|
|
This chapter provides an overview of performance monitoring and data collection tasks. MPLS VPN Solution provides three types of performance monitoring:
In the MPLS VPN Solution software, accounting data is collected to provide end-to-end usage information on VPN-based network traffic and to provide a complete billing solution. Collected accounting data is used by the Accounting server for various levels of aggregation for accounting reports and API accounting information.
MPLS VPN Solution makes NetFlow "MPLS-aware." Thus, different service provider Customers can use the same IP address space, and MPLS VPN Solution can track the traffic flows for each individual VPN and Customer.
To use NetFlow and MPLS VPN Solution software to gather flow statistics, you must complete the following tasks:
1. NetFlow Collector must be running.
ip_address port3. The Simple Network Management Protocol (SNMP) must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings on a router, see the "Setting Up SNMP on the Routers in the Service Provider Network" section.
4. On the PE interfaces that face the CEs, enable interfaces with the following command:
![]() |
Caution Cisco recommends that you do not change the NetFlow cache entries. Improper use of this feature could cause network problems. To return to the default NetFlow cache entries, use the no ip flow-cache entries global configuration command. |
Complete the following tasks on each NetFlow Collector device in the service provider network:
1. When you install NetFlow on the NetFlow Collector (NFC) device, configure a local user name and password. MPLS VPN Solution software uses this NFC user name and password to communicate with the NFC device.
2. After NetFlow Collector 3.0 is installed, two configuration files must be modified so that MPLS VPN Solution software can import traffic data from the NFC device---the nf.resources file and the nfconfig.file. Both files are located on the NFC device at /opt/CSCOnfc/config.
#Set format to Comma Separated for VPNSC:CSV_FORMAT yes#Use long file names with dates:LONG_OUTPUTFILE_SUFFIX yes
#Use the Detail Call Record aggregation scheme for VPNSC:Thread DETCALLRECAggregation DetailCallRecordPeriod 30Port 9996State ActiveDataSetPath /opt/CSCOnfc/DataBinary YesCompression NoMax Usage 100
![]() |
Note Without these statements in the nfconfig.file, the VPN accounting reports cannot display information. |
When NetFlow is set up in the service provider network and the NFC devices themselves, you can then configure NetFlow accounting in MPLS VPN Solution software. To do so, you must add the NFC devices to the network definition and enable NetFlow accounting.
1. In order to collect traffic statistics from NetFlow Collector devices, the NFC devices must be configured as a target. For instructions, see the "Adding a NetFlow Collector Device to the Network" section.
2. Enabling NetFlow accounting in MPLS VPN Solution software is part of adding a service for a specific PE-CE link. For information on where you enable NetFlow accounting in the product, see the "Specifying VRF Parameters" section.
![]() |
Tips Cisco recommends that you schedule MPLS VPN Solution to collect data from the NetFlow Collector devices every three hours. |
To collect VPN accounting data, follow these steps:
The VPN Console Monitoring menu shown in Figure 5-1 provides the menu options from which you can access the performance collection tasks and their corresponding reports.

Step 2 The first window is informational. Click Next to continue.
Step 3 From the Network drop-down menu, select the name of the network that the NetFlow Collector devices are in.
The upper panel displays all the available NetFlow Collector devices in the specified network.
Step 4 Click Add All.
The active list of NetFlow Collector devices is displayed in the lower panel.
If you need to remove some of NetFlow Collector devices from the active list, select the appropriate device and click Remove to remove a specific device; or click Remove All to remove all the NetFlow Collector devices from the active list.
When you are ready to choose the NetFlow Collector devices in the lower panel, click Next.
Step 5 Provide a unique task name for the data collection operation, then click Next.
The task name you enter here is listed in the Task Manager window and the Task Logs.
Defining the Data Collection Schedule
Step 6 Begin to schedule the task by selecting the Yes radio button and clicking Next.
![]() |
Note Do not click Add until you have set all the other scheduling information in the Schedule window. |
Step 7 To set the collection frequency schedule to once every three hours, click the Hourly radio button.
Step 8 In the Start Time fields, set the time you want MPLS VPN Solution to start collecting data from the NetFlow Collector devices.
![]() |
Note Be sure to set the start time no less than fifteen minutes ahead of the current time. |
Step 9 In the Every hour(s) drop-down menu, select 3.
Step 10 Set the duration of the collection task.
For detailed information about scheduling, refer to Chapter 11, "Scheduling," in the Cisco VPN Solutions Center: MPLS Solutions User Reference.
Step 11 Click Next to initiate and save the accounting collection task.
You are informed that all the steps are done.
Step 12 Click Close to close the wizard.
Now that you have collected data for accounting, you can view this data as directed in the next section "Viewing Accounting Reports."
![]() |
Note Based on the number of data flows, it may take from between fifteen minutes to an hour after you initiate the collection operation before the analyzed data is available through the accounting reports. |
NetFlow data is periodically procured from the NetFlow Collector workstations. MPLS VPN Solution analyzes the data to create the accounting reports:
After collecting VPN accounting data, choose Monitoring>View Accounting Reports, then select the specific type of report you require (as shown in Figure 5-2).

