006
192.0.2.20
192.0.2.20
192.0.2.20
1:101
0x0
bg1_bd1_vfi
1500
disabled
Ethernet
0x2
(LSP ping verification)
0x6
(router alert label)
(TTL expiry)
-------------------------
16005
Next Hop
Bytes
Switched
--------------- -----------\
point2point
214700000
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-222
OL-23591-02
Chapter 9
Statistics:
packets: received 0, sent 0
bytes: received 0, sent 0
Storm control drop counters:
packets: broadcast 0, multicast 0, unknown unicast 0
bytes: broadcast 0, multicast 0, unknown unicast 0
Dynamic arp inspection drop counters:
packets: 0, bytes: 0
IP source guard drop counters:
packets: 0, bytes: 0
.
.
.
RP/0/RSP0/CPU0:router# show controllers np counters all
Mon Nov 15 12:20:35.289 EST
Node: 0/0/CPU0:
---------------------------------------------------------------Show global stats counters for NP0, revision v3
Read 20 non-zero NP counters:
Offset Counter
FrameValue
Rate (pps)
------------------------------------------------------------------------------23 PARSE_FABRIC_RECEIVE_CNT
417
0
30 RESOLVE_INRESS_DROP_CNT
9
0
31 RESOLVE_EGRESS_DROP_CNT
6
0
53 MODIFY_FRAMES_PADDED_CNT
3230
0
67 PARSE_MOFRR_SWITCH_MSG_RCVD_FROM_FAB
920
0
70 RESOLVE_INGRESS_L2_PUNT_CNT
1081
0
71 RESOLVE_EGRESS_L3_PUNT_CNT
4613
0
74 RESOLVE_LEARN_FROM_NOTIFY_CNT
3484
0
75 RESOLVE_BD_FLUSH_DELETE_CNT
104
0
83 RESOLVE_MOFRR_HASH_UPDATE_CNT
463
0
87 RESOLVE_MOFRR_SWITCH_MSG_INGNORED
407
0
111 DIAGS
536
0
295 DROP_IPV4_NEXT_HOP_DOWN
15
0
.
.
.
The following command allows you to view the bridge domain forwarding data.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain location 0/6/CPU0
Thu Apr 15 00:15:29.581 EDT
Bridge
MAC
Bridge-Domain Name
ID
Ports addr
Flooding Learning State
-------------------------------- ------ ----- ------ -------- -------- --------bg1:bg1_bd1
0
3
4
Enabled Enabled UP
The following command allows you to view the bridge domain MAC details. The output from this
command can be very large, so you should limit the terminal screen output or send the data to a file.
RP/0/RSP0/CPU0:router# loc 0/6/cpu0 | file disk0:bdoutput.txt
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location 0/6/CPU0
Mac Address
Type
Learned from/Filtered on
LC learned Resync Age
Mapped to
-------------------------------------------------------------------------------0000.0001.0101 dynamic Gi0/6/0/1.1
0/6/CPU0
0d 0h 1m 59s
N/A
0000.0001.0102 dynamic Gi0/6/0/1.1
0/6/CPU0
0d 0h 1m 59s
N/A
0000.0002.0202 dynamic (192.0.2.20, 1:101)
0/6/CPU0
0d 0h 1m 59s
N/A
0000.0003.0303 dynamic (192.168.40.40, 1:101)
0/6/CPU0
0d 0h 1m 59s
N/A
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-223
Chapter 9
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Step 2
Step 3
Step 4
Step 5
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-224
OL-23591-02
Chapter 9
Step 6
Step 7
Step 8
bd-name-id detail
Step 2
Step 3
Ensure that the destination MAC entry is programmed for the LCs destination interface.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location
node-id
Step 2
Ensure that the hardware is programmed for both AC and PW (as applicable).
Step 3
Ensure that the destination MAC entry is programmed for the LCs destination interface.
RP/0/RSP0/CPU0:router# show l2vpn forwarding bridge-domain mac-address location node-id
Step 2
bd-name-id detail
Ensure that the hardware is programmed for both AC and PW (as applicable).
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-225
Chapter 9
Determine where the ping packets are being dropped, view the xconnect AC interface counters and the
L2VPN counters for the PW. For information on ping procedures, see the Troubleshooting Ping and
ARP Connectivity section on page 3-75.
Step 2
Step 3
Step 4
Step 5
Traffic Loss
Step 1
Determine where the packets are being dropped, view the xconnect AC interface counters and the
L2VPN counters for the PW. For information on ping procedures, see the Troubleshooting Ping and
ARP Connectivity section on page 3-75.
Step 2
Step 3
bd-name-id detail
View segment counters to see if the packet and byte switched count increased.
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface GigabitEthernet
location
Step 4
interface-id detail
node-id
Step 2
bd-name-id detail
View segment counters to see if the packet and byte switched count increased.
