Table Of Contents
Validating the ASA 1000V Configuration
Topology Used for Troubleshooting
Security Profile Configuration in the Cisco VNMC
Port Profile Configuration in the VSM
Port Profile Assignment from vCenter to the VMs
Binding of the Organization Path, ASA 1000V, and Security Profile to the Port Profile in the VSM
Security Profile-to-Interface Mapping in the ASA 1000V
Port Profile Configuration in the VSM and Application in vCenter
VSM Module Configuration
VSM vCenter Configuration
Cisco VNMC VM Manager
Dynamic VSM Interface Configuration
VEM Port Configuration
Cisco VNMC Security Profile ID
VSM vService Configuration
VSN Configuration in the VSM
VSN Configuration in the VEM
ASA 1000V IP-SPID Mapping (Control Path)
ASA 1000V IP-SPID Mapping (Data Path)
ASA 1000V Services for Security Profile Interfaces
VSM Interface Counters
VEM Packet Statistics
ASA 1000V vPath Counters
VSM vService Statistics
ASA 1000V Interface Statistics
Validating the ASA 1000V Configuration
This chapter describes how to validate the ASA 1000V configuration. To make sure that the configuration works correctly, follow the validation procedures listed in the sequence as shown in this chapter. The sample output from certain commands helps indicate whether or not an issue exists.
The chapter includes the following sections:
•
Topology Used for Troubleshooting
•
Security Profile Configuration in the Cisco VNMC
•
Port Profile Configuration in the VSM
•
Port Profile Assignment from vCenter to the VMs
•
Binding of the Organization Path, ASA 1000V, and Security Profile to the Port Profile in the VSM
•
Security Profile-to-Interface Mapping in the ASA 1000V
•
Port Profile Configuration in the VSM and Application in vCenter
•
VSM Module Configuration
•
VSM vCenter Configuration
•
Cisco VNMC VM Manager
•
Dynamic VSM Interface Configuration
•
VEM Port Configuration
•
Cisco VNMC Security Profile ID
•
VSM vService Configuration
•
VSN Configuration in the VSM
•
VSN Configuration in the VEM
•
ASA 1000V IP-SPID Mapping (Control Path)
•
ASA 1000V IP-SPID Mapping (Data Path)
•
ASA 1000V Services for Security Profile Interfaces
•
VSM Interface Counters
•
VEM Packet Statistics
•
ASA 1000V vPath Counters
•
VSM vService Statistics
•
ASA 1000V Interface Statistics
Topology Used for Troubleshooting
To help isolate problem areas, you should also have an accurate topology of your system configuration. Figure 2-1 shows the topology that provides the basis for the examples and case studies in this guide.
Figure 2-1 Topology Used for Troubleshooting
This system configuration includes the following components:
•
The Cisco Nexus 1000V switch, the software platform on which the ASA 1000V runs
•
The Virtual Services Module (VSM), the control software for the Cisco Nexus 1000V switch
•
The Virtual Ethernet Module (VEM), a component of the Cisco Nexus 1000V switch
•
The Virtual Network Management Center (VNMC), one of the two available GUI managers
•
An inside Linux Virtual Machine (VM)
•
The ASA 1000V VM
•
The outside Linux VM
•
vCenter, the VM manager
•
The vSphere client, the vCenter manager
•
Two server hosts (for example, UCS) that are connected to a physical switch
Security Profile Configuration in the Cisco VNMC
You need to verify the entire system configuration to make sure that traffic can pass between the inside and outside Linux machines (VMs).
The first step is to validate that a security profile has been created in the Cisco VNMC and was pushed to the ASA 1000V. Figure 2-2 shows the topology for a security profile configuration in the Cisco VNMC.
Figure 2-2 Security Profile Configuration in the Cisco VNMC
Make sure that you have configured a security profile from the Cisco VNMC or from the ASA 1000V CLI if you are using the ASDM mode. This configuration shows the following:
•
The inside VM and the inside ASA 1000V connect to the same VLAN (101).
