Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers Version History Version Number Date Notes 1 July 30, 2003 This document was created. The term “Safe Harbor” was changed to “Profiled Release.” 2 September 5, 2003 Additional technical edits incorporated. Executive Summary The nEverest program is a quality initiative that focuses on satisfying customer requirements by coordinating Cisco IOS release system-level and reliability testing under “real world” conditions. The nEverest testing uses the following five profiles, the designs of which are based solely on customer requirements: • Global Enterprise • Financial Enterprise • Service Provider/IP backbone • Service Provider/MPLS backbone • Broadband This document provides a summary of the system-level and reliability testing completed atop the Global Enterprise profile for the following releases: Cisco IOS Release 12.2(16b)M Cisco IOS Release 12.1(13)E9 Cisco IOS Release 12.1(13)EW2 Cisco IOS Release 12.1(13)EA1c Cisco IOS Release 12.2(15)T5 Catalyst OS 7.6(1) Catalyst OS 6.4(3) Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Copyright © 2003. Cisco Systems, Inc. All rights reserved. Table 1 lists all of the software releases tested and the platforms on which they were tested. Table 1 Tested Software Releases and Platforms Release Platform Cisco IOS Release 12.2(16b)M • WAN/branches platforms (7500, 7200, 36x0, 2620) Cisco IOS Release 12.1(13)E9 • 7600 and Catalyst 6500 - Native (See Note 1 & Note 2) Cisco IOS Release 12.1(13) EW2 • Catalyst 4000/4500 - Native - sup3 Cisco IOS Release 12.1(13)EA1c • Catalyst 3550 • Catalyst 2950 Cisco IOS Release 12.2(15)T5 • 7200 with NPE-G1 • (3745 and other platforms) for Voice, QoS, and IP Security • Catalyst 4000/4500 Access Gateway Module VoIP line card • Catalyst 6500 - Hybrid (See Note 1 & Note 2) • Catalyst 4000/4500 - Hybrid - sup2 Catalyst OS 7.6(1) Catalyst OS 6.4(3) Note Notes • 1. Cat6000 Hybrid image: c6msfc2-jsv-mz.121-13.E9 + CATOS 7.6.1 Cat6000 Supervisor IOS (native): c6sup22-jsv-mz.121-13.E9 • 2. Cisco 7600 Router Image: c6sup22-jsv-mz.121-13.E9 • 1. Cat6000 Hybrid image: c6msfc2-jsv-mz.121-13.E9 + CATOS 7.6.1 Cat6000 Supervisor IOS (native): c6sup22-jsv-mz.121-13.E9 • 2. Cisco 7600 Router Image: c6sup22-jsv-mz.121-13.E9 Catalyst 5x00 The software versions listed in this document were tested using the test procedures described. All relevant unresolved DDTSs found during testing are listed in the Test Results Summary table. In addition to the information contained in this report, we highly recommend that you review the Release Notes for each release to see the latest list of open caveats for specific features not tested or caveats found after publication. During the testing, the network is placed under loads that are consistent with those in a global enterprise network. A standard suite of traffic testing tools (for example, Chariot) is used during the network testing. This network testing includes a combination of automated and manual tests. For a summary of the test results, see the “Test Results Summary” section. This document contains the following sections: • About Global Enterprise System Test, page 3 • Test Results Summary, page 17 • Test Suite 1: San Jose Campus with Data Center, page 22 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 2 About Global Enterprise System Test • Test Suite 2: Boston Campus, page 60 • Test Suite 3: Washington, D.C. Campus with Data Center, page 89 • Test Suite 4: Denver Campus, page 120 • Test Suite 5: Dallas Campus, page 154 • Test Suite 6: Remote Campuses, page 186 About Global Enterprise System Test The goal of the Global Enterprise System Test project was to provide improved network stability, reliability, and performance with respect to Cisco IOS software. This project involved testing the feature sets and protocols in several Cisco IOS release images on certain platforms to provide high-quality code for global enterprises. This combination of features, hardware, and images was tested in a laboratory environment that simulated the global enterprise business network environment. For information on the tested hardware and the network setup of the test environment, see the “Global Enterprise Topology”section. What was Tested This test effort focused on verifying the functionality, reliability and performance requirements of the following technology features in the large enterprise global test topology: • IP Routing • NMS • QoS • VoIP • Multicast • Security (IPSec) Global Enterprise Topology The global enterprise topology consisted of five multilayer-design campuses—two large campuses with data centers, and three regional campuses—plus 12 remote sites, as follows: • San Jose campus with data center • Boston campus • Washington, D.C. campus with data center • Denver campus • Dallas campus • Remote campuses – Los Angeles – Colorado Springs – Phoenix Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 3 About Global Enterprise System Test – Santa Fe – New Orleans – Pittsburgh – Houston – Austin – New York – Miami – Arlington – Boca Raton Figure 1 shows the topology for the global enterprise network at a high level. Each campus is represented in the topology. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 4 About Global Enterprise System Test Figure 1 High-Level Enterprise Global Topology T1 (PTP) ATM/FR (nx64k) E1 (PTP) ATM E1 T3 (PTP) ATM T3 7609 T1 7500 7500 7206 POS OC3 7609 Washington, D.C. Data Center GE GE 7609 7609 7507 7206 ATM OC3 ATM Provider ATM OC3 7500 HSSI (P2P) ISP1 Multichannel E3 FE 7500 FE . 7206 7206 Denver 2600 7507 7206 FE ATM E3 7206 7206 Dallas 7206 FE ATM/FR ATM/FR 7507 ATM T3 (P2P) 88421 San Jose - HQ Data Center ISP3 7206 Boston 7206 FE FR/FR ATM/FR T1 ISDN BRI 3640 Los Angeles 7204 Phoenix 2651 Colorado Springs 2651 Sante Fe 2651 New Orleans T1 T1 3640 Arlington 1760 2651 3640 7206 3640 Boca Austin 3660 Houston Pittsburgh Miami Raton 3620 New York ATM-to-ATM links and leased lines (with back-to-backWANs) were used in the topology. Multiple types of high-speed WAN links were used to establish the connections to all campuses, including OC-3 Packet-Over-SONET (POS) line card interface links, OC-3 ATM line card interface links, T1 links, and High-Speed Serial Interface (HSSI) links. The remote sites were connected to the campuses using ATM-to-Frame Relay (FR) and leased-line connections with various fractional T1/E1 and T1/T3 link speeds, respectively. In addition, there were connections between selected campuses and the Internet service provider (ISP) through the use of T1/T3 leased lines. The platforms tested include the Cisco 7600 router, the Cisco 7500 router, the Cisco 7200VXR router, the Cisco 3600 router, the Cisco 2600 router, the Catalyst 6500 switch, the Catalyst 5500 switch, the Catalyst 4500 switch, the Catalyst 4000 switch, the Catalyst 3550 switch, and the Catalyst 2950 switch. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 5 About Global Enterprise System Test The topologies for each campus within the larger global enterprise topology are detailed in separate sections of this document. Table 2 shows where you can find more information about the topology for a specific campus. Table 2 Where to Find the Topology Information for Each Campus Campus Section San Jose campus with data center Test Suite 1: San Jose Campus with Data Center, page 22 Boston campus Test Suite 2: Boston Campus, page 60 Washington, D.C. campus with data center Test Suite 3: Washington, D.C. Campus with Data Center, page 89 Denver campus Test Suite 4: Denver Campus, page 120 Dallas campus Test Suite 5: Dallas Campus, page 154 Remote campuses Test Suite 6: Remote Campuses, page 186 The Testing Approach The end-to-end system test approach for global enterprise consists of defining and executing a series of functionality, system, and reliability test cases in the large global enterprise campuses. The nEverest Phase 2 System Test focused on IP routing with EIGRP, BGP, and OSPF, plus network management, multicast, security, voice, and QoS testing. This test plan focused primarily on the following areas: • Functionality testing • System testing • Reliability testing Functionality Test Description The functionality test category verified the reliability and performance of basic IP functionality. The tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS The overall objectives of the functionality test were as follows: • Verify the basic network operation (that is, network connectivity). • Verify the configurability and stability in a controlled environment for each of the functionality tests listed. • Verify that the software versions recommended for nEverest Phase 2 could be loaded into the devices under test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 6 About Global Enterprise System Test • Verify that the major IP features worked as expected in the Global Enterprise Test Network. The following test sequence took place during the functionality test case execution: • Basic IP testing was performed in conjunction with network management testing (NMS). Network Management was utilized to collect the test information. After completion of the basic IP test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. • Multicast testing was performed, again with NMS monitoring. After completion of the multicast test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. • Security testing was performed in conjunction with NMS monitoring. After completion of the security test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. • Voice testing was performed in conjunction with NMS monitoring. After completion of the voice test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. • QoS testing was performed in conjunction with NMS monitoring. After completion of the QoS test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. Basic IP The objective of the basic IP test was to verify the functionality and reliability requirements of the basic IP in a large enterprise topology environment. For Phase 2, the primary focus was on basic IP with EIGRP, OSPF, and BGP. The basic IP testing category covered the deployment and verification of the following Layer 2 features and Layer 3 routing protocols: • Layer 3 – EIGRP or OSPF – eBGP and iBGP • Layer 2 LAN – VTP and VLAN – VLAN trunking – STP – HSRP The enterprise global topology consisted of five different "multilayer design" campuses comprising two large campuses with data centers, two medium-size regional campuses, one small campus, and 12 remote sites. The ATM-to-ATM and leased lines with back-to-back WAN connections with different WAN links such as ATM-OC-3, POS-OC-3, T3, E3, and HSSI were used to connect all campuses. The remote sites were connected to the campuses by FR-to-FR, ATM-to-FR, and leased-line connections with various fractional T1/E1 and T1/T3 link speeds, respectively. Also, there were connections between some campuses and ISP topology by T1/T3 leased lines. The tested platforms were Cisco 7600, Cisco 7500, Cisco 7200VXR, Cisco 3600, Cisco 2600, Catalyst 6500, Catalyst 5500, Catalyst 4500, Catalyst 4000, Catalyst 3550, and Catalyst 2950. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 7 About Global Enterprise System Test The network connectivity within the enterprise global topology and from the global to ISP topology were verified. The network parameters, such as CPU utilization, memory usage, and route convergence time, were captured using various test tools. Routing for the basic IP test was divided into two major sections: Interior Gateway Protocols (EIGRP and OSPF) and Exterior Gateway Protocols (BGP). Figure 2 shows an overview of the intercampus links and what protocol the links used, IGP or EGP. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 8 About Global Enterprise System Test Figure 2 Enterprise Global IGP and EGP Routing Topology Overview ATM physical conection Physical leased-line connection Physical GE/FE connection Boston eBGP ISP 3 AS 3 egbos-7200-w1 egwas-6506-c1 egsj-6509-c3 egwas-6506-c2 egwas7600-w2 egsj-6509-c4 egsj-7206-w3 egwas-7507-w3 ATM eBGP Washington, D.C. T3 -A TM ISP 1 AS 1 OC3-ATM San Jose Denver Dallas Boca Raton egden-6509-c1 Austin V egdal-6506-c1 V egden-6509-c2 egdal-6506-c2 egdal-7206-w3 ATM/FR egden-7507-w4 V V Los Phoenix Colorado Angeles Springs V V V V V Santa Fe New Orleans Houston Pittsburgh New York V V V Arlington 95531 V egden-7206-w3 Miami Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 9 About Global Enterprise System Test Network Management During the first phase, the high-level feature and functionality test was performed to verify that any major feature or functionality that was supported but not present or not functioning was identified in a timely manner. Also, detailed testing was performed. For a description of the available test case definitions and expected results, refer to the testing tools, scripts, and files listed in the various test sections. The network management testing included the following: • Manually tested new and enhanced MIBs. • Used the existing scripts to test all identified MIBs. • Performed a basic functionality check on traps in v1 and v2c. • Checked the MIBs support list and compared with the show snmp mib command output. • Completed detailed tests and performed newly developed test scripts on all technology. • Used network management software such as CiscoWorks2000 RME, Campus Manager DFM, CiscoView, and HP OpenView to maximize interoperability, compatibility, and other tests. The procedures used for SNMP MIB testing in this phase were to verify that the information stored in a MIB database can be accessed, propagated, read, and written if applicable, to verify that the operation of the OID values reflected the actual operation on the device. Network Management Feature Coverage Following is the list of network management features and the testing objectives of those tested features: • Basic functionality check of SNMPv1 and v2 basic operations of GET, GETNEXT, SET and TRAP. • MIB database and OID test: – Verify the MIB database by different operations in the covered topologies. • Propagating the MIB database: – Verify that the MIB variable was set and that its value was propagated to the other MIB variable, as defined. • MIB compliance: – Test whether various MIB implementations conform to the respective MIB specification. Verify that the real operations that were set in the OIDs were correctly reflected on the device. The test was performed manually, by automation scripts, and by comparing the results with show command output. • SNMP Trap tests: – Verify that SNMPv1 and v2 traps and informs were appropriately generated. • Network Management Test: – Verify various network management tools (CiscoWorks 2000, CiscoView, HP OpenView) and other network management applications on various operating systems (for example, Solaris and Windows 2000). • Verify documents: • Negative testing peer with memory leak tests: – Verify that all SNMP operations did not cause any memory leaks. • New technologies and new hardware MIB tests: – Verify SNMP operation on new hardware MIBs. Following are other features that were integrated and tested prior to the network management tests: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 10 About Global Enterprise System Test • OSPF, EIGRP, and BGP routing • SYSLOG • NTP • TFTP • DNS • TACACS+ • ACL • HSRP • SPT • 802.1q trunking Multicast The goal of multicast testing was to verify functional features, which integrate across multiple Cisco platforms, with various sets of Cisco IOS and CatOS releases at a system level that is commonly used by target enterprise customers. The strategy was to implement and test multicast features within the nEverest E2E-Global test beds and to discover and to fix any software defects by working closely with designated development engineers, before customers find them in their complex operational networks. The results from this testing were shared with our partner teams, such as the Development Test group (DevTest), the Enterprise Solutions Engineering group (ESE), the Engineering System Test group (EST), and the enterprise customers of the nEverest program. In nEverest Phase 2, priority was given to the features, platforms, and configurations that are most widely deployed today by customers. The following was the structure of each test case execution instance. This structure was a part of the functionality and system test cases. • Input parameters—multiple combinations of basic configuration sets, multicast configuration sets, and flow sets: – Basic configuration set—the portion of the configuration of network devices that addresses nonmulticast features used during testing. This set includes IP routing (EIGRP, OSPF, and BGP), basic SNMP, and security. These features had been tested prior to the multicast test execution instance. – Multicast configuration set—the configuration of network devices that would typically use more than one multicast feature. – Flow set—the set of flows or traffic generator configuration that was used with the multicast configuration set. • Output parameters—the network health show command set and the feature show command set: – Network health show command set—the set of show commands that were needed to determine the general health of the network, such as memory and CPU. – Feature show commands set—the set of show commands that were needed to determine if a specific multicast feature is working. • Results—from the output, a result information set was generated and a pass or fail determination was made. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 11 About Global Enterprise System Test – Result information set—the relevant information that was parsed from the show commands, and the results obtained by test tools that determined if the test execution instance passed. Multicast Feature Coverage Following is the list of multicast features and the testing objectives of those tested features: • CGMP: Verify that CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. • IGMP v2: Verify that IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping: Verify that IGMP snooping manages multicast traffic at Layer 2 by configuring a Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. Verify that IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • MMLS: Verify that multicast flows create MMLS entries and that switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • PIM sparse-dense mode: Verify that multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • Auto-RP: Verify that auto-RP dynamically updates the RP information in every network device. • Anycast-RP with Auto-RP: Verify that Anycast RP information was distributed to the routers and that none of the multicast groups reverted to dense mode. • Admin scoping and multicast boundary: Verify that the router learned RP mapping information within the defined time-to-live (TTL) number of hops and that multicast flows were restrained in the TTL range. Verify that RP messages were prevented from traveling beyond the boundaries of the network using multicast boundaries. • Multicast rate limit: Verify the rate that a sender from the source list could send to a multicast group in the group list Security The primary security test goals for nEverest Phase 2 were as follows: • Verify the functionality of IPSec and AAA features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. • Prepare for the integration of those features with other features commonly used by target enterprise customers in future nEverest phases. The approach was to cover three areas of security based on the nEverest customer template within the enterprise global topology, as follows: • IPSec IKE with preshared keys. • IPSec IKE with certificate server. • AAA with TACACS+ and other security commands. Priority was given to the features, platforms, and configurations that are most widely deployed today by customers. Security testing covered three types of tests: functionality test, system test, and reliability test. The following was the structure of each test case execution instance. This structure was a part of the system test case. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 12 About Global Enterprise System Test • Input parameters—multiple combinations of basic configuration sets, security configuration sets, and flow sets: – Basic configuration set—the portion of the configuration of network devices that addresses nonsecurity features used during testing. This set included IP routing (EIGRP, OSPF, and BGP), basic SNMP, and security. These features had been tested prior to the multicast test execution instance. – Multicast configuration set—the configuration of network devices that would typically use more than one security feature. – Flow set—the set of flows or traffic generator configuration that was used with the security configuration set. • Output parameters—the network-health show command set and the feature show command set: – Network health show command set—the set of show commands that were needed to determine the general health of the network, such as memory and CPU. – Feature show commands set—the set of show commands that were needed to determine if a specific security feature was working. • Results—from the output, a result information set was generated and a pass or fail determination was made. – Result information set—the relevant information that was parsed from the show commands, and the results obtained by test tools that determined if the test execution instance passed. Security Feature Coverage Following is the list of IPSec features that were tested: • 168-bit 3DES encryption • MD5 and SHA-1 hashing, plus support for IPSec AH and HMAC transforms • Diffie-Hellman and preshared key exchange • Group1—768 bits, Group 2—1024 bits • RSA public key signature • GRE tunnel • Tunnel and transport mode • IPSec certificate authentication • CLI • IKE (ISAKMP) • AAA with TACACS+ Following are other features that were integrated and tested prior to security testing: • SNMP • Logging • NTP • DNS • OSPF, EIGRP, and BGP • HSRP • ACL Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 13 About Global Enterprise System Test • Spanning tree • 802.1q Voice The objective of voice over IP (VoIP) testing was to verify the convergence of the following two general areas of VoIP telephony within the enterprise global topology: • The traditional H.323 gateway-based VoIP or "legacy network." • The newer yet-to-be-added IP telephone CallManager architecture (termed the "AVVID" additions). Both of these architectures, plus some additional new features and hardware, were added to the enterprise global data topology in a phased manner. It was hoped that time would allow all phases of the design to be implemented, but the testing did not depend on having all of the phases complete. The strategy was such that after any phase, testing could commence and the remaining phases could be added later. Feature Test The following feature set was tested during the VoIP functionality testing: • H.323—Took place between all legacy gateways, c4k blades, vg200, ATA186, gatekeeper, and from the gatekeeper and gateway to Cisco CallManager. • SCCP—Took place between all real or simulated IP telephones, c6k blades, c4k transcoding, SRST gateways and Cisco CallManager. • RTP—These voice streams took place after all call setups. • Transcoding—Took place in selected paths at the data center or other regional sites. • G.711—Took place as the codec of choice on the LANs. • G.729—Took place as the codec of choice on the WANs. • SRST—Took place at the Los Angeles, Colorado Springs, and Pittsburgh remote sites. Scope Besides the features already listed, the scope included testing matrices in the following three areas: • Signaling protocols • Call types • Gateway types These three matrices were built in to the final dial plan document as follows: • Signaling: – H.323 to H.323 calls—covered across the entire VoIP legacy network – H.323 to SCCP calls—covered across the entire AVVID network – SCCP to SCCP calls—covered across the entire AVVID network • Call types covered across entire network: – FXS to FXS – FXS to T1 – FXS to IP – T1 to T1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 14 About Global Enterprise System Test – T1 to IP – IP to IP • Gateway types: – Catalyst 6000 only—covered in Washington, D.C. – Catalyst 4000 only—covered in Denver – Catalyst 6000 to Catalyst 6000—covered between San Jose and Washington, D.C. – Catalyst 6000 to Catalyst 4000—covered in San Jose – Catalyst 6000 to GW—covered between San Jose and Los Angeles – Catalyst 4000 and Catalyst 4500—covered between San Jose and Denver – Catalyst 4000 to GW—covered between Boston and Pittsburgh – GW to GW—covered by legacy network gateways QoS The objective of QoS testing was to verify the integration of QoS features with other features commonly used by target enterprise customers. The strategy was to implement and test QoS within the E2E global test beds and to discover defects before customers find them in their complex networks. The components of QoS can be broken into six general categories. These categories were evaluated on an individual basis. There may be more than one specific mechanism in each category; only the following QoS mechanisms and features were tested: • Classification and Marking, including the following: – Access lists – Network-based application recognition (NBAR) – Class maps – Differentiated services code point (DSCP) – Policy maps using DSCP • Congestion Avoidance, including the following: – Weighted Random Early Detection (WRED) – Distributed WRED (dWRED) • Congestion Management, including the following: – Low Latency Queueing (LLQ) – Distributed LLQ (dLLQ) – Class-Based Weighted Fair Queueing (CBWFQ) – Distributed CBWFQ (dCBWFQ) • Traffic Conditioning, including the following: – Frame Relay Traffic Shaping (FRTS) – Generic Traffic Shaping (GTS) – Distributed Traffic Shaping (dTS) – ATM Traffic Shaping • Signaling: None Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 15 About Global Enterprise System Test • Link Efficiency Mechanisms, including the following: – Multi-Link Point-to-Point Protocol (MLPPP) – Compressed Real-Time Transport Protocol (cRTP) – Distributed cRTP (dcRTP) – Link Fragmentation and Interleaving (LFI) These features were configured for use with the QoS functionality described in the following sections. Modular QoS CLI (MQC) The MQC is the Cisco IOS framework for implementing QoS features. The MQC is a CLI structure that allows you to create traffic policies and attach these policies to interfaces. In the MQC, the class-map command is used to define a traffic class (which is then associated with a traffic policy). The purpose of a traffic class is to classify traffic. The modular QoS CLI structure consists of the following three processes: • Defining a traffic class with the class-map command. • Creating a traffic policy by associating the traffic class with one or more QoS features with the policy-map command. • Attaching the traffic policy to the interface with the service-policy command. Classification and Marking Classification and marking are two separate actions that are always done together. This test plan used access lists, class maps, and NBAR to classify data, voice, and video (multicast) traffic. Packets were marked using policy-map commands, and the DSCP. Packet classification and marking was used on the outbound interfaces of the access and distribution layer switches in all campuses. The Layer 2 CoS to Layer 3 QoS trust mechanism, also known as remarking or marking, was also tested, whenever possible. Classification also took place at the other routers and switches in the network to enforce predictable Per-Hop Behaviors (PHBs). Layer 2 to Layer 3 trust mechanisms were also tested. Congestion Avoidance Weighted Random Early Detection (WRED) is the congestion avoidance mechanism that was used in the test plan. WRED provides buffer management to the output queues and was applied using the random-detect dscp-based command on the outbound interfaces of the WAN aggregation routers with T3/E3, HSSI, and OC-3 links. Congestion Management Congestion management is achieved by setting up queues of differing priorities. In the testing, the LLQ priority and bandwidth commands were used to establish a set of queues to service all traffic. These commands were added to the policy map applied to the outbound (WAN-side) interfaces of all routers and Layer 3 switches. Traffic Conditioning The policing and shaping features make up traffic conditioning. In the test plan, GTS, dTS, and ATM shaping (using the vbr-nrt command) were used for conditioning traffic. In addition, Frame Relay Traffic Shaping (FRTS) was used on the WAN or edge outbound interfaces to account for the disparity between the link and the permanent virtual circuit (PVC) clock rates in the ATM/Frame Relay and ATM clouds. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 16 Test Results Summary Signaling Signaling features such as Resource Reservation Protocol (RSVP) were not included in the QoS features tested. Voice signaling was categorized into the “Interactive” application class. Link Efficiency Mechanisms Large packets can create an unacceptable delay on lower-speed WAN links for small voice packets waiting behind them. To resolve this potential problem, link fragmentation and interleaving (LFI) or Multilink Point-to-Point Protocol (MLPPP) was enabled on the WAN or edge outbound interfaces. Because the bandwidth on these low-speed WAN connections is very valuable, the increased workload of compressing the headers of the voice packets was justified. cRTP also was enabled on the outbound interfaces to conserve bandwidth. System Test Description The goal of the system test case was to simulate a realistic customer environment by configuring all functional features under test and executing all Cisco IOS functionality simultaneously with various planned levels of traffic generation. The negative test cases were also executed during the system test case. Reliability Test Description The reliability test was an extension of the system test case. The environment that was set up and successfully executed in the system test case was executed for a duration of 150 hours to verify that no new critical or severe defects were found during the extended test time. Test Results Summary Table 3 summarizes the results of all the testing that was completed as part of the Global Enterprise System Test initiative. Table 3 has the following information: the name of the test suite, the test category, the tests that were performed, the test results, the DDTS number (if applicable), and comments. Table 3 Test Results Summary Test Suites Test Category Test Suite 1: San San Jose Jose Campus with Functionality Test, page 27 Data Center, page 22 San Jose System Test, page 53 Tests Results DDTS/Comments Basic IP, page 28 Passed — Network Management, Passed page 34 — Multicast, page 35 Passed — Security, page 43 Passed — Voice, page 44 Passed — QoS, page 47 Passed — System, page 53 Passed — Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 