The time-based reports are as follows:
![]() |
Note For more detail about the data provided in the reports and how to get to the specific information that you require, refer to "View Accounting Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS Solutions User Reference. |
| Step | Command | Description or Task |
| 1 | | routername is the name of the router you are checking. |
| 2 | Router> enable-password | Enter enable mode and enter the enable password. |
| 3 | |
|
| 4 | | Check the output to see whether the following statement is present: SNMP agent not enabled |
| 5 |
| Enter global configuration mode. You can also abbreviate the command to config t. |
| 6 | | Set the community read-only string. |
| 7 | | Set the community read-write string |
| 8 | | Return to privileged Exec mode. |
| 9 | | Save the configuration changes to NVRAM. |
![]() |
Tips The SNMP strings defined in the MPLS VPN Solution target password database must agree with those set on each router in the service provider network. The procedure for setting the SNMP community strings in the MPLS VPN Solution software is described in the "Completing the Target Information for Individual Targets" section. |
MPLS VPN Solution software monitors performance through the service-level agreement (SLA) servers. An SLA defines a service provided by a service provider to any customer. MPLS VPN Solution monitors the service related performance criteria by provisioning and monitoring SLAs on routers that support the Service Assurance Agent (SA Agent) management information base (MIB). To provision the SLAs and to collect statistics for each SLA, the process of creating an SLA and collecting the data requires some user input, as described in this section.
The SLA server collects the relevant performance data, stores it persistently, and presents useful reports. The SLA server is based on the Service Assurance Agent (SA Agent) MIB. The MPLS VPN Solution software leverages the SA Agent MIB to monitor SLA performance. Service providers can monitor network traffic using any of the following protocols:
The Service Assurance Agent (SA Agent) feature allows you to monitor network performance, network resources, and applications by measuring response times and availability. With this feature you can perform troubleshooting, problem notifications, and preventive analysis based on Service Assurance Agent statistics.
The SA Agent router uses the Cisco Round Trip Time Monitor (RTTMON) MIB. For more information on the RTTMON MIB, refer to the Cisco MIB User Quick Reference.
You can use the Service Assurance Agent feature to troubleshoot problems by checking the time delays between devices (such as between two CEs in a VPN) and the time delays on the path from the source device to the destination device at the protocol level.
You can also use this feature to send any combination of SNMP traps and SNA Alerts/Resolutions when one of the following has occurred: a user-configured threshold is exceeded, a connection is lost and reestablished, or when a timeout occurs. Thresholds can also be used to trigger additional collection of time delay statistics.
You can use this feature to perform preventive analysis by scheduling the Service Assurance Agent and collecting the results as history and accumulated statistics. You can then use the statistics to model and predict future network topologies.
1. SNMP must be enabled and the SNMP read-only and read-write community strings must be set on all the PEs and CEs in the service provider's network. For instructions, see the previous section, "Setting Up SNMP on the Routers in the Service Provider Network."
![]() |
Note The command syntax does not reflect the current terminology for the SA Agent. The terms "rtr" and SA Agent are equivalent. |
4. PEs and CEs in the Customer's VPN must be able to communicate with the HTTP server in the service provider network.
Before you can create an SLA, the SA Agent CE router must be:
In addition, you must verify that the targets are assigned and the IP addresses are populated into the Device Inventory Repository for each target that is a source or destination for an SLA probe.
![]() |
Tips The SA Agent can gather performance information from CEs only when they are managed CEs. Make sure that when you add a CE to VPN Customer that the CE is configured as a managed CE with either Regular SA Agent status or Shadow SA Agent status enabled. For information on modifying an existing CE definition to enable SA Agent, see the "Editing Customer Site and Site CE Definitions" section. |
To verify router targets and IP addresses in the Device Inventory Repository, follow these steps:
The Network window is displayed, as shown in Figure 5-3.

