Cisco Nexus 9000: Packet Tracer Tool Explained

Introduction

Packet Tracer is a built-in utility on Nexus 9000 switches used to trace the path of packets through the switch. It can be invoked from the command line and configured based on IP addresses and/or Layer 4 characteristics. It is not suitable for matching ARP traffic.

This tool helps determine if a flow is passing through the switch and provides counters to track flow statistics, which can be useful for diagnosing intermittent or complete packet loss.

Prerequisites

Cisco recommends having a basic understanding of the following topics:

Components Used

The information in this document is based on the following software and hardware versions:

Use Case Scenarios

Supported Hardware

Only Top-of-Rack (TOR) switches with Line Cards/Fabric Modules or Broadcom Trident II ASICs are supported. The supported list includes:

Unsupported Hardware

Note: If a specific line card/TOR is not listed, contact TAC.

How to Use Packet Tracer

Configuration

The packet-tracer command is an EXEC level command.

To configure packet tracing:

N9K-9508# test packet-tracer src_ip <src_ip> dst_ip <dst_ip>
N9K-9508# test packet-tracer start
N9K-9508# test packet-tracer stop
N9K-9508# test packet-tracer show

The above commands program triggers on all Broadcom Trident II ASICs present on line cards or fabric modules. When a flow with matching characteristics passes through these modules, their counters will be displayed, aiding in identifying the path within the switch (Ingress module —> one of the Fabric modules —> Egress module).

Counters can be used to pinpoint drops.

Background Information

Fabric modules interconnect in I/O module slots. All fabric modules are active and forward traffic. Each fabric module has two instances of Broadcom Trident II ASIC (T2).

The diagram illustrates the Nexus 9000 switch architecture, showing modules and fabric connections. It details the path of traffic through different components like NS (ALE) and NFE (T2) ASICs across modules and fabric. The diagram shows numbered paths indicating ingress and egress points on modules and fabric.

Diagram Description:

The diagram depicts a Nexus 9000 architecture with two main modules (Module 1 and Module 2) connected via Fabric 2. Each module contains NS (ALE) and NFE(T2) ASIC components. Fabric 2 has two NFE(T2) ASIC instances. Numbered arrows indicate traffic flow paths: 1. Ingress on module 1, 2. Ingress on fabric module, 3. Ingress on module 2, 4. Ingress on module 2, 5. Ingress on fabric module, 6. Ingress on module 1 (from fabric). The diagram also shows port types like 100G/40G/10G SERDES or QSFP28.

The primary steps to configure to match traffic of interest are:

switch# test packet-tracer {<src-ip>|<dst-ip>|<src-l4-port>|<dst-l4-port>} [<protocol>] [detail-fp|detail-hg]

The configuration required is:

switch# test packet-tracer src_ip <src_ip>
switch# test packet-tracer dst_ip <dst_ip>
switch# test packet-tracer protocol <protocol>

There is no need to apply to a specific interface. The above config installs filter ACLs on all LC/FM for all T2 ASIC instances. It displays the packet count for the module where traffic ingress. This matches traffic of interest on modules, both line cards and fabric.

Problem

Port Access-lists (PACLs) are used to verify if a specific physical interface received traffic of interest. However, on the Nexus platform, some line cards do not have TCAM etched for PACLs. TCAM fragmentation may require reloading the module. In such cases, Packet Tracer can be used to verify traffic of interest. You can also trace packets going to fabric ports and then to egress modules. Therefore, Packet Tracer provides more information on how traffic is forwarded within the switch.

Packet Tracer utilizes TCAM entries logged for SPAN.

Solution

NS - North Star ASIC, T2 - Trident II ASIC, NFE - Network Forwarding Engine, ALE - ACI Leaf Engine.

For more details on Nexus 9000 switch architecture, refer to:

Cisco Nexus 9000 Series Switches White Paper

Example Scenario:

ICMP SRC IP: 10.1.1.1/24

ICMP DST IP: 10.2.2.1/24

Configuration Example:

N9K-9508# test packet-tracer src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
N9K-9508# test packet-tracer start

Interpreting test packet-tracer show Output:

N9K-9508# test packet-tracer show
Packet-tracer stats
-----------------------
Module 1:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1
ASIC instance 0:
Entry 0: id = 7425, count = 0, active, fp
Entry 1: id = 7426, count = 0, active, hg
ASIC instance 1:
Entry 0: id = 7425, count = 0, active, fp
Entry 1: id = 7426, count = 0, active, hg
Filter 2 uninstalled:
...
Module 2:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1
ASIC instance 0:
Entry 0: id = 7425, count = 0, active, fp
Entry 1: id = 7426, count = 0, active, hg
...

