Best Practice 6500
Best Practice 6500
Best Practice 6500
This document is a quick reference to the best practices that have been developed by Cisco for the features in Cisco IOS software on the Catalyst 6500 Series Switches. This document supplements, but does not replace, IOS software documentation.
Note
Best Practice recommendations in this document have been tested and verified in Cisco's Data Center Test Lab (DCTL) at RTP, NC. This document consists of feature-specific sections that follow a consistent pattern, making the type of information in each subsection easily recognizable. Best practices do not need to be implemented simultaneously, but sections are cross referenced to related best practices, making it easier to implement all related best practices at the same time. To use this document, you should be familiar with the following:
The Cisco IOS Software user interfaceFor more information, see the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2:
http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/ffun_c.html
The Cisco IOS software features in Release 12.2SXFor more information, see the release notes.
For Release 12.2(18)SXF and rebuilds: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/release/notes/OL_4164.html For Release 12.2(33)SXH and rebuilds: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/ol_14271.html
Note
When deploying new hardware, enter the diagnostic start system test all command (available in Release 12.2(33)SXH and later) to run the Generic Online Diagnostics (GOLD) on-demand tests before putting the hardware into service. With earlier releases, run the test individually. Before you RMA hardware, use the Generic Online Diagnostics (GOLD) on-demand tests to confirm that a problem exists.
Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
1. Best Practices for Layer 2 Features, page 3 2. Best Practices for Health Monitoring, page 39 3. Best Practices for Switch Management, page 51 4. Best Practices for Multicast, page 69 5. Best Practices for Denial of Service (DoS) Protection and Security, page 76 6. Best Practices for Virtual Switching System (VSS), page 97
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
1.1 Best Practices for the Rapid Per-VLAN Spanning Tree Protocol (RPVST), page 3 1.2 Best Practices for STP PortFast, page 5 1.3 Best Practices for STP BPDU Guard, page 7 1.4 Best Practices for STP EtherChannel Guard, page 9 1.5 Best Practices for STP Root Guard, page 10 1.6 Best Practices for STP Loop Guard, page 12 1.7 Best Practices for Extended System ID, page 13 1.8 Best Practices for UniDirectional Link Detection (UDLD), page 15 1.9 Best Practices for Autonegotiation and Link Negotiation, page 17 1.10 Best Practices for Flow Control, page 19 1.11 Best Practices for EtherChannel, page 20 1.12 Best Practices for VLAN Trunking Protocol (VTP), page 24 1.13 Best Practices for Dynamic Trunking Protocol (DTP), page 28 1.14 Best Practices for Traffic Storm Control, page 31 1.15 Best Practices for Unknown Unicast Flood Blocking (UUFB), page 33 1.16 Best Practices for the Port Debounce Timer, page 35 1.17 Best Practices for MAC Address Aging, page 37
1.1 Best Practices for the Rapid Per-VLAN Spanning Tree Protocol (RPVST)
These sections describe best practices for RPVST:
1.1.1 Description of RPVST 1.1.2 Benefits of the RPVST Best Practices 1.1.3 Features Incompatible with RPVST 1.1.4 Guidelines and Restrictions for RPVST 1.1.5 Recommended RPVST Configuration 1.1.6 Documentation for RPVST 1.1.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
UplinkFast BackboneFast
Use the default RPVST timer values. Create and maintain a Layer 2 topology diagram of your network. Observe these limitations on the number of spanning tree and logical interface instances:
For Release 12.2(18)SXF and rebuilds and earlier releases:
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/release/notes/OL _4164.html#Spanning_Tree_Troubleshooting
For Release 12.2(33)SXH and later releases:
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/release/notes/ol_14271.ht ml#Spanning_Tree_Troubleshooting
Plan the Layer 2 topology of your network and configure the root bridge port of each VLAN. Use the procedures in the Configuring the Root Bridge section of the customer documentation and the Configuring a Secondary Root Bridge section.
Note
Do not rely on the default spanning tree that RPVST creates. For reliable operation, you must select and configure the root bridge ports.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
Note
If the link is full duplex, there is no need to enter this command as software will detect it.
1.2 Best Practices for STP PortFast, page 5 1.3 Best Practices for STP BPDU Guard, page 7 1.4 Best Practices for STP EtherChannel Guard, page 9 1.5 Best Practices for STP Root Guard, page 10 1.6 Best Practices for STP Loop Guard, page 12 1.8 Best Practices for UniDirectional Link Detection (UDLD), page 15
1.2.1 Description of STP PortFast 1.2.2 Benefits of the STP PortFast Best Practices 1.2.3 Features Incompatible with STP PortFast 1.2.4 Guidelines and Restrictions for STP PortFast 1.2.5 Recommended STP PortFast Configuration 1.2.6 Documentation for STP PortFast
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
Configure STP PortFast only on ports that are connected to end host devices that terminate VLANs and from which the port should never receive STP BPDUs, such as:
Workstations Servers Ports on routers that are not configured to support bridging
Configure STP BPDU Guard along with STP PortFast to shut down STP PortFast-enabled ports if they receive a BPDU.
On any access port that connects to a device that terminates VLANs (for example, a port that connects to an end station), enable STP PortFast:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
On any access port that connects to a device that propagates VLANs (for example, a port that connects to another switch or a port that connects to a router that is configured to support bridging), disable STP PortFast:
Router(config-if)# spanning-tree portfast disable
On any trunk port that connects to a device that terminates VLANs (for example, a port that connects to an end station), enable STP PortFast:
Router(config-if)# spanning-tree portfast trunk
On any trunk port that connects to a device that propagates VLANs (for example, a port that connects to another switch or a port that connects to a router that is configured to support bridging), disable STP PortFast:
Router(config-if)# no spanning-tree portfast enable
1.3.1 Description of STP BPDU Guard 1.3.2 Benefits of the STP BPDU Guard Best Practices 1.3.3 Features Incompatible with STP BPDU Guard 1.3.4 Guidelines and Restrictions for STP BPDU Guard 1.3.5 Recommended STP BPDU Guard Configuration
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
1.3.6 Documentation for STP BPDU Guard 1.3.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
1.4.1 Description of STP EtherChannel Guard 1.4.2 Benefits of the STP EtherChannel Guard Best Practices 1.4.3 Features Incompatible with STP EtherChannel Guard 1.4.4 Guidelines and Restrictions for STP EtherChannel Guard 1.4.5 Recommended STP EtherChannel Guard Configuration 1.4.6 Documentation for STP EtherChannel Guard 1.4.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
1.5.1 Description of STP Root Guard 1.5.2 Benefits of the STP Root Guard Best Practices 1.5.3 Features Incompatible with STP Root Guard 1.5.4 Guidelines and Restrictions for STP Root Guard 1.5.5 Recommended STP Root Guard Configuration 1.5.6 Documentation for STP Root Guard 1.5.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
10
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
11
1.6.1 Description of STP Loop Guard 1.6.2 Benefits of the STP Loop Guard Best Practices 1.6.3 Features Incompatible with STP Loop Guard 1.6.4 Guidelines and Restrictions for STP Loop Guard 1.6.5 Recommended STP Loop Guard Configuration 1.6.6 Documentation for STP Loop Guard 1.6.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
12
1.7.1 Description of Extended System ID 1.7.2 Benefits of the Extended System ID Best Practices 1.7.3 Features Incompatible with Extended System ID 1.7.4 Guidelines and Restrictions for Extended System ID 1.7.5 Recommended Extended System ID Configuration 1.7.6 Documentation for Extended System ID 1.7.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
13
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
14
1.8.1 Description of UDLD 1.8.2 Benefits of the UDLD Best Practices 1.8.3 Features Incompatible with UDLD 1.8.4 Guidelines and Restrictions for UDLD 1.8.5 Recommended UDLD Configuration 1.8.6 Documentation for UDLD 1.8.7 Related Features and Best Practices
Spanning tree topology loops caused by unidirectional links Incorrect cabling of unbundled fiber strands Transceiver or link hardware malfunction Incorrect or excessive flooding of packets Loss of traffic without notice (also know as black holing)
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
15
UDLD can only detect unidirectional links when UDLD is enabled on both ends of a link. The UDLD best practices in this document assume that the hello, forward-delay, and maximum aging STP timers are configured with their default values. Use UDLD with autonegotiation or link negotiation correctly configured on the link. On 802.1Q trunks, UDLD requires that the Native VLAN be correctly configured and that the VLAN be defined and active. There is no requirement for it to carry any traffic.
Note
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
16
1.9 Best Practices for Autonegotiation and Link Negotiation, page 17 1.6 Best Practices for STP Loop Guard, page 12
1.9.1 Description of Autonegotiation and Link Negotiation 1.9.2 Benefits of the Autonegotiation and Link Negotiation Best Practices 1.9.3 Features Incompatible with Autonegotiation and Link Negotiation 1.9.4 Guidelines and Restrictions for Autonegotiation and Link Negotiation 1.9.5 Recommended Autonegotiation and Link Negotiation Configuration 1.9.6 Documentation for Autonegotiation and Link Negotiation 1.9.7 Related Features and Best Practices
Gigabit and 10-Gigabit Ethernet are full duplex only. You cannot change the duplex mode on Gigabit or 10-Gigabit Ethernet ports or on a 10/100/1000-Mps port configured for Gigabit Ethernet. If you set the port speed to auto on a 10/100-Mbps or a 10/100/1000-Mbps Ethernet port, both speed and duplex are autonegotiated. You cannot change the duplex mode of autonegotiation ports. Link negotiation is supported on Gigabit and 10-Gigabit Ethernet ports and does not negotiate port speed.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
17
On 10/100-Mbps and 10/100/1000-Mbps Ethernet ports, autonegotiation is enabled by default. If it has been disabled, revert to the default configuration:
Router(config-if)# speed auto
On Gigabit Ethernet and 10 Gigabit Ethernet ports, link negotiation is enabled by default. If it has been disabled, revert to the default configuration:
Router(config-if)# no speed nonegotiate
On ports that are connected to devices that do not support autonegotiation or link negotiation:
Enable aggressive mode UDLD. See the procedures in the configuration guide to manually configure the port speed and duplex mode as appropriate to support the far-end device.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
18
1.10.1 Description of Flow Control 1.10.2 Benefits of the Flow Control Best Practices 1.10.3 Features Incompatible with Flow Control 1.10.4 Guidelines and Restrictions for Flow Control 1.10.5 Recommended Flow Control Configuration 1.10.6 Documentation for Flow Control 1.10.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
19
If you know that the device is capable of negotiating flow control, enter this command:
Router(config-if)# flowcontrol receive
On a Gigabit Ethernet port, if you do not know that the device is capable of negotiating flow control, enter this command:
Router(config-if)# flowcontrol receive desired
1.11.1 Description of EtherChannel 1.11.2 Benefits of the EtherChannel Best Practices 1.11.3 Features Incompatible with EtherChannel 1.11.4 Guidelines and Restrictions for EtherChannel 1.11.5 Recommended EtherChannel Configuration 1.11.6 Documentation for EtherChannel 1.11.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
20
EtherChannels fall into the following non-exclusive categories, determined by the ports used to form the EtherChannel:
Layer 2 EtherChannelAll member ports are configured with the switchport command. A
port-channel interface is configured with a Layer 3 address. A Layer 3 EtherChannel can be either a single-VLAN link or a Layer 3 trunk link with subinterfaces configured on the port-channel interface.
Single-module EtherChannelAll member ports are on the same switching module. Multi-module EtherChannelThe member ports are on more than one switching module. Non-distributed EtherChannelAll member ports are served by the PFC or by the same DFC. Distributed EtherChannel (DEC)The member ports are served by the PFC and one or more
DFCs or by multiple DFCs. On switching modules with dual switch-fabric connections, a DEC can also be a single-module EtherChannel. Search the release notes for Dual switch-fabric connections.