Step 2 Select a row that lists the target router.
Step 3 From the Network window, choose Actions > Edit Target.
Step 4 Choose the IP Addresses tab.
Step 2 Step through the Populate Interface Information wizard.
This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.
Step 3 If only a few IP address are missing, you can individually add IP addresses and click the Add button for each addition.
Refer to "Adding a New Router to the Network" section for the steps to do this.
Step 2 The first wizard window is informational. Click Next to continue.
The Specify SLA Operation window appears.

As shown in Figure 5-4, you can create an SLA, delete an SLA, or collect data for SLA monitoring.
Step 3 To create an SLA in MPLS VPN Solution, choose Create SLA, then click Next.
The window shown in Figure 5-5 displays, which directs you to select the source CE (or CEs)---that is, the CE you select here sends the SLA probe.

Step 4 Select one or more source CEs for the SLA probe, then click Next.
To select multiple CEs from the list, hold down the Ctrl key and click the items.
The next window directs you to indicate the source IP address for the source CE.

Step 5 From the drop-down list, choose the IP address for the appropriate interface on the source CE. The name of the selected CE is displayed to the left of the IP address.
When finished, click Next.
The next window directs you to specify the common parameters for the SLA.

Step 6 Enter the values for the SLA parameters common to each of the SLA protocols, then click Next.
The fields in the SLA Common Parameters window are as follows:
.
| ToS Value | Binary Value | Meaning |
|---|---|---|
7 | 111 | In contract, best class |
6 | 110 | In contract, second best class |
5 | 101 | In contract, third best class |
4 | 100 | In contract, worst class |
3 | 011 | Out of contract, best class |
2 | 010 | Out of contract, second best class |
1 | 001 | Out of contract, third best class |
0 | 000 | Out of contract, worst class |
The next window directs you to specify the type of SLA protocol and set its corresponding parameters.

Step 7 Select one or more SLA protocols and enter the values for the fields associated with them.
![]() |
Note Be sure to select the appropriate Destination CE and the corresponding Destination IP Address. Then complete the other fields as necessary. |
You can add additional protocols as desired.
Step 8 When finished specifying the SLA protocol probes, click Add. Then click Next.
For details on the parameters and values for each SLA protocol listed here, refer to "Provision SLA Definitions and Collect SLA Data" in Chapter 8 of the Cisco VPN Solutions Center: MPLS Solution User Reference.
Step 9 Enter the task name, then click Next.
Step 10 Choose the defaul, (Yes) to proceed to schedule the task, then click Next.
Step 11 From the Schedule window, set all the pertinent scheduling information, then click Add.
The SLA is added to the Schedule List (and displayed in the upper pane).
Step 12 Click Next twice, then click Close.
When you collect data for SLA monitoring, MPLS VPN Solution software downloads SLA statistics collected over the last hour from one or more specified routers. The specified routers must have the SA Agent probes configured on them. For information on defining a CE as a router running SA Agent, see the "Defining the Customer Sites" section.
![]() |
Note When you initially create an SLA, you must wait at least sixty minutes before attempting to collect SLA data. If you try to collect SLA data before sixty minutes elapses, the data will not yet be available and the SLA reports will be empty. |
To collect SA Agent data for SLAs, follow these steps:
Step 2 The first wizard window is informational. Click Next to continue.
The Specify SLA Operation window is displayed. From this window, you can choose to create an SLA, delete an SLA, or collect data for SLA monitoring.
Step 3 Choose Collect Data for SLA Monitoring, then click Next.
The window shown in Figure 5-9 appears and directs you to select the source CE for the SLA probe (or CEs). The CE you select here sends the SLA probe to the routers that have SA Agent enabled.