17 Test Results Summary Table 3 Test Results Summary (continued) Test Suites Test Category Tests San Jose Reliability Reliability, page 57 Test, page 57 Test Suite 2: Boston Campus, page 60 Boston Functionality Test, page 64 Passed with exceptions DDTS/Comments • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. Passed — Network Management, Passed page 68 — Multicast, page 69 Passed — Security, page 74 Passed — Voice, page 75 Passed — QoS, page 77 Passed — Boston System Test, page 81 System, page 81 Passed — Boston Reliability Test, page 84 Reliability, page 84 Passed with exceptions Washington, D.C. Test Suite 3: Washington, D.C. Functionality Test, Campus with Data page 92 Center, page 89 Basic IP, page 64 Results Basic IP, page 92 Passed • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • Chariot endpoint station bos-ux1 failed during the test. Chariot reported the problem as a bus error in the Sun workstation that served as bos-ux1 and did not reflect any problems in the network. The test results were not affected. — Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 18 Test Results Summary Table 3 Test Results Summary (continued) Test Suites Test Suite 4: Denver Campus, page 120 Test Category Tests Results DDTS/Comments Network Management, Passed page 97 — Multicast, page 99 Passed — Security, page 105 Passed — Voice, page 106 Passed — QoS, page 109 Passed — Washington, D.C. System Test, page 112 System, page 112 Passed — Washington, D.C. Reliability Test, page 116 Reliability, page 116 Passed with exceptions Denver Functionality Test, page 123 Denver System Test, page 146 Basic IP, page 124 • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • About two-thirds into the test, 2 Chariot endpoint stations (EPs) failed due to problems with their network interface cards. The failures were with the Chariot EPs and did not reflect any problems in the network. The test results were not affected. Passed — Network Management, Passed page 130 — Multicast, page 132 Passed — Security, page 137 Passed — Voice, page 138 Passed — QoS, page 141 Passed — System, page 146 Passed — Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 19 Test Results Summary Table 3 Test Results Summary (continued) Test Suites Test Suite 5: Dallas Campus, page 154 Test Suite 6: Remote Campuses, page 186 Test Category Tests Results Denver Reliability Test, page 150 Reliability, page 150 Passed with exceptions Dallas Functionality Test, page 157 • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • An H.323 VoIP traffic generator failed to start, resulting in a 2-hours delay of the start of VoIP traffic between the Denver campus and the remote campuses. The test results were not affected. Passed — Network Management, Passed page 161 — Multicast, page 163 Passed — Security, page 167 Passed — Voice, page 170 Passed — QoS, page 172 Passed — Dallas System Test, System, page 177 page 177 Passed — Dallas Reliability Test, page 181 Passed with exceptions Remote Functionality Test, page 189 Basic IP, page 157 DDTS/Comments Reliability, page 181 Basic IP, page 190 Passed • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. — Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 20 Test Suite Overview Table 3 Test Results Summary (continued) Test Suites Test Category Tests Results DDTS/Comments Network Management, Passed page 193 — Multicast, page 194 Passed — Security, page 198 Passed — Voice, page 200 Passed — QoS, page 202 Passed — Remote System Test, page 206 System, page 206 Passed — Remote Reliability Test, page 211 Reliability, page 211 Passed with exceptions • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • An H.323 VoIP traffic generator failed to start, resulting in a 2-hours delay of the start of VoIP traffic between the Denver campus and the remote campuses. The test results were not affected. • One of the multicast clients was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There was no multicast traffic between San Jose and Los Angeles while the client was off, but there were no problems in the network and the test results were not affected. Test Suite Overview There were a total of six test suites, one for each campus (San Jose, Washington, D.C., Denver, Boston, and Dallas), and one for the remote sites. Each test suite contained three or more feature-specific test categories that addressed a specific type of testing conducted (that is, basic IP testing, system testing, and reliability testing). Within each of these test categories, feature-specific test plans were designed and implemented. Table 4 lists each test suite, the category of testing conducted in the suite, the feature-specific tests, and the section that contains detailed topology information. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 21 Test Suite 1: San Jose Campus with Data Center Table 4 Test Suite Overview Test Plan Suite Category of Testing Conducted Suite 1: San Jose Campus with Data Center Suite 2: Boston Campus Suite 3: Washington, D.C. Campus with Data Center Suite 4: Denver Campus Suite 5: Dallas Campus Suite 6: Remote Campuses • Functionality testing • System testing • Reliability testing • Functionality testing • System testing • Reliability testing • Functionality testing • System testing • Reliability testing • Functionality testing • System testing • Reliability testing • Functionality testing • Scalability performance testing • System testing • Reliability testing • Functionality testing • System testing • Reliability testing Test Suite Chapter Test Suite 1: San Jose Campus with Data Center, page 22 Test Suite 2: Boston Campus, page 60 Test Suite 3: Washington, D.C. Campus with Data Center, page 89 Test Suite 4: Denver Campus, page 120 Test Suite 5: Dallas Campus, page 154 Test Suite 6: Remote Campuses, page 186 Test Suite 1: San Jose Campus with Data Center This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP and QoS at the San Jose campus with data center. The San Jose campus with data center is one component of the larger global enterprise topology. The global enterprise topology comprises five multilayer-design campuses—two large campuses with data centers and three regional campuses—and ten remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section of this document. In the test suite for the San Jose campus with data center, the following categories (or types) of testing were conducted: • Functionality testing: This test category verified basic IP functionality. The functionality testing involved basic IP testing (Layer 2 and HSRP, EIGRP and BGP routing, routing traffic setup and routing convergence testing, negative testing, and verification and traffic load testing), network management testing, multicast testing, security testing, voice testing, and QoS testing. • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing: This test category verified system reliability. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 22 Test Suite 1: San Jose Campus with Data Center This test suite contains the following sections: • Topology Description, page 23 • San Jose Functionality Test, page 27 • San Jose System Test, page 53 • San Jose Reliability Test, page 57 Topology Description The San Jose campus topology represents a large enterprise headquarters campus with a data center. The WAN aggregation routers, connecting to the other global enterprise sites and to the ISP, consisted of two Cisco 7609 Optical Services Routers (OSRs). The WAN aggregation router connecting to the remote sites was a Cisco 7206VXR router. Multiple types of high-speed WAN links were used, including OC-3 POS, OC-3 ATM, T1, T3, T3 ATM, and High-Speed Serial Interface (HSSI). The core of the campus consisted of four Catalyst 6509 switches with dual Multilayer Switch Feature (MSFC2) cards and Policy Feature (PFC2) cards. High-speed core Layer 3 Gigabit Ethernet (GE) links were used to connect two user buildings and one data center building. In one building, two Catalyst 6506 switches were used as distribution layer switches and multiple Catalyst switches, such as the 4003, 5505 and 6506 switches, were used as the access layer switches. In another building, two Catalyst 4000 switches were used as distribution layer switches and multiple Catalyst switches, such as the 4006, 4506, and 6506 switches, were used as the access layer switches. In the data center, two Catalyst 6506 switches were used as distribution layer switches and multiple Catalyst switches, such as the 5505 and 6506 switches, were used as the access layer switches. A Cisco 3640 router was used as a VoIP voice gateway, and another Cisco 3640 router was used as a VoIP gatekeeper for the entire global enterprise topology. EIGRP was the IP IGP routing protocol and approximately 800 routes were used at various points in the topology. BGP was the IP EGP routing protocol used for the ISP connection. Global application servers located at the San Jose campus data center served all campuses within the entire global enterprise topology. The simulated database servers (located at the data center of this campus) served this campus and stored data for the entire global enterprise topology. A redundant database server was included in the Washington, D.C. campus. Applications such as voice, RealMedia, FTP, HTTP, and Simple Network Management Protocol (SNMP) were simulated by Callgen, Chariot, IXIA, and Pagent. The testbed simulated end users by the use of traffic generators and actual PC and UNIX workstations. IPTV was used to generate multicast traffic. Figure 3 shows the San Jose campus with data center topology at a high level and includes the names of the individual routers. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 23 Test Suite 1: San Jose Campus with Data Center Figure 3 San Jose Campus with Data Center High-Level Topology Dallas Washington, D.C. Boston ATM Los Angeles ISP 1 Denver Washington, D.C. WAN Access egsj-7609-w1 egsj-6506-sd1 egsj-7609-w2 egsj-5505-sa1 egsj-7206-w3 WAN Regional Aggregation egsj-5505-sa2 egsj-6506-sd2 Core egsj-6509-c1 egsj-6509-c2 egsj-6509-c3 egsj-6509-c4 egsj-6506-sa3 Data Center Servers egsj-3640-gk egsj-3640-v2 Voice gateway and gatekeeper egsj-4506-b2d2 egsj-6506-b1d1 egsj-6506-b1d2 egsj-4003-b1a1 egsj-5505-b1a2 egsj-6506-b1a3 egsj-4006-b2a1 egsj-6506-b2a2 Building 1 Building 2 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 24 95533 egsj-4006-b2d1 FE GE HSSI(P2P) POS OC3(P2P) ATM OC3 T1(P2P) T3(P2P) ATM T3 Test Suite 1: San Jose Campus with Data Center Figure 4 shows the San Jose campus with data center topology at a more detailed level and includes the interface names. Figure 4 San Jose Campus with Data Center Detailed Topology Dallas Washington, D.C. ATM Boston Denver s2/0/0 Los Angeles s4/0 h2/0/0 egsj-7609-w1 egsj-7206-w3 g1/0,2/0 a2/1/0 a3/0/0 s2/1/0 g6/3 - g6/3 egsj-5505-sa1 1/1,2 g2/16 - g2/16 g1/1,2 g3/13,11,12,15,16 egsj-6506-sd2 g3/13,11,12,15,16 egsj-6509-c2 g3/1 - g3/1 g3/2,3 g3/2,3 g3/14,15 g3/14,15 1/1,2 egsj-6506-sd1 egsj-7609-w2 g1/1,2 f4/1,2 g1/1,2 g1/1,2 egsj-6509-c1 ISP 1 Washington, D.C. p3/1/0 egsj-5505-sa2 1/1,2 egsj-6506-sa3 f1/0 f1/0 g3/16 - g3/16 egsj-6509-c4 egsj-6509-c3 egsj-3640-gk egsj-3640-v2 g3/1,2,3 g3/1,2,3 g1/1,2 egsj-6506-b1d1 g1/1 g2/16 - g2/16 g2/1,2,3 1/1,2 egsj-4003-b1a1 egsj-6506-b1d2 g1/1 egsj-4506-b2d2 g2/16 - g2/16 g2/1,2,3 egsj-4006-b2d1 1/1,2 1/1,2 egsj-5505-b1a2 egsj-6506-b1a3 2/1,2 egsj-4006-b2a1 1/1,2 egsj-6506-b2a2 FE GE HSSI(P2P) POS OC3(P2P) ATM OC3 T1(P2P) T3(P2P) ATM T3 95534 g1/1,2 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 25 Test Suite 1: San Jose Campus with Data Center Figure 5 shows the San Jose campus with data center topology with the IP addresses. Figure 5 San Jose Campus with Data Center Topology with IP Addresses Dallas Washington, D.C. Boston ATM Los Angeles ISP 1 Denver Washington, D.C. .5 egsj-7609-w1 .1 .1 .21 .2 egsj-6509-c2 . 53 .17 .18 .54 .2 .4 .22 .11 egsj-6506-b1d2 .12 .21 .21 . 22 .1 .18 7 .13 .14 .5 .6 egsj-5505-sa2 4 egsj-6506-sa3 7 .5 8 .5 .8 egsj-6509-c4 .9 .1 0 egsj-6506-b1d1 .9 .10 .102 egsj-6506-sd2 egsj-6509-c1 .5 .6 .3 .2 .1 .5 egsj-5505-sa1 .6 .1 .13 egsj-6509-c3 1.1.0.0/19 1.2.0.0/19 1.3.0.0/19 96.5.8.0/21 .1 .2 .38 .37 . 13 .14 Building 1 address range: .3 .2 0 9 96.5.1.x/30 (P2P) 96.5.3.x/30 (P2P) 96.5.4.x/30 (P2P) 96.5.0.x/32 (loopback) .26 .25 egsj-6506-sd1 .101 .6 egsj-7609-w2 4 .3 3 .3 .46 .45 . 50 . 49 egsj-7206-w3 .41 .42 .9 .10 .7 DC address range: 1.1.160.0/19 1.2.160.0/19 1.3.160.0/19 96.5.136.0/21 .9 egsj-3640-gk egsj-3640-v2 egsj-4506-b2d2 .22 Building 2 address range: 1.1.32.0/19 1.2.32.0/19 1.3.32.0/19 96.5.16.0/21 egsj-4006-b2d1 egsj-4006-b2a1 egsj-6506-b2a2 95532 egsj-4003-b1a1 egsj-5505-b1a2 egsj-6506-b1a3 FE GE HSSI(P2P) POS OC3(P2P) ATM OC3 T1(P2P) T3(P2P) ATM T3 Platform and Software Version Information Table 5 lists the platforms, router names, software versions, and software images configured in the San Jose network topology for this test suite. Table 5 San Jose Platform, Router Name, Software Version, and Software Images Platform Router Name Software Version Software Image Cisco 7609 egsj-7609-w1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 7609 egsj-7609-w2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 7206 egsj-7206-w3 12.2(16b) c7200-jk8s-mz.122-16b Catalyst 6500 egsj-6509-c1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egsj-6509-c2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 26 Test Suite 1: San Jose Campus with Data Center Table 5 San Jose Platform, Router Name, Software Version, and Software Images (continued) Platform Router Name Software Version Software Image Catalyst 6500 egsj-6509-c3 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egsj-6509-c4 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egsj-6506-b1d1 12.1(13)E9 c6msfc2-jsv-mz.121-13.E9 Catalyst 6500 egsj-6506-b1d2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 4000 egsj-4006-b2d1 12.1(13)EW2 cat4000-is-mz.121-13.EW2 Catalyst 4500 egsj-4506-b2d2 12.1(13)EW2 cat4000-is-mz.121-13.EW2 Catalyst 6500 egsj-6506-sd1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egsj-6506-sd2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 3640 egsj-3640-gk 12.2(15)T5 c3640-jsx-mz.122-15.T5 Cisco 3640 egsj-3640-v 12.2(16a) c3640-a3js-mz.122-16a Catalyst 5500 egsj-5505-sa1 6.4(3) cat5000-sup3.6-4-3 Catalyst 5500 egsj-5505-sa2 6.4(3) cat5000-sup3.6-4-3 Catalyst 6500 egsj-6506-sa3 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 4000 egsj-4003-b1a1 7.6(1) cat4000-k8.7-6-1 Catalyst 5500 egsj-5505-b1a2 6.4(3) cat5000-sup3.6-4-3 Catalyst 6500 egsj-6506-b1a3 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 4000 egsj-4006-b2a1 7.6(1) cat4000-k8.7-6-1 Catalyst 6500 egsj-6506-b2a2 7.6(1) cat6000-sup2k8.7-6-1 San Jose Functionality Test The functionality test category verified basic IP functionality. The tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS The testing in each section was performed sequentially and as independently as possible. The San Jose functionality testing was conducted as follows: 1. Basic IP testing was performed in conjunction with Network Management Testing (NMS). Network management was utilized to collect the test information. 2. After completion of the basic IP test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 3. Multicast testing was performed, again with NMS monitoring. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 27 Test Suite 1: San Jose Campus with Data Center 4. After completion of the multicast test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 5. Security testing was performed in conjunction with NMS monitoring. 6. After completion of the security test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 7. Voice testing was performed in conjunction with NMS monitoring. 8. After completion of the voice test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 9. QoS testing was performed in conjunction with NMS monitoring. 10. After completion of the QoS test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. Basic IP The overall objective of this test case is as follows: • Verify the basic network operation (that is, network connectivity). • Verify the configurability and stability in a controlled environment for each of the functionality tests. • Verify that the selected Cisco IOS software versions can be loaded into the devices. • Verify that the major IP routing features work as expected. In addition to basic IP, the following features were configured: • Layer 2 and HSRP • EIGRP and BGP Routing Layer 2 Protocols and HSRP This test verified various Layer 2 protocols and HSRP. The following features were included in the test plan: • VLAN Trunking Protocol (VTP) and VLAN • Spanning-tree Protocol (STP) • HSRP Test Plan The procedure used to perform the Layer 2 protocols and HSRP test follows: Step 1 Set up the VLANs. The access switch VLAN model is model number 1, “share VLANs across Access Layer switches,” for this campus. Each building is in a separate VTP domain. The two distribution layer switches work in VTP server mode, and all access layer switches work in VTP transparent mode. VLAN 1 is for control traffic on all switches by default. VLAN 10 is for a backdoor network connection, configured only on the access layer switches. VLANs 11 to 20 are used for end-user networks that are configured across all access switches and the distribution layer switches. VLANs 21 to 110 are used to generate routes, which are configured only on distribution layer switches. Step 2 Use the CatOS show vlan command, the CatOS show vtp domain command, and the Cisco IOS show vtp status command to verify the VTP and VLAN configuration. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 28 Test Suite 1: San Jose Campus with Data Center Step 3 Set up VLAN trunking. All links between switches are L2 dot1q trunking. The trunk mode is desirable/desirable. Step 4 Use the Cisco Native IOS show interface trunk command and the CatOS show trunk command to verify that the VLAN trunkings are formed correctly. Step 5 Set up the STP feature (root replacement). Use the Cisco IOS show spanning-tree root command to verify that the spanning tree roots are on the distribution switches. The left side of the distribution switch in a building block is the primary root for odd-numbered VLANs and the secondary root for even-numbered VLANs. The right side of the distribution switch in a building block is the primary root for even-numbered VLANs and the secondary root for odd-numbered VLANs. Step 6 Set up HSRP. The left distribution layer switch serves as the HSRP active group for all odd-numbered VLANs. The right distribution layer switch serves as the HSRP active group for all even-numbered VLANs. The HSRP interface track feature is turned on so that if both uplinks from any distribution layer switch to the core go down, the HSRP active group will fail over to the other distribution layer switch. Step 7 Use the Cisco IOS show standby brief command to verify that each distribution switch is the active HSRP router for half of the VLANs (either the even-numbered VLANs or the odd-numbered VLANs). Step 8 Conduct a negative test of STP and HSRP. Shut down any one of the distribution switches in the same building and use the Cisco IOS show spanning-tree root command to verify that the spanning tree root changed to the active distribution switch in the building. Then, use the show standby brief command to verify that the HSRP secondary router takes over the active state for all the VLANs. Expected Results We expect the following results: • The VTP and VLAN configuration will work correctly. • The spanning tree roots on the distribution switches work correctly. • Each distribution switch is an active HSRP route for half of the VLANs (either the even-numbered VLANs or the odd-numbered VLANs). • During negative testing of STP and HSRP, the HSRP secondary router takes over the active state for all VLANs. • The HSRP active group switches back correctly. Results Table 6 shows the San Jose Layer 2 protocols and HSRP test results. Table 6 San Jose Layer 2 Protocols and HSRP Test Results Test Results San Jose Layer 2 protocols and HSRP Passed EIGRP with BGP Routing This test involved testing EIGRP with BGP routing. The following features were included in the test plan: • Route summarization • Route filtering Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 29 Test Suite 1: San Jose Campus with Data Center • EIGRP stub router functionality • Route redistribution and default route generation • Log event or change functionality • BGP policy control (specifically, autonomous system prepend and route filtering) • EIGRP metric tuning—link delay and bandwidth Test Plan This test verified route summarization, route filtering, route