| 0 comments ]

NBAR

Add a note here Enterprise applications require different levels of service based on business requirements. These requirements can be translated into network policies. NBAR is an important embedded Cisco IOS Software technology that provides visibility into how network assets are being used by applications.


NBAR Overview

Add a note hereTraffic classification can help organizations answer many questions about network resources, such as the following:

  • Add a note hereWhich applications run on the network?

  • Add a note hereWhat is the application resource utilization?

  • Add a note hereAre users following application usage policies?

  • Add a note hereHow much bandwidth should be assigned to different QoS classes?

  • Add a note hereHow should applications (for example, VoIP) be allocated and deployed most efficiently?

Add a note hereNBAR is an embedded Cisco IOS Software classification engine that recognizes and classifies a wide variety of protocols and applications. NBAR provides full packet stateful inspection that identifies applications, including protocols that use dynamic TCP and UDP port assignments.

Add a note hereNBAR includes an optional feature called NBAR Protocol Discovery that analyzes application traffic patterns in real time and discovers which traffic is running on the network. NBAR develops statistics on protocol traffic on interfaces.

Add a note hereNBAR supports the business requirements of an organization by allowing multiple network applications to be classified to deliver more granular identification and control. NBAR can be used as the foundation for applying QoS policies to traffic flows in the network by enabling network administrators to see the variety of protocols and the amount of traffic generated by each protocol. After gathering this information, NBAR enables the network administrator to organize traffic into classes. The network can then be configured to apply the appropriate QoS to these traffic classes, providing different levels of service for specific applications and protocols. NBAR therefore allows better network management by enabling the appropriate level of network resources to be provided for each type of network traffic.

Add a note here NBAR Packet Inspection

Add a note hereAs illustrated in Figure 12-10, NBAR uses the following five elements, from Layers 3 through 7, to identify an NBAR flow on each interface:

  • Add a note hereSource IP address

  • Add a note hereDestination IP address

  • Add a note here Source port

  • Add a note hereDestination port

  • Add a note hereLayer 3 protocol field

Click to collapse
Add a note hereFigure 12-10: NBAR Inspects Many Fields in a Packet

Note

Add a note hereRecall that traditional NetFlow uses these same identifiers, plus the ToS and incoming interface.

Add a note hereNBAR supports several classification methods to identify more than 90 applications and protocols, including the following:

  • Add a note here Statically assigned TCP and UDP port numbers: NBAR can classify application traffic by looking at statically assigned TCP and UDP port numbers. Although ACLs can also be used for classifying static ports, NBAR is easier to configure and provides classification statistics that are not available in ACLs.

  • Add a note here Dynamically assigned TCP and UDP port numbers: NBAR can also classify dynamically assigned TCP and UDP port numbers by using stateful protocol inspection across multiple packets during packet classification. NBAR uses approximately 150 bytes of DRAM for each traffic flow that requires stateful inspection.

  • Add a note here Subport and deep-packet inspection: NBAR looks beyond the port numbers of a packet by looking into the payload itself and classifying packets based on content within the payload, such as the transaction identifier, message type, or other similar data.

    Add a note hereFor example, if a packet is classified as HTTP traffic, it may be further classified by URL, host, Multipurpose Internet Mail Extensions (MIME) type, and so forth. NBAR classifies HTTP traffic using text within the URL or host fields of a request using regular expression matching. HTTP URL matching in NBAR supports most HTTP request methods such as GET, PUT, HEAD, POST, DELETE, and TRACE. NBAR converts the specified match string into a regular expression.

  • Add a note here Native and nonnative Packet Description Language Modules (PDLM): NBAR can monitor only applications that it recognizes. However, application-recognition modules, known as PDLMs, can be added to provide support for additional applications. A non-native PDLM is a separate downloadable file available at Cisco.com used to add support for a protocol that is not available as part of the native PDLM currently embedded in the Cisco IOS Software release.

    Add a note hereNBAR also provides custom protocol support for static port-based protocols and applications that are not currently supported in NBAR. There are 10 custom applications that can be assigned using NBAR, and each custom application can have up to 16 TCP and 16 UDP ports each mapped to the individual custom protocol. The real-time statistics of each custom protocol can be monitored using NBAR Protocol Discovery.


Note

Add a note here NBAR is enabled by default when class maps with a match protocol option are applied to an interface.