If you have service modules installed, see this Field Notice: http://www.cisco.com/en/US/ts/fn/610/fn61935.html The commands in this section can be used on all LAN ports in Catalyst 6500 series switches, including the ports on the supervisor engine and a redundant supervisor engine. Release 12.2(17b)SXA and later releases provide support for more than 1 Gbps of traffic per EtherChannel on the WS-X6548-GE-TX and WS-X6548V-GE-TX switching modules. With Release 12.2(17a)SX and Release 12.2(17a)SX1, the WS-X6548-GE-TX and WS-X6548V-GE-TX fabric-enabled switching modules do not support more than 1 Gbps of traffic per EtherChannel.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
21
The WS-X6148-GE-TX and WS-X6148V-GE-TX switching modules do not support more than 1 Gbps of traffic per EtherChannel. When you add a member port that does not support ISL trunking to an EtherChannel, Cisco IOS software automatically adds a switchport trunk encapsulation dot1q command to the port-channel interface to prevent configuration of the EtherChannel as an ISL trunk. The switchport trunk encapsulation dot1q command is inactive when the EtherChannel is not a trunk. All Ethernet LAN ports on all modules, including those on a redundant supervisor engine, support EtherChannels (maximum of eight LAN ports) with no requirement that the LAN ports be physically contiguous or on the same module. Configure all LAN ports in an EtherChannel to use the same EtherChannel protocol; you cannot run two EtherChannel protocols in one EtherChannel. Configure all LAN ports in an EtherChannel to operate at the same speed and in the same duplex mode. LACP does not support half-duplex. Half-duplex ports in an LACP EtherChannel are put in the suspended state. Enter no shutdown commands for all the LAN ports in an EtherChannel. If you shut down a LAN port in an EtherChannel, it is treated as a link failure and its traffic is transferred to one of the remaining ports in the EtherChannel. An EtherChannel will not form if one of the LAN ports is a Switched Port Analyzer (SPAN) destination port. For Layer 3 EtherChannels, assign Layer 3 addresses to the port channel logical interface, not to the LAN ports in the channel. For Layer 2 EtherChannels:
Assign all LAN ports in the EtherChannel to the same VLAN or configure them as trunks. If you configure an EtherChannel from trunking LAN ports, verify that the trunking mode is the
same on all the trunks. LAN ports in an EtherChannel with different trunk modes can operate unpredictably.
An EtherChannel supports the same allowed range of VLANs on all the LAN ports in a trunking
Layer 2 EtherChannel. If the allowed range of VLANs is not the same, the LAN ports do not form an EtherChannel.
LAN ports with different STP port path costs can form an EtherChannel as long they are
compatibly configured with each other. If you set different STP port path costs, the LAN ports are not incompatible for the formation of an EtherChannel.
An EtherChannel will not form if protocol filtering is set differently on the LAN ports.
After you configure an EtherChannel, the configuration that you apply to the port channel interface affects the EtherChannel. The configuration that you apply to the LAN ports affects only the LAN port where you apply the configuration. When QoS is enabled, enter the no mls qos channel-consistency port-channel interface command to support EtherChannels that have ports with different QoS characteristics. Enable QOS after configuring EtherChannel to avoid channels from breaking when QOS gets enabled.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
22
Caution
Serious traffic problems can result from mixing manual mode with PAgP or LACP modes, or with a port with no EtherChannel configured. For example, if a port configured in on mode is connected to another port configured in desirable mode, or to a port not configured for EtherChannel, a bridge loop is created and a broadcast storm can occur. If one end uses the on mode, the other end must also.
Note
The sequence of commands to configure a Layer 3 EtherChannel is different than the sequence for a Layer 2 EtherChannel. The following sections describe the recommended EtherChannel configuration, but see the Configuring EtherChannels section of the customer documentation for the complete sequence of commands.
Note
With WS-X6716-10GE or WS-X6708-10GE switching modules, MAC address synchronization is enabled by default.
Configure MAC address aging to be at least three times as long as the activity time of MAC address synchronization. For example:
Router(config)# mac-address-table aging-time 480
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
23
Note
mac-address-table aging-time 480 is done by default (per CSCsm96610 in SXH2), if synchronization is enabled
Note
Switches that handle asymmetric routing traffic have different MAC address aging requirements (see the 1.17 Best Practices for MAC Address Aging section on page 37).
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
24
1.12.2 Benefits of the VTP Best Practices 1.12.3 Features Incompatible with VTP 1.12.4 Guidelines and Restrictions for VTP 1.12.5 Recommended VTP Configuration 1.12.6 Documentation for VTP 1.12.7 Related Features and Best Practices
Server (default)Allows configuration of VLANs and propagates those configuration changes. Propagates received configuration changes. Accepts configuration changes from other switches configured as VTP servers. Client (must be used with some switches configured as VTP servers)Does not allow configuration of VLANs. Propagates received configuration changes. Accepts configuration changes from switches configured as VTP servers. TransparentAllows configuration of VLANs but does not propagate those configuration changes. Propagates received configuration changes. Ignores configuration changes from switches configured as VTP servers. Off (Release 12.2(33)SXH and later releases) Allows configuration of VLANs but does not propagate those configuration changes. Does not propagate received configuration changes. Ignores configuration changes from switches configured as VTP servers.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
25
When you configure switches as VTP servers and clients, all the servers and client in a VTP domain accept a propagated VLAN database that has a revision number higher than the current database. This capability provides easy configurability when it is used correctly, but the possibility of serious network problems exists if unintentional changes occur because a VTP client or server switch with a database that has a higher revision number than the current database is introduced into the VTP domain, in which case the VLAN database of the new switch overwrites the current VLAN database. Adoption of a new VLAN database might delete VLANs and cause a outage in the network. To ensure that client or server switches always have a configuration revision number that is lower than that of the server, change the client VTP domain name to something other than the standard name, and then revert back to the standard. This action sets the configuration revision on the client to 0.
Prune VLANs from switches where the VLANs are not used.
In VTP server or client mode, you can enter the vtp pruning command to automatically prune
VTPv1 and VTPv2 do not propagate configuration information for extended-range VLANs (VLAN numbers 1006 to 4094). You must configure extended-range VLANs manually on each network device. In VTP server or client mode, the VLAN database is saved in the vlan.dat file. In VTP transparent mode, the VLAN database is saved in the running-config file and the vlan.dat file. Supervisor engine redundancy does not support nondefault VLAN data file names or locations. Do not enter the vtp file file_name command on a switch that has a redundant supervisor engine. Before installing a redundant supervisor engine, enter the no vtp file command to return to the default configuration. All network devices in a VTP domain must run the same VTP version. If you configure a VTP password on one switch, the management domain will not function properly if you do not assign a management domain password to each network device in the domain. A VTP version 2-capable network device can operate in the same VTP domain as a network device running VTP version 1 provided VTP version 2 is disabled on the VTP version 2-capable network device (VTP version 2 is disabled by default). Do not enable VTP version 2 on a network device unless all of the network devices in the same VTP domain are version 2-capable. When you enable VTP version 2 on a network device, all of the version 2-capable network devices in the domain enable VTP version 2. In a Token Ring environment, you must enable VTP version 2 for Token Ring VLAN switching to function properly. When you enable or disable VTP pruning on a VTP server, VTP pruning for the entire management domain is enabled or disabled. If there is insufficient DRAM available for use by VTP, or if there is an NVRAM error in writing or reading data from vlan.dat file, the VTP mode changes to transparent. Network devices in VTP transparent mode do not send VTP Join messages. On Catalyst 6500 series switches with trunk connections to network devices in VTP transparent mode, configure the VLANs that are used by the transparent-mode network devices or that need to be carried across trunks as pruning ineligible. For information about configuring prune eligibility, see the Configuring the List of Prune-Eligible VLANs section of the customer documentation. Manual pruning is preferable to automatic pruning except in MST environments.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
26
Configure a VTP domain name, or ensure that no domain name is entered on any switch:
Router(config)# vtp domain domain_name
Note
The Dynamic Trunking Protocol (DTP) functions only between switches that have the same VTP domain name.
VTP Mode
Decide if your switches are going to operate in VTP transparent mode or in server and client modes.
VTP server mode is the default and does not require any configuration. To configure VTP client mode:
Router(config)# vtp mode client
Decide if VTPv2 is required. To configure VTPv2, enter this command on a VTP server:
Router(config)# vtp version 2
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
27
1.13.1 Description of DTP 1.13.2 Benefits of the DTP Best Practices 1.13.3 Features Incompatible with DTP 1.13.4 Guidelines and Restrictions for DTP 1.13.5 Recommended DTP Configuration 1.13.6 Documentation for DTP 1.13.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
28
The following configuration guidelines and restrictions apply when using 802.1Q trunks and impose some limitations on the trunking strategy for a network. Note these restrictions when using 802.1Q trunks:
When connecting Cisco switches through an 802.1q trunk, make sure the native VLAN for an
802.1Q trunk is the same on both ends of the trunk link. If the native VLAN on one end of the trunk is different from the native VLAN on the other end, spanning tree loops might result.
Disabling spanning tree on the native VLAN of an 802.1Q trunk without disabling spanning tree
on every VLAN in the network can cause spanning tree loops. We recommend that you leave spanning tree enabled on the native VLAN of an 802.1Q trunk. If this is not possible, disable spanning tree on every VLAN in the network. Make sure your network is free of physical loops before disabling spanning tree.
When you connect two Cisco switches through 802.1Q trunks, the switches exchange spanning
tree BPDUs on each VLAN allowed on the trunks. The BPDUs on the native VLAN of the trunk are sent untagged to the reserved IEEE 802.1d spanning tree multicast MAC address (01-80-C2-00-00-00). The BPDUs on all other VLANs on the trunk are sent tagged to the reserved Cisco Shared Spanning Tree (SSTP) multicast MAC address (01-00-0c-cc-cc-cd).
Non-Cisco 802.1Q switches maintain only a single instance of spanning tree that defines the
spanning tree topology for all VLANs. When you connect a Cisco switch to a non-Cisco switch through an 802.1Q trunk, the MST of the non-Cisco switch and the native VLAN spanning tree of the Cisco switch combine to form a single spanning tree topology known as the Common Spanning Tree (CST).
Because Cisco switches transmit BPDUs to the SSTP multicast MAC address on VLANs other
than the native VLAN of the trunk, non-Cisco switches do not recognize these frames as BPDUs and flood them on all ports in the corresponding VLAN. Other Cisco switches connected to the non-Cisco 802.1q cloud receive these flooded BPDUs. This allows Cisco switches to maintain a per-VLAN spanning tree topology across a cloud of non-Cisco 802.1Q switches. The non-Cisco 802.1Q cloud separating the Cisco switches is treated as a single broadcast segment between all switches connected to the non-Cisco 802.1q cloud through 802.1q trunks.
Make certain that the native VLAN is the same on all of the 802.1q trunks connecting the Cisco
connections must be through 802.1q trunks. You cannot connect Cisco switches to a non-Cisco 802.1q cloud through ISL trunks or through access ports. Doing so causes the switch to place the ISL trunk port or access port into the spanning tree port inconsistent state and no traffic will pass through the port.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
29
Use the default port configuration, switchport mode dynamic desirable, which will negotiate to become a trunk if the far-end port is capable and compatibly configured. Configure trunks to use DTP and 802.1Q encapsulation:
Router(config-if)# switchport Router(config-if)# switchport trunk encapsulation dot1q
Configure the access VLAN, which is the VLAN that is used if the port stops trunking:
Router(config-if)# switchport access vlan access_vlan_ID
Configure the native VLAN, which is the VLAN that is used to carry untagged traffic:
Router(config-if)# switchport trunk native vlan native_vlan_ID
Note
On 802.1Q trunks, UDLD requires that the Native VLAN be correctly configured and that the VLAN be defined and active. There is no requirement for it to carry any traffic.
VLAN 1 is the default VLAN for many features. To avoid the unintentional propagation of VLAN 1 traffic in cases where, incorrectly, another VLAN has not been configured, remove VLAN 1 from any trunk that does not need to carry it:
Router(config-if)# switchport trunk allowed vlan remove vlan 1
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
30
1.14.1 Description of Traffic Storm Control 1.14.2 Benefits of the Traffic Storm Control Best Practices 1.14.3 Features Incompatible with Traffic Storm Control 1.14.4 Guidelines and Restrictions for Traffic Storm Control 1.14.5 Recommended Traffic Storm Control Configuration 1.14.6 Documentation for Traffic Storm Control 1.14.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
31
The switch supports multicast and unicast traffic storm control on Gigabit and 10 Gigabit Ethernet LAN ports. Most FastEthernet switching modules do not support multicast and unicast traffic storm control, with the exception of WS-X6148A-RJ-45 and the WS-X6148-SFP. The switch supports broadcast traffic storm control on all LAN ports except on those modules previously noted. Except for BPDUs, traffic storm control does not differentiate between control traffic and data traffic. When multicast suppression is enabled, traffic storm control suppresses BPDUs when the multicast suppression threshold is exceeded on these modules:
WS-X6748-SFP WS-X6724-SFP WS-X6748-GE-TX WS-X6748-GE-TX WS-X6704-10GE WS-SUP32-GE-3B WS-SUP32-10GE-3B
When multicast suppression is enabled on the listed modules, do not configure traffic storm control on STP-protected ports that need to receive BPDUs. Except on the listed modules, traffic storm control does not suppress BPDUs.