•
The outside VM and the outside ASA 1000V connect to the same VLAN (1101).
Port Profile Configuration in the VSM
The next step is to validate that the port profile has been correctly configured in the VSM. Figure 2-3 shows the topology for a valid port profile configuration in the VSM.
Figure 2-3 Port Profile Configuration in the VSM
Make sure that you have configured three port profiles through the VSM console: one for the inside Linux VM (user-app-profile), one for the inside ASA 1000V interface and VMs (user-profile), and one for the outside ASA 1000V interface (user-outside-profile).
Port Profile Assignment from vCenter to the VMs
The next step is to validate that port profiles were correctly assigned from vCenter to the VMs. Figure 2-4 shows the topology for a valid port profile assignment from vCenter to the VMs.
Figure 2-4 Port Profile Assignment from vCenter to the VMs
Make sure that you have completed the following tasks in this step:
•
Assigned the first port profile (user-app-profile) to the inside Linux VM and specified that this port profile (user-app-profile) has the vservice configuration.
•
Assigned the second port profile (user-profile) to the inside ASA 1000V interface and specified that this port profile (user-profile) does not have the vservice configuration.
•
Assigned the third port profile (user-outside-profile) to the outside ASA 1000V interface and outside Linux VM, and specified that this port profile (user-outside-profile) does not have the vservice configuration.
Binding of the Organization Path, ASA 1000V, and Security Profile to the Port Profile in the VSM
The next step is to validate that the binding of the organization (org) path (root/user), ASA 1000V (vservice node vASA-user), and security profile (user-app-profile) to the port profile in the VSM was completed correctly. Figure 2-5 shows the topology for correctly binding the organization path, ASA 1000V, and security profile to the port profile in the VSM.
Figure 2-5 Binding of the Org Path, ASA 1000V, and Security Profile to the Port Profile in the VSM
Figure 2-6 shows a visual representation of the steps that you should have performed for binding of the organization path, ASA 1000V, and security profile to the port profile in the VSM. Colored boxes on the right and left sides of the illustration indicate matching values.
Figure 2-6 Binding of the Org Path, ASA 1000V, and Security Profile to the Port Profile in the VSM
To bind the organization path, ASA 1000V, and security profile to the port profile in the VSM, make sure that you have performed the following steps:
1.
Configured the edge security profile in the Cisco VNMC.
2.
Completed binding of the organization, edge security profile, and vASA to the VM port profile.
3.
Configured the vservice node for the ASA 1000V in the VSM.
4.
Created an edge firewall under root/user and configured the ASA 1000V inside IP address in the Cisco VNMC.
5.
Assigned the ASA 1000V instance to the edge firewall in the Cisco VNMC.
Note
Make sure that the IP address for the inside interface of the ASA 1000V in the VSM matches the IP address for the inside interface of the ASA 1000V in the Cisco VNMC.
There is no need for the name of the port profile to be the same as the name of the edge security profile that is used in the vservice command in the port profile. In this example, user-app-profile is used in both for convenience.
Security Profile-to-Interface Mapping in the ASA 1000V
The next step applies only if you are using the ASDM mode. This mapping is automatically configured if you are using the VNMC mode. Make sure that you have completed this step by entering the service-interface security-profile all inside command at the ASA 1000V CLI or through the ASDM GUI. This configuration shows that all security profile traffic uses the inside interface for traffic to the ASA 1000V and to servers for the inside VMs. Figure 2-7 shows the topology of a correct configuration for security profile-to-interface mapping in the ASA 1000V.
Figure 2-7 Security Profile-to-Interface Mapping in the ASA 1000V
The configuration that enables traffic to flow between the inside VMs and the outside VMs is complete.
Port Profile Configuration in the VSM and Application in vCenter
Figure 2-8 shows a visual representation of the steps that you should have performed to configure the port profile for inside VMs in the VSM and apply this configuration in vCenter. Colored boxes on the right and left sides of the illustration indicate matching values.
