Implementing Path Control Using Cisco IOS IP SLAs
This  section examines path control using Cisco IOS IP SLAs. A typical  scenario for this solution is Internet branch office connectivity, with  connections to two different ISPs, such as the network illustrated in Figure 5-4.  In this case, the organization’s edge router is configured to perform  NAT, and has default routes for outbound traffic to the ISPs; branch  offices, especially smaller ones, are not likely to run BGP or other  routing protocols toward the ISP. The static default routes are likely  to be equal cost, and the Cisco IOS will by default load balance over  the links on a per-destination basis. NAT will be applied to the  outbound traffic resulting from the load- balancing algorithm.
In  this scenario, the edge router can detect if there is a direct failure  on the link to one ISP, and in that case use the other ISP for all  traffic. However, if the infrastructure within of one of the ISPs fails  and the link to that ISP remains up, the edge router would continue to  use that link because the static default route would still be valid.
There  are multiple solutions to this issue. One approach is for the branch  office router to run a dynamic routing protocol with the ISPs, so that  the branch router learns the ISPs’ networks in its routing table. The  branch router will then be aware of any link failures within the ISPs’  network. This solution is impractical for smaller branch offices, and in  any case requires interaction and integration with the ISPs. It may,  however, be the best solution for critical branch offices or those with  large traffic volumes.
 Another  solution is to use either static routes or PBR, but make them subject  to reachability tests toward critical destinations, such as the Domain  Name System (DNS) servers within the ISP. If the DNS servers in one of  the ISPs go down or are unreachable, the static route toward that ISP  would be removed. These reachability tests can be performed with Cisco  IOS IP SLAs that probe the DNS servers frequently and that are attached  to the static routes.
The tools used for this solution include the following:
-  Object tracking— The Cisco IOS object tracking tracks the reachability of specified objects (in this example, of DNS servers). 
-  Cisco IOS IP SLAs probes— The object tracking features can use Cisco IOS IP SLAs to send different types of probes toward the desired objects. 
-  Route maps with PBR— To associate the results of the tracking to the routing process, PBR with route maps can be used, allowing options to define specific traffic classes, such as voice, or specific applications. 
-  Static routes with tracking options— As an alternative to PBR, you can use static routes with tracking options. This solution is simpler and accommodates scenarios in which you want all outbound traffic to choose outbound exit points similarly. 
 Using Cisco IOS IP SLAs to Control Path Selection
 Using Cisco IOS IP SLAs to Control Path Selection
 This section introduces Cisco IOS IP SLAs and describes how this feature is used to control path selection.
Cisco  IOS IP SLAs use active traffic monitoring, generating traffic in a  continuous, reliable, and predictable manner, to measure network  performance.
Cisco IOS IP SLAs, illustrated in Figure 5-5,  send simulated data across the network and measure performance between  multiple network locations or across multiple network paths. The  information collected includes data about response time, one-way  latency, jitter (interpacket delay variance), packet loss, voice-quality  scoring, network resource availability, application performance, and  server response time. In its simplest form, Cisco IOS IP SLAs verify  whether a network element, such as an IP address on a router interface  or an open TCP port on an IP host, is active and responsive.
 Because  Cisco IOS IP SLAs are accessible using Simple Network Management  Protocol (SNMP), performance-monitoring applications, such as CiscoWorks  Internetwork Performance Monitor (IPM) and other third-party Cisco  partner performance-management products, can also use them.
| Note | 
 | 
Cisco  IOS IP SLAs use the Cisco Round-Trip Time Monitor (RTTMON) Management  Information Base (MIB) for communication between the external Network  Management System (NMS) applications and the Cisco IOS IP SLAs  operations running on the Cisco devices.
As  an additional feature, SNMP notifications based on the data gathered by  a Cisco IOS IP SLAs operation allow the router to receive alerts when  performance drops below a specified level and when problems are  corrected. These thresholds can trigger additional events and actions.
 The  following sections detail IP SLAs terminology and operation, before  configuration, verification, and examples are provided in later  sections.
