Cisco Systems 3.6.6 manual BGP Neighbor Loss Alarm, Description Up Alarm

Page 74

Chapter 7 MPLS Network Faults

BGP Neighbor Loss Alarm

Table 7-1

MPLS Network Alarms Supported by Cisco ANA

 

 

 

 

 

 

Alarm

 

Default Severity

Description

Up Alarm

 

 

 

 

 

BGP Neighbor

 

Red (critical)

Generated whenever BGP connectivity is

BGP Neighbor

Loss

 

 

lost to a specific device.

Found

 

 

 

 

 

Broken LSP

 

Orange (major)

Activates a backward flow on the untagged

N/A

Discovered

 

 

entry to traverse the full LSP path passing

 

 

 

 

through it. The alarm is generated whenever

 

 

 

 

Cisco ANA locates services (such as VRFs

 

 

 

 

and pseudowires) on the path that use the

 

 

 

 

LSPs.

 

 

 

 

 

 

LDP Neighbor

 

Orange (major)

Generated whenever a TCP connection

LDP Neighbor Up

Down

 

 

failure occurs in LDP path, or the interface

 

 

 

 

no longer runs MPLS.

 

 

 

 

 

 

MPLS Black

 

Dark blue

Generated whenever Cisco ANA discovers

MPLS Black Hole

Hole Found

 

(information)

an MPLS interface that has at least one

Cleared

 

 

 

untagged LSP leading to a known PE router.

 

 

 

 

 

MPLS TE Tunnel

Orange (major)

Generated whenever a TE tunnel’s

MPLS TE Tunnel

Down

 

 

operational status changes to down and the

Up

 

 

 

tunnel is not flapping.

 

 

 

 

 

MPLS TE Tunnel

Orange (major)

Generated whenever multiple up and down

MPLS TE Tunnel

Flapping

 

 

alarms are generated during a short time

Up or MPLS TE

 

 

 

interval and they are suppressed.

Tunnel Down

 

 

 

 

Pseudo Wire (L2

Yellow (minor)

Generated whenever the pseudowire link

Layer 2 Tunnel Up

VPN) MPLS

 

 

goes down, namely, the pseudowire is

 

Tunnel Down

 

 

reported as down from both the devices

 

 

 

 

(based on the status of the tunnel).

 

 

 

 

 

 

Tunnel

 

Dark Blue

Generated from a syslog message sent by

N/A

Reoptimized

 

(information)

the router whenever a tunnel is up and its

 

 

 

 

route changes but the tunnel continues to

 

 

 

 

remain up.

 

 

 

 

 

 

BGP Neighbor Loss Alarm

If BGP connectivity is lost to a specific device in an MPLS VPN network, VPN sites lose connectivity. The VNE models the BGP connection between routers and actively monitors its state. A BGP Neighbor Loss alarm is generated from both sides of the connection when a connectivity loss occurs. Alarms and tickets are issued and impact analysis information displayed.

The correlation engine identifies various faults that affect the BGP connection and reports them as the root cause for the BGP neighbor loss alarm, for example, Link Down, CPU Overutilized, and Link Data Loss.

Note BGP Neighbor Loss alarms are not correlated to each other. They are correlated to the root cause of the connectivity loss.

Cisco Active Network Abstraction 3.6.6 MPLS User Guide

7-2

OL-19192-01

 

 