Figure 2-8 Port Profile Configuration in the VSM and Application in vCenter
To configure the port profile for inside VMs in the VSM and apply this configuration in vCenter, make sure that you have performed the following steps:
1.
Configured the port profiles for the inside VMs.
2.
Applied the port profiles to the inside VMs.
3.
Configured the port profiles for the inside ASA 1000V.
4.
Applied the port profiles to the inside ASA 1000V and then to the outside ASA 1000V.
5.
Configured the port profiles for the outside ASA 1000V and the VMs.
6.
Applied the port profiles to the outside VMs.
7.
Assigned network adapters 1 and 2 for the ASA 1000V in the same sequence as shown in Figure 2-8.
8.
Validated that the inside VLAN of the inside VM is on the same inside interface as the ASA 1000V.
9.
Validated that the vservice node IP address for the ASA 1000V matches the inside IP address of the Cisco VNMC.
VSM Module Configuration
To make sure that the VSM module has been correctly configured, use the show module command on the Cisco Nexus 1000V switch to display the current statistics and configuration settings.
The following is sample output from the show module command:
Mod Ports Module-Type Model Status
--- ----- -------------------------------- ------------------ ------------
1 0 Virtual Supervisor Module Nexus1000V active
3 248 Virtual Ethernet Module NA ok
4 248 Virtual Ethernet Module NA ok
--- ------------------ ------------------------------------------------
3 4.2(1)SV1(5.2) VMware ESXi 4.1.0 Releasebuild-260247 (2.0)
4 4.2(1)SV1(5.2) VMware ESXi 4.1.0 Releasebuild-260247 (2.0)
Mod MAC-Address(es) Serial-Num
--- -------------------------------------- ----------
1 00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8 NA
3 02-00-0c-00-03-00 to 02-00-0c-00-03-80 NA
4 02-00-0c-00-04-00 to 02-00-0c-00-04-80 NA
Mod Server-IP Server-UUID Server-Name
--- --------------- ------------------------------------ --------------------
3 172.23.34.129 849aa5f8-a4ce-11df-be27-f866f223184e exampleuser-esx-3.cisco.com
4 172.23.34.134 ab420101-aefe-11df-a902-1cdf0f1d532c exampleuser-esx-4.cisco.com
In this example, the following applies:
•
The active status for Module 1 is for the current terminal session only.
•
The Server UUID is the UCS host on the Cisco Nexus 1000V switch.
•
Two servers are connected to the Cisco Nexus 1000V switch.
•
The output shows the statistics for all the components bound together.
VSM vCenter Configuration
To make sure that the VSM vCenter configuration is correct, use the show svs connection command on the Cisco Nexus 1000V switch. The following is sample output from the show svs connections command:
Switch# show svs connections
protocol: vmware-vim https
datacenter name: Org/user-DC
DVS uuid: b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27
operational status: Connected
version: VMware vCenter Server 4.1.0 build-345043
vc-uuid: 32D940A7-CB4E-467A-AD42-923A8AF53192
The output shows the IP address for the main data center that contains the servers and the data center name.
Cisco VNMC VM Manager
To make sure that the Cisco VNMC VM Manager has been correctly configured to manage the VMs, in the Cisco VNMC, choose Resource Management > Resources > Virtual Machines > VM Managers. Figure 2-9 shows the UCS host that is being managed by the Cisco VNMC.
Figure 2-9 Cisco VNMC VM Manager
Dynamic VSM Interface Configuration
Make sure that the dynamic VSM interface has been correctly configured. The dynamic VSM interface configuration shows multiple vEthernet interfaces, including the outside, inside, and inside VM interfaces, and the virtual network interface cards (vNICs) for the VMs. To validate that the dynamic VSM interfaces have been correctly configured, use the show running-config interface command on the Cisco Nexus 1000V switch. The following is sample output from the show running-config interface command:
Switch# show running-config interface
inherit port-profile user-outside-profile
description user-outside-linux, Network Adapter 1
vmware dvport 4579 dvswitch uuid "b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27"
vmware vm mac 0050.568E.00A1
inherit port-profile user-outside-profile
description user-ASA-1000V-efw, Network Adapter 3
vmware dvport 4581 dvswitch uuid "b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27"
vmware vm mac 0050.568E.011F
inherit port-profile user-profile
description user-ASA-1000V-efw, Network Adapter 2
vmware dvport 4548 dvswitch uuid "b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27"
vmware vm mac 0050.568E.011B
inherit port-profile user-app-profile
description user-app-linux, Network Adapter 1
vmware dvport 4866 dvswitch uuid "b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27"
vmware vm mac 0050.568E.00A0
The output shows the following:
•
user-ASA-1000V-efw is the ASA 1000V machine with the outside interface associated with vEthernet 40 and the inside interface associated with vEthernet 43.
•
user-app-linux is the inside Linux machine and is associated with vEthernet 55.
•
user-outside-linux is the outside Linux machine and is associated with vEthernet 5.
To view the interface status for the VSM, use the show interface status command on the Cisco Nexus 1000V switch. The following is sample output from the show interface status command:
Switch# show interface status
--------------------------------------------------------------------------------
Port Name Status Vlan Duplex Speed Type
--------------------------------------------------------------------------------
mgmt0 -- up routed full 1000 --
Eth3/6 -- up trunk full 1000 --
Eth4/6 -- up trunk full 1000 --
Veth1 VSM-Nexus1000V-4.2 up 2 auto auto --
Veth2 VSM-Nexus1000V-4.2 up 3 auto auto --
Veth5 user-outside-linux up 1101 auto auto --
Veth40 user-ASA1000V-efw, up 1101 auto auto --
Veth43 user-ASA1000V-efw, up 101 auto auto --
Veth55 user-app-linux, N up 101 auto auto --
The output shows the following:
•
vEthernets and their associated VLANs and VMs.
•
vEthernet 5 and vEthernet 40 are on the same VLAN.
•
vEthernet 43 and vEthernet 55 are on the same VLAN.
VEM Port Configuration
To validate that the VEM port has been correctly configured, use the show port command on the ESX or ESXi server on which the VEM is installed. The following is sample output from the show port command on the VEM:
LTL VSM Port Admin Link State PC-LTL SGID Vem Port Type
58 Veth40 UP UP FWD 0 user-ASA1000V-efw.eth2
59 Veth43 UP UP FWD 0 user-ASA1000V-efw.eth1
64 Veth5 UP UP FWD 0 user-outside-linux.eth0
65 Veth55 UP UP FWD 0 user-app-linux.eth0
The output shows the following:
•
The LTL column shows the VEM port IDs, which are internally generated by the VEM.
•
The VSM Port column shows the associated vEthernets.
•
The vEthernet-VM associations shown must be the same as those that appear in the VSM.
Note
You can enter commands on the VEM from the VEM shell (SSH access is required) or from the VSM CLI using the module vem # execute command. An example from the VSM is the module vem 3 execute vemcmd show port command.
Cisco VNMC Security Profile ID
The security profile ID (SPID) is mapped to an edge security profile and is generated by the Cisco VNMC. The SPID is encapsulated in the traffic packet. To validate that the Cisco VNMC SPID has been correctly configured, in the Cisco VNMC, choose Policy Management > Service Profiles > root > User > user-app-profile. Figure 2-10 shows an example of a correctly configured Cisco VNMC SPID.
Figure 2-10 Cisco VNMC SPID
VSM vService Configuration
To validate that the VSM vservice has been correctly configured, use the show vservice detail command on the Cisco Nexus 1000V switch. The following is sample output from the show vservice detail command:
Switch# show vservice detail
#Node ID:13 Name:vASA-user
Type:asa IPAddr:10.0.101.1 Fail:close Vlan:101
4 Alive 00:50:56:8e:01:1b 2
#PortProfile:user-app-profile Org:root/user
Node:vASA-user Profile(Id):user-app-profile(36)
NIC-Name:Network Adapter 1
VM-UUID :42 0e 13 70 3c 73 06 3b-3e c2 3c 80 da df 63 87
DVS-UUID:b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27
The output shows the following:
•
The name of the VSN, which is vASA-user. This VSN appears earlier in this guide in the port profile running configuration under the user-app-profile.
•
The IP address, 10.0.101.1, specified in this example refers to the inside interface of the ASA 1000V, which is used for all vPath traffic.
•
The port profile that was assigned.
•
The inside VM, user-app-linux, and its IP address, 10.0.101.22.
•
The VSM gets the security profile ID from the VNMC. For example, Profile(Id): user-app-profile (36).
•
Each VM and its associated vEthernet.
•
The edge security profile - SPID mapping. The user-app-profile edge security profile is associated with SPID 36.
•
A correlation also exists between the IP address of the inside machine, user-app-linux, and SPID 36.
•
All the items that appear in the output are bound together.
•
The number of ASA 1000V and VSG licenses in use.
VSN Configuration in the VSM
To validate the VSN configuration in the VSM, use the show vservice brief command on the Cisco Nexus 1000V switch. The following is sample output from the show vservice brief command:
Switch# show vservice brief
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Type In-Use-Lic-Count UnLicensed-Mod
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
ID Name Type IP-Address Mode State Module
13 vASA-user asa 10.0.101.1 v-101 Alive 4,
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
PortProfile:user-app-profile
Node:vASA-user(10.0.101.1) Profile(Id):user-app-profile(36)
Veth Mod VM-Name vNIC IP-Address
55 4 user-app-linux 1 10.0.101.22,
Module 4 shows the inside interface configuration of the ASA 1000V, which displays information for all vPath traffic.
To see vEthernet information, use the show vservice port brief | detail command on the Cisco Nexus 1000V switch. The following is sample output from the show vservice port brief command:
Switch# show vservice port brief
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
PortProfile:user-app-profile
Node:vASA-user(10.0.101.1) Profile(Id):user-app-profile(36)
Veth Mod VM-Name vNIC IP-Address
55 4 user-app-linux 1 10.0.101.22,
The following is sample output from the show vservice port detail command:
Switch# show vservice port detail
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
PortProfile:user-app-profile
Node:vASA-user(10.0.101.1) Profile(Id):user-app-profile(36)
VM-UUID :42 0e 13 70 3c 73 06 3b-3e c2 3c 80 da df 63 87
DVS-UUID:b0 6a 0e 50 e2 e4 79 25-76 d8 24 d4 02 b0 32 27
The output shows the following:
•
The VSN data IP address is for the edge security profile, which has the same IP address as the Cisco VNMC does.
•
That 36 is the SPID that is mapped to the security profile and is embedded in the packet.
VSN Configuration in the VEM
To validate the VSN configuration in the VEM, use the show vsn binding command on the ESX or ESXi server on which the VEM is installed. The following is sample output from the show vsn binding command:
~ # vemcmd show vsn binding
VSG Services Disabled | VSG Licenses Available 0
ASA Services Enabled | ASA Licenses Available 2
LTL PATH VSN SWBD IP P-TYPE P-ID
65 6 13 101 10.0.101.1 2 36
LTL 65 is associated with user-app-linux, which is the inside VM. As a result, the VEM can correlate the inside VM with SPID 36. A profile type of 2 indicates the edge security profile.
To validate the IP address of the inside VM, use the show learnt ip command on the Cisco Nexus 1000V switch. The following is sample output from the show learnt ip command:
~ # vemcmd show learnt ip
The VEM learns the IP addresses of the VMs present on the network and knows the IP address of the inside VM, which is user-app-linux. The IP and SPID information is the same in the VEM and in the VSM.