redistribution, EIGRP stub router functionality, route redistribution and default route generation, log event or change functionality, BGP policy control, and EIGRP metric tuning. There are several parts to this test plan, and they are described in the sections that follow. Route Summarization and Filtering Test The procedure used to perform the route summarization and filtering test follows: Step 1 Turn off EIGRP auto-summary on all EIGRP-enabled routers. Step 2 Configure a distribution list on the core routers, the egsj-6509-c3 router and the egsj-6509-c4 router, to allow local campus routes and default routes advertised to the distribution layer routers only. Step 3 Configure a distribution list on the WAN aggregation router, the egsj-7206-w3 router, to allow local campus summarized routes and the default route to be advertised to the remote sites only. Step 4 Configure all the building and data center distribution layer routers and voice routers as EIGRP stub routers, so that the EIGRP queries do not propagate to the distribution layer routers or the voice routers. Route Redistribution and Default Route Generation Test The procedure used to perform the route redistribution and default route generation test follows: Step 1 Configure BGP and EIGRP routing on the campus WAN aggregation routers egsj-7609-w1 and egsj-7609-w2. BGP will receive ISP advertised routes in addition to intercampus routes. Step 2 Redistribute BGP into EIGRP and permit only the intercampus routes to be tagged and redistributed into EIGRP. A static default route will be created by the router connected to the ISP and advertised into the whole EIGRP AS and will be permitted into remote sites. A backup static default route will be advertised by the secondary ISP connected router, using a floating static route. The default route will not be advertised by BGP. Varying metrics will be applied to the routes being redistributed based on the number of BGP ASs that the intercampus route learned. BGP Policy Control Test The procedure used to perform the BGP policy control test follows: Step 1 Configure logging of changes on all the EIGRP- and BGP-enabled routers by using the Cisco IOS eigrp log-neighbor-changes command and the bgp log-neighbor-changes command. Step 2 Configure BGP and EIGRP routing on the campus WAN access router egsj-7609-w2. Step 3 Redistribute BGP into EIGRP, and permit only internal EIGRP routes to be redistributed. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 30 Test Suite 1: San Jose Campus with Data Center Step 4 Configure the egsj-7609-w2 BGP policy so that the traffic from the ISP destined for the local campus prefixes get high priority (by using AS prepending) to the advertised prefixes of the remote campuses. All intercampus routes will be advertised to the ISP, but the AS will be prepended three times. Step 5 Leak a 24-bit route to the Chariot endpoints into the remote AS via link POS3/1/0 on egsj-7609-w2. Set the community attribute to no-advertise on these routes. EIGRP Metric Tuning Test The procedure used to perform the EIGRP metric tuning test follows: Step 1 Tune the switch virtual interface (SVI) delay on the distribution layer switches to enable symmetric routing for the building end-user networks. On the left distribution layer switch (the HSRP primary group for all the odd-numbered VLANs), change the SVI delay on the even-numbered VLAN interface from 10 microseconds to 50 microseconds. This configuration enables the left distribution layer switch to advertise a less desirable routing metric to the core routers for all the even-numbered VLAN interfaces. Similarly configure the right distribution layer switch. Step 2 Configure all the SVI interfaces on the distribution layer routers as EIGRP passive interfaces. Step 3 Configure the Cisco IOS no peer neighbor-route command for all the encapsulated PPP WAN interfaces to avoid suboptimal routing for these WAN interface routes. Step 4 Analyze the output of the Cisco IOS show commands listed in Table 7, which lists each command and the role it plays in the EIGRP with BGP routing test. Table 7 show Commands Used in the EIGRP with BGP Routing Test Command show ip route summary Purpose • Verifies that the routes are summarized as expected. • Verifies that the route filters work as expected. • Verifies that the default route is generated as expected. show ip route • Verifies the symmetric routing for the building end-user networks. show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show logging • Verifies that there are no significant errors for EIGRP or BGP routing. show ip bgp summary • Verifies that BGP routing is working correctly. show ip bgp • Verifies BGP AS prepending policy control on the ISP routers. and show ip route Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 31 Test Suite 1: San Jose Campus with Data Center Table 7 show Commands Used in the EIGRP with BGP Routing Test (continued) Command Purpose show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. show ip eigrp neighbors detail • Verifies that the distribution layer routers are EIGRP stub-enabled. show ip eigrp neighbors • Verifies that the EIGRP neighbor was not created between two distribution layer routers. show ip route [interface name] • Verifies that specific WAN interface routes are not in the routing table. Expected Results We expect the following results: • The routes are summarized correctly. • The route filters function correctly. • CPU utilization is less than 90 percent. • Memory consumption is stable. • The distribution layer routers are EIGRP stub-enabled. • The default route is generated correctly. • The BGP AS prepending policy control is enabled on the ISP routers. • There are no significant EIGRP or BGP routing errors and the link delay and bandwidth have been tuned correctly. • BGP route filtering functions correctly. • The EIGRP neighbor was not created between two distribution layer routers. • The routing table displays the appropriate routes. Results Table 8 shows the San Jose EIGRP with BGP routing test results. Table 8 San Jose EIGRP with BGP Routing Test Results Test Results San Jose EIGRP with BGP routing Passed Traffic Routing Convergence The following section describes the procedures for setting up traffic routing and conducting the traffic routing convergence testing. Test Plan The procedure used to perform the traffic routing convergence test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 32 Test Suite 1: San Jose Campus with Data Center Step 1 Set up a continuous ping between two PCs located in two points in the topology. Set the ping packet size to 512 bytes. Set the ping timeout to 1 sec. Step 2 During the ping test, make various link-to-router connections fail. Step 3 Capture the number of ping packets lost, and derive the convergence time from the product of the total number of packets lost and the ping timeout setting. Expected Results We expect that all simulated routes exist and that the link connections between two points in the topology will be established and maintained. Results Table 9 shows the San Jose traffic routing convergence test results. Table 9 San Jose Traffic Routing Convergence Test Results Tests Results San Jose traffic routing convergence Passed Traffic Load Capacity Test This test was intended to test the network configuration at zero percent of traffic load capacity, at 50 percent of traffic load capacity, and at 90 percent of traffic load capacity for a period of 2 to 4 hours. Test Plan The procedure used to perform the traffic load capacity test follows: Step 1 At 0 percent of network traffic capacity, repeat the steps for the Layer 2 protocols and HSRP test plan, the EIGRP with BGP routing test plan, and the routing traffic convergence test plan. Step 2 Increase network traffic for WAN links to 100 percent. Step 3 Repeat the steps for the Layer 2 protocols and HSRP test plan, the EIGRP with BGP routing test plan, and the routing traffic convergence test plan. Expected Results We expect that the network configuration continues to function correctly at each level of traffic load capacity. Results Table 10 shows the San Jose traffic load capacity test results. Table 10 San Jose Traffic Load Capacity Test Results Test Results San Jose traffic load capacity Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 33 Test Suite 1: San Jose Campus with Data Center Network Management This section describes the network management testing in the San Jose campus with data center. The following features were included in the test plan: • MIB Walk automation script (snmp_walk_test) and traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB walk and traps. The MIB Walk automation script (snmp_walk_test) will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the snmp_walk_test script will work properly. Step 3 Upload the following MIBs to the snmp_walk_test script: • Basic IP: – CISCO-VTP-MIB – CISCO-BGP4-MIB – CISCO-HSRP-MIB – CISCO-EIGRP-MIB • Multicast: – CISCO-IPMROUTE-MIB.my – CISCO-IGMP-MIB.my – CISCO-MSDP-MIB.my – CISCO-PIM-MIB.my • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB.my – CISCO-CCM-MIB • QoS: – CISCO-QOS-MIB • Security: – CISCO-IPSEC-FLOW-MONITOR-MIB Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 34 Test Suite 1: San Jose Campus with Data Center Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command and the CatOS show time command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send e-mail notification for error conditions on the routers or switches. Step 11 Use the show crypto mib ipsec flowmib version command to verify that the device has IPsec MIB support. Step 12 Use the show log command or the show align command to verify that there are no other significant errors. Step 13 Use the show snmp command to verify the SNMP configuration information. Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 11 shows the San Jose network management test results. Table 11 San Jose Network Management Test Results Test Results San Jose network management Passed Multicast The objective of the San Jose campus with data center multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • CGMP • IGMP-v2 • IGMP snooping • MMLS • MDS-7500 specific feature • PIM sparse-dense mode • Auto-RP • Anycast-RP with Auto-RP Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 35 Test Suite 1: San Jose Campus with Data Center • Admin scoping and multicast boundary • Multicast Rate Limit The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Step 2 Step 3 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV clients to the egsj-5505-b1a2 device on the San Jose campus. c. Configure the IP/TV server to stream three programs as follows: • The first program contains a 239.192.0.1/14 multicast address scope and consists of a 128-kbps video stream and a 100-kbps audio stream. The IP/TV clients at all campuses and remote sites will receive this program. • The second program contains a 239.255.0.1/16 multicast address scope and consists of a 500-kbps video stream and a 100-kbps audio stream. The IP/TV clients at all campuses will receive this program. • The third program contains a 239.194.0.1/14 multicast address scope and consists of a 1500-kbps video stream and a 100-kbps audio stream. Only the IP/TV client at the San Jose campus will receive this program. Enable CGMP on the following San Jose campus Layer 2 access switches: • egsj-5505-b1a2 • egsj-5505-sa1 • egsj-5505-sa2 • egsj-4003-b1a1 • egsj-4006-b2a1 Enable CGMP on the Layer 3 distribution switches on the following campuses: • San Jose • Denver • Boston Step 4 Enable IGMP-v2. This feature is enabled by default in Native IOS and Cisco IOS software, so no additional configuration is required. Step 5 Enable IGMP snooping on the egsj-6506-sa3 San Jose campus Layer 2 switch. This feature is enabled by default in Native IOS, so no additional configuration for Layer 3 is required. Step 6 Enable MMLS. This feature is enabled by default in Native IOS, so no additional configuration is required. Step 7 Enable PIM sparse-dense mode on all Layer 3 Native IOS and Cisco IOS multicast devices. Step 8 Enable Anycast-RP with Auto-RP on the following RP routers: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 36 Test Suite 1: San Jose Campus with Data Center Step 9 • egsj-6506-sd1 • egwas-6506-sd1 Enable multicast admin scoping and multicast boundary on the following devices: • San Jose campus—egsj-7609-w1, egsj-7609-w2, and egsj-7206-w3 • Washington, D.C campus—egwas-7505-w3 • Dallas campus—egdal-7507-w4 Verification The procedure used to perform the multicast verification test follows: Step 1 Use DART to capture the output of the generic show commands listed in Table 12. Table 12 Generic show Commands Used in the San Jose Multicast Verification Test Command Purpose • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show buffer failure • Verifies a buffer or memory failure. show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. • Verifies that there are no other significant errors. show processes cpu show logging Step 2 Using the show commands listed in Table 13, verify that CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. Table 13 show Commands Used in the San Jose Multicast CGMP Verification Test Command Step 3 Purpose show cgmp statistics • Displays the CGMP statistics. show cgmp leave • Verifies the status of the CGMP leave feature. show multicast router • Displays the ports that have IGMP or RGMP-capable routers assigned to them. show multicast group • Verifies the multicast group information. show multicast group cgmp • Displays the multicast group configuration information learned via CGMP. Using the show commands listed in Table 14, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. In addition, verify the following: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 37 Test Suite 1: San Jose Campus with Data Center • The router with the lower IP address is the correct IGMP querier. • The router installs group members upon receipt of IGMP join messages. • All groups are seen for all IGMP joined groups. • The router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Table 14 show Commands Used in the San Jose Multicast IGMPv2 Verification Test Command Step 4 Purpose show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. Using the show commands listed in Table 15, verify that IGMP snooping functions as follows: • IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. Table 15 show Commands Used in the San Jose Multicast IGMP Snooping Verification Test Command Purpose show igmp statistics On Layer 2 switches: • show multicast group igmp On Layer 2 switches: • show multicast group count igmp Verifies that the correct multicast router has been learned. On Layer 3 switches: • Step 5 Verifies that IGMP snooping is globally enabled. On Layer 3 switches: • show mac-address-table multicast vlan-id Verifies the total count of multicast addresses (groups) in a VLAN learned via IGMP. On Layer 3 switches: • show ip igmp snooping mrouter Verifies the multicast group configuration information learned via IGMP. On Layer 2 switches: • show ip igmp interface Verifies the IGMP statistics for a particular VLAN. Verifies that the correct multicast addresses are present in the output. Using the show commands listed in Table 16, verify that MMLS functions as follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 38 Test Suite 1: San Jose Campus with Data Center • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts. In the Catalyst 6500s, the flows are taking the correct paths. • The flows are using the expected multicast forwarding entry (*,G) or (S,G). • Hardware-based flows are created where expected. • The lowest rate of the traffic flow at which a hardware shortcut is created is identified. • CPU utilization does not increase. If it does, then there is a possibility that flows are being software switched. • On DFC cards, forwarding tables on line cards are the same as on the processor card. Table 16 show Commands Used in the San Jose Multicast MMLS Verification Test Command Step 6 Purpose show mls ip multicast summary • Verifies that hardware-based flows are created where expected. show mls ip multicast • Verifes that multicast flows create MMLS entries and that switching of the flow is performed. show mls ip multicast group • Displays multilayer IP multicast group information. show mls ip multicast source • Displays the MLS IP information for a specific destination IP address. show mls ip multicast interface • Displays the MLS IP information for a specific interface. show mls ip multicast statistics • Displays the statistics for the MLS IP multicast entries. Using the show commands listed in Table 17, verify that multicast distributed switching (MDS) functions as follows: • The VIP interfaces on Cisco 7500 routers are MDS-enabled. • Multicast distributed switching is enabled. • Multicast traffic is distributed-switched. Table 17 show Commands Used in the San Jose Multicast MDS Verification Test Command Step 7 Purpose show ip mds interface • Verifies the status of MDS interfaces. show ip pim interface detail • Displays detailed information about each interface configured for Protocol Independent Multicast (PIM). show ip mds forwarding • Verifies the MFIB table and forwarding information for MDS. show ip mds summary • Displays a summary of the MFIB table for MDS. Using the show commands listed in Table 18, verify that PIM sparse-dense mode functions as follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 39 Test Suite 1: San Jose Campus with Data Center • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Table 18 show Commands Used in the San Jose Multicast PIM Sparse-Dense Mode Verification Test Command Step 8 Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. Using the show commands listed in Table 19, verify that Anycast-RP with Auto-RP functions as follows: • Auto-RP dynamically updates the RP information in every device in the network. • Traffic for the two Auto-RP groups 224.0.1.39 and 224.0.1.40 are dense-mode flooded network. • All routers learn about RP mapping information. • The correct RP mapping is shown for the specified group. • The RP mapping information is consistent through the network. • Anycast RP information is distributed to the routers and no multicast groups are reverting to dense mode. • MSDP peers are operational. • There is an SA cache entry for each source. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 40 Test Suite 1: San Jose Campus with Data Center Table 19 show Commands Used in the San Jose Multicast Anycast-RP with Auto-RP Verification Test Command Step 9 Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface count • Verifies the switching counts for MDS and other fast-switching statistics. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip msdp peer • Verifies that MSDP peers are operational. show ip msdp sa-cache • Verifies that there is an SA cache entry for each source. Using the show commands listed in Table 20, verify that admin scoping and multicast boundary functions as follows: • RP messages are prevented from traveling beyond the boundaries of the network using multicast boundaries. • Routers within the TTL number of hops from the source RP mapping agent receive the Auto-RP discovery messages. • Routers learn about correct RP mapping information within the TTL range. • Routers out of the TTL range cannot receive the Auto-RP Discovery messages. • A border router with a multicast boundary configured will not leak Auto-RP messages out of the network. • Multicast traffic cannot be forwarded out of the defined admin scope. Table 20 show Commands Used in the San Jose Admin Scoping and Multicast Boundary Verification Test Command Purpose show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 41 Test Suite 1: San Jose Campus with Data Center Table 20 show Commands Used in the San Jose Admin Scoping and Multicast Boundary Verification Test (continued) Command Step 10 Purpose show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Using the show commands listed in Table 21, verify that multicast rate limit functions as follows: • The rate that a sender can send to a multicast group in the group list is appropriate. • Multicast traffic can be forwarded out of the WAN interface with the rate setup. • IP/TV receives an acceptable video stream from the server. Table 21 show Commands Used in the San Jose Multicast Rate Limit Verification Test Command Purpose show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip pim interface count • Verifies the switching counts for MDS and other fast-switching statistics. Expected Results We expect the following results: • CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. • IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • Multicast forwarding is achieved using PIM. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 42 Test Suite 1: San Jose Campus with Data Center • Auto-RP dynamically updates the RP information in every device in the network. • Anycast RP information is distributed to the routers and none of the multicast groups reverts to dense mode. • Routers learn RP mapping information within the defined TTL number of hops and multicast flows are restrained in the TTL range. • RP messages are prevented from traveling beyond the boundaries of the network by using multicast boundaries. • The rate that a sender from the source list can send to a multicast group in the group list is appropriate. Results Table 22 shows the San Jose multicast test results. Table 22 San Jose Multicast Test Results Test Results San Jose multicast Passed Security This security test was conducted for the San Jose campus with data center. This test catagory verified the functionality of AAA and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. The objectives of the security test were as follows: • Verify TACACS+ and AAA services at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • AAA and TACACS+ • IPSec certificate server • Other security commands Test Plan Setup The procedure used to set up the San Jose security test follows: Step 1 Configure encryption service facility and AAA and TACACS+. Step 2 Configure the time-stamping service facility for logging. Step 3 Disable all unnecessary services. Step 4 Configure an enable password. Step 5 Configure a console port password. Step 6 Configure an AUX port password, if applicable. Step 7 Disable CDP on edge interfaces that do not require it. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 43 Test Suite 1: San Jose Campus with Data Center Step 8 Configure a warning banner. Step 9 Configure all CatOS devices for security. Verification The procedure used to perform the San Jose security verification test follows: Step 1 Use the show tacacs command to verify the TACACS+ configuration values. Step 2 Use the show accounting command to verify the user account on the router and switch. Step 3 Verify the Passed Authentication report from the Cisco Secure ACS. Step 4 Verify the TACACS Account report from the Cisco secure ACS. Step 5 Verify the Failed Attempts report from the Cisco secure ACS. Expected Results We expect the following results: • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 23 shows the San Jose security test results. Table 23 San Jose Security Test Results Test Results San Jose security Passed Voice The purpose of the voice test was to deploy and verify the VoIP deployment scenarios for large Enterprise customers that want to minimize the operations cost of telephony by utilizing IP telephony over traditional services. The overall objectives of the voice test case were as follows: • Verify that voice can be incorporated into the San Jose campus. • Verify the operation of the Cisco IOS release to test the AVVID and legacy voice interoperability. • Collect and document the test results. • Ensure that the system behaves as expected. The following features and equipment were tested: • Centralized CallManager architecture • Gateways: VG200 and ATA186 • Call setup and control: H.323 and SCCP • Codec: G.729 over WAN, G.711 over LAN, transcoding Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 44 Test Suite 1: San Jose Campus with Data Center • Equipment facility capabilities: In-line power on Catalyst 6000, Catalyst 4000, Access Gateway Module on Catalyst 4000, Vespa, SRST • Equipment Interoperability: Analog on Catalyst 6000, Catalyst 4000, T1 blade Voice Testing The following features were configured for voice testing: • Legacy H.323 VoIP • SCCP Test Plan The voice test verified that voice traffic operated properly accross the network. Set Up Legacy H.323 The procedure used to set up the legacy H.323 voice test follows: Step 1 Configure the H.323 voice gateway egsj-3660-v for T1 CAS and FXS. Step 2 Check that egwas-3640-v1 is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egwas-3660-v1 router. Step 3 Configure Callgen telephony. Step 4 Check that egsj-3640-v is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egsj-3640-v router. Set Up SCCP The procedure used to set up the SCCP voice test follows: Step 1 Configure T1 CAS and FXS SCCP voice gateways on the Catalyst 6506. Step 2 Configure T1 CAS and FXS SCCP voice gateways on the Catalyst 4507. Step 3 Configure inline power and real IP telephones on the Catalyst 6506. Step 4 Configure inline power and real IP telephones on the Catalyst 4507. Step 5 Verify that the T1 CAS, the FXS, any transcoding devices, and all real or simulated IP telephones on the Catalyst 6506 and Catalyst 4507 appear and are registered in CallManager. Step 6 Configure Callgen SCCP to generate test traffic. Step 7 The WS-X6608-T1/E1 blade is used as a T1 or E1 gateway in egsj-6506-b1d1-sup. It uses the Skinny protocol to communicate with the Cisco CallManager server to set up and tear down calls. Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. Step 8 The WS-X6624 is used in egsj-6506-b1d1-sup and has a single MAC address and a single IP address. Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. The IP address, IP default gateway, and TFTP server address parameters can be configured manually or they can be configured dynamically from a DHCP server. This test uses manually configured (static) parameters. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 45 Test Suite 1: San Jose Campus with Data Center Step 9 The Catalyst 4000 8-port RJ21 FXS module for the access gateway module is a high-density analog phone and fax relay interface. VoIP gateway is the default mode for the access gateway module. Before you can use the conferencing and transcoding services, you must enable the IP telephony gateway mode, configure the services, and reboot. Step 10 Enable IP telephony gateway mode by using the voicecard sccp manager command. Step 11 Enable IP telephony transcoding service by using the voicecard transcode command. A transcoder is a device that takes the output stream of one codec and transcodes (converts) it from one compression type to another compression type. For example, a transcoder could take an output stream from a G.711 codec and transcode (convert) it in real time to a G.729 input stream accepted by a G.729 codec. Transcoders for this Cisco CallManager release transcode between G.711, G.723, and G.729 codecs. Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. Step 12 Configure the VG200 and ATA186 voice ports with H.323. Voice Traffic Verification Test This test verified that incoming and outgoing voice traffic is handled properly on the network. In this test plan, no QoS features are configured and the network was free from traffic congestion. Test Plan The procedure use to perform the voice traffic verification test follows: Step 1 Configure an IP phone manually, install it in each campus, and make calls to test voice quality. Step 2 Start the bulk call traffic generators by performing the following steps: a. Start all BCG channels to Washington (19 calls), Boston (4 calls), Dallas (3 calls), Denver (13 calls), and Los Angeles (10 calls). Note: Refer to the dial plan and voice design document. b. Using the show channel command on the Callgens, verify for 5 minutes that all originate and terminate BCG channels have started and are progressing correctly with no problems. Step 3 Verify for 5 minutes that all originate and terminate Callgen SCCP endpoints have started and are progressing correctly with no problems. Step 4 Analyze the output of the show commands listed in Table 24. Use the listed commands on all the WAN routers using the DART tool every 60 seconds for the show processes cpu command, and every 5 minutes for all the others—for a duration of 2 hours. Table 24 show Commands Used for the Voice Traffic Verification Test Command Purpose show processes cpu • Verifies the CPU utilization. show clock • Verifies the current time. show memory summary • Verifies that there are no memory leaks. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the rate will be dropped. The show commands listed in Table 24 were used on the WAN routers and interfaces listed in Table 25. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 46 Test Suite 1: San Jose Campus with Data Center Table 25 Step 5 Step 6 San Jose WAN Routers and Interfaces Router Interface egsj-7609-w1 ATM3/1/0, Serial3/0/0, POS4/1/0 egsj-7609-w2 Serial3/1/0/1, ATM3/0/0 egsj-7206-w3 Serial4/0/1:0, Serial4/0/0:0, ATM4/1/0.768 Capture voice quality information by performing the following steps: a. Use the show channel command of the Callgen testing tool to verify that the Callgen channels to Washington, D.C. (19 calls), Boston (4 calls), Dallas (3 calls), Denver (13 calls), and Los Angeles (10 calls) are functioning correctly. b. Use CIC to measure the call attempts and accepts and path confirmation for end users between San Jose and Washington, D.C., between San Jose and Boston, between San Jose and Denver, between San Jose and Dallas, and between San Jose and Los Angeles. Stop the bulk call traffic generators and verify results by performing the following steps: a. Stop Callgen after 1 hour of run time. b. Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels are functioning correctly without any significant errors. c. Capture the output statistics of Callgen by using CIC. d. Use Performance monitor to check real time the number of gateways and IP Phones registered and CDR on the CallManager to also check the percentage of successful calls. Expected Results We expect the following results: • Voice traffic was sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. • All Callgen SCCP calls completed. Results Table 26 shows the San Jose voice traffic verification test results. Table 26 San Jose Voice Traffic Verification Test Results Test Results San Jose voice traffic verification Passed QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 ToS. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 47 Test Suite 1: San Jose Campus with Data Center QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. The following features were included in the test plan: • Classification and Marking: Access lists, NBAR, table maps, IP precedence, and DSCP • Congestion avoidance: