cc/td/doc/product/rtrmgmt/vpnsc/mpls/1_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Monitoring VPN Performance

Monitoring VPN Performance

This chapter provides an overview of performance monitoring and data collection tasks. MPLS VPN Solution provides three types of performance monitoring:

MPLS VPN NetFlow Accounting

In the MPLS VPN Solution software, accounting data is collected to provide end-to-end usage information on VPN-based network traffic and to provide a complete billing solution. Collected accounting data is used by the Accounting server for various levels of aggregation for accounting reports and API accounting information.

NetFlow Collector (NFC) is the software that gathers flow statistics from Cisco IOS devices. It is used for data collection, filtering and aggregation. The NetFlow data is stored on the NetFlow workstations in binary flat files. Because NetFlow sends data from the router in User Datagram Protocol (UDP) packets, Cisco recommends that the NetFlow Collector 3.0 device be located on a LAN connected directly to the PE or the Management PE (MPE) device.

MPLS VPN Solution makes NetFlow "MPLS-aware." Thus, different service provider Customers can use the same IP address space, and MPLS VPN Solution can track the traffic flows for each individual VPN and Customer.

To use NetFlow and MPLS VPN Solution software to gather flow statistics, you must complete the following tasks:

Setting Up NetFlow Accounting on the Service Provider Network

Before you can use MPLS VPN Solution software to provide NetFlow accounting data, complete the following tasks in the service provider network:

    1. NetFlow Collector must be running.

    2. Issue the following commands once per PE:

ip flow-export version 5
ip flow-export destination ip_address port

    3. The Simple Network Management Protocol (SNMP) must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings on a router, see the "Setting Up SNMP on the Routers in the Service Provider Network" section.

    4. On the PE interfaces that face the CEs, enable interfaces with the following command:

ip route-cache flow

    5. To confirm that NetFlow is enabled and that traffic flows are being recorded, issue the following command on each NetFlow-enabled PE:

show ip cache flow
The output for this command shows the size of the packets, types of traffic, which interfaces the traffic enters and exits, as well as the source and destination addresses.

    6. NetFlow Collector uses a pre-allocated cache. By default, the NFC cache has 64K entries in which each flow (unidirectional) is assigned one entry. Each entry uses 68 bytes. You can expand the number of NetFlow Collector entries if traffic requirements and machine resources warrant, as follows:

ip flow-cache entries #
The ip flow-cache entries command is a global command executed on the PE.
The default size of the NetFlow cache is usually adequate. However, you can increase or decrease the number of entries maintained in the cache to meet the needs of your flow traffic rates. For environments with a high amount of flow traffic (such as an Internet core router), a larger value such as 131072 (128K) is recommended. To obtain information on your flow traffic, use the show ip cache flow command.
The default is 64K flow cache entries. Each cache entry is approximately 64 bytes of storage. Assuming a cache with the default number of entries, approximately 4 MB of DRAM would be required. Each time a new flow is taken from the free flow queue, the number of free flows is checked. If there are only a few free flows remaining, NetFlow attempts to age 30 flows using an accelerated timeout. If there is only one free flow remaining, NetFlow automatically ages 30 flows regardless of their age. The intent is to ensure free flow entries are always available.

Caution Cisco recommends that you do not change the NetFlow cache entries. Improper use of this feature could cause network problems. To return to the default NetFlow cache entries, use the no ip flow-cache entries global configuration command.

Configuring the NetFlow Collector Device

Complete the following tasks on each NetFlow Collector device in the service provider network:

    1. When you install NetFlow on the NetFlow Collector (NFC) device, configure a local user name and password. MPLS VPN Solution software uses this NFC user name and password to communicate with the NFC device.

    2. After NetFlow Collector 3.0 is installed, two configuration files must be modified so that MPLS VPN Solution software can import traffic data from the NFC device---the nf.resources file and the nfconfig.file. Both files are located on the NFC device at /opt/CSCOnfc/config.

    #Set format to Comma Separated for VPNSC:
    CSV_FORMAT yes
    #Use long file names with dates:
    LONG_OUTPUTFILE_SUFFIX yes
    
    #Use the Detail Call Record aggregation scheme for VPNSC:
    Thread DETCALLREC
    Aggregation DetailCallRecord
    Period 30
    Port 9996
    State Active
    DataSetPath /opt/CSCOnfc/Data
    Binary Yes
    Compression No
    Max Usage 100
    

Configuring NetFlow Accounting in MPLS VPN Solution

When NetFlow is set up in the service provider network and the NFC devices themselves, you can then configure NetFlow accounting in MPLS VPN Solution software. To do so, you must add the NFC devices to the network definition and enable NetFlow accounting.

    1. In order to collect traffic statistics from NetFlow Collector devices, the NFC devices must be configured as a target. For instructions, see the "Adding a NetFlow Collector Device to the Network" section.

    2. Enabling NetFlow accounting in MPLS VPN Solution software is part of adding a service for a specific PE-CE link. For information on where you enable NetFlow accounting in the product, see the "Specifying VRF Parameters" section.

Specifying the NetFlow Collector Devices in the Network

This procedure allows you to specify the NetFlow Collector devices in the network from which you want MPLS VPN Solution to collect accounting data. You also define the data collection schedule. This collection procedure assumes that the NetFlow Collector devices are configured in the network and have already collected data from the network.


Tips Cisco recommends that you schedule MPLS VPN Solution to collect data from the NetFlow Collector devices every three hours.

To collect VPN accounting data, follow these steps:


Step 1 From the VPN Console, choose Monitoring>Collect VPN Accounting Data.

The VPN Console Monitoring menu shown in Figure 5-1 provides the menu options from which you can access the performance collection tasks and their corresponding reports.


Figure 5-1: Monitoring Menu


Step 2 The first window is informational. Click Next to continue.

The Get Devices window allows you to specify the NetFlow Collector devices from which you wish MPLS VPN Solution to collect accounting information.

Step 3 From the Network drop-down menu, select the name of the network that the NetFlow Collector devices are in.

The upper panel displays all the available NetFlow Collector devices in the specified network.

Step 4 Click Add All.

The active list of NetFlow Collector devices is displayed in the lower panel.

If you need to remove some of NetFlow Collector devices from the active list, select the appropriate device and click Remove to remove a specific device; or click Remove All to remove all the NetFlow Collector devices from the active list.

When you are ready to choose the NetFlow Collector devices in the lower panel, click Next.

Step 5 Provide a unique task name for the data collection operation, then click Next.

The task name you enter here is listed in the Task Manager window and the Task Logs.

Defining the Data Collection Schedule

Step 6 Begin to schedule the task by selecting the Yes radio button and clicking Next.


Note Do not click Add until you have set all the other scheduling information in the Schedule window.

Step 7 To set the collection frequency schedule to once every three hours, click the Hourly radio button.

Step 8 In the Start Time fields, set the time you want MPLS VPN Solution to start collecting data from the NetFlow Collector devices.


Note Be sure to set the start time no less than fifteen minutes ahead of the current time.

Step 9 In the Every hour(s) drop-down menu, select 3.

Step 10 Set the duration of the collection task.

For detailed information about scheduling, refer to Chapter 11, "Scheduling," in the Cisco VPN Solutions Center: MPLS Solutions User Reference.

Step 11 Click Next to initiate and save the accounting collection task.

You are informed that all the steps are done.

Step 12 Click Close to close the wizard.

Now that you have collected data for accounting, you can view this data as directed in the next section "Viewing Accounting Reports."



Note Based on the number of data flows, it may take from between fifteen minutes to an hour after you initiate the collection operation before the analyzed data is available through the accounting reports.

Viewing Accounting Reports

NetFlow data is periodically procured from the NetFlow Collector workstations. MPLS VPN Solution analyzes the data to create the accounting reports:

Accounting reports, which are based on processed accounting data, provide network usage and planning information. Billing systems can get the traffic usage from the Accounting Server, which leverages collected accounting data and provides complete billing services to customers.

After collecting VPN accounting data, choose Monitoring>View Accounting Reports, then select the specific type of report you require (as shown in Figure 5-2).


Figure 5-2: Accounting Reports Menu


The time-based reports are as follows:

Displays total packets and total KB for traffic that can be mapped to the VPN (VPN Traffic) and otherwise to Unmappable Traffic.
Provides total packets and total K bytes for each application type.
Provides total packets and total KB for each customer plus additional reports for customer site and application type.
Reports on all traffic between PE to PE, plus additional reports for the following: 1) PE to connected CE, 2) PE to remote CE, 3) PE traffic, and 4) PE to CE.
Provides total packets and total KB for each type of service.
Provides information on all traffic volume for a specific customer between CE to CE in packets or KB (by type of service).
Provides information on all traffic volume between PE to PE in packets or KB (by type of service).
Provides information on all traffic between PE to CE (by TOS).

Note For more detail about the data provided in the reports and how to get to the specific information that you require, refer to "View Accounting Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS Solutions User Reference.

Setting Up SNMP on the Routers in the Service Provider Network

The Simple Network Management Protocol (SNMP) must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings on a router, execute the following steps for each router.

Step Command Description or Task
1

> telnet routername

routername is the name of the router you are checking.

2

Router> enable

Router> enable-password

Enter enable mode and enter the enable password.

3

Router# show snmp

4

Check the output to see whether the following statement is present: SNMP agent not enabled

5

Router# configure terminal

Enter global configuration mode. You can also abbreviate the command to config t.

6

Router(config)# snmp-server community userstring RO

Set the community read-only string.

7

Router(config)# snmp-server community userstring RW

Set the community read-write string

8

Router(config)# Ctrl+Z

Return to privileged Exec mode.

9

Router# copy running startup

Save the configuration changes to NVRAM.


Tips The SNMP strings defined in the MPLS VPN Solution target password database must agree with those set on each router in the service provider network. The procedure for setting the SNMP community strings in the MPLS VPN Solution software is described in the "Completing the Target Information for Individual Targets" section.

Monitoring Performance Through Service Level Agreements

MPLS VPN Solution software monitors performance through the service-level agreement (SLA) servers. An SLA defines a service provided by a service provider to any customer. MPLS VPN Solution monitors the service related performance criteria by provisioning and monitoring SLAs on routers that support the Service Assurance Agent (SA Agent) management information base (MIB). To provision the SLAs and to collect statistics for each SLA, the process of creating an SLA and collecting the data requires some user input, as described in this section.

The SLA server collects the relevant performance data, stores it persistently, and presents useful reports. The SLA server is based on the Service Assurance Agent (SA Agent) MIB. The MPLS VPN Solution software leverages the SA Agent MIB to monitor SLA performance. Service providers can monitor network traffic using any of the following protocols:

About the Service Assurance Agent Feature

The Service Assurance Agent (SA Agent) feature allows you to monitor network performance, network resources, and applications by measuring response times and availability. With this feature you can perform troubleshooting, problem notifications, and preventive analysis based on Service Assurance Agent statistics.

The SA Agent router uses the Cisco Round Trip Time Monitor (RTTMON) MIB. For more information on the RTTMON MIB, refer to the Cisco MIB User Quick Reference.

You can use the Service Assurance Agent feature to troubleshoot problems by checking the time delays between devices (such as between two CEs in a VPN) and the time delays on the path from the source device to the destination device at the protocol level.

You can also use this feature to send any combination of SNMP traps and SNA Alerts/Resolutions when one of the following has occurred: a user-configured threshold is exceeded, a connection is lost and reestablished, or when a timeout occurs. Thresholds can also be used to trigger additional collection of time delay statistics.

You can use this feature to perform preventive analysis by scheduling the Service Assurance Agent and collecting the results as history and accumulated statistics. You can then use the statistics to model and predict future network topologies.

Setting Up CEs for SLA Data Collection

You must enter some configuration changes on each CE and PE from which you want to collect performance data. To set up the CEs for SLAs, make sure the following conditions are met:

    1. SNMP must be enabled and the SNMP read-only and read-write community strings must be set on all the PEs and CEs in the service provider's network. For instructions, see the previous section, "Setting Up SNMP on the Routers in the Service Provider Network."

    2. The rtr responder software must be enabled on the CEs configured as SA Agent CEs. The rtr responder is automatically enabled when MPLS VPN Solution software provisions the SA Agent CE.

To enable the rtr responder software, enter the following command on each CE router that is running the SA Agent:
rtr responder

    3. To enable a UDP Echo SLA, enter the following command on the SA Agent CE router:

service udp-small-servers

    4. PEs and CEs in the Customer's VPN must be able to communicate with the HTTP server in the service provider network.

Verifying SA Agent Targets and IP Addresses in the Device Inventory Repository

Before you can create an SLA, the SA Agent CE router must be:

In addition, you must verify that the targets are assigned and the IP addresses are populated into the Device Inventory Repository for each target that is a source or destination for an SLA probe.