 Cisco IOS IP SLAs Operation
 Cisco IOS IP SLAs Operation
 The  embedded Cisco IOS IP SLAs measurement capability allows network  managers to validate network performance, proactively identify network  issues, and verify service guarantees by using active monitoring to  generate probe traffic in a continuous, reliable, and predictable  manner. This measurement capability also helps create a network that is  “performance aware.” Using IOS IP SLAs measurements, Cisco network  equipment can verify service guarantees, validate network performance,  improve network reliability, proactively identify network issues, and  react to performance metrics with changes to the configuration and  network.
The  Cisco IOS IP SLAs feature allows performance measurements to be taken  within and between Cisco devices, or between a Cisco device and a host,  providing data about service levels for IP applications and services.
Cisco  IOS IP SLAs measurements perform active monitoring by generating and  analyzing traffic to measure performance between Cisco IOS Software  devices or between a Cisco IOS device and a host, such as a network  application server. With the IOS IP SLAs feature enabled, a router sends  synthetic traffic to the other device, as illustrated in Figure 5-6.
Cisco IOS IP SLAs Sources and Responders
All the IP SLAs measurement probe operations are configured on the IP SLAs source,  either via the command-line interface (CLI) or through an SNMP tool  that supports the operation of IP SLAs. The source sends probe packets  to the target.
There are two types of IP SLAs operations: those in which the target device is running the IP SLAs responder  component (such as a Cisco router), and those in which the target  device is not running the IP SLAs responder component (such as a web  server or IP host). An IP SLAs responder is a component embedded in a  Cisco IOS device that allows that device to anticipate and respond to IP  SLAs request packets. A Cisco IOS device can be configured as an IP  SLAs responder and will provide accurate measurements without the need  for dedicated probes or any complex or per-operation configuration.
 The IP SLAs measurement accuracy is improved when the target is an IP SLAs responder, as described in the upcoming “Cisco IOS IP SLAs Operation with Responders” section.
Cisco IOS IP SLAs Operations
An IP SLAs operation is a measurement that includes protocol, frequency, traps, and thresholds.
The  network manager configures the IP SLAs source with the target device  address, protocol, and User Datagram Protocol (UDP) or Transfer Control  Protocol (TCP) port number, for each operation. When the operation is  finished and the response has been received, the results are stored in  the IP SLAs MIB on the source, and are retrieved using SNMP.
IP  SLAs operations are specific to target devices. Operations such as DNS  or HTTP can be sent to any suitable computer. For operations such as  testing the port used by a database, there might be risks associated  with unexpected effects on actual database servers, and therefore IP  SLAs responder functionality on a router can be configured to respond in  place of the actual database server.
Cisco IOS IP SLAs Operation with Responders
Using  an IP SLAs responder provides enhanced measurement accuracy—without the  need for dedicated third-party external probe devices—and additional  statistics that are not otherwise available via standard Internet  Control Message Protocol (ICMP)-based measurements.
When  a network manager configures an IP SLAs operation on the IP SLAs  source, reaction conditions can also be defined, and the operation can  be scheduled to be run for a period of time to gather statistics. The  source uses the IP SLAs control protocol to communicate with the  responder before sending test packets. To increase security of IP SLAs  control messages, message digest 5 (MD5) authentication can be used to  secure the control protocol exchange.
The following sequence of events occurs for each IP SLAs operation that requires a responder on the target, as illustrated in Figure 5-7:
-  At the start of the control phase, the IP SLAs source sends a control message with the configured IP SLAs operation information to IP SLAs control port UDP 1967 on the target router (the responder). The control message includes the protocol, port number, and duration of the operation. In Figure 5-7, UDP port 2020 is used for the IP SLAs test packets. If MD5 authentication is enabled, the MD5 checksum is sent with the control message, and the responder verifies the MD5 checksum. If the authentication fails, the responder returns an “authentication failure” message. 
-  If the responder processes the control message, it sends an “OK” message to the source and listens on the port specified in the control message for a specified duration. If the responder cannot process the control message, it returns an error. If the IP SLAs source does not receive a response from the responder, it tries to retransmit the control message. It will eventually time out if it does not receive a response. Note The responder is capable of responding to multiple IP SLAs measurement operations that try to connect to the same port number. 