Step 4 Choose the appropriate Customer from the Customer drop-down list.
Step 5 Choose the appropriate VPN from the VPN drop-down list.
Step 6 Select one or more CEs from which you want to collect SLA data, then click Next.
Step 7 Provide a unique task name, then click Next.
Step 8 You can choose to schedule the task.
For detailed information about scheduling, refer to Chapter 11, "Scheduling," in the Cisco VPN Solutions Center: MPLS Solutions User Reference.
Step 9 To save the SA Agent collection task, click Next.
If you chose to schedule the SA Agent collection task, that will also occur.
You are informed that all steps are done.
Step 10 Click Close to close the wizard.
When you have collected data for SLAs, you can view the data (see the "Viewing SLA Reports" section).
Deleting an SLA from MPLS VPN Solution deletes an SA Agent probe from the source CE router.
Step 2 The first wizard window is informational. Click Next to continue.
The Specify SLA Operation window is displayed (as shown in Figure 5-4).
Step 3 To delete an SLA in MPLS VPN Solution, choose Delete SLA, then click Next.
The window shown in Figure 5-10 appears.

Step 4 In the Customer and VPN drop-down lists, select the pertinent Customer name and VPN name.
The CE pane lists all the CEs in the selected VPN that are running SA Agent.
Step 5 Select the name of the source CE for the SLA probe you want to delete, then click Next.
The next window directs you to select the SLA you want to delete.

Step 6 Click the appropriate lines in the list to select the SLAs you want to delete, then click Next.
To select multiple items, hold down the Ctrl key and click each item you want to add.
Step 7 Enter the task name, then click Next.
Step 8 Choose the default (Yes) to proceed to schedule the task, then click Next.
Step 9 From the Schedule window, set all the pertinent scheduling information, then click Add.
The SLA deletion request is added to the Schedule List (and displayed in the upper pane).
Step 10 Click Next twice, then click Close.
![]() |
Note For details on each type of SLA report, refer to "View SLA Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS VPN User Reference. |

The specific report types are as follows:
CAR provides several fundamental capabilities:
Setting up the service provider network in preparation for generating and collecting CAR data requires the following steps:
1. Configure each PE and CE in the network.
2. Populate the router's interface information to the Repository.
3. Poll each router's CAR MIB.
CAR does not run on all Cisco routers. At this time, CAR is supported on the following platforms:
CAR requires Cisco IOS 12.0(7) or later.
Distributed CAR (DCAR) is supported on Cisco 7000 series routers with a route switch processor-based RSP7000 interface processor or a Cisco 7500 series router with a Versatile Interface Processor-based VIP2-40 or greater interface processor.
CAR and DCAR can be configured on an interface or subinterface. However, CAR and DCAR are not supported on Fast EtherChannel, tunnel, or PRI interfaces, nor on any interface that does not support Cisco Express Forwarding (CEF). CEF must be enabled on the interface before configuring CAR or DCAR.
![]() |
Note Cisco assumes that a service provider network administrator is responsible for configuring CAR on the network's PEs and managed CEs. |
SNMP must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings, execute the following steps for each router.
| Step | Command | Description or Task |
| 1 | | routername is the name of the router you are checking. |
| 2 | Router> enable-password | Enter enable mode and enter the enable password. |
| 3 | |
|
| 4 | | Check the output to see whether the following statement is present: SNMP agent not enabled |
| 5 |
| Enter global configuration mode. You can also abbreviate the command to config t. |
| 6 | | Set the community read-only string. |
| 7 | | Set the community read-write string |
| 8 | | Return to privileged Exec mode. |
| 9 | | Save the configuration changes to NVRAM. |
![]() |
Note These SNMP strings defined in the MPLS VPN Solution target password database must agree with those set on each router in the service provider network. The procedure for setting the SNMP community strings in the MPLS VPN Solution software is described in the "Completing the Target Information for Individual Targets" section. |
In the example, assume the network operator delivered a physical T3 link to the customer, but offered a less expensive 20 MBPS subrate service. The customer pays only for the subrate bandwidth, which can be upgraded with additional access bandwidth.
The CAR policy configured here limits the traffic rate available to the customer and delivered to the network to the agreed upon rate limit, plus providing the ability to briefly burst over the limit.
interface hssi 0/0/0rate-limit output 200000000 24000 3200 conform-action transmit exceed-action dropip address 209.165.200.225 255.255.255.0
To verify the configuration and monitor CAR statistics, use the show interfaces rate-limit command:
Router# show interfaces hssi 0/0/0 rate-limit
To gather and view CAR data in MPLS VPN Solution software, you must complete two tasks:
Prior to polling a router's CAR MIB, you must populate the router interfaces.
To populate the interface information for all managed devices in the Device Inventory Repository, follow these steps:
Step 2 Step through the Populate Interface Information wizard.
This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.
To poll a router's CAR MIB, follow these steps:
The Task Manager window appears.
Step 2 From the Task Manager window, choose Actions > New Task.
The Task Chooser window appears.