Tips  The SA Agent can gather performance information from CEs only when they are managed CEs. Make sure that when you add a CE to VPN Customer that the CE is configured as a managed CE with either Regular SA Agent status or Shadow SA Agent status enabled. For information on modifying an existing CE definition to enable SA Agent, see the "Editing Customer Site and Site CE Definitions" section.

To verify router targets and IP addresses in the Device Inventory Repository, follow these steps:


Step 1 Bring up the VPN Console. In the hierarchy pane under the Device Inventory, double-click the name of the desired network listed in the Networks folder.

The Network window is displayed, as shown in Figure 5-3.


Figure 5-3: Network Window


Step 2 Select a row that lists the target router.

Step 3 From the Network window, choose Actions > Edit Target.

Step 4 Choose the IP Addresses tab.

A complete list of all currently populated IP addresses for the selected target (router) is displayed.


Populating IP Address Information to the Device Inventory Repository

If all IP addresses are not listed, you must populate the IP addresses in the Device Inventory Repository database as follows:


Step 1 From the VPN Console, choose Monitoring > Configure Traps > Populate interface information for Cisco Router Targets.

Step 2 Step through the Populate Interface Information wizard.

This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.

Step 3 If only a few IP address are missing, you can individually add IP addresses and click the Add button for each addition.

Refer to "Adding a New Router to the Network" section for the steps to do this.


Creating an SLA

Each Service Level Agreement (SLA) is associated with a customer, the source and destination addresses on the target CEs, the protocol used for the SA Agent probe, and the threshold for delay. When you create an SLA, MPLS VPN Solution software creates an SA Agent probe on the target CE router. To create an SLA, follow these steps:


Step 1 From the VPN Console, choose Monitoring>Provision SLA Definitions and Collect SLA Data.

Step 2 The first wizard window is informational. Click Next to continue.

The Specify SLA Operation window appears.


Figure 5-4:
Specifying the SLA Operation


As shown in Figure 5-4, you can create an SLA, delete an SLA, or collect data for SLA monitoring.

Step 3 To create an SLA in MPLS VPN Solution, choose Create SLA, then click Next.

The window shown in Figure 5-5 displays, which directs you to select the source CE (or CEs)---that is, the CE you select here sends the SLA probe.


Figure 5-5: Selecting CEs


Step 4 Select one or more source CEs for the SLA probe, then click Next.

To select multiple CEs from the list, hold down the Ctrl key and click the items.

The next window directs you to indicate the source IP address for the source CE.


Figure 5-6: Select Source IP Address for SLA Probe


Step 5 From the drop-down list, choose the IP address for the appropriate interface on the source CE. The name of the selected CE is displayed to the left of the IP address.

When finished, click Next.

The next window directs you to specify the common parameters for the SLA.


Figure 5-7: Specify SLA Common Parameters


Step 6 Enter the values for the SLA parameters common to each of the SLA protocols, then click Next.

The fields in the SLA Common Parameters window are as follows:

.
Table 5-1: Meanings of TOS Values
ToS Value Binary Value Meaning

7

111

In contract, best class

6

110

In contract, second best class

5

101

In contract, third best class

4

100

In contract, worst class

3

011

Out of contract, best class

2

010

Out of contract, second best class

1

001

Out of contract, third best class

0

000

Out of contract, worst class

The next window directs you to specify the type of SLA protocol and set its corresponding parameters.


Figure 5-8: Select SLA Protocol and Set Parameters


Step 7 Select one or more SLA protocols and enter the values for the fields associated with them.


Note Be sure to select the appropriate Destination CE and the corresponding Destination IP Address. Then complete the other fields as necessary.

You can add additional protocols as desired.

Step 8 When finished specifying the SLA protocol probes, click Add. Then click Next.

For details on the parameters and values for each SLA protocol listed here, refer to "Provision SLA Definitions and Collect SLA Data" in Chapter 8 of the Cisco VPN Solutions Center: MPLS Solution User Reference.

Step 9 Enter the task name, then click Next.

Step 10 Choose the defaul, (Yes) to proceed to schedule the task, then click Next.

Step 11 From the Schedule window, set all the pertinent scheduling information, then click Add.

The SLA is added to the Schedule List (and displayed in the upper pane).

Step 12 Click Next twice, then click Close.


Configuring MPLS VPN Solution to Collect SA Agent Data for an SLA

When you collect data for SLA monitoring, MPLS VPN Solution software downloads SLA statistics collected over the last hour from one or more specified routers. The specified routers must have the SA Agent probes configured on them. For information on defining a CE as a router running SA Agent, see the "Defining the Customer Sites" section.


Note When you initially create an SLA, you must wait at least sixty minutes before attempting to collect SLA data. If you try to collect SLA data before sixty minutes elapses, the data will not yet be available and the SLA reports will be empty.

To collect SA Agent data for SLAs, follow these steps:


Step 1 From the VPN Console, choose Monitoring >Provision SLA Definitions and Collect SLA Data.

Step 2 The first wizard window is informational. Click Next to continue.

The Specify SLA Operation window is displayed. From this window, you can choose to create an SLA, delete an SLA, or collect data for SLA monitoring.

Step 3 Choose Collect Data for SLA Monitoring, then click Next.

The window shown in Figure 5-9 appears and directs you to select the source CE for the SLA probe (or CEs). The CE you select here sends the SLA probe to the routers that have SA Agent enabled.


Figure 5-9: Select Source CE for SLA Probe


Step 4 Choose the appropriate Customer from the Customer drop-down list.

Step 5 Choose the appropriate VPN from the VPN drop-down list.

Step 6 Select one or more CEs from which you want to collect SLA data, then click Next.

Step 7 Provide a unique task name, then click Next.

Step 8 You can choose to schedule the task.

For detailed information about scheduling, refer to Chapter 11, "Scheduling," in the Cisco VPN Solutions Center: MPLS Solutions User Reference.

Step 9 To save the SA Agent collection task, click Next.

If you chose to schedule the SA Agent collection task, that will also occur.

You are informed that all steps are done.

Step 10 Click Close to close the wizard.

When you have collected data for SLAs, you can view the data (see the "Viewing SLA Reports" section).


Deleting an SLA

Deleting an SLA from MPLS VPN Solution deletes an SA Agent probe from the source CE router.


Step 1 From the VPN Console, choose Monitoring>Provision SLA Definitions and Collect SLA Data.

Step 2 The first wizard window is informational. Click Next to continue.

The Specify SLA Operation window is displayed (as shown in Figure 5-4).

Step 3 To delete an SLA in MPLS VPN Solution, choose Delete SLA, then click Next.

The window shown in Figure 5-10 appears.


Figure 5-10: Select Source CE of SLA


Step 4 In the Customer and VPN drop-down lists, select the pertinent Customer name and VPN name.

The CE pane lists all the CEs in the selected VPN that are running SA Agent.

Step 5 Select the name of the source CE for the SLA probe you want to delete, then click Next.

The next window directs you to select the SLA you want to delete.


Figure 5-11: Select SLAs to Delete


Step 6 Click the appropriate lines in the list to select the SLAs you want to delete, then click Next.

To select multiple items, hold down the Ctrl key and click each item you want to add.

Step 7 Enter the task name, then click Next.

Step 8 Choose the default (Yes) to proceed to schedule the task, then click Next.

Step 9 From the Schedule window, set all the pertinent scheduling information, then click Add.

The SLA deletion request is added to the Schedule List (and displayed in the upper pane).

Step 10 Click Next twice, then click Close.


Viewing SLA Reports

After collecting SA Agent data for SLA, choose Monitoring>View SLA Reports, then select the specific type of report you require.


Note For details on each type of SLA report, refer to "View SLA Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS VPN User Reference.


Figure 5-12: SLA Reports Menu


The specific report types are as follows:

These reports are time-based reports that show the following parameters: Connectivity as a percentage, Maximum Delay in milliseconds, and Threshold Violation as a percentage. These parameters are available in annual, monthly, weekly, daily, and hourly reports. For each parameter, you can generate detailed reports that show more related parameters. The reports can be organized by source router (the source CE of the SLA), SLA identifier, customer name, or VPN name.
Displays statistics that are measured only by Voice Jitter SLAs originated in a selected router. The reports are time-based. They show hourly, daily, weekly, monthly, and annual data and can be organized by SLA ID, destination router, VPN, Customer, or Unspecified.
Displays statistics that are measured only by HTTP SLAs. The reports are time-based, and they show data in the following time increments: hourly, daily, weekly, monthly, and annually. Data can be organized by SLA ID, source router, VPN, or Customer.
The Summary HTTP Report displays the connectivity, maximum delay, and threshold violation (as in the Summary Report). The Stages HTTP Report displays the round trip time, timeouts, and the error distribution among different HTTP stages: DNS lookup, TCP connect, and Transaction.
Shows the packet drop percentage among CEs of a specific customer. This information is measured only for the SLAs with the jitter protocol. The reports are organized by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
Shows the maximum, minimum, and average round-trip time (in milliseconds) among the CEs of a specific customer. The statistics are for all the probe types. The reports are organized by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
Shows the packet drop percentage among all the shadow SA Agent CEs in the network. The network packet drop between PEs is measured by the shadow SA Agent CEs that are connected to the PEs. This information is measured only for the SLAs with the jitter protocol. The reports are organized by class of service. The reports are annually, monthly, weekly, daily, and hourly. You can navigate along the time scale.
Shows the maximum, minimum, and average round-trip time among shadow SA Agent CEs in the network. The statistics are for all the probe types. The reports are aggregated by class of service. The reports are annually, monthly, weekly, daily, and hourly. The user can navigate along the time scale.
Shows all the SLAs on the SA Agent routers from which data was collected. The SLA Definition report shows the SLA ID given to each SLA. SLAs in the report may have been deleted but are kept in the SLA Definition to match the old collected data.

Monitoring Data with the Committed Access Rate MIB

Committed Access Rate (CAR) is the underlying software base for both packet classification and access rate-limiting functionality. CAR provides the status for each interface on each router configured with CAR. CAR controls IP traffic transmission rates into the network during periods of network congestion. CAR achieves this control through rate limiting (with burst capabilities), and classifies and marks packets using IP precedence and QoS group settings.

CAR provides several fundamental capabilities:

CAR can identify traffic of interest for limiting access rate or setting the precedence (or both). Rate policies can be associated with one of the following:

  • All IP traffic

  • IP precedence (defined by a rate-limit access list)

  • QoS group

  • MAC address (defined by a rate-limit access list)

  • IP access list (standard and extended)

CAR utilizes a token bucket measurement mechanism. Tokens are inserted into the bucket at the committed rate. The depth of the bucket is the burst size. When traffic arrives at the bucket, if sufficient tokens are available, the traffic is said to conform and the corresponding number of tokens are removed from the bucket. If sufficient tokens are not available, the traffic is said to exceed. Note that unlike leaky bucket implementations, the token bucket does not delay the traffic.
The network operator can specify policies to be executed for traffic, which either conforms to or exceeds a specified rate limit.

Rate-Limiting Functionality

CAR's rate-limiting functionality provides the network operator with the means to define Layer 3 aggregate or granular access or egress bandwidth rate limits and to specify traffic handling policies when the traffic either conforms to or exceeds the specified rate limits. Aggregate access means matching all of the packets on an interface or subinterface. Granular access means matching a particular type of traffic based on precedence, MAC address, or other parameters.
You can specify CAR rate-limiting policies based on criteria including physical port, packet classification, IP address, MAC address, application flow, or other criteria specifiable by access lists or extended access lists. CAR rate limits can be implemented either on input or output interfaces or subinterfaces including frame relay and ATM subinterfaces.
CAR utilizes a token bucket; thus CAR can pass temporary bursts that exceed the rate limit as long as tokens are available. CAR does not smooth or shape the traffic and thus does no buffering (and adds no delay). CAR provides managed discard between the excess burst and extended excess burst parameters and CAR is highly optimized to run on high-speed links.
CAR also includes a new set of algorithms that provide highly efficient execution of aggregate rate limits (matching all traffic on an interface or subinterface), as well as rate limits that match specific IP precedence values and MAC addresses.

Setting Up the Service Provider Network for CAR

Setting up the service provider network in preparation for generating and collecting CAR data requires the following steps:

    1. Configure each PE and CE in the network.

    2. Populate the router's interface information to the Repository.

This task is performed in MPLS VPN Solution software.

    3. Poll each router's CAR MIB.

This task is performed in MPLS VPN Solution software.

Platform and Cisco IOS Support

CAR does not run on all Cisco routers. At this time, CAR is supported on the following platforms:

CAR requires Cisco IOS 12.0(7) or later.

Distributed CAR (DCAR) is supported on Cisco 7000 series routers with a route switch processor-based RSP7000 interface processor or a Cisco 7500 series router with a Versatile Interface Processor-based VIP2-40 or greater interface processor.

CAR and DCAR can be configured on an interface or subinterface. However, CAR and DCAR are not supported on Fast EtherChannel, tunnel, or PRI interfaces, nor on any interface that does not support Cisco Express Forwarding (CEF). CEF must be enabled on the interface before configuring CAR or DCAR.


Note Cisco assumes that a service provider network administrator is responsible for configuring CAR on the network's PEs and managed CEs.

CAR reports are organized by both the Network and the Customer. You can generate Customer reports only if CAR is configured the CEs and data has been collected from the CEs. To generate Customer-based reports, CEs collecting CAR data must be managed CEs.

Setting Up SNMP on the Routers

SNMP must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings, execute the following steps for each router.

Step Command Description or Task
1

> telnet routername

routername is the name of the router you are checking.

2

Router> enable

Router> enable-password

Enter enable mode and enter the enable password.

3

Router# show snmp

4

Check the output to see whether the following statement is present: SNMP agent not enabled

5

Router# configure terminal

Enter global configuration mode. You can also abbreviate the command to config t.

6

Router(config)# snmp-server community userstring RO

Set the community read-only string.

7

Router(config)# snmp-server community userstring RW

Set the community read-write string

8

Router(config)# Ctrl+Z

Return to privileged Exec mode.

9

Router# copy running startup

Save the configuration changes to NVRAM.


Note These SNMP strings defined in the MPLS VPN Solution target password database must agree with those set on each router in the service provider network. The procedure for setting the SNMP community strings in the MPLS VPN Solution software is described in the "Completing the Target Information for Individual Targets" section.

Simple CAR Configuration Example

The following configuration example illustrates how to configure a basic CAR policy that allows all IP traffic.

In the example, assume the network operator delivered a physical T3 link to the customer, but offered a less expensive 20 MBPS subrate service. The customer pays only for the subrate bandwidth, which can be upgraded with additional access bandwidth.

The CAR policy configured here limits the traffic rate available to the customer and delivered to the network to the agreed upon rate limit, plus providing the ability to briefly burst over the limit.

interface hssi 0/0/0
rate-limit output 200000000 24000 3200 conform-action transmit exceed-action drop
ip address 209.165.200.225 255.255.255.0

To verify the configuration and monitor CAR statistics, use the show interfaces rate-limit command:

Router# show interfaces hssi 0/0/0 rate-limit

Setting Up CAR Data Collection in MPLS VPN Solution

To gather and view CAR data in MPLS VPN Solution software, you must complete two tasks:

Populating Interface Information to the Device Inventory Repository

Prior to polling a router's CAR MIB, you must populate the router interfaces.

To populate the interface information for all managed devices in the Device Inventory Repository, follow these steps:


Step 1 From the VPN Console, choose Monitoring>Configure Traps > Populate interface information for Cisco Router Targets.

Step 2 Step through the Populate Interface Information wizard.

This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.


Polling a Router's CAR MIB

To poll a router's CAR MIB, follow these steps:


Step 1 From the VPN Console, choose Tools > Tasks.

The Task Manager window appears.

Step 2 From the Task Manager window, choose Actions > New Task.

The Task Chooser window appears.


Figure 5-13: Task Chooser Window


Step 3 From the task list, choose Poll a Router's CAR MIB, then click OK.

This wizard creates a task to poll the selected Cisco routers for data from the CAR MIB.

Step 4 Click Next twice to step through the introductory windows.

The next window allows you to specify which devices to poll for CAR information.


Figure 5-14: Specify CAR Devices


Step 5 From the Network drop-down list, choose the pertinent network.

This window has two panels. The upper panel displays the routers in the selected network. The lower panel will display the routers you want to be polled for CAR data.

Step 6 From the upper panel, select the routers you want to be polled for CAR data.

When you click Add or Add All, the selected routers are displayed in the lower panel.

If you need to remove any of the routers from the lower panel, click Remove to remove individual routers; or click Remove All to remove the entire list from the lower panel.

Step 7 When finished defining the list of routers to be polled, click Next.

Step 8 Enter the task name, then click Next.

Step 9 Choose the default (Yes) to proceed to schedule the task, then click Next.

Step 10 From the Schedule window, set all the pertinent scheduling information, then click Add.


Tips Cisco recommends that you schedule the polling task to occur every fifteen minutes. This requires four separate tasks to be scheduled, each starting fifteen minutes apart and reoccurring every hour.


Note You may discover that you need to increase the frequency of polling for CAR data, depending on the speed of the device interfaces and the volume of traffic on the router that is being polled.

The polling request is added to the Schedule List (displayed in the upper pane).

Step 11 Click Next twice, then click Close.


Viewing CAR MIB Reports

The CAR MIB status data is collected in the Repository. The report data is organized first by Customer and Network. Each of these reports can be generated on an hourly, daily, weekly, monthly, and yearly basis.


Step 1 To view the data, choose Monitoring > View CAR MIB Reports.

Step 2 From the menu, choose either By Customer or By Network.


For detailed information on these reports, refer to "View CAR MIB Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS VPN Solution User Reference.

Configuring Traps

Router configuration files are usually collected at regular intervals and then examined for changes that affect the way the routers function. The normal collection process does not separate the routers whose configuration files have changed from the routers whose configuration files have not changed. However, the routers whose configuration files have changed are the only ones that need to be collected. SmartCollector finds the routers whose configuration files have changed and puts them in a group to have their configuration files collected.

With SmartCollector, MPLS VPN Solution creates a task and schedules it to be run once. When the task executes, all the targeted routers are instructed to advise the MPLS VPN Solution software that uses the Simple Network Management Protocol (SNMP) of any change to their configuration files. MPLS VPN Solution, through the trapcatcher daemon, notes these traps and keeps track of the routers whose configuration files have changed, and thus need to be collected. The purpose of configuring traps (through SmartCollector) is to efficiently collect router configuration files from a set of routers grouped by network.

An example of the potential substantial savings is a scenario in which a network has 200 routers but the configuration files for only 20 of the routers have changed. In this example, SmartCollector only collects the configuration files for the 20 that have changed rather than for all 200 routers. If on average only 10 percent of the routers have their configuration files changed between scheduled collections, each SmartCollection takes only 10 percent of the resources of a full collection.

Note that periodically (as determined by the cycle_t variable in the etc/csm.properties file), the scheduler ignores the reduced target list and collects from all routers in the original target list. Thus even those routers whose traps failed to reach the MPLS VPN Solution are collected periodically.

Populating Router Interface Information to the Repository

Prior to registering the configuration file change traps, you must populate the router interface information in the Repository, as follows:


Step 1 From the VPN Console, choose Monitoring>Configure Traps > Populate interface information for Cisco Router Targets.

Step 2 Step through the Populate Interface Information wizard.


This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.

This information is used to create the various accounting reports and to map the "config-change" traps to the appropriate routers.

Registering for Config-Change Traps

This section explains how to register config-change traps, which indicates the routers for which data will be collected only if the routers have changed.


Step 1 From the VPN Console, choose Monitoring>Configure Traps > Register for Config-Change Traps.

This wizard configures selected Cisco routers to send "config-change" traps to the current MPLS VPN Solution workstation. This enables SmartCollection, through which configuration files are collected only from those routers whose configuration files have changed.


Note If configuration file collection tasks are running and you initiate SmartCollection by registering for traps, the PEs must be IOS version 12.x to return traps.

Step 2 Step through the wizard.


Deregistering for Config-Change Traps

This section explains how to deregister config-change traps.


Step 1 From the VPN Console, choose Monitoring>Configure Traps > Deregister for Config-Change Traps.

This wizard configures selected Cisco routers to stop sending "config-change" traps to the current MPLS VPN Solution workstation. The selected routers will no longer be part of SmartCollection, through which configuration files are collected only from those routers whose configuration files have changed.

Step 2 Step through the wizard.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Apr 21 10:59:56 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.