-  If an “OK” message is returned, the IP SLAs operation on the source moves to the probing phase where it sends one or more test packets to the responder to compute response times. In Figure 5-7, the test messages are sent on control port 2020. 
-  The responder accepts the test packets and responds. Based on the type of operation, the responder may add an “in” time stamp and an “out” time stamp in the response packet payload to account for the CPU time spent measuring unidirectional packet loss, latency, and jitter. These time stamps help the IP SLAs source make accurate assessments of one-way delay and processing time in target routers. The responder disables the user-specified port after it responds to the IP SLAs measurements packet or when the specified time expires. 
Cisco IOS IP SLAs with Responder Time Stamps
 Figure 5-8  illustrates the use of time stamps in round-trip calculations in an  operation using an IP SLAs responder. The IP SLAs source uses four time  stamps for the round-trip time (RTT) calculation.
The IP SLAs source sends a test packet at time T1.
Because  of other high-priority processes, routers might take tens of  milliseconds to process incoming packets. For example, the reply to a  test packet might be sitting in a queue waiting to be processed. To  account for this delay, the IP SLAs responder includes both the receipt  time (T2) and the transmitted time (T3) in the response packet. The time  stamps are accurate to submilliseconds.
The  IP SLAs source subtracts T2 from T3 to determine the delta value—the  time spent processing the test packet in the IP SLAs responder. The  delta value is subtracted from the overall RTT.
The  same principle is applied by IP SLAs source. The incoming time stamp  (T4) is taken at the interrupt level to allow for greater accuracy in  the RTT calculation. The T4 time stamp, rather than the T5 time stamp  (when the packet is processed), is used in the RTT calculation.
The  two time stamps taken in the IP SLAs responder also allow one-way  delay, jitter, and directional packet loss to be tracked. These  statistics are critical for understanding asynchronous network behavior.  To calculate these one-way delay measurements, the source and target  need to be synchronized to the same clock source, and therefore, the  Network Time Protocol (NTP) must be configured on both.
 Configuring Path Control Using IOS IP SLAs
 Configuring Path Control Using IOS IP SLAs
 This section describes some of the commands used to configure path control using IOS IP SLAs.
The following steps are required to configure Cisco IOS IP SLAs functionality:
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
These steps are detailed in the following sections.
Configuring Cisco IOS IP SLAs Operations
This section describes some of the configuration commands used to define IP SLAs operations.
Use the ip sla operation-number global configuration command (or the ip sla monitor operation-number  global configuration command) to begin configuring a Cisco IOS IP SLAs  operation and to enter IP SLA configuration mode (or rtr configuration  mode). The operation-number is the identification number of the IP SLAs operation you want to configure.
| Note | 
 | 
| Note | 
 
 | 
The ICMP echo operation is used to cause ICMP echo requests to be sent to a destination to check connectivity. Use the icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} | source-interface interface-name] IP SLA configuration mode command (or the type echo protocol ipIcmpEcho {destination-ip-address | destination-hostname} [source-ipaddr {ip-address | hostname} | source-interface interface-name] rtr configuration mode command) to configure an IP SLAs ICMP echo operation. The parameters of these commands are defined in Table 5-3.
| 
 | |
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| Note | 
 | 
Use the frequency seconds  IP SLA configuration submode command (or rtr configuration submode  command) to set the rate at which a specified IP SLAs operation repeats.  (For example, this command can be entered within the icmp-echo command  mode.) The seconds parameter is the number of seconds between the IP SLAs operations; the default is 60.
Use the timeout milliseconds  IP SLA configuration submode command (or rtr configuration submode  command) to set the amount of time a Cisco IOS IP SLAs operation waits  for a response from its request packet. (For example, this command can  be entered within the icmp-echo command mode.) The milliseconds  parameter is the number of milliseconds (ms) the operation waits to  receive a response from its request packet. It is recommended that the  value of the milliseconds parameter be based on the sum of both the maximum RTT value for the packets and the processing time of the IP SLAs operation.