ASA 1000V IP-SPID Mapping (Control Path)
To validate the ASA 1000V IP-SPID mapping from the control path, use the show vsn command on the ASA 1000V. The following is sample output from the show vsn command:
Configuration through VNMC: enabled
vsn security-profile info:
security-profile : user-outside-profile@root/user
security-profile : default@root
security-profile : user-app-profile@root/user
security-profile : user-app-profile@root/user
The output shows the binding (mapping) information in the Cisco VNMC, ASA 1000V, and Cisco Nexus 1000V switch, and the following:
•
SPID bindings from the control path.
•
IP-SPID bindings that are the same as the VSM and VEM output.
•
The user-app-profile edge security profile has been mapped to the ASA 1000V.
•
All vPath traffic passes through security profile 3 (sp003) on the ASA 1000V.
ASA 1000V IP-SPID Mapping (Data Path)
To validate the ASA 1000V IP-SPID binding from the data path, use the show asp table vsn ip-binding command on the ASA 1000V. You can use this command in ASDM or in VNMC mode. The following is sample output from the show asp table vsn ip-binding command:
ASA1000V(config)# show asp table vsn ip-binding
This output may help determine if the control path or data path is the issue that requires resolution.
To validate the security profile-SPID binding from the data path, use the show asp table vsn security-profile command on the ASA 1000V. You can only use this command when you are in ASDM mode. The following is sample output from the show asp table vsn security-profile command on the ASA 1000V:
ASA1000V(config)# show asp table vsn security-profile
ASA 1000V Services for Security Profile Interfaces
To validate the ASA 1000V services for security profiles, use the show running-config service-interface command on the ASA 1000V. The following is sample output from the show running-config service-interface command:
ASA1000V# show running-config service-interface
service-interface security-profile all inside
You only need to enter this command if you use the ASDM mode. The command runs automatically if you use the VNMC mode. The security profile interface is not a physical interface that can send or receive vPath tagged traffic from the Cisco Nexus 1000V switch. You can associate the physical interface to be used to send or receive vPath traffic using the service-interface command.
VSM Interface Counters
To see the vEthernet statistics, use the show interface counters command on the Cisco Nexus 1000V switch. The following is sample output from the show interface counters command:
Switch# show interface counters
--------------------------------------------------------------------------------
Port InOctets InUcastPkts InMcastPkts InBcastPkts
--------------------------------------------------------------------------------
Veth55 43639 25386 19 163
Veth43 117240 28656 0 608
--------------------------------------------------------------------------------
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
--------------------------------------------------------------------------------
Veth55 1512452 327 0 149429
Veth43 141150 340 18 134246
VEM Packet Statistics
To see the correlation between the VSM and VEM statistics, use the show packets command on the ESX or ESXi server on which the VEM installed. The following is sample output from the show packets command on the VEM:
LTL RxUcast TxUcast RxMcast TxMcast RxBcast TxBcast Txflood Rxdrop Txdrop Name
65 25386 327 19 0 163 149429 1593 0 0 user-app-linux.eth0
58 198 613 0 18 532 51 21 0 0 user-ASA1000V-efw.eth2
59 28656 340 0 18 608 134246 1926 0 0 user-ASA1000V-efw.eth1
The packet statistics on the VEM and on the VSM must match each other in a working configuration.
ASA 1000V vPath Counters
To see the packets sent or received on the service interface, use the show counters command on the ASA 1000V. The following is sample output from the show counters command:
Protocol Counter Value Context
VPATH IN_PKTS 181 Summary
VPATH OUT_PKTS 29 Summary
VPATH OUT_VSN_PKTS 152 Summary
VPATH HA_COMMON_OUT_PKTS 1 Summary
VPATH HA_COMMON_OUT_BYTES 56 Summary
SSLERR BAD_PROTOCOL_VERSION_NUMBER 2 Summary
SSLERR BAD_SIGNATURE 2 Summary
SSLALERT TX_CLOSE_NOTIFY 101 Summary
SSLALERT TX_WARNING_ALERT 101 Summary
SSLNP OPEN_CONN 1 Summary
SSLNP HANDSHAKE_START 101 Summary
In this output, the vPath counters specify the following:
•
IN_PKTS—The number of packets received from the Cisco Nexus 1000V switch (for the service interface).