Note
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
32
1.15.1 Description of UUFB 1.15.2 Benefits of the UUFB Best Practices 1.15.3 Features Incompatible with UUFB 1.15.4 Guidelines and Restrictions for UUFB 1.15.5 Recommended UUFB Configuration 1.15.6 Documentation for UUFB 1.15.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
33
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
34
1.16.1 Description of the Port Debounce Timer 1.16.2 Benefits of the Port Debounce Timer Best Practices 1.16.3 Features Incompatible with the Port Debounce Timer 1.16.4 Guidelines and Restrictions for the Port Debounce Timer 1.16.5 Recommended the Port Debounce Timer Configuration 1.16.6 Documentation for the Port Debounce Timer 1.16.7 Related Features and Best Practices
The show interfaces debounce command does not display the default value for 10-GigabitEthernet ports when the port debounce timer is disabled. Implement the port debounce timer with these default values:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
35
Port Type Ports operating at 10 Mbps or 100 Mbps Ports operating at 1000 Mbps or 10 Gbps over copper media Ports operating at 1000 Mbps or 10 Gbps over fiber media except WS-X6502-10GE WS-X6502-10GE 10-Gigabit ports
Debounce Timer Disabled Debounce Timer Enabled 300 milliseconds 300 milliseconds 10 milliseconds 1000 milliseconds 3100 milliseconds 3100 milliseconds 100 milliseconds 3100 milliseconds
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
36
1.17.1 Description of MAC Address Aging 1.17.2 Benefits of the MAC Address Aging Best Practices 1.17.3 Features Incompatible with MAC Address Aging 1.17.4 Guidelines and Restrictions for MAC Address Aging 1.17.5 Recommended MAC Address Aging Configuration 1.17.6 Documentation for MAC Address Aging 1.17.7 Related Features and Best Practices
Note
For switches that do not handle asymmetric routing traffic, see the EtherChannel 1.11.5.1 Recommended Global Configuration section on page 23 for distributed EtherChannel (DEC) MAC address aging recommendations.
The ARP timeout is separately configurable on each interface, but is seldom changed from the default value. Verify that no ARP timeout commands have been configured. If the default ARP timeout is configured, this command will have no output:
Router# show running-config | include arp timeout
On any interface where a non-default ARP timeout is configured, enter the no arp timeout interface command to revert to the default value. MAC address aging is globally configurable and also separately configurable on each VLAN. To configure MAC address aging time:
Router(config)# mac-address-table aging-time 14400 [vlan vlan_id]
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
37
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
38
When you are deploying new hardware, enter the diagnostic start system test all command to run the Generic Online Diagnostics (GOLD) on-demand tests before you put the hardware into service. Before you RMA hardware, use the Generic Online Diagnostics (GOLD) on-demand tests to confirm that there is a problem. Use the show diagnostic events command to monitor any intermittent failures.
2.1 Best Practices for GOLD Bootup Online Diagnostics Level, page 39 2.2 Best Practices for GOLD Health-Monitoring Tests, page 41 2.3 Best Practices for Verifying the System Configuration, page 42 2.4 Best Practices for GOLD Tcl Script Template, page 45 2.5 Best Practices for Smart Call Home, page 47 2.6 Best Practices for Monitoring System Resource Usage, page 48 2.7 Best Practices for Error Counter Monitoring, page 49
2.1.1 Description of the GOLD Bootup Online Diagnostics Level 2.1.2 Benefits of the GOLD Bootup Online Diagnostics Level Best Practices 2.1.3 Features Incompatible with GOLD Bootup Online Diagnostics Level 2.1.4 Guidelines and Restrictions for the GOLD Bootup Online Diagnostics Level 2.1.5 Recommended GOLD Bootup Online Diagnostics Level Configuration 2.1.6 Documentation for the GOLD Bootup Online Diagnostics Level 2.1.7 Related Features and Best Practices
OffNo test are run. MinimalRuns the EARL tests and the loopback tests for all ports. CompleteRuns all tests.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
39
2.1.2 Benefits of the GOLD Bootup Online Diagnostics Level Best Practices
If the added boot time is acceptable, configure the complete bootup diagnostics level to provide the most complete verification of the switch. In all cases, boot the switch with the complete bootup diagnostics level configured at least once to verify the hardware; if possible, boot the switch periodically with the complete bootup diagnostics level configured to reverify the hardware.
2.1.4 Guidelines and Restrictions for the GOLD Bootup Online Diagnostics Level
With the complete bootup diagnostics level configured, the bootup time for each module will increase by about 10 seconds compared to the default minimal level. If switch bootup time must be as short as possible, you might not be able to implement this best practice.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
40
2.2.1 Description of the GOLD Health-Monitoring Tests 2.2.2 Benefits of the Health-Monitoring Tests Best Practices 2.2.3 Features Incompatible with the GOLD Health-Monitoring Tests 2.2.4 Guidelines and Restrictions for the GOLD Health-Monitoring Tests 2.2.5 Recommended GOLD Health-Monitoring Tests Configuration 2.2.6 Documentation for the GOLD Health-Monitoring Tests 2.2.7 Related Features and Best Practices
Use the default enabled state of the GOLD health-monitoring tests. Set the TestSPRPInbandPing test interval to 5 seconds:
Router(config)# diagnostic monitor interval module supervisor_engine_slot test TestSPRPInbandPing 00:00:05 0 0
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
41
For more information, see either the Release 12.2(18)SXF and rebuilds or the Release 12.2(33)SXH and rebuilds Online Diagnostic Tests appendix.
If the test is applicable to the traffic on the module, enter the following commands to run the
Note
With Release 12.2(33)SXH and later releases, you do not need to enter the 00:00:15 0 0 interval values.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
42
2.3.2 Benefits of the Verifying the System Configuration Best Practices 2.3.3 Features Incompatible with Verifying the System Configuration 2.3.4 Guidelines and Restrictions for Verifying the System Configuration 2.3.5 Recommended Verifying the System Configuration Procedure 2.3.6 Documentation for Verifying the System Configuration 2.3.7 Related Features and Best Practices
If the switch can ping the gateway of last resort (shown in the command output as the default gateway). The command tests connectivity to either a default gateway or through a routed path. UDLD statusDisplays:
Whether or not UDLD is globally enabled. Per-port UDLD status.
If the maximum aging time is other than the default. If the forward delay time is other than the default. If the hello time is other than the default.
For non-root bridge ports (shown as the bridge):
If the maximum aging time is other than the default. If the forward delay time is other than the default. If the hello time is other than the default.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
43
Spanning tree protocol status for portsDisplays information for ports that have:
A nondefault STP port priority. A nondefault STP port cost. PortFast enabled. PortFast BPDU Filtering enabled.
Note
If the configuration register is set to any value other than 0x2, 0x102, 0x2102. If the boot string is empty or if any of the images listed are invalid or absent. If IGMP snooping is disabled. If IGMP snooping is disabled but RGMP is enabled. If multicast is enabled globally but disabled on an interface. If SNMP is enabled, if the SNMP access strings [RW,RO] have been left at the default values.
Note
Leaving the SNMP access strings at the default values is a security risk.
Which ports have flowcontrol receive disabled. Which ports have a native VLAN mismatch. Which ports have a duplex mismatch. Which ports have negotiated half-duplex links. Which ports are in the inline power denied or faulty state. Which diagnostic tests failed on bootup. If the bootflash is correctly formatted and has enough space to hold a crashinfo file.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
44
Note
Release 12.2(33)SXH and later releases support embedded event manager (EEM) Tcl scripting for GOLD. These sections describe best practices for the GOLD Tcl script template:
2.4.1 Description of GOLD Tcl Script Template 2.4.2 Benefits of the GOLD Tcl Script Template Best Practices 2.4.3 Features Incompatible with the GOLD Tcl Script Template 2.4.4 Guidelines and Restrictions for the GOLD Tcl Script Template 2.4.5 Recommended GOLD Tcl Script Template Configuration 2.4.6 Documentation for GOLD Tcl Script Template 2.4.7 Related Features and Best Practices
TestAsicSync TestFabricHealth TestFabricCh0Health TestFabricCh1Health TestSynchedFabChannel TestIntPortLoopback TestMacNotification TestNonDisruptiveLoopback TestPortTxMonitoring TestScratchRegister TestSPRPInbandPing TestUnusedPortLoopback
::cisco::eem::event_register_gold card all testing_type monitoring \ test_name name_of_test \ consecutive_failure number_of_failures \ platform_action 0 queue_priority last namespace import ::cisco::eem::* namespace import ::cisco::lib::*
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
45
if [catch {cli_exec $cli1(fd) \ "diagnostic action mod $card test name_of_test default"} result] { error $result $errorInfo } else { set cmd_output $result } if [catch {cli_close $cli1(fd) $cli1(tty_id)} result] { error $result $errorInfo }
2.4.4 Guidelines and Restrictions for the GOLD Tcl Script Template
None.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
46
Note
Release 12.2(33)SXH and later releases support Call Home and Smart Call Home. Smart Call Home requires a Cisco Systems SMARTnet service contract. These sections describe best practices for Smart Call Home:
2.5.1 Description of Smart Call Home 2.5.2 Benefits of the Smart Call Home Best Practices 2.5.3 Features Incompatible with Smart Call Home 2.5.4 Guidelines and Restrictions for Smart Call Home 2.5.5 Recommended Smart Call Home Configuration 2.5.6 Documentation for Smart Call Home 2.5.7 Related Features and Best Practices
Provides background information and recommendations. Provides continuous device health monitoring and real-time diagnostics alerts. For known issues, particularly GOLD diagnostics failures, generates Automatic Service Requests with the Cisco TAC.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
47
Note
2.6.1 Description of Monitoring System Resource Usage 2.6.2 Benefits of the Monitoring System Resource Usage Best Practices 2.6.3 Features Incompatible with Monitoring System Resource Usage 2.6.4 Guidelines and Restrictions for Monitoring System Resource Usage 2.6.5 Recommended Monitoring System Resource Usage Procedure
MIB Locator
http://tools.cisco.com/ITDIT/MIBS/servlet/index
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
48
Note
Release 12.2(33)SXH and later releases support error counter monitoring. These sections describe best practices for error counter monitoring:
2.7.1 Description of Error Counter Monitoring 2.7.2 Benefits of the Error Counter Monitoring Best Practices 2.7.3 Features Incompatible with Error Counter Monitoring 2.7.4 Guidelines and Restrictions for Error Counter Monitoring 2.7.5 Recommended Error Counter Monitoring Procedure 2.7.6 Documentation for Error Counter Monitoring 2.7.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
49
Step 2 Step 3
Look for events with timestamps that correspond to the problem and card that you are investigating. Look for incrementing DV and TF values. If DV is incrementing rapidly, for example, going up by 10 or more, and all other values (ID, IN, PO,RE,R, etc.) remain the same, then submit the errors to the Cisco TAC for further analysis.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
50
3.1 Recommended Switch Management Feature and Command List, page 52 3.2 Best Practices for Hostname Configuration, page 54 3.3 Best Practices for the Login Banner, page 55 3.4 Best Practices for System Logging, page 57 3.5 Best Practices for Simple Network Management Protocol (SNMP), page 60 3.6 Best Practices for Software and Configuration Backup, page 61 3.7 Best Practices for NetFlow Data Export (NDE), page 62 3.8 Best Practices for the Time Domain Reflectometer (TDR), page 64 3.9 Best Practices for Management Connections, page 65 3.10 Best Practices for Switched Port Analyzer (SPAN), page 67
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
51
For initial setup, use the setup commandSee this publication: http://www.cisco.com/en/US/docs/ios/12_2/configfun/configuration/guide/fcf002.html#Using_Setup Use the show history command to display your command entries:
router# show history router(config)# do show history
Create and maintain a physical and logical network diagram. With Release 12.2(33)SXH and later releases, use the Smart Port Macros featureSee this publication: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/smrtport. html
With Release 12.2(33)SXH and later releases, use the AutoSecure featureSee this publication: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/autosec.ht ml
With Release 12.2(33)SXH and later releases, use the Auto QoS featureSee this publication: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/auto_qos. html
With Release 12.2(33)SXH and later releases, the Configuration Replace and Configuration Rollback features are availableSee this publication: http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gtrollbk.html Configure NTP to ensure that time-stamped SYSLOG messages from all devices have consistent timestamps, which makes troubleshooting easier. A common use of the NTP-synchronized time is in debug and log time-stamps, configured with these commands:
Router(config)# service timestamps debug datetime msec localtime show-timezone Router(config)# service timestamps log datetime msec localtime show-timezone
Use the default configuration register value: 0x2102. Enter this command to restore the default value:
router(config)# config-register 0x2102
Note
The show diagnostic sanity command will report a nondefault configuration register value.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
52
Store a backup software image on another flash device and configure a second boot command for it:
Router(config)# boot system flash device_name:image_name
Or:
Router(config)# boot system flash device_name:image_name
If the switch cannot boot the image specified in the first command, it will boot the image specified in the second command. See this publication for more information about boot configuration: http://www.cisco.com/en/US/docs/ios/fundamentals/configuration/guide/cf_rebooting.html
Issue the show platform hardware capacity command periodically to monitor the flash filesystems:
Any system resource with usage of 90% or greater should be addressed. Ensure that there is sufficient space available in the flash filesystems (at least 3MB) for
crashinfo collection.