Step 3 From the task list, choose Poll a Router's CAR MIB, then click OK.
This wizard creates a task to poll the selected Cisco routers for data from the CAR MIB.
Step 4 Click Next twice to step through the introductory windows.
The next window allows you to specify which devices to poll for CAR information.

Step 5 From the Network drop-down list, choose the pertinent network.
This window has two panels. The upper panel displays the routers in the selected network. The lower panel will display the routers you want to be polled for CAR data.
Step 6 From the upper panel, select the routers you want to be polled for CAR data.
When you click Add or Add All, the selected routers are displayed in the lower panel.
If you need to remove any of the routers from the lower panel, click Remove to remove individual routers; or click Remove All to remove the entire list from the lower panel.
Step 7 When finished defining the list of routers to be polled, click Next.
Step 8 Enter the task name, then click Next.
Step 9 Choose the default (Yes) to proceed to schedule the task, then click Next.
Step 10 From the Schedule window, set all the pertinent scheduling information, then click Add.
![]() |
Tips Cisco recommends that you schedule the polling task to occur every fifteen minutes. This requires four separate tasks to be scheduled, each starting fifteen minutes apart and reoccurring every hour. |
![]() |
Note You may discover that you need to increase the frequency of polling for CAR data, depending on the speed of the device interfaces and the volume of traffic on the router that is being polled. |
The polling request is added to the Schedule List (displayed in the upper pane).
Step 11 Click Next twice, then click Close.
The CAR MIB status data is collected in the Repository. The report data is organized first by Customer and Network. Each of these reports can be generated on an hourly, daily, weekly, monthly, and yearly basis.
Step 2 From the menu, choose either By Customer or By Network.
For detailed information on these reports, refer to "View CAR MIB Reports" in Chapter 8 of the Cisco VPN Solutions Center: MPLS VPN Solution User Reference.
Router configuration files are usually collected at regular intervals and then examined for changes that affect the way the routers function. The normal collection process does not separate the routers whose configuration files have changed from the routers whose configuration files have not changed. However, the routers whose configuration files have changed are the only ones that need to be collected. SmartCollector finds the routers whose configuration files have changed and puts them in a group to have their configuration files collected.
With SmartCollector, MPLS VPN Solution creates a task and schedules it to be run once. When the task executes, all the targeted routers are instructed to advise the MPLS VPN Solution software that uses the Simple Network Management Protocol (SNMP) of any change to their configuration files. MPLS VPN Solution, through the trapcatcher daemon, notes these traps and keeps track of the routers whose configuration files have changed, and thus need to be collected. The purpose of configuring traps (through SmartCollector) is to efficiently collect router configuration files from a set of routers grouped by network.
An example of the potential substantial savings is a scenario in which a network has 200 routers but the configuration files for only 20 of the routers have changed. In this example, SmartCollector only collects the configuration files for the 20 that have changed rather than for all 200 routers. If on average only 10 percent of the routers have their configuration files changed between scheduled collections, each SmartCollection takes only 10 percent of the resources of a full collection.
Step 2 Step through the Populate Interface Information wizard.
This wizard sets up a scheduled task that polls for information about router interfaces. It extracts the interface name, index number, and IP address and subnet mask for each interface. The collected interface information is stored with each router definition.
This information is used to create the various accounting reports and to map the "config-change" traps to the appropriate routers.
This wizard configures selected Cisco routers to send "config-change" traps to the current MPLS VPN Solution workstation. This enables SmartCollection, through which configuration files are collected only from those routers whose configuration files have changed.
![]() |
Note If configuration file collection tasks are running and you initiate SmartCollection by registering for traps, the PEs must be IOS version 12.x to return traps. |
Step 2 Step through the wizard.
This section explains how to deregister config-change traps.
This wizard configures selected Cisco routers to stop sending "config-change" traps to the current MPLS VPN Solution workstation. The selected routers will no longer be part of SmartCollection, through which configuration files are collected only from those routers whose configuration files have changed.
Step 2 Step through the wizard.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Apr 21 10:59:56 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.