Add a note here NBAR Protocol Discovery

Add a note hereNBAR Protocol Discovery discovers any protocol traffic supported by NBAR and gathers real-time statistics associated with that protocol. NBAR Protocol Discovery maintains the following per-protocol statistics for each enabled interface:

  • Add a note hereTotal number of input packets and bytes

  • Add a note hereTotal number of output packets and bytes

  • Add a note hereInput bit rates

  • Add a note hereOutput bit rates

Add a note hereThese statistics can be used to define traffic classes, and traffic policies for each traffic class. The traffic policies or policy maps are used to apply specific QoS features and functionality to the traffic classes.


Note

Add a note hereNBAR Protocol Discovery is configured with the ip nbar protocol-discovery interface configuration command.

Add a note here NBAR and NetFlow

Add a note hereNetFlow and NBAR are complementary technologies, as illustrated in Figure 12-11.

Image from book
Add a note hereFigure 12-11: NetFlow and NBAR are Complementary Technologies

Add a note hereRecall that the main objective of NetFlow is to provide visibility into the network behavior and how network assets are being used. In traditional NetFlow, flows are defined by a set of seven key characteristics that define who is using which part of the network for what purposes at what times. NetFlow is a passive technology that monitors network activity, typically from OSI Layers 2 through 4. NetFlow data export allows trending of network records.

Add a note hereFlexible NetFlow can monitor packet information from Layer 2 for switching environments, Layer 3 and 4 for IP information, and up to Layer 7 with deep-packet inspection for application monitoring.

Add a note hereIn contrast, the main objective of NBAR is to identify and classify traffic based on payload attributes and protocol characteristics. NBAR flows are defined by a set of five key characteristics for each interface. NBAR can support static and stateful dynamic inspections and QoS mechanisms can be applied to the classified packets to support optimization of application performance. NBAR is an active technology that can be used to validate or reclassify ToS marking based on packet inspection in Layers 3 through 7. NBAR Protocol Discovery provides an easy way to discover the application protocols that are operating on an interface.


Add a note hereFigure 12-12: AdventNet ManageEngine NetFlow Analyzer

Add a note here Figure 12-13 shows a screen shot from the CA eHealth application that shows the top protocol distribution from the NBAR Discovery Protocol statistics.

Image from book
Add a note hereFigure 12-13: CA eHealth Protocol Distribution

Add a note here Figure 12-14 shows a screen shot from the InfoVista VistaView application, displaying interface speed, traffic, utilization; and inbound and outbound traffic by application.

Image from book
Add a note hereFigure 12-14: InfoVista VistaView Traffic Monitoring

Add a note here Figure 12-15 provides a screen shot from the IBM Tivoli IT Netcool/Provisio application, showing the Top N protocol statistics. This information enables the network manager to identify the traffic mix on a specific link and understand which applications are consuming bandwidth.

Image from book
Add a note hereFigure 12-15: IBM Tivoli IT Netcool/Provisio Top N Protocol Statistics

Add a note here Figure 12-16 shows an example screen shot using the Multi Router Traffic Grapher (MRTG) freeware application to graph NBAR Protocol Discovery statistics. The MRTG tool uses the Vermeer add-on to report on NBAR data collected through SNMP from routers.

Image from book
Add a note hereFigure 12-16: MRTG Graphs NBAR Protocol Discovery Statistics

NBAR and Cisco AutoQoS

Add a note here The Cisco IOS Software includes two features to automate the deployment of QoS in the network: AutoQoS VoIP and AutoQoS for the Enterprise. Both of these features use the NBAR traffic-classification functionality.

Add a note hereThe Cisco AutoQoS features on routers and switches provide a simple, automatic way to enable QoS configurations in conformance with Cisco best-practice recommendations. The router or switch creates configuration commands to perform such things as classifying and marking VoIP traffic and then applying a low-latency queuing (LLQ) strategy on WAN links for that traffic. The configuration created by AutoQoS becomes part of the normal configuration file and can therefore be edited if required.

Add a note here Cisco AutoQoS VoIP

Add a note here The Cisco AutoQoS VoIP feature is available with Cisco IOS Software Release 12.2(15)T and later releases and provides a way to simplify the implementation and provisioning of QoS for VoIP traffic.

Add a note here Cisco AutoQoS for the Enterprise

Add a note here The Cisco AutoQoS for the Enterprise feature is available with Cisco IOS Software Release 12.3(11)T and later releases and helps automate the deployment of QoS in a general business environment, particularly for midsize companies and branch offices of larger companies. It expands on the functionality in the Cisco AutoQoS VoIP with support for QoS features required for voice, video, and data traffic.

Add a note hereThis feature uses NBAR Protocol Discovery to gather traffic statistics, and then creates class maps and policy maps based on the detected traffic; suggested bandwidth settings per class are based on Cisco best practice recommendations.