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface GigabitEthernet
location
Step 3
interface-id detail
node-id
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-226
OL-23591-02
Chapter 9
Step 2
Step 3
Step 4
interface-id detail
node-id
bd-name-id detail
Step 5
Step 6
node-id
Check all routers in the MPLS path to ensure the following are configured:
a.
b.
OSPF NSF
View the segment counters to see if the packet and byte switched count increased.
RP/0/RSP0/CPU0:router# show l2vpn forwarding interface GigabitEthernet node-id detail
location node-id
Step 2
bd-name-id detail
node-id
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-227
Chapter 9
Show Commands
The DHCP application runs on the RSP. It has several EXEC mode CLI show commands that present the
application's configuration state, DHCP client state, and DHCP packet statistics.
show dhcp ipv4 snoop statistics bridge-domain nameView detailed DHCP snoop Rx, Tx,
and drop packets for each message type in a bridge domain.
Trace Commands
The DHCP application has over 1200 Trace logs. The Trace logs record significant events that occur in
the application. Trace logs that are associated with a specific DHCP client will contain the client MAC
address.
error traces.
event traces.
Syslog Commands
The DHCP application has over 1600 syslog logs. These logs record events that occur in the application.
error logs.
event logs.
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-228
OL-23591-02
Chapter 9
Tech-support Commands
The DHCP application has four tech-support commands that call groups of DHCP CLI commands. Use
tech-support commands for information about the DHCP application for debugging.
filename
bridge-domain-id file
Action Commands
Use the following CLI commands to clear DHCP snoop binding states:
L2VPN Commands
DHCP snoop is enabled on L2VPN ACs by attaching a DHCP snoop profile to a bridge domain or AC.
The DHCP snoop trusted attribute is configured on an AC according to the value of the trusted attribute
in the DHCP snoop profile. L2VPN CLI commands are used to display the status of DHCP snoop
attributes on L2VPN bridge domains and ACs.
show l2vpn bridge-domain bd-name bridgename detailView the L2VPN DHCP snoop
configuration for the specified bridge domain.
show l2vpn forwarding interface interface detail location locationView the L2VPN
DHCP snoop configuration for a specific interface.
L2Snoop Commands
L2Snoop receives and transmits DHCP snoop packets between NETIO and the DHCP snoop application
on the RSP.
show l2snoop statistics pcb allView
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-229
Chapter 9
MSTAG Access Network Does Not Recognize MSTAG Node as Root, page 9-231
Configuration name
Bridge revision
Provider-bridge mode
Run the following command to check that the configuration is consistent across multiple devices.
RP/0/RSP0/CPU0:router# show spanning-tree mst protocol-instance-id configuration
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-230
OL-23591-02
Chapter 9
Look for topology change notifications. Run the following command and look for TC 1:
Note
Shut down redundant links, remove MSTP configuration, and ensure that basic bridging works.
RP/0/RSP0/CPU0:router# show spanning-tree mst name
RP/0/RSP0/CPU0:router# show interface interface-name
Step 2
Check the state of each port as calculated by MSTP, and compare it with packet transmit and receive
counts on ports and Ethernet flow points (EFPs) that are controlled by MSTP. Normal data packets
should be sent/received only on ports that are in forwarding (FWD) state. In steady state operation,
BPDUs are sent if there is at least one MSTI that is in Designated role.
Step 3
Ensure that BPDUs are flowing and that root bridge selection is correct. Check those related scenarios
first.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain [detail]
This command will show the status of members of the bridge domain. Ensure that the relevant bridge
domain members are up.
Step 4
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
OL-23591-02
9-231
Chapter 9
Step 1
To view the BPDUs being sent by MSTAG, run the following command.
RP/0/RSP0/CPU0:router# show spanning-tree mstag protocol-instance-id bpdu interface
interface-name
Advertise as though both nodes are separaterequires each node have a unique bridge id and the
configurations complement each other.
Advertise as though each node is a different port on the same nodeconfiguration is identical
except for the port id.
Commands for MSTAG must target the untagged EFP instead of the base interface. Perform the
following steps to verify your configuration and debug MSTAG.
Step 2
Collect L2VPN and UIDB data to verify the data path is healthy.
RP/0/RSP0/CPU0:router# show l2vpn bridge-domain [detail]
Step 2
Ensure that the forwarding state is set as it was programmed in the hardware.
Cisco ASR 9000 Series Aggregation Services Router L2VPN and Ethernet Services Command
Reference
Cisco ASR 9000 Series Aggregation Services Router L2VPN and Ethernet Services Configuration
Guide
Use the following guide when you configure routing. L2VPN services rely on Layer 3 connectivity from
the provider edge (PE) through the core:
Cisco ASR 9000 Series Aggregation Services Router Routing Configuration Guide, Release 4.0
Cisco IOS XR Troubleshooting Guide for the Cisco ASR 9000 Aggregation Services Router
9-232
OL-23591-02