Note
Do not enable creation of core dumps except as instructed by the Cisco TAC.
See the Determining System Hardware Capacity section of the customer documentation for more information.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
53
3.2.1 Description of Hostname Configuration 3.2.2 Benefits of the Hostname Configuration Best Practices 3.2.3 Features Incompatible with Hostname Configuration 3.2.4 Guidelines and Restrictions for Hostname Configuration 3.2.5 Recommended Hostname Configuration 3.2.6 Documentation for Hostname Configuration 3.2.7 Related Features and Best Practices
For example:
Router(config)# hostname 6K-LV2-CL3 6K-LV2-CL3(config)#
After the hostname is entered, the CLI prompt changes to reflect the entered name. The hostname is derived from the device type (Catalyst: 6K), floor location (Level 2), and wiring closet location (Closet 3). Sometimes the name can also incorporate the supervisor type or other relevant information (for example, S720B-LV2-CL3).
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
54
3.3.1 Description of the Login Banner 3.3.2 Benefits of the Login Banner Best Practices 3.3.3 Features Incompatible with the Login Banner 3.3.4 Guidelines and Restrictions for the Login Banner 3.3.5 Recommended Login Banner Configuration 3.3.6 Documentation for the Login Banner 3.3.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
55
Notice that the system is to be logged into or used only by specifically authorized personnel and perhaps information about who can authorize use. Notice that any unauthorized use of the system is unlawful and can be subject to civil and criminal penalties. Notice that any use of the system can be logged or monitored without further notice and that the resulting logs can be used as evidence in court. Specific notices required by local laws.
For security purposes, rather than legal, a login banner should not contain any specific information about the switch name, model, software, or ownership. Such information can be abused by malicious users.
Any character that does not appear in message_text can be used as the delimiting (d) character, including control characters, except ^z (Control-Z).
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
56
3.4.1 Description of System Logging 3.4.2 Benefits of the System Logging Best Practices 3.4.3 Features Incompatible with System Logging 3.4.4 Guidelines and Restrictions for System Logging 3.4.5 Recommended System Logging Configuration 3.4.6 Customer Documentation for System Logging 3.4.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
57
By default, all system messages are sent to the system console. Console logging is a high-priority task in Cisco IOS Software. Disable console logging to avoid a situation in which the switch might hang while waiting for a response from a terminal.
Router(config)# no logging console
Note
You might want to enable console logging during troubleshooting: enter the logging console command; you can enter the logging console severity_level command (severity_level: 0 to 7) to obtain a selected level of message logging.
This command disables logging for terminal lines other than the system console.
Router(config)# no logging monitor
Note
Enable monitor logging only as specifically required: enter the logging monitor command; you can enter the logging monitor severity_level command (severity_level: 0 to 7) to obtain a desired level of message logging.
Buffered messages can be displayed with the show logging command. The logging buffer is circular. Once the logging buffer is filled, older entries are overwritten by newer entries. The size of the logging buffer is user-configurable and is specified in bytes. 16384 provides adequate logging in most cases.
Router(config)# logging buffered 16384
Filter by severity the messages sent to the syslog servers. The default logging level for all destinations (console, monitor, buffer, and traps) is debugging (level 7). If you leave the trap logging level at 7, many noncritical messages are sent to the syslog servers. Set the default logging level for traps to notifications (level 5).
Router(config)# logging trap notifications
Note
To make identification of the messages from a particular switch easier, select the interface from which the messages will be sent. The IP address of the interface will be the source address of the messages. This example configures the loopback 0 interface as the source of messages:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
58
Note
Configure the selected interface with the IP address that you want to be used as the source address of the messages.
Note
Ensure that console logging has been disabled before you enter any logging event commands.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
59
3.5.1 Description of SNMP 3.5.2 Benefits of the SNMP Best Practices 3.5.3 Features Incompatible with SNMP 3.5.4 Guidelines and Restrictions for SNMP 3.5.5 Recommended SNMP Configuration 3.5.6 Customer Documentation for SNMP 3.5.7 Related Features and Best Practices
Note
For the highest level of security, configure SNMPv3 with MD5 authentication and DES encryption.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
60
3.6.1 Description of Software and Configuration Backup 3.6.2 Benefits of the Software and Configuration Backup Best Practices 3.6.3 Features Incompatible with Software and Configuration Backup 3.6.4 Guidelines and Restrictions for Software and Configuration Backup 3.6.5 Recommended Software and Configuration Backup Procedures 3.6.6 Customer Documentation for Software and Configuration Backup 3.6.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
61
file_name is:
The software image name const_nvram:startup-config For switches in VTP server mode, const_nvram:vlan.dat bootflash: disk0: disk1: slot0: tftp:
destination is:
3.7.1 Description of NDE 3.7.2 Benefits of the NDE Best Practices 3.7.3 Features Incompatible with NDE 3.7.4 Guidelines and Restrictions for NDE 3.7.5 Recommended NDE Configuration 3.7.6 Customer Documentation for NDE
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
62
Only NetFlow version 9 provides NDE support for IP multicast traffic. NDE does not support any non-IP protocol, including Internetwork Packet Exchange (IPX). When you configure NAT and NDE on an interface, the PFC sends all fragmented packets to the MSFC to be processed in software. (CSCdz51590)
Display Statistics
Router(config)# show mls netflow ip
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
63
3.8.1 Description of the TDR 3.8.2 Benefits of the TDR Best Practices 3.8.3 Features Incompatible with the TDR 3.8.4 Guidelines and Restrictions for the TDR 3.8.5 Recommended TDR Procedure 3.8.6 Customer Documentation for the TDR 3.8.7 Related Features and Best Practices
The TDR can test cables up to a maximum length of 115 meters. The TDR is supported on these switching modules:
WS-X6748-GE-TX WS-X6548V-GE-TX WS-X6548-GE-TX WS-X6548-GE-45AF WS-X6148V-GE-TX WS-X6148-GE-TX WS-X6148-GE-45AF WS-X6148A-RJ-45 WS-X6148A-GE-TX
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
64
3.9.1 Description of Management Connections 3.9.2 Benefits of the Management Connections Best Practices 3.9.3 Features Incompatible with Management Connections 3.9.4 Guidelines and Restrictions for Management Connections 3.9.5 Recommended Management Connections Configuration 3.9.6 Customer Documentation for Management Connections 3.9.7 Related Features and Best Practices
In-band management connectionUses a network topology where both management and data traffic share the same physical links and network access. Out-of-band management connectionRequires a network topology where there are separate physical links and network access for management and data traffic.
The serial link to the console port is inherently an out-of-band management connection, but it is quite common to use a terminal server that provides network access to the serial link, so that the aggregate link (network plus serial) can be either in-band or out-of-band. Catalyst 6500 switches do not have management-only Ethernet ports, but any port can be configured for for management-only use, and depending on the network topology, it can be either in-band or out-of-band.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
65
Use a loopback interface for in-band management connections, because loopback interfaces are up as long as there is at least one active SVI or active Layer 3 interface.
Note
If possible, configure an out-of-band management connection. Physical ports for out-of-band management connections fall into these categories:
A console connection through a terminal server that is cabled outside the data network. An Ethernet connection that is cabled outside the data network to a port in a VLAN reserved for
management traffic (don't use VLAN 1). Because the connection requires the port to be up, configure the port as a Layer 3 interface with an IP address and use that address for the management connection.
Configuring both in-band and both out-of-band management connections provides two out-of-band paths in addition to the in-band access.
Layer 3 Interface
Router(config)# interface interface_type slot/port Router(config-if)# ip address ip_address subnet_mask
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
66
3.10.1 Description of SPAN 3.10.2 Benefits of the SPAN Best Practices 3.10.3 Features Incompatible with SPAN 3.10.4 Guidelines and Restrictions for SPAN 3.10.5 Recommended SPAN Configuration 3.10.6 Documentation for SPAN 3.10.7 Related Features and Best Practices
One or more CPUs (only with Release 12.2(33)SXH and later releases) One or more ports One or more EtherChannels One or more VLANs
SPAN sends the copied traffic to one or more destinations for analysis by a network analyzer.
Note
EtherChannels as SPAN destinations Additional local SPAN egress-only sessions Distributed egress SPAN Input Packets with Don't Learn Option
Note
To monitor traffic that can be matched with an ACL, consider using VACL capture. Before enabling SPAN, carefully evaluate the SPAN source traffic rates, and consider the performance implications and possible oversubscription points, which include these:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
67
To avoid disrupting traffic, do not oversubscribe any of these points in your SPAN topology. Some oversubscription and performance considerations are:
SPAN doubles traffic internally SPAN adds to the traffic being process by the switch fabric SPAN doubles forwarding engine load The supervisor engine handles the entire load imposed by egress SPAN (also called transmit SPAN).
Note
Egress SPAN should only be enabled for short periods of time during active troubleshooting. Release 12.2(33)SXH and later releases support distributed egress SPAN, which reduces the load on the supervisor engine.
The ingress modules handle the load imposed by ingress SPAN sources (also called receive SPAN) on each module. Ingress SPAN adds to rewrite/replication engine load.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
68
4.1 Description of Multicast 4.2 Benefits of the Multicast Best Practices 4.3 Features Incompatible with Multicast 4.4 Guidelines and Restrictions for Multicast 4.5 Recommended Multicast Configuration 4.6 Documentation for Multicast 4.7 Related Features and Best Practices
options.
Do not configure more than 4 bidirectional PIM rendezvous points (RPs) per VPN. With multiple multicast routing protocols configured (for example, sparse mode (SM) and Bidirectional PIM), avoid overlapping multicast group ranges. When SSM, IGMPv3 and IGMP snooping are configured, use multicast groups that map to unique Layer 2 multicast MAC addresses. Avoid overlapping Layer 2 multicast MAC addresses. Ensure that there is at least one IGMP querier-capable device active in each VLAN. In a VLAN where PIM and IGMP are not configured because the multicast traffic does not need to be routed, enable the IGMP snooping querier.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
69
Note
The IGMP snooping querier does not support querier elections. Do not enable the IGMP snooping querier on more than one device in a VLAN.
4.5.1 Platform Independent Configuration 4.5.2 Replication Mode 4.5.3 Local Egress Replication Mode 4.5.4 Non-RPF Traffic 4.5.5 Partially and Completely Switched Flows 4.5.6 Multicast Consistency Checker 4.5.7 Rate Limit Traffic from Directly Connected Sources 4.5.8 Directly Connected Subnets 4.5.9 Multicast Redundancy and SSO 4.5.10 PIM snooping 4.5.11 IGMP Snooping
Egress replication mode provides better performance only when there are a significant number of multicast outgoing interfaces (OIFs) served by DFCs. Without a DFC to support local egress replication mode, egress replication mode performance is lower then ingress replication mode because of the load placed on the PFC. Ingress marking and egress policing are not compatible with egress replication. (CSCsd41348) Egress SPAN is not supported in egress multicast mode. (CSCsa95965)
Use the automatically detected replication mode. If possible, the switch will use egress replication mode.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
70
If you have configured ingress replication mode, enter this command to return to the automatic detection mode:
Router(config)# no mls ip multicast replication-mode ingress
If you have configured egress replication mode, enter this command to return to the automatic detection mode:
Router(config)# no mls ip multicast replication-mode egress
Note
Modify the packets-per-second and burst values based on the convergence requirements of your network and the available CPU capacity.
Note
For partially switched flows, do not configure the ip multicast ttl-threshold command on multicast OIFs. To avoid the possibility of ACLs interfering with multicast routing control packets, ensure that multicast sources are configured not to send multicast data packets that use multicast groups that map to 0100.5e00.00xx.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
71
Note
The RP-SP multicast consistency checker results are most reliable when multicast traffic levels are stable. When multicast traffic levels vary significantly, the RP-SP multicast consistency checker might indicate a problem when none exists. The RP-SP checker is enabled by default in Release 12.2(33)SXH and later releases.
Set a packets-per-second value between 150 and 1000 and modify the packets-per-second and burst values based on the convergence requirements of your network.
Note
If the switch is the first hop router for any multicast source, rate-limit the traffic.
Use the default settings. Enter this command to revert to the defaults:
Router(config)# no mls ip multicast sso convergence-time 1 Router(config)# no mls ip multicast sso leak interval 1 Router(config)# no mls ip multicast sso leak percent 1
Note
When prefaced with the no keyword, you can enter any numerical value to revert to the default setting.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
72
Note
With SSO redundancy configured, do not use auto-RP. SSO redundancy is supported only for PIM-DM, PIM-SM, SSM protocols.
In VLANs with multicast routers running source-specific multicast (SSM) and directly connected multicast sources, disable PIM snooping in the VLAN:
Router(config)# interface vlan vlan_ID Router(config-if)# no ip pim snooping
In VLANs that have multicast routers running PIM sparse mode (PIM-SM) and directly connected multicast sources, enable PIM snooping on the switch and in the VLAN and ensure that DR flooding is enabled on the switch:
Router(config)# ip pim snooping Router(config)# ip pim snooping dr-flood Router(config)# interface vlan vlan_ID Router(config-if)# ip pim snooping
Note
The presence or absence of any other type of multicast routing, such as SSM or bidirectional PIM, does not affect the need for DR flooding with PIM-SM and directly connected multicast sources.
sources.
A VLAN with multicast routers running SSM only and with no directly connected multicast
sources.
A VLAN with multicast routers running bidirectional PIM only, whether or not there are any
directly connected multicast sources. If DR flooding is not required on the switch, disable it to reduce bandwidth usage:
Router(config)# no ip pim snooping dr-flood
CSCsh98208In a VLAN with PIM snooping configured, when the shared tree and shortest path tree (SPT) diverge, PIM snooping might suppress the (S,G) RPT-bit prune message that is sent by a multicast receiver from reaching the upstream router in the shared tree, causing a situation in which more than one upstream router forwards the multicast traffic, each using their own (S,G)-join state, which in turn causes duplicate multicast packets to be delivered to the multicast receivers. This situation lasts only briefly because the PIM-ASSERT mechanism stops the extraneous flow, but this cycle repeats again when the next (*,G) join (S,G) RPT bit prune message is sent by one of the receivers.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
73
message suppression:
Router(config)# ip pim snooping suppress sgr-prune
With releases earlier than Release 12.2(18)SXF9, disable PIM snooping in the VLAN:
Router(config)# interface vlan vlan_ID Router(config-if)# no ip pim snooping
Note
Bidirectional PIM does not interfere with directly connected sources. PIM dense mode (PIM-DM) is not compatible with PIM snooping.
With Release 12.2(33)SXH and later releases, to prevent depletion of the switchs hardware table capacity, enter the following command:
Router(config)# ip igmp snooping source-only-learning limit {1000 | 2000}
Enter 2000 unless Virtual Switching System (VSS) is configured. Enter 1000 if VSS is configured.
Modify the packets-per-second and burst values based on the requirements of your network and the available CPU capacity.
Note
When IGMP/PIM packets are redirected, the forwarding engine cannot apply ACLs or QoS to them.
Note
If you see too much source only flooding, you can change the source-only flooding timer with the ip igmp snooping source-only-learning age-timer command.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
74
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
75
5.1 Best Practices for Unicast Reverse Path Forwarding (uRPF) Check, page 76 5.2 Best Practices for Port Security, page 79 5.3 Best Practices for Control Plane Policing (CoPP), page 82 5.4 Best Practices for CoPP Support for ISIS, page 87 5.5 Best Practices for Attack Protection, page 88 5.6 Best Practices for Controlling Management Session Access, page 92 5.7 Best Practices for NetFlow Data Export (NDE) for Security, page 95 5.8 Best Practices for Private VLANs (PVLANs) for Servers, page 95
Note
Disable features that are not being used. Disable CDP on ports that connect to partner companies through an extranet, or to nodes in the network that have no need for data provided by CDP. The data provided by CDP could prove useful to a malicious user. Use SNMPv3 with MD5 authentication and DES encryption (see the 3.5 Best Practices for Simple Network Management Protocol (SNMP) section on page 60). If you can predict the IP addresses from which administrators make connections, consider using Cisco Lock-and-Key Security, which provides tightly controlled access. To decrease the risk of VLAN hopping by specifically crafted malicious traffic, on Layer 2 ports, configure the access VLAN (the VLAN used when the port is not trunking) to be different than the 802.1Q native VLAN (used for untagged traffic when the port is an 802.1Q trunk) or configure 802.1Q trunks to support only tagged traffic.
5.1 Best Practices for Unicast Reverse Path Forwarding (uRPF) Check
These sections describe best practices for uRPF:
5.1.1 Description of uRPF Check 5.1.2 Benefits of the uRPF Best Practices 5.1.3 Features Incompatible with uRPF 5.1.4 Guidelines and Restrictions for uRPF 5.1.5 Recommended uRPF Configuration 5.1.6 Documentation for uRPF 5.1.7 Related Features and Best Practices
For CLI modifications in IOS release SXI, refer to SXI configuration guidelines:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
76
uRPF does not provide complete protection against spoofing. Spoofed packets can enter a network through uRPF-enabled interfaces if an appropriate return route to the source IP address exists. The switch applies the same uRPF mode to all interfaces where uRPF check is configured. Any change that you make in the uRPF mode on any interfaces is applied to all interfaces where the uRPF check is configured. The allow default options of the uRPF modes do not offer significant protection against spoofing.
Strict uRPF Check with Allow Default:
Received IP traffic that is sourced from a prefix that exists in the routing table passes the uRPF check if the prefix is reachable through the input interface. If a default route is configured, any IP packet with a source prefix that is not in the routing table passes the uRPF check if the ingress interface is a reverse path for the default route.
Loose uRPF Check with Allow Default:
Avoid configurations that overload the route processor with uRPF checks.
Do not configure uRPF to filter with an ACL. Do not configure the global uRPF punt check mode.
Note
Although the software supports up to 8 reverse-path interfaces (16 in Release 12.2(33)SXH and later releases), limit your configuration to the number of reverse-path interfaces described in the 5.1.5 Recommended uRPF Configuration section on page 78. For a list of guidelines and restrictions that applies to other uRPF configurations, see the uRPF Check Guidelines and Restrictions section.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
77
PFC2 Configuration Options PFC3 Configuration Options Maximum Paths uRPF Check Strict Mode uRPF Check Pass Global Mode uRPF Check Group-Interface Global Mode uRPF Check Interface Groups
The PFC2 supports the uRPF check for packets that have a single reverse-path interface. If, on any number of interfaces, the switch receives valid IP packets that have one reverse path interface per source prefix, configure uRPF strict mode. To ensure that no more than one reverse-path interface exists in the routing table for each prefix, enter the maximum-paths 1 command in config-router mode when configuring OSPF, EIGRP, or BGP.
Note
With a PFC2, the hardware FIB supports 256K entries, which includes 16K IP multicast entries. With the uRPF check enabled, there are twice as many IP entries in the FIB, which effectively reduces the table capacity by half. With the uRPF check enabled, the PFC2 cannot support the full internet routing table.
uRPF Strict ModeThe uRPF strict mode provides the greatest security against spoofed traffic. If, on all uRPF-check enabled interfaces, the switch receives valid IP traffic through interfaces that are reverse paths for the traffic, then strict mode is an option in these circumstances:
If, on a maximum of 24 interfaces, divided into four groups of six interfaces each, the switch
receives valid IP packets that have up to six reverse-path interfaces per source prefix, configure uRPF strict mode with the interface-group global mode. This option requires you to identify the source prefixes and the interfaces that serve as reverse paths for the source prefixes and to configure interface groups for those reverse path interfaces. All of the reverse-path interfaces for each source prefix must be in the same interface group. You can configure four interface groups, with each group containing up to six reverse-path interfaces. There is no limit on the number of source prefixes that an interface group can support. To ensure that no more than six reverse-path interfaces exist in the routing table for each prefix, enter the maximum-paths 6 command in config-router mode when configuring OSPF, EIGRP, or BGP. IP traffic with one or two reverse-path interfaces that is received on uPPF-check enabled interfaces outside the interface groups passes the uRPF check if the ingress interface and at most one other interface are reverse paths. With maximum paths set to six, IP traffic with more than two reverse-path interfaces that is received on uPPF-check enabled interfaces outside the interface groups always pass the uRPF check.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
78
path interfaces per source prefix, configure uRPF strict mode with the pass global mode. To ensure that no more than two reverse-path interfaces exist in the routing table for each prefix, enter the maximum-paths 2 command in config-router mode when configuring OSPF, EIGRP, or BGP.
uRPF Loose Mode with the Pass Global ModeThe uRPF loose mode provides less protection than strict mode, but it is an option on switches that receive valid IP traffic on interfaces that are not reverse paths for the traffic. The uRPF loose mode verifies that received traffic is sourced from a prefix that exists in the routing table, regardless of the interface on which the traffic arrives.
Maximum Paths
Router(config-router)# maximum-paths [1 | 2 | 6]
5.2.1 Description of Port Security 5.2.2 Benefits of the Port Security Best Practices 5.2.3 Features Incompatible with Port Security 5.2.4 Guidelines and Restrictions for Port Security 5.2.5 Recommended Port Security Configuration 5.2.6 Documentation for Port Security
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
79
For stable connections (for example, ports that always support the same devices, as in an office environment: devices like an IP phone, a desktop computer, or the same laptop computer), configure port security with sticky MAC addresses. Port security with sticky MAC addresses allows the switch to learn addresses dynamically and then retain the dynamically learned MAC addresses during a link-down condition. For flexible connections (for example, connections to conference rooms or connections that support guests), configure port security with activity-based aging.
Switch Port Analyzer (SPAN) destination ports. EtherChannel port-channel interfaces. With releases earlier than Release 12.2(33)SXH, 802.1X port-based authentication. With releases earlier than Release 12.2(18)SXE, port security does not support trunks. (With Release 12.2(18)SXE and later releases, port security supports nonnegotiating trunks.) With releases earlier than Release 12.2(18)SXE, port security does not support PVLAN ports. With releases earlier than Release 12.2(18)SXE, port security does not support IEEE 802.1Q tunnel ports.
With releases earlier than Release 12.2(18)SXE, port security does not support sticky MAC addresses. With releases earlier than Release 12.2(18)SXE, port security does not support activity-based aging. The PFC2 does not support activity-based aging. With the default port security configuration, enter the errdisable recovery cause psecure-violation global configuration command to automatically bring secure ports out of the error-disabled state, or manually reenable ports by entering the shutdown and no shut down interface configuration commands. Enter the clear port-security dynamic global configuration command to clear all dynamically learned secure addresses. See the Cisco IOS Master Command List, Release 12.2SX, for complete syntax information. Port security learns unauthorized MAC addresses with a bit set that causes traffic to them or from them to be dropped. The show mac-address-table command displays the unauthorized MAC addresses, but does not display the state of the bit. (CSCeb76844)
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
80
To preserve dynamically learned sticky MAC addresses and configure them on a port following a bootup or a reload and after the dynamically learned sticky MAC addresses have been learned, you must enter a write memory or copy running-config startup-config command to save them in the startup-config file.
Note
The default violation mode (shutdown) provides the greatest security, but does not provide automatic recovery. If the security requirements of your network allow it, you can configure one of the other violation modes or configure automatic recovery with the errdisable recovery cause psecure-violation global configuration command.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
81
5.3.1 Description of CoPP 5.3.2 Benefits of the CoPP Best Practices 5.3.3 Features Incompatible with CoPP 5.3.4 Guidelines and Restrictions for CoPP 5.3.5 Recommended CoPP Configuration 5.3.6 Documentation for CoPP 5.3.7 Related Features and Best Practices
Do not include a class-map class-default statement in a CoPP policy map. (CSCsi25255, CSCsf25709) CoPP is not supported in hardware for broadcast packets. The combination of ACLs, traffic storm control, and CPP software protection provides protection against broadcast DoS attacks. CoPP is not supported in hardware for multicast packets. The combination of ACLs, multicast CPU rate limiters, and CoPP software protection provides protection against multicast DoS attacks. CoPP does not support ARP policies. ARP policing mechanisms provide protection against ARP storms. CoPP does not support non-IP classes except for the default non-IP class. ACLs can be used instead of non-IP classes to drop non-IP traffic, and the default non-IP CoPP class can be used to limit the non-IP traffic that reaches the RP CPU.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
82
Do not use the log keyword in CoPP policy ACLs. With a PFC3A, egress QoS and CoPP cannot be configured at the same time. In this situation, CoPP is performed in the software. A warning message is displayed to inform you that egress QoS and CoPP cannot be configured at the same time. If you have a large QoS configuration, the system may run out of TCAM space. If this is the case, CoPP may be performed in software. When there is a large QoS configuration for other interfaces, you can run out of TCAM space. When this situation occurs, CoPP may be performed entirely in software and result in performance degradation and CPU cycle consumption. You must ensure that the CoPP policy does not filter critical traffic such as routing protocols or interactive access to the switches. Filtering this traffic could prevent remote access to the switch, requiring a console connection. PFC3 supports built-in special-case rate limiters, which are useful for situations where an ACL cannot be used (for example, TTL, MTU, and IP options). When you enable the special-case rate limiters, you should be aware that the special-case rate limiters will override the CoPP policy for packets matching the rate-limiter criteria. CoPP is not enabled in hardware unless QoS is enabled globally with the mls qos command. If the mls qos command is not entered, CoPP will only work in software. Egress CoPP is not supported. Silent mode is not supported. CoPP is only supported on ingress (service-policy output CoPP cannot be applied to the control plane interface). ACE hit counters in hardware are only for ACL logic. You can rely on software ACE hit counters and the show access-list, show policy-map control-plane, and show mls ip qos commands to evaluate CPU traffic. CoPP is performed on a per-forwarding-engine basis and software CoPP is performed on an aggregate basis. CoPP does not support ACEs with the log keyword. CoPP uses hardware QoS TCAM resources. Enter the show tcam utilization command to verify the TCAM utilization. Make sure you consider and allow your applications when configuring CoPP.
Analyze Traffic Filter Traffic by Protocol Type Filter Traffic by Protocol Type and Source Address Ranges Filter Traffic by Protocol Type and Source Address Filter Traffic by Protocol Type, Source Address, and Destination Address
Analyze Traffic
Analyze the existing control and management plane access requirements to determine the exact traffic profile for the filtering lists.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
83
Make a list of the known protocols that access the Route Processor and divide them into categories. For example, critical, important, normal, undesirable, and default. Your network might require fewer classes, or it might require additional classes.
ACL 120: critical traffic ACL 121: important traffic ACL 122: normal traffic ACL 123: explicitly denies unwanted traffic (Slammer worm traffic in this example) ACL 124: the rest of the traffic
Step 2
Create ACLs that permit all the known protocols. Use different ACL numbers for each type of traffic. Configure an initial ACE in each ACLs with both the source and destination addresses set to any. Configure the final entry in the last ACL as permit ip any any, which will match traffic not explicitly permitted by other entries in the other ACLs. For example:
access-list 120 remark CoPP ACL for critical traffic ! allow BGP from a known peer to this router's BGP TCP port ! Initial ACE access-list 120 permit any any eq bgp access-list 121 remark CoPP Important traffic ! permit return traffic from TACACS host ! Initial ACE access-list 121 permit any any established ! ssh access to the router from a subnet !Initial ACE access-list 121 permit any any eq 22 ! telnet access to the router from a subnet !Initial ACE access-list 121 permit any any eq telnet ! SNMP access from the NMS host to the router !Initial ACE access-list 121 permit any any eq snmp ! Allow the router to receive NTP packets from a known clock source !Initial ACE access-list 121 permit any any eq ntp access-list 122 remark CoPP normal traffic ! permit router originated traceroute access-list 122 permit icmp any any ttl-exceeded access-list 122 permit icmp any any port-unreachable ! permit receipt of responses to router originated pings access-list 122 permit icmp any any echo-reply ! allow pings to router access-list 122 permit icmp any any echo access-list 123 remark explicitly defined "undesirable" traffic ! permit, for policing, all traffic destined to UDP 1434 access-list 123 permit udp any any eq 1434 !This ACL identifies all other traffic access-list 124 remark rest of the IP traffic for CoPP access-list 124 permit ip any any
Step 3
Apply the ACLs to a corresponding set of descriptively named class-maps. For example:
class-map CoPP-critical match access-group 120 class-map CoPP-important match access-group 121
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
84
Step 4
Apply the class maps to a policy-map that permits all traffic, regardless of classification. A default policy is not required at this stage of policy development. For example:
policy-map CoPP class CoPP-critical police 31500000 conform-action transmit exceed-action drop class CoPP-important police 125000 3906 3906 conform-action transmit exceed-action drop class CoPP-normal police 64000 2000 2000 conform-action transmit exceed-action drop ! This policy drops all traffic categorized as undesirable, regardless of rate. class CoPP-undesirable police 32000 1500 1500 conform-action drop exceed-action drop
Step 5
Enter the show access-lists command to determine which ACEs in the ACLs are in use (the ACEs each identify a protocol), as well as the number of packets permitted by the final ACL entry (the permit ip any any ACE).
Note
At this stage, the show access-lists command is more useful than the show tcam interface command, which shows what is processed in hardware.
Ideally, you will have identified all required traffic destined to the router. Realistically, not all required traffic will be identified prior to deployment. Some extra analysis will be required to determine the unclassified packets. This extra classification step can be accomplished using several techniques: general ACL classification as described in Characterizing and Tracing Packet Floods Using Cisco Routers or packet analyzers. Once classified, modify the ACLs as necessary. Use the show policy-map control-plane command to collect data (packet count and rate information) about the policies, which will support development of increasingly granular policies.
Filter Traffic by Protocol Type
Step 1
Remove the final permit ip any any ACE (access-list 124 permit ip any any in the example).
Note Step 2
If necessary, configure additional ACEs for other protocols that you have identified.
Enter the show access-lists command to determine which ACEs in the ACLs are in use (the ACEs each identify a protocol). Enter the show map command to display the rate data.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
85
As appropriate for some protocols, create ACLs that filter traffic by source addresses.
Note
The addresses shown in these ACEs are only examples. You must use the addresses that are valid for your network. Configure the ACE with the allocated CIDR block. For example, if your network has been allocated 171.68.0.0/16, then configure that as the source address, rather than a larger subnet. External BGP (eBGP) requires an exception; the permitted source addresses for the session will lie outside the CIDR block.
For example:
access-list ! allow BGP access-list ! allow BGP access-list access-list access-list 120 remark CoPP ACL for critical traffic from a known peer to this router's BGP TCP port 120 permit tcp host 47.1.1.1 host 10.9.9.9 eq bgp from a peer's BGP port to this router 120 permit tcp host 47.1.1.1 eq bgp host 10.9.9.9 120 permit tcp host 10.86.183.120 host 10.9.9.9 eq bgp 120 permit tcp host 10.86.183.120 eq bgp host 10.9.9.9
access-list 121 remark CoPP Important traffic ! permit return traffic from TACACS host access-list 121 permit tcp host 1.1.1.1 host 10.9.9.9 established ! ssh access to the router from a subnet access-list 121 permit tcp 10.0.0.0 0.0.0.255 host 10.9.9.9 eq 22 ! telnet access to the router from a subnet access-list 121 permit tcp 10.86.183.0 0.0.0.255 any eq telnet ! SNMP access from the NMS host to the router access-list 121 permit udp host 1.1.1.2 host 10.9.9.9 eq snmp ! Allow the router to receive NTP packets from a known clock source access-list 121 permit udp host 1.1.1.3 host 10.9.9.9 eq ntp
Step 2
This step provides data about traffic from outside the CIDR block.
Filter Traffic by Protocol Type and Source Address
Narrow the ACL permit statements to only allow known authorized source addresses.
Filter Traffic by Protocol Type, Source Address, and Destination Address
Caution
Care must be taken to ensure that the CoPP policy does not filter critical traffic such as routing protocols or interactive access to the routers. Filtering this traffic could prevent remote access to the router, thus requiring a console connection
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
86
5.4.1 Description of CoPP Support for ISIS 5.4.2 Benefits of CoPP Support for ISIS 5.4.3 Features Incompatible with CoPP Support for ISIS 5.4.4 Guidelines and Restrictions for CoPP Support for ISIS 5.4.5 Recommended CoPP Support for ISIS Configuration 5.4.6 Configuration Guide for CoPP Support for ISIS 5.4.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
87
If the system is under a non-IP packet DoS attack, ACLs can be used to drop the non-IP traffic.
5.5.1 Firewall Services Module (FWSM) 5.5.2 Traffic Anomaly Detector Service Module 5.5.3 Anomaly Guard Module 5.5.4 IOS Access Control Lists (ACLs) 5.5.5 VLAN ACLs (VACLs) 5.5.6 Port ACLs (PACLs) 5.5.7 QoS ACLs 5.5.8 Hardware Rate-Limiters 5.5.9 Optimized ACL Logging (OAL) 5.5.10 AutoSecure 5.5.11 DHCP Snooping 5.5.12 IP Source Guard 5.5.13 Dynamic ARP Inspection (DAI)
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
88
Note
Do not configure the Cisco IOS software firewall features, which are supported in some releases and which run in software with very limited hardware support.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
89
Note
When possible, use CoPP, because CoPP uses ACLs to select the traffic that needs to be dropped, in contrast to the hardware rate-limiters, which cannot distinguish between offending and non-offending traffic. When CoPP is not an option, you can configure hardware rate limiters to protect the switch control plane and limit CPU utilization:
mls rate-limit all mtu-failure mls rate-limit all ttl-failure mls rate-limit layer2 ip-admission mls rate-limit layer2 l2pt mls rate-limit layer2 pdu mls rate-limit layer2 port-security mls rate-limit multicast ipv4 connected mls rate-limit multicast ipv4 fib-miss mls rate-limit multicast ipv4 igmp mls rate-limit multicast ipv4 ip-options mls rate-limit multicast ipv4 non-rpf mls rate-limit multicast ipv4 partial mls rate-limit multicast ipv4 pim mls rate-limit multicast ipv6 connected mls rate-limit multicast ipv6 default-drop mls rate-limit multicast ipv6 mld mls rate-limit multicast ipv6 route-cntl mls rate-limit multicast ipv6 sec mls rate-limit multicast ipv6 secondary-drop mls rate-limit multicast ipv6 sg mls rate-limit multicast ipv6 starg-bridge mls rate-limit multicast ipv6 starg-m-bridge mls rate-limit unicast acl input mls rate-limit unicast acl mac-pbf mls rate-limit unicast acl output mls rate-limit unicast acl vacl-log mls rate-limit unicast cef glean
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
90
mls rate-limit unicast cef receive mls rate-limit unicast ip arp-inspection mls rate-limit unicast ip dhcp-snooping mls rate-limit unicast ip errors mls rate-limit unicast ip features mls rate-limit unicast ip icmp redirect mls rate-limit unicast ip icmp unreachable acl-drop mls rate-limit unicast ip icmp unreachable no-route mls rate-limit unicast ip options mls rate-limit unicast ip rpf-failure
Note
See these sections for information about rate limiting multicast traffic:
4.5.4 Non-RPF Traffic, page 71 4.5.5 Partially and Completely Switched Flows, page 71 4.5.7 Rate Limit Traffic from Directly Connected Sources, page 72 4.5.11 IGMP Snooping, page 74
5.5.10 AutoSecure
Note
Release 12.2(33)SXH and later releases support AutoSecure. The AutoSecure feature automatically secures the switch. See this publication for information about AutoSecure: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/autosec.html
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
91
The PFC3 and Release 12.2(18)SXE and later releases support DHCP Snooping. DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers. DHCP snooping provides a valuable security function and is required to support IP Source Guard. See this publication for information about DHCP Snooping: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/configuration/guide/snood hcp.html