After the Cisco IP SLAs operation is configured, it needs to be scheduled. Use the ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm[:ss] [month day | day month] | pending | now | after hh:mm:ss}] [ageout seconds] [recurring] global configuration mode command (or the ip sla monitor schedule operation-number [life {forever | seconds}] [start-time {hh:mm[:ss] [month day | day month] | pending | now | after hh:mm:ss}] [ageout seconds] [recurring]  global configuration mode command) to configure the scheduling  parameters for a single Cisco IOS IP SLAs operation. The parameters of  these commands are defined in Table 5-4.
| 
 | |
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| Note | 
 | 
Configuring Cisco IOS IP SLAs Tracking Objects
 This  section examines some of the configuration commands used to define  tracking objects, to track the state of IOS IP SLAs operations.
Use the track object-number ip sla operation-number {state | reachability} global configuration command (or the track object-number rtr operation-number {state | reachability}  global configuration command) to track the state of an IOS IP SLAs  operation, and enter track configuration mode. The parameters of these  commands are defined in Table 5-5.
| 
 | 
 | 
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| Note | 
 | 
Use the delay {up seconds [down seconds] | [up seconds] down seconds}  track configuration command to specify a period of time to delay  communicating state changes of a tracked object. The parameters of this  command are defined in Table 5-6.
| 
 | 
 | 
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
Configuring the Action Associated with the Tracking Object
This section describes one of the configuration commands used to define the action associated with the tracking object.
Use the ip route prefix mask {ip-address | interface-type interface-number [ip-address]} [dhcp] [distance] [name next-hop-name] [permanent | track number] [tag tag] global configuration command to establish a static route that tracks an object. The parameters of this command are defined in Table 5-7.
| 
 | |
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
The  next section introduces some of the commands used to verify path  control using IOS IP SLAs. The section after that illustrates two  examples of IOS IP SLAs configuration and verification.
 Verifying Path Control Using IOS IP SLAs
 Verifying Path Control Using IOS IP SLAs
 This section describes some of the commands used to verify path control using IOS IP SLAs.
Use the show ip sla configuration [operation] command (or the show ip sla monitor configuration [operation]  command) to display configuration values including all defaults for all  Cisco IOS IP SLAs operations, or for a specified operation. The operation parameter is the number of the IP SLAs operation for which the details will be displayed.
Use the show ip sla statistics [operation-number] [details] command (or the show ip sla monitor statistics [operation-number] [details]  command) to display the current operational status and statistics of  all Cisco IOS IP SLAs operations, or of a specified operation. The  parameters of these commands are defined in Table 5-8.
| 
 | 
 | 
|---|---|
| 
 | 
 | 
| 
 | 
 | 
| Note | 
 | 
 Examples of Path Control Using Cisco IOS IP SLAs
 Examples of Path Control Using Cisco IOS IP SLAs
 This section uses two examples to illustrate IOS IP SLAs configuration and verification.
Tracking Reachability to Two ISPs
 Figure 5-9  illustrates a scenario in which Customer A is multihoming to two ISPs.  Customer A is not using BGP with the ISPs; instead, it is using static  default routes. Two default static routes with different administrative  distances are configured, so that the link to ISP-1 is the primary link  and the link to ISP-2 is the backup link. The static default route with  the lower administrative distance will be preferred and injected into  the routing table.
However,  if there is a problem with the ISP-1 router or with its connectivity  toward the Internet but its interface to Customer A is still up, all  traffic from Customer A will still go to that ISP. This traffic may then  get lost within the ISP. The solution to this issue is the Cisco IOS IP  SLAs functionality, which can be used to continuously check the  reachability of a specific destination (such as a provider edge [PE]  router interface, the ISP’s DNS server, or any other specific  destination) and conditionally announce the default route only if the  connectivity is verified.
 The Cisco IOS IP SLAs configuration of R1 is provided in Example 5-2.