Image 74
Contents Cisco Active Network Abstraction 3.6.6 Mpls User Guide Americas HeadquartersPage N T E N T S Viewing Rate Limit Information IPv6 VPN over Mpls Running a VPN Leak Report A-1 Section Title Description PrefaceOrganization Convention Indication Related DocumentationConventions Obtaining Documentation and Submitting a Service Request OL-19192-01 Viewing Mpls VPNs Supported Mpls and VPN Technologies and Routing ProtocolsVPN Business Configurations Mpls VPN Maps OverviewVPN Topology Connections Layer 3 VPN Business ConfigurationLayer 2 VPN Business Configuration and Tunnels Topology Example Line Description Association Example DescriptionLayer 3 VPN Map Layer 2 VPN MapCisco ANA NetworkVision Window Represents Tree PaneTree Map Pane Tree Pane Map Pane DescriptionMap Pane Ticket PaneManaging Mpls VPN Maps Adding a VPN to a MapConnecting a CE Device Removing a VPN from a MapDisconnecting a CE Device Showing or Hiding a CE DeviceCreating an Aggregated Node Disaggregating an Aggregated NodeNode is separated into its parts OL-19192-01 Managing VPN Business Configurations Creating a VPNManaging VPN Business Configurations Creating a VPN Moving a Virtual Router Adding a Tunnel to a VPNRemoving a Tunnel Add Tunnels Dialog BoxDeleting an LCA Creating an LCAMoving an LCA Renaming a Business Element Moving an LCPJumping to an Adjacent LCP Deleting a Business Element RequirementsOL-19192-01 Viewing Site Properties Viewing Mpls VPN PropertiesViewing VPN Properties Viewing Virtual Router Properties VRF Properties Cisco Active Network Abstraction 3.6.6 Mpls User Guide Viewing VRF Properties in the Inventory Window Displaying VRF Egress and Ingress AdjacentsVRF Properties From a Device Inventory Window Working with the VPN Service Overlay Choosing an OverlayDisplaying or Hiding Overlays Displaying or Hiding CalloutsPage OL-19192-01 Viewing Mpls Logical Inventory Mpls VPN Logical Inventory OverviewViewing Mpls VPN Properties When finished, press Ctrl + F4 to close the inventory window Viewing Routing Entities Viewing the ARP Table Viewing a Label Switched Entity Mpls Interfaces TabTraffic Engineering LSPs Tab Viewing Mpls Logical Inventory Viewing Mpls VPN Properties Viewing MP-BGP Information Viewing VRF InformationOL-19192-01 Viewing Port Configuration Port Information in the Inventory WindowViewing Pseudowire End-to End Emulation Tunnels Viewing Cross VRF Routing EntriesViewing Mpls TE Tunnel Information Viewing Access List Information OL-19192-01 OL-19192-01 IPv6 VPN over Mpls 6VPE Overview PE1 PE2 CE2Viewing IPv4 and IPv6 Addresses Addresses Interface Table Properties WindowPort with IPv4 and IPv6 Addresses Cisco ANA 6VPE Support Limitations Device Software VersionIPv6 Addressing IPv6 Address RepresentationCompressed IPv6 Address IPv6 Address Prefix Text RepresentationAddress Type Non-Compressed IPv4 and IPv6 AddressAdding Route Target Using Cisco ANA NetworkVision Provisioning Route TargetsCommand Builder Route Target Commands 3 4 5 6 Add Route Target Export with Address Family Preview Enabling IPv6 VRFs Adding Route Targets with IPv4 and IPv6 Address FamiliesDeleting Route Targets with IPv4 and IPv6 Address Families Deleting Route Targets Mpls Network Faults Mpls Network Alarms OverviewDescription Up Alarm BGP Neighbor Loss AlarmAlarm BGP Process Down Alarm Broken LSP Discovered AlarmLDP Neighbor Down Alarm Example of an Mpls Black Hole ScenarioMpls Black Hole Found Alarm Mpls TE Tunnel AlarmsPseudo Wire Mpls Tunnel Down Alarm Service Impact Analysis Overview Impact Analysis in Mpls NetworksService Impact Analysis For MPLS-Based VPN Services L3 VPN ReportSupported Fault Scenarios Pseudowire L2 VPN ReportLink Down Scenario Link Overutilized/Data Loss ScenarioBGP Neighbor Loss Scenario Route Reflector Example Mpls TE Tunnel Down Scenario Pseudowire Mpls Tunnel Down ScenarioBroken LSP Discovered Scenario OL-19192-01 Using Cisco ANA PathTracer in Mpls Networks Cisco ANA PathTracer Tracing CapabilityElement Location Start Options Using Cisco ANA PathTracer in Mpls NetworksCisco ANA PathTracer Starting Points Element Location End Options Cisco ANA PathTracer WindowsCisco ANA PathTracer Endpoints Cisco ANA PathTracer Multipath Window Cisco ANA PathTracer Single-Path Window Using Cisco ANA PathTracer for Layer 3 VPN Using Cisco ANA PathTracer for Layer 2 VPNUsing Cisco ANA PathTracer for Mpls TE Tunnels Viewing Mpls TE Tunnel Information Running a VPN Leak Report OL-19192-01 Numerics IN-2 IN-3 IN-4

3.6.6 specifications

Cisco Systems has continually evolved its networking solutions to address the demands of modern enterprises, with the introduction of the Cisco Systems 3.6.6 version being no exception. This version integrates cutting-edge technologies designed to enhance network performance, security, and management efficiency, catering to the increasingly complex needs of businesses across various sectors.

One of the standout features of Cisco Systems 3.6.6 is its enhanced support for automation and orchestration. This version incorporates advanced automation tools, allowing IT teams to deploy and configure network resources more rapidly and efficiently. With features such as Cisco DNA Center’s intent-based networking, organizations can streamline operations and reduce manual intervention, leading to quicker service delivery and reduced operational costs.

Security remains a top priority, and Cisco Systems 3.6.6 includes improved security protocols that help protect sensitive data and critical infrastructure. The integration of Cisco SecureX provides a unified view of security across the network, enabling organizations to respond to threats in real-time, manage vulnerabilities proactively, and maintain compliance with regulatory standards. The incorporation of machine learning and AI-driven analytics ensures that potential threats are identified and mitigated before they can escalate.

Interoperability is another key characteristic of version 3.6.6, allowing existing Cisco hardware and software to work seamlessly together. This flexibility ensures that enterprises can leverage their current investments while adopting newer technologies without the need for a complete overhaul of their existing network architecture.

Additionally, Cisco Systems 3.6.6 has enhanced support for IoT devices, integrating robust frameworks that enable organizations to manage and secure an increasing number of connected devices. With the proliferation of IoT in various industries, this feature is vital for maintaining efficiency and security, as it allows for better monitoring and control over the connected ecosystem.

In conclusion, Cisco Systems 3.6.6 embodies a comprehensive approach to modern networking challenges. Its emphasis on automation, advanced security features, interoperability, and IoT support positions it as a pivotal solution for businesses looking to enhance their operational capabilities and embrace digital transformation. As organizations worldwide adapt to an ever-evolving technological landscape, Cisco Systems 3.6.6 stands out as a reliable partner in navigating these complexities.