Release 12.2(33)SXH and later releases support IP Source Guard. IP Source Guard provides source IP address filtering on a Layer 2 port to prevent a malicious host from impersonating a legitimate host by assuming the legitimate host's IP address. IP Source Guard is an effective means of spoofing prevention at Layer 2. See this publication for information about IP Source Guard: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/ipsrcgrd.html
The PFC3 and Release 12.2(18)SXE and later releases support DAI. Dynamic ARP Inspection (DAI) mitigates ARP poisoning attacks. See this publication for information about DAI: http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SXF/native/configuration/guide/dynar p.html
5.6.1 Description of Controlling Management Session Access 5.6.2 Benefits of the Controlling Management Session Access Best Practices 5.6.3 Features Incompatible with Controlling Management Session Access 5.6.4 Guidelines and Restrictions for Controlling Management Session Access 5.6.5 Recommended Management Session Access Control Configuration 5.6.6 Documentation for Controlling Management Session Access 5.6.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
92
5.6.2.1 Use Secure Shell (SSH) and Secure Copy Protocol (SCP) 5.6.2.2 Configure VTY Lines to Maintain Sessions 5.6.2.3 Limit Access to VTY Lines
5.6.2.1 Use Secure Shell (SSH) and Secure Copy Protocol (SCP)
Secure Shell (SSH) is a network protocol that supports encrypted data exchange between two devices. SSH supports authentication with public-key cryptography. Instead of Telnet, use SSH to encrypt management session traffic, which prevents access of the data being transmitted by a malicious user. Cisco IOS software supports SSH Version 1.0 (SSHv1) or SSH Version 2.0 (SSHv2). Cisco IOS software also supports the Secure Copy Protocol (SCP), which supports encrypted connections for copying configuration files or software images. SCP relies on SSH. Use secure file transfer protocols (for example, Secure Copy Protocol (SCP) instead of FTP or TFTP), when you copy configuration data.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
93
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
94
5.7 Best Practices for NetFlow Data Export (NDE) for Security
Data Export (NDE) is also covered in the 3.7 Best Practices for NetFlow Data Export (NDE) section on page 62. This section describes the security applications of NDE. Use NDE to monitor for unusually heavy data-traffic. NDE allows you to see traffic as it traverses the network in real time. NDE allows you to quickly identify and trace network traffic, especially during incident response. NDE can provide visibility into all traffic on the network. NetFlow data can be viewed and analyzed through the command line interface (CLI) or the data can be exported to a NetFlow collector for aggregation and analysis. These sections, earlier in this document, describe the best practices for NDE:
3.7.1 Description of NDE, page 63 3.7.2 Benefits of the NDE Best Practices, page 63 3.7.3 Features Incompatible with NDE, page 63 3.7.4 Guidelines and Restrictions for NDE, page 63 3.7.5 Recommended NDE Configuration, page 63 3.7.6 Customer Documentation for NDE, page 63 3.7.7 Related Features and Best Practices, page 64
5.8.1 Description of PVLANs 5.8.2 Benefits of the PVLANs Best Practices 5.8.3 Features Incompatible with PVLANs 5.8.4 Guidelines and Restrictions for PVLANs 5.8.5 Recommended PVLANs Configuration 5.8.6 Documentation for PVLANs 5.8.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
95
VLAN database configuration mode. VTP does not propagate a private VLAN configuration.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
96
6.1 Best Practices for VSS Standby Console Usage, page 97 6.2 Best Practices for VSS Image Upgrade, page 98 6.3 Best Practices for VSL Capacity Planning, page 100 6.4 Best Practices for Migration From Non-VSS to VSS, page 101 6.5 Best Practices for VSS Power Management, page 101 6.6 Best Practices for VSS CPU Protection, page 103 6.7 Best Practices for VSS NAM Service Module Integration, page 104 6.8 Best Practices for VSS VSLP Timers, page 105 6.9 Best Practices for Matching PFC and DFC, page 106 6.10 Best Practices for VSS Domain-ID, page 107 6.11 Best Practices for VSS Priority/Preemption, page 108 6.12 Best Practices for VSS Router MAC Address, page 109 6.13 Best Practices for VSS Standby Port Bringup/Delay, page 110 6.14 Best Practices for VSS IP Connectivity Management, page 111 6.15 Best Practices for VSS Dual-Active Detection, page 112 6.16 Best Practices for VSS VSLP Timers, page 114 6.17 Best Practices for VSS STP features, page 115 6.18 Best Practices for VSS in a Layer 2 Campus Environment, page 116 6.19 Best practices for SPAN on VSL, page 117 6.20 Best Practices for MAC Synchronization on VSS, page 119 6.21 Best Practices for Multicast on VSS, page 120 6.22 Best Practices for VSS QoS, page 123 6.23 Best Practices for Supervisor Engine 720-10G VSS for VSL, page 124 6.24 Best Practices for Layer 2 QoS on the VSS, page 126 6.25 Best Practices for VSS Etherchannel Load Distribution, page 127 6.26 Best Practices for Etherchannel Min-Links in VSS, page 128 6.27 Best Practices for LACP Port-Channel Port-Priority in VSS, page 131 6.28 Best Practices for VSS L3, page 133
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
97
6.2.1 Description of VSS Image Upgrade 6.2.2 Benefits of the VSS Image Upgrade Best Practices 6.2.3 Features Incompatible with VSS Image Upgrade
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
98
6.2.4 Guidelines and Restrictions for VSS Image Upgrade 6.2.5 Recommended VSS Image Upgrade Configuration 6.2.6 Configuration Guide for VSS Image Upgrade 6.2.7 Related Features and Best Practices
Copy new images to both of the flash devices in the Active and Standby switches. Change the boot variable with the boot system device_name:file_name global configuration command and save the running-config file. Enter the redundancy reload peer command. Standby switch will reboot into RPR mode with new image. Enter the redundancy force switch-over command. The previous Standby switch will continue to bootup from RPR mode into Active switch. During this time, traffic may be disrupted, until the linecard is completely booted up. Previous Active switch will be rebooted with new image as Standby, and come up in SSO mode.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
99
6.3.1 Description of VSL Capacity Planning 6.3.2 Benefits of VSL Capacity Planning 6.3.3 Features Incompatible with VSL Capacity Planning 6.3.4 Guidelines and Restrictions for VSL Capacity Planning 6.3.5 Recommended VSL Capacity Planning Configuration 6.3.6 Configuration Guide for VSS Capacity Planning 6.3.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
100
6.4.1 Description of Migration From Non-VSS to VSS 6.4.2 Benefits of the Migration From Non-VSS to VSS Best Practices 6.4.3 Features Incompatible with Migration From Non-VSS to VSS 6.4.4 Guidelines and Restrictions for Migration From Non-VSS to VSS 6.4.5 Recommended Migration From Non-VSS to VSS Configuration 6.4.6 Configuration Guide for Migration From Non-VSS to VSS 6.4.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
101
6.5.1 Description of VSS Power Management 6.5.2 Benefits of the VSS Power Management Best Practices 6.5.3 Features Incompatible with VSS Power Management 6.5.4 Guidelines and Restrictions for VSS Power Management 6.5.5 Recommended VSS Power Management Configuration 6.5.6 Configuration Guide for VSS Power Management 6.5.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
102
6.6.1 Description of VSS CPU Protection Recommendation 6.6.2 Benefits of the VSS CPU Protection Recommendation 6.6.3 Features Incompatible with VSS CPU Protection Recommendation 6.6.4 Guidelines and Restrictions for VSS CPU Protection Recommendation 6.6.5 Recommended VSS CPU Protection Configuration 6.6.6 Configuration Guide for VSS CPU Protection Recommendation 6.6.7 Related Features and Best Practices
For IOS features like TCP intercept, PBR, etc., the first packet is always software switched. When the flow established, CPU will program the flow to hardware, the remaining packets are switched by hardware. Therefore, we must avoid sudden large amount of initial packets that overwhelm CPU. Many mls rate-limit commands are provided to protect CPU. We should implement them judiciously. Some control or resolution packets like ICMP, ARP, etc., must be handled by CPU. Use mls rate-limit to limit their frequency hitting CPU.
ACL and QOS classifications are implemented in hardware using TCAM. Although TCAM implementation provides constant lookup rates regardless of size of ACL and QOS entries, optimal use of TCAM resources are still important. Because, when a link flaps, software has to recalculate ACL and QOS entries then reprogram TCAM again, contributing to converging delays.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
103
mls rate-limit unicast cef glean 1000 Recommended Rate-Limiter Configuration Configuring Control Plane Policing
6.7.1 Description of VSS Network Analysis Module (NAM) Integration 6.7.2 Benefits of the VSS NAM Service Module Integration Best Practices 6.7.3 Features Incompatible with VSS NAM Service Module Integration 6.7.4 Guidelines and Restrictions for VSS NAM Service Module Integration 6.7.5 Recommended VSS NAM Service Module Integration Configuration 6.7.6 Configuration Guide for NAM 6.7.7 Related Features and Best Practices
6.7.2 Benefits of the VSS NAM Service Module Integration Best Practices
With NAM installed in redundant fashion, it provides high availability network monitoring.
6.7.4 Guidelines and Restrictions for VSS NAM Service Module Integration
Same restrictions as SPAN in VSS.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
104
6.8.1 Description of VSS VSLP Timers 6.8.2 Benefits of the VSS VSLP Timers 6.8.3 Features Incompatible with VSS VSLP Timers 6.8.4 Guidelines and Restrictions for VSS VSLP Timers 6.8.5 Recommended VSS VSLP Timers Configuration 6.8.6 Configuration Guide for VSS VSLP Timers 6.8.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
105
6.9.1 Description of matching PFC and DFC 6.9.2 Benefits of the matching PFC and DFC 6.9.3 Features Incompatible with matching PFC and DFC 6.9.4 Guidelines and Restrictions for matching PFC and DFC 6.9.5 Recommended matching PFC and DFC configuration 6.9.6 Configuration Guide for Matching PFC and DFC 6.9.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
106
6.10.1 Description VSS Domain-ID 6.10.2 Benefits of VSS Domain-ID 6.10.3 Features Incompatible with VSS Domain-ID 6.10.4 Guidelines and Restrictions for VSS Domain-ID 6.10.5 Recommended VSS Domain-ID Configuration 6.10.6 Configuration Guide for VSS Domain-ID 6.10.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
107
6.11.1 Description of VSS Priority/Preemption 6.11.2 Benefits of the VSS Priority/Preemption 6.11.3 Features Incompatible with VSS Priority/Preemption 6.11.4 Guidelines and Restrictions for VSS Priority/Preemption 6.11.5 Recommended VSS Priority/Preemption Configuration 6.11.6 Configuration Guide for VSS Priority/Preemption 6.11.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
108
6.12.1 Description of VSS Router MAC Address 6.12.2 Benefits of VSS Router MAC Address 6.12.3 Features Incompatible with VSS Router MAC Address 6.12.4 Guidelines and Restrictions for VSS Router MAC Address 6.12.5 Recommended VSS Router MAC Address Configuration 6.12.6 Configuration Guide for VSS Router MAC Address 6.12.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
109
6.13.1 Description of VSS Standby Port Bringup/Delay 6.13.2 Benefits of the VSS Standby Port Bringup/Delay 6.13.3 Features Incompatible with VSS Standby Port Bringup/Delay 6.13.4 Guidelines and Restrictions for VSS Standby Port Bringup/Delay 6.13.5 Recommended VSS Standby Port Bringup/Delay Configuration 6.13.6 Configuration Guide for VSS Standby port bringup/delay 6.13.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
110
6.14.1 Description of VSS IP Connectivity Management 6.14.2 Benefits of VSS IP Connectivity Management 6.14.3 Features Incompatible with VSS IP Connectivity Management 6.14.4 Guidelines and Restrictions for VSS IP Connectivity Management 6.14.5 Recommended VSS IP Connectivity Management Configuration 6.14.6 Configuration Guide for VSS IP Connectivity Management Configuration 6.14.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
111
6.15.1 Description of VSS Dual-Active Detection 6.15.2 Benefits of the VSS Dual-Active Detection 6.15.3 Features Incompatible with VSS Dual-Active Detection 6.15.4 Guidelines and Restrictions for VSS Dual-Active Detection 6.15.5 Recommended VSS Dual-Active Detection Configuration 6.15.6 Configuration Guide for VSS Dual-Active Detection Configuration 6.15.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
112
Cisco-proprietary protocol for managing EtherChannels. The VSS MEC must have at least one port on each chassis of the VSS and terminates to a Cisco switch.
Dual-Active Detection Using IP BFD
Requires direct connection between the two switches, Regular Layer 3 ping will not function correctly on this connection, the VSS instead uses the Bidirectional Forwarding Detection (BFD) protocol.
It is recommended to use PAgP+ for Dual-Active Detection across two different PAgP+ enabled switches. If PAgP+ enabled switches are not available, use BFD Dual-Active Detection instead. If troubleshooting is required during the dual-active scenario, it is recommended to leverage the console port for access to the switches. If the IP connectivity for dual-active troubleshooting is the only option, non-MEC ports residing on both switches should be configured as L3 port for IP connectivity. Additionally, ensure that those ports are configured in the interface exclusion list and do not participate in the dynamic routing process as network inconsistency may occur during dual-active condition. On VSS, we recommend that the static routes be configured pointing to the VSS next-hop router if the network management is residing on a different subnet.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
113
Note
198.2.1.0 is the management network and 102.1.24.2 and 102.3.24.2 are the IP addresses of the next-hop router.