Configuration Example for Bidirectional Traffic:

N9K-9508# test packet-tracer src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
N9K-9508# test packet-tracer src-ip 10.2.2.1 dst-ip 1.1.1.1 protocol 1

Starting and Checking Statistics:

N9K-9508# test packet-tracer start
N9K-9508# test packet-tracer show non-zero

Test: Ping from SRC IP to DST IP connected from Module 1 to Module 2.

Router# ping 10.1.1.1 source 10.2.2.1
PING 10.1.1.1 (10.1.1.1) from 10.2.2.1: 56 data bytes
64 bytes from 10.1.1.1: icmp_seq=0 ttl=253 time=0.77 ms
...
--- 10.1.1.1 ping statistics ---
5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min/avg/max = 0.383/0.477/0.77 ms

Verification: Check packet tracer counts.

N9K-9508# test packet-tracer show non-zero
Packet-tracer stats
====================
Module 1:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
ASIC instance 0:
Entry 0: id = 7425, count = 5, active, fp
Filter 2 installed: src-ip 10.2.2.1 dst-ip 10.1.1.1 protocol 1
...
Module 2:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
Filter 2 installed: src-ip 10.2.2.1 dst-ip 10.1.1.1 protocol 1
ASIC instance 0:
Entry 0: id = 7457, count = 5, active, fp
...
Module 22:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
ASIC instance 0:
Entry 0: id = 7425, count = 4, active, hg
...
Module 23:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
ASIC instance 0:
Entry 0: id = 7425, count = 1, active, hg
...
ASIC instance 0:
Entry 0: id = 7425, count = 3, active, hg
...
Module 24:
Filter 1 installed: src-ip 10.1.1.1 dst-ip 10.2.2.1 protocol 1
ASIC instance 0:
Entry 0: id = 7425, count = 2, active, hg
...

Other Useful Commands

PDF preview unavailable. Download the PDF instead.

210592-Nexus-9000-Packet-Tracer-tool-explained iText 5.5.12 ©2000-2017 iText Group NV (AGPL-version)

Related Documents

Preview Cisco ACI Fabric Endpoint Learning: A Comprehensive Guide
Explore the intricacies of Cisco ACI fabric endpoint learning, covering behavior, deployment, and optimization options for efficient network management and traffic flow.
Preview Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide, Release 7.x
A comprehensive guide for configuring Quality of Service (QoS) features on Cisco Nexus 9000 Series switches running NX-OS. Learn about classification, marking, policing, queuing, and scheduling to optimize network traffic.
Preview Cisco Nexus 9504 スイッチ (NX-OS モード) ハードウェア設置ガイド
Cisco Nexus 9504 スイッチ (NX-OS モード) のハードウェア設置ガイド。設置場所の準備、環境要件、モジュール交換、電源、冷却、LEDインジケータなどの詳細情報を提供します。
Preview Cisco Nexus 9000 Series NX-OS Release Notes 10.4(3)F
This document provides release notes for Cisco NX-OS software Release 10.4(3)F for the Cisco Nexus 9000 Series switches, detailing new features, enhancements, and resolved issues.
Preview Configuring MACsec on Cisco NX-OS Devices
This document provides a comprehensive guide on configuring MACsec (Media Access Control Security) on Cisco NX-OS devices, covering essential aspects from basic setup to advanced configurations and troubleshooting.
Preview Cisco NX-OS Release Notes, Release 10.4(1)F for Nexus 9000 Series
This document provides release notes for Cisco NX-OS version 10.4(1)F, detailing new and enhanced software features, hardware support, known issues, and resolved issues for the Cisco Nexus 9000 Series switches.
Preview Cisco Nexus 9000 Series NX-OS Release Notes 10.3(8)M
Release notes for Cisco NX-OS version 10.3(8)M, detailing supported hardware, new features, resolved issues, and compatibility information for Cisco Nexus 9000 series switches.
Preview Cisco Nexus 9500 Platform Common Equipment Data Sheet
This data sheet provides an overview of the Cisco Nexus 9500 platform, detailing its product overview, features, benefits, components, deployment scenarios, and regulatory compliance. It highlights the platform's modularity, high performance, scalability, and power efficiency, making it suitable for various data center network architectures.