R1(config)#ip sla monitor 11
R1(config-rtr)#type echo protocol ipIcmpEcho 10.1.1.1 source-interface
FastEthernet0/0
R1(config-rtr-echo)#frequency 10
R1(config-rtr-echo)#exit
R1(config)#ip sla monitor schedule 11 life forever start-time now
R1(config)#track 1 rtr 11 reachability
R1(config-track)#exit
R1(config)#ip route 0.0.0.0 0.0.0.0 10.1.1.1 2 track 1
R1(config)#ip sla monitor 22
R1(config-rtr)#type echo protocol ipIcmpEcho 172.16.1.1 source-interface
FastEthernet0/1
R1(config-rtr-echo)#frequency 10
R1(config-rtr-echo)#exit
R1(config)#ip sla monitor schedule 22 life forever start-time now
R1(config)#track 2 rtr 22 reachability
R1(config-track)#exit
R1(config)#ip route 0.0.0.0 0.0.0.0 172.16.1.1 3 track 2
The first step in this configuration defines the probe; probe 11 is defined by the ip sla monitor 11 command. The test defined with the type echo protocol ipIcmpEcho 10.1.1.1 source-interface FastEthernet0/0  command specifies that the ICMP echoes are sent to destination 10.1.1.1  (R2) to check connectivity, with the Fast Ethernet 0/0 interface used  as the source interface. The frequency 10 command schedules the connectivity test to repeat every 10 seconds. The ip sla monitor schedule 11 life forever start-time now  command defines the start and end time of the connectivity test for  probe 11; the start time is now and it will continue forever.
The second step defines the tracking object, which is linked to the probe from the first step. The track 1 rtr 11 reachability  command specifies that object 1 is tracked; it is linked to probe 11  (defined in the first step) so that the reachability of the 10.1.1.1 is  tracked.
 The last step defines an action based on the status of the tracking object. The ip route 0.0.0.0 0.0.0.0 10.1.1.1 2 track 1  command conditionally configures the default route, via 10.1.1.1, with  an administrative distance of 2, if the result of tracking object 1 is  true. Thus, if 10.1.1.1 is reachable, a static default route via  10.1.1.1 with an administrative distance of 2, is installed in the  routing table.
This  scenario requires the configuration of two probes, two tracking  objects, and two conditionally announced default routes. The second set  of configuration commands in Example 5-2 is almost the same as the first set. Probe 22, defined by the ip sla monitor 22  command, defines the test condition for the reachability of the backup  ISP destination address 172.16.1.1, using Fast Ethernet 0/1 as the  source address. The test is every 10 seconds, from now to forever.  Tracking object 2 is related to the second probe, as defined by the track 2 rtr 22 reachability  command. The default route configured, via 172.16.1.1, is using a  higher administrative distance of 3, because the backup ISP is to be  used only if the primary ISP is not available. This default route is  offered to the routing table if the result of tracking object 2 is true.
Tracking DNS Server Reachability in the Two ISPs
 Figure 5-10  illustrates the network for this example scenario. R3 represents a  branch office connected to two ISPs. In this scenario Cisco IOS IP SLAs  are used to track the reachability to the DNS servers (with IP addresses  10.0.8.1 and 10.0.8.2) and tie the results to the static default routes  on R3. If there is a DNS server failure, the Cisco IOS IP SLAs probes  will fail, the static default route to that DNS will be removed, and all  traffic will be rerouted toward the other ISP.
| Note | 
 | 
The following steps detail the implementation and verification of Cisco IOS IP SLAs in this example:
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
| 
 | 
 | 
 Example 5-3 illustrates the results of the reachability verification tests from R3 to the DNS servers.