Add a note hereThe Cisco AutoQoS for the Enterprise feature consists of a two-phase configuration process.

Add a note hereIn the first phase, Auto Discovery collects data and evaluates traffic in the network. The Auto Discovery phase is started by using the auto discovery qos [trust] interface configuration command.

Add a note hereIn untrusted mode (without the trust keyword), NBAR Protocol Discovery is used to detect and classify the applications on the network and perform statistical analysis on the network traffic.

Add a note hereIn trusted mode (with the trust keyword), packets are classified based on DSCP values in the IP header. NBAR Protocol Discovery statistics are used to calculate the bandwidth and average or peak rate, which is passed to the template module.

Add a note hereThe data should be collected over a period of time (for several days to a week), to ensure a realistic traffic analysis.

Add a note hereThe show auto discovery qos command displays the results of the data collected during the Auto Discovery phase. Example 12-3 shows an example output from the show auto discovery qos command, illustrating the results of the Cisco AutoQoS Discovery process.

Add a note here Example 12-3: AutoQoS Discovery Process

Add a note hererouter# show auto discovery qos
AutoQoS Discovery enabled for applications
Discovery up time: 2 days, 55 minutes
AutoQoS Class information:
Class VoIP:
Recommended Minimum Bandwidth: 517 Kbps/50% (PeakRate)
Detected applications and data:
Application/ AverageRate PeakRate Total
Protocol (kbps/%) (kbps/%) (bytes)
rtp audio 76/7 517/50 703104
Class Interactive Video:
Recommended Minimum Bandwidth: 24 Kbps/2% (AverageRate)
Detected applications and data:
Application/ AverageRate PeakRate Total
Protocol (kbps/%) (kbps/%) (bytes)
rtp video 24/2 5337/52 704574
Class Transactional:
Recommended Minimum Bandwidth: 0 Kbps/0% (AverageRate)
Detected applications and data:
Application/ AverageRate PeakRate Total
Protocol (kbps/%) (kbps/%) (bytes)
citrix 36/3 74/7 30212
sqlnet 12/1 7/<1 1540

Add a note here In the second phase, the Cisco AutoQoS template generation and installation process generates templates from the data collected during the Auto Discovery phase and installs the templates on the configured interface. These templates are used as the basis for creating the class maps and policy maps for the network, with values for bandwidth and scheduling parameters based on the Auto Discovery statistics. The maps are then installed on the interface.

Add a note hereThe Cisco AutoQoS template generation phase is started by using the auto qos interface configuration command. The generated class maps and policy maps should be reviewed by using the show auto qos command, and customized as necessary.

Add a note hereBy default, the NBAR mechanisms do not show unclassified traffic. As illustrated in Example 12-4, the show ip nbar unclassified-port-stats command returns an error message if the feature to analyze unclassified traffic is not enabled.

Add a note here Example 12-4: Attempting to View Statistics for Unclassified Traffic

Add a note hererouter1# show ip nbar unclassified-port-stats
Port statistics for unclassified packets is not turned on.

Add a note hereThe debug ip nbar unclassified-port-stats command can be used to configure the router to begin tracking the ports on which packets arrive. The show ip nbar unclassified-port-stats command can then be used to verify the collected information; the output will display a histogram of the most commonly used ports.


Note

Add a note hereLike all debug commands, the debug ip nbar command should be used with caution. Using NetFlow to look at the unclassified traffic is typically a better practice than using the debug ip nbar command because it has less potential for overloading the router CPU.

Add a note here Example 12-5 shows example partial output of the show auto qos command, illustrating a suggested policy from the Cisco AutoQoS template-generation process.

Add a note here Example 12-5: Suggested Policy from Cisco AutoQoS

Add a note hererouter1# show auto qos

!
class-map match-any AutoQoS-Voice-Et3/1
match protocol rtp audio
!
class-map match-any AutoQoS-Inter-Video-Et3/1
match protocol rtp video
!
class-map match-any AutoQoS-Signaling-Et3/1
match protocol sip
match protocol rtcp
!
class-map match-any AutoQoS-Transactional-Et3/1
match protocol citrix
!
class-map match-any AutoQoS-Bulk-Et3/1
match protocol exchange

policy-map AutoQoS-Policy-Et3/1
class AutoQoS-Voice-Et3/1
priority percent 1
set dscp ef
class AutoQoS-Inter-Video-Et3/1
bandwidth remaining percent 1
set dscp af41
class AutoQoS-Signaling-Et3/1
bandwidth remaining percent 1
set dscp cs3


0 comments

Post a Comment