•
OUT_PKTS—The number of packets sent to the Cisco Nexus 1000V switch (for the service interface).
•
OUT_VSN_PKTS—Control-related packets.
•
HA_COMMON_OUT_PKTS—The number of packets sent during failover replication.
•
HA_COMMON_OUT_BYTES—The number of bytes sent during failover replication.
Example
An ICMP packet is sent from an inside VM to the outside, with five ping packets.
The show counters command output shows that the vPath counters on the ASA 1000V were the following:
Protocol Counter Value Context
VPATH OUT_VSN_PKTS 7 Summary
The result is the following:
•
5 vPath IN_PKTS—Five packets were received by the service interface from the Cisco Nexus 1000V switch.
•
5 vPath OUT_PKTS—Five packets were sent by the service interface to the Cisco Nexus 1000V switch.
•
7 vPath OUT_VSN_PKTS—Seven packets were control-related packets.
VSM vService Statistics
To see VSM vService statistics, use the show vservice statistics vlan 101 command on the Cisco Nexus 1000V switch. The following is sample output from the show vservice statistics vlan 101 command:
Switch(config)# show vservice statistics vlan 101
#VSN VLAN: 101, IP-ADDR: 10.0.101.1
#VPath Packet Statistics Ingress Egress Total
Policy-Permits Rcvd 0 5 5
The output shows the following:
•
The counters on the ASA 1000V and the VSM are the same.
•
The VSM saw five packets and decapsulated them.
•
The VSM received seven control-related packets from the service node.
ASA 1000V Interface Statistics
To see interface statistics for the ASA 1000V, use the show interface command on the ASA 1000V. The following is sample output from the show interface command:
ASA1000V(config)# show interface
Interface GigabitEthernet0/0 "inside", is up, line protocol is up
Interface security profile "sp0003", is up, line protocol is up
security-profile user-app-profile@root/user, spid 36
service-interface is inside
Hardware is 1825445EM rev01, BW 1000 Mbps, DLY 10 usec
Auto-Duplex (Full-duplex), Auto-Speed (1000Mbps)
Input flow control is unsupported, output flow control is off
MAC address 0050.568e.011b, MTU 1500
IP address 10.0.101.1, subnet mask 255.255.255.0
98 packets input, 6272 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 8 ignored, 0 abort
0 pause input, 0 resume input
51 packets output, 3600 bytes, 0 underruns
0 pause output, 0 resume output
0 output errors, 0 collisions, 2 interface resets
0 late collisions, 0 deferred
48 input reset drops, 0 output reset drops
input queue (blocks free curr/low): hardware (255/205)
output queue (blocks free curr/low): hardware (204/204)
Traffic statistics for "inside":
44 packets input, 2024 bytes
The output shows the following:
•
The service interface is the inside interface.
•
All vPath traffic traverses this interface.
•
Any issues that occur with vPath encapsulation should appear in the L2 decode drop values.
•
A non-zero value indicates the number of dropped packets for the vPath header. In this example, no packets have been dropped.
•
The security profile interface sp0003 is up, and no packets have been dropped.
•
The service interface is configured as the inside interface.
To see interface statistics for security profiles, use the show interface command on the ASA 1000V. The following is sample output from the show interface command for security profiles:
ASA1000V(config)# show interface
Interface security-profile "sp0003", is up, line protocol is up
security-profile user-app-profile@root/user, spid 36
Traffic statistics for "sp0003":
29 packets input, 2436 bytes
29 packets output, 2436 bytes
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec, 0 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
Traffic statistics for "sp0003":
29 packets input, 2436 bytes
29 packets output, 2436 bytes
1 minute input rate 0 pkts/sec, 0 bytes/sec
1 minute output rate 0 pkts/sec, 0 bytes/sec
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec, 0 bytes/sec
5 minute output rate 0 pkts/sec, 0 bytes/sec
5 minute drop rate, 0 pkts/sec
The output indicates that security profile interface sp0003 is up, and no packets have been dropped.