R3#ping 10.0.8.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.8.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/36 ms
R3#ping 10.0.8.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.0.8.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 28/29/32 ms
R3#
 After  confirming that the reachability tests are successful, the Cisco IOS IP  SLAs are configured. The configuration is shown in Example 5-4. The ip sla monitor 99  command is used to create an ICMP echo probe on R3 to the first DNS  server; the operation number 99 is locally significant only to the  router. (Note that there are many other types of probes other than the  ICMP echo probes that could be created.) The frequency 10  command schedules the connectivity test to repeat every 10 seconds. The  probe is scheduled to start now, and to run forever. A second probe,  100, is similarly created to test connectivity to the second DNS server.
ip sla monitor 99
type echo protocol ipIcmpEcho 10.0.8.1
frequency 10
ip sla monitor schedule 99 life forever start-time now
ip sla monitor 100
type echo protocol ipIcmpEcho 10.0.8.2
frequency 10
ip sla monitor schedule 100 life forever start-time now
 The IP SLAs configuration is verified next, using the show ip sla monitor configuration command. The partial output is shown in Example 5-5,  illustrating the details of the configuration of operation 99. This  output confirms that the operation is an echo operation to 10.0.8.1 with  a frequency of 10 seconds, and that it has already started (the start  time has already passed).
R3(config)#do show ip sla monitor configuration
SA Agent, Infrastructure Engine-II
Entry number: 99
Owner:
Tag:
Type of operation to perform: echo
Target address: 10.0.8.1
Request size (ARR data portion): 28
Operation timeout (milliseconds): 5000
Type of Service parameters: 0x0
Verify data: No
Operation frequency (seconds): 10
Next Scheduled Start Time: Start Time already passed
Group Scheduled: FALSE
Life (seconds): Forever
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
Status of entry (SNMP RowStatus): Active
Threshold (milliseconds): 5000
Number of statistic hours kept: 2
Number of statistic distribution buckets kept: 1
Statistic distribution interval (milliseconds): 20
Number of history Lives kept: 0
Number of history Buckets kept: 15
—-More—-
 The show ip sla monitor statistics  command is used next, to display the number of successes, failures, and  the results of the latest operations. The output is shown in Example 5-6,  and it confirms that operation 99 has succeeded 16 times already, had  no failures, and the last operation returned an “OK” result. Operation  100 has succeeded 15 times, had no failures, and its last operation also  returned an “OK” result.
R3(config)#do show ip sla monitor statistics
Round trip time (RTT) Index 99
Latest RTT: 20 ms
Latest operation start time: *18:07:10.306 UTC Fri May 24 2002
Latest operation return code: OK
Number of successes: 16
Number of failures: 0
Operation time to live: Forever
Round trip time (RTT) Index 100
Latest RTT: 19 ms
Latest operation start time: *18:07:12.006 UTC Fri May 24 2002
Latest operation return code: OK
Number of successes: 15
Number of failures: 0
Operation time to live: Forever
R3(config)#
The next step is to configure tracking objects, as illustrated in Example 5-7.  The first tracking object is tied to IP SLAs object 99 and has 10  seconds of down delay and 1 second of up delay, representing the level  of sensitivity to changes of tracked objects. The delay helps to  alleviate the affect of flapping objects, those that are going down and  up rapidly. In this case, if the DNS server fails momentarily and comes  back up within 10 seconds, there is no impact. The ip route  command creates a static default route via 192.168.2.2 (R1) that  appears or disappears, depending on the success or failure of the IP  SLAs operation. Notice that this command reference the tracking object  number 1, which in turn reference IP SLAs operation number 99.
The second tracking object is tied to IP SLAs object 100 and has a similar configuration.
track 1 rtr 99 reachability
delay down 10 up 1
ip route 0.0.0.0 0.0.0.0 192.168.2.2 track 1
track 2 rtr 100 reachability
delay down 10 up 1
ip route 0.0.0.0 0.0.0.0 192.168.1.2 track 2
 Example 5-8  shows the static routes in the IP routing table. This output confirms  that both static default routes currently appear in the routing table.
R3#show ip route static
S* 0.0.0.0 0.0.0.0 [1/0] via 192.168.2.2
via 192.168.1.2
To examine the routing behavior, IP routing debugging is enabled on R3, with the debug ip routing  command. The DNS address on R2 is shut down. (Recall that in this  example, the DNS address is simulated by interface loopback 0 on R2;  thus a shutdown command on this interface is all that is required.)
| Note | 
 | 
The debug output on R3 is shown in Example 5-9.  The EIGRP route to 10.0.8.2 is immediately deleted, and there are now  no routes to 10.0.8.2. This is the object being tracked with the track 2  command; it tracks reachability to IP SLAs object 100, which is an ICMP  echo to 10.0.8.2. After about 10 seconds, the value specified in the delay command, the static default route via 192.168.1.2 (R2) is deleted.