6.16.1 Description of VSS VSLP Timers 6.16.2 Benefits of the VSS VSLP Timers 6.16.3 Features Incompatible with VSS VSLP Timers 6.16.4 Guidelines and Restrictions for VSS VSLP Timers 6.16.5 Recommended VSS VSLP Timers Configuration 6.16.6 Configuration Guide for VSS VSLP Timers 6.16.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
114
6.17.1 Description of STP on VSS 6.17.2 Benefits of the STP Best Practices for VSS 6.17.3 Features Incompatible with STP on VSS 6.17.4 Guidelines and Restrictions for STP on VSS 6.17.5 Recommended Configuration for STP on VSS 6.17.6 Configuration Guide for STP on VSS 6.17.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
115
6.18.1 Description of Layer 2 Campus on VSS 6.18.2 Benefits of VSS in a Layer 2 Campus Environment 6.18.3 Features Incompatible with Layer 2 Campus on VSS 6.18.4 Guidelines and Restrictions for Layer 2 campus on VSS
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
116
6.18.5 Recommended Configuration for Layer 2 campus on VSS 6.18.6 Configuration Guide for Layer 2 campus on VSS 6.18.7 Related Features and Best Practices
6.19.1 Description of SPAN on VSS 6.19.2 Benefits of VSS best practices for SPAN 6.19.3 Features Incompatible
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
117
6.19.4 Guidelines and Restrictions for SPAN on VSS 6.19.5 Recommended Configuration for SPAN on VSS 6.19.6 Configuration Guide for VLAN distribution on VSS 6.19.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
118
6.20.1 Description of MAC Synchronization on VSS 6.20.2 Benefits of MAC Synchronization Best Practices for VSS 6.20.3 Features Incompatible with MAC Synchronization 6.20.4 Guidelines and Restrictions for MAC Synchronization on VSS 6.20.5 Recommended Configuration for MAC Synchronization on VSS 6.20.6 Configuration Guide for MAC Synchronization on VSS 6.20.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
119
6.21.1 Description of Multicast on VSS 6.21.2 Benefits of Multicast on VSS Best Practices 6.21.3 Features Incompatible with Multicast on VSS 6.21.4 Guidelines and Restrictions for Multicast on VSS 6.21.5 Recommended Multicast on VSS Configuration 6.21.6 Configuration Guide for Multicast on VSS 6.21.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
120
All of the existing non-VSS Multicast Guidelines & Restrictions also apply to VSS. Due to the (possible) large number of available modules and interfaces in VSS mode, the current guidelines & restrictions will apply:
IPv4 mroute limit is < or = 30K IGMP joins (per second) < or = 3K PIM query (hello) interval > or = 10 seconds
Other then the general scalability guidelines listed above, Multicast on VSS should operate in the same way as it does on non-VSS Catalyst 6500 systems.
All of the existing non-VSS Multicast Configurations also apply to VSS. These sub-sections describe the recommended configuration for Multicast on VSS:
6.21.5.1 Platform Independent Multicast Configuration 6.21.5.2 Platform Dependent (non-VSS) Multicast Configuration 6.21.5.3 Multicast Replication Mode 6.21.5.4 Multicast Redundancy (NSF/SSO) 6.21.5.5 Multicast Timers 6.21.5.6 Multicast over MEC
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
121
Note
The VSS architecture only supports WS-X6700 linecards, which are all egress-capable. Hence, the default replication mode will be Egress.
Note
This is especially applicable to Multicast on VSS, due to the potentially large number of modules, ports, and related adjacencies and traffic flows. Using more aggressive timers may result in loss of traffic and/or other system resources, until NSF/SSO is complete.
Note
Millisecond (msec) PIM query-interval is not recommended in VSS mode. If you have > 50 PIM neighbors, use the default (30 seconds) PIM query-interval. If your topology has < 50 neighbors, use (non-default) > or = 10 second PIM query-interval. Use the default IGMP related timers. Use the default Multicast Flow Statistics Interval (1/4 every 25 seconds).
Note
Avoid non-MEC (single-chassis attached) Multicast Source & Receiver connections. This design is supported, but will result in loss of traffic when the directly-connected chassis fails. Wherever possible, you should utilize > or = 2 port Multi-chassis Ether-Channels (MECs) to connect to all of your PIM (or PIM Snooping) neighbors, L2 (IGMP Snooping-capable) switches, and LACP-capable Network Interface Cards (NICs). This will provide additional bandwidth (via load-balancing), and will insure minimal Multicast traffic loss, during an individual link or module failure, and/or during SSO, without the need for unicast and/or spanning-tree re-convergence. Refer to the MEC Best Practices documentation for additional information.
There are no configuration differences for Multicast on VSS. Refer to the following URLs for additional Multicast configuration information:
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
122
6.22.1 Description of Routing Protocol Prioritization traversing VSL 6.22.2 Benefits of Routing Protocol Prioritization traversing VSL 6.22.3 Features Incompatible with Routing Protocol Prioritization traversing VSL 6.22.4 Guidelines and Restrictions for Routing Protocol Prioritization traversing VSL 6.22.5 Recommended Configuration for Routing Protocol Prioritization traversing VSL 6.22.6 Configuration Guide for QoS 6.22.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
123
6.22.4 Guidelines and Restrictions for Routing Protocol Prioritization traversing VSL
For the mls qos protocol protocol_name command to work, the ports where the routing adjacency is formed has to be untrusted or ignore port trust has to be enabled. Do not mark routing protocol packets with a precedence of 5.
To mark the routing protocol packets ingressing the switch, issue the following command in global configuration mode:
!--- Precedence of 6 is recommended Router(config)# mls qos protocol protocol_name precedence 6
Note
For the above command to mark the packets, the port where the adjacency is formed has to be untrusted. If the port is trusted, then ignore port trust has to be enabled
If the routing protocol packets ingressing the VSS are already marked and PFC QoS is enabled globally, then all that needs to be done is enable trust on the port where the routing adjacency is formed as follows:
Router(config-if)# mls qos trust ip-prec
Or:
Router(config-if)# mls qos trust dscp
6.23 Best Practices for Supervisor Engine 720-10G VSS for VSL
These sections describe best practices for Supervisor Engine 720-10G VSS for VSL:
6.23.1 Description of 10G-Only Mode for VSL 6.23.2 Benefits of 10G-Only Mode for VSL 6.23.3 Features Incompatible with 10G-Only Mode for VSL 6.23.4 Guidelines and Restrictions for 10G-Only Mode for VSL 6.23.5 Recommended 10G-Only Mode for VSL Configuration 6.23.6 Configuration Guide for 10G-only mode for VSL 6.23.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
124
The Gigabit Ethernet uplinks need to be shutdown for 10G-only mode to be enabled:
Router(config)# mls qos 10g-only Error: following ports have to be shut to enable 10g-only mode: Gi1/5/1 Gi1/5/2 Gi1/5/3 Gi2/5/1 Gi2/5/2 Gi2/5/3 Command Rejected! Router(config)# interface range g1/5/1-3 , g2/5/1-3
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
125
6.24.1 Description of Layer 2 QoS on the VSS 6.24.2 Benefits of VLAN Based QoS on the VSS 6.24.3 Features Incompatible with VLAN Based QoS on the VSS 6.24.4 Guidelines and Restrictions for Layer 2 QoS on the VSS 6.24.5 Recommended VLAN Based QoS Configuration on the VSS 6.24.6 Configuration Guide for VLAN Based QoS 6.24.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
126
Note
VLAN Based QoS is enabled by default for all layer 2 physical interfaces in the standby VSS switch.
6.25.1 Description of VSS Etherchannel Load Distribution 6.25.2 Benefits of Adaptive Load Distribution Algorithm 6.25.3 Features Incompatible with Adaptive Load Distribution Algorithm 6.25.4 Guidelines and Restrictions for Adaptive Load Distribution Algorithm 6.25.5 Recommended Configuration 6.25.6 Configuration Guide for VSS Etherchannel Load Distribution 6.25.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
127
6.26.1 Description for EtherChannel Min-Links in VSS 6.26.2 Benefits of Etherchannel Min-Links Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
128
6.26.3 Features Incompatible with Etherchannel Min-Links 6.26.4 Guidelines and Restrictions for Etherchannel Min-Links 6.26.5 Recommended Etherchannel Min-Links Configuration 6.26.6 Configuration Guide for Etherchannel Min-Links 6.26.7 Related Features and Best Practices
When the minimum link requirement in a port-channel is not met within a chassis (in the following case, it is chassis 1), the chassis-local ports in that EtherChannel will be put in (m) state, and will allow traffic to traverse the Virtual Switch Link as an alternate path to egress via the member ports of this port-channel on the peer chassis.
vip-vs1# show etherchannel 25 summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
129
w - waiting to be aggregated Number of channel-groups in use: 125 Number of aggregators: 125 Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------25 Po25(RU) LACP Gi1/3/1(D) Gi1/3/2(m) Gi2/2/25(P) Gi2/2/26(P) Last applied Hash Distribution Algorithm: Adaptive
When the minimum link requirement is not met in both chassis, the port-channel will be fallged down and status will be denoted by either (SM) or (RM) as following:
vip-vs1# show etherchannel 25 summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use N - not in use, no aggregation f - failed to allocate aggregator M m u d not in use, no aggregation due to minimum links not met not in use, port not aggregated due to minimum links not met unsuitable for bundling default port
w - waiting to be aggregated Number of channel-groups in use: 125 Number of aggregators: 125 Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------25 Po25(RM) LACP Gi1/3/1(D) Gi1/3/2(D) Gi2/2/25(D) Gi2/2/26(w) Last applied Hash Distribution Algorithm: Adaptive
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
130
6.27.1 Description of LACP Port-Channel Port-Priority in VSS 6.27.2 Benefits of LACP Port-Channel Port-Priority in VSS 6.27.3 Features Incompatible with LACP Port-Channel Port-Priority in VSS 6.27.4 Guidelines and Restrictions for LACP Port-Channel Port-Priority in VSS 6.27.5 Recommended LACP Port-Channel Port-Priority in VSS 6.27.6 Configuration Guide for LACP Port-Channel Port-Priority in VSS 6.27.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
131
Show command:
Router# show etherchannel 25 summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use N - not in use, no aggregation f - failed to allocate aggregator M m u d not in use, no aggregation due to minimum links not met not in use, port not aggregated due to minimum links not met unsuitable for bundling default port
w - waiting to be aggregated Number of channel-groups in use: 125 Number of aggregators: 125 Group Port-channel Protocol Ports ------+-------------+-----------+-------------------------------------------------25 Po25(RU) LACP Gi1/3/1(P) Gi1/3/2(H) Gi2/2/25(P) Gi2/2/26(H) Last applied Hash Distribution Algorithm: Adaptive
Note
In the above example, if LACP port-priority was not configured, default priority for the port-channel member interface, would allow only switch 1 member interfaces to be aggregated in the bundle, thus making the EtherChannel a non-MEC.
Router# configure terminal
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
132
6.27.1 Description of LACP Port-Channel Port-Priority in VSS 6.27.2 Benefits of LACP Port-Channel Port-Priority in VSS 6.27.3 Features Incompatible with LACP Port-Channel Port-Priority in VSS 6.27.4 Guidelines and Restrictions for LACP Port-Channel Port-Priority in VSS 6.27.5 Recommended LACP Port-Channel Port-Priority in VSS 6.27.6 Configuration Guide for LACP Port-Channel Port-Priority in VSS 6.27.7 Related Features and Best Practices
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
133
None.
Guidelines and Restrictions
To enable NSF on the routing protocol like OSPF following configuration is needed:
router ospf 6 nsf
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
134
None.
Having L3 MEC will have more quick and robust response to the change in the network topology.
Features Incompatible
None.
Guidelines and Restrictions
None.
Recommended Configuration
None.
Configuration Guide
None.
Proper Routing protocol design have numerous benefits that helps in keeping check on CPU utilization, traffic flowing across the VSL link, convergence and predictable flow of traffic.
Features Incompatible
None.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
135
None.
Recommended Configuration
None.
Configuration Guide
None.
Quick Reference to Best Practices for Cisco IOS on Catalyst 6500 Series Switches
136