R3#
3w6d: RT: delete route to 10.0.8.2 via 192.168.1.2, eigrp metric [90/156160]
3w6d: RT: SET_LAST_RDB for 10.0.8.2 255.255.255.255
OLD rdb: via 192.168.1.2, FastEthernet0/1
3w6d: RT: no routes to 10.0.8.2
3w6d: RT: NET-RED 10.0.8.2 255.255.255.255
3w6d: RT: delete subnet route to 10.0.8.2 255.255.255.255
3w6d: RT: NET-RED 10.0.8.2 255.255.255.255
R3#
3w6d: RT: del 0.0.0.0 via 192.168.1.2, static metric [1/0]
3w6d: RT: NET-RED 0.0.0.0 0.0.0.0
R3#
3w6d: RT: NET-RED 0.0.0.0 0.0.0.0
R3#
 Debugging is disabled, and the statistics are viewed again, using the show ip sla monitor statistics command, as displayed in Example 5-10.  This output confirms that there have been 11 failures on the IP SLAs  object 100; these are failures in the ICMP echo to 10.0.8.2. The latest  return code is “Timeout.”
R3#show ip sla monitor statistics
The static routes in the IP routing table now are shown in Example 5-11. This output confirms that only one static default remains, via 192168.2.2 (R1).
R3#show ip route static
S* 0.0.0.0 0.0.0.0 [1/0] via 192.168.2.2
R3#
To  examine the routing behavior when connectivity to the R2 DNS is  restored, IP routing debugging is enabled on R3 again, with the debug ip routing command, and the DNS address on R2 is enabled by performing a no shutdown command on the loopback 0 interface on R2.
The debug output on R3 is shown in Example 5-12. The EIGRP route to 10.0.8.2 comes up, and almost immediately the default static route via 192.168.1.2 (R2) comes up.
3w6d: RT: SET_LAST_RDB for 10.0.8.2 255.255.255.255
NEW rdb: via 192.168.1.2
3w6d: RT: add 10.0.8.2 255.255.255.255 via 192.168.1.2, eigrp metric [90/156160]
3w6d: RT: NET-RED 10.0.8.2 255.255.255.255
R3#
3w6d: RT: add 0.0.0.0 0.0.0.0 via 192.168.1.2, static metric [1/0]
3w6d: RT: NET-RED 0.0.0.0 0.0.0.0
3w6d: RT: NET-RED 0.0.0.0 0.0.0.0
R3#
3w6d: RT: NET-RED 0.0.0.0 0.0.0.0
R3#
 The routing table now is shown in Example 5-13; both static default routes are there. Full connectivity has been restored.
R3#show ip route static
S* 0.0.0.0 0.0.0.0 [1/0] via 192.168.2.2
via 192.168.1.2
An alternative solution for this example network, using PBR, is presented at the end of the next section, after PBR is detailed.
In  summary, there are many possibilities available with object tracking  and Cisco IOS IP SLAs. As shown in these examples, you can base a probe  on reachability, changing routing operations and path control based on  the ability to reach an object. You can also use Cisco IOS IP SLAs with  Cisco IOS Optimized Edge Routing (OER) to allow paths to be changed  based on network conditions such as delay, load, and so forth. (Cisco  IOS OER allows the best exit path to be selected, based on a defined  policy, and is described briefly in the “Cisco IOS Optimized Edge Routing” section, later in this chapter.)
In  deploying the Cisco IOS IP SLAs solution, the impact of the additional  probe traffic being generated should also be considered, including how  that traffic affects bandwidth utilization and congestion levels. Tuning  the configuration (for example with the delay and frequency  commands) becomes critical to mitigate possible issues related to  excessive transitions and route changes in the presence of flapping  tracked objects.
 
0 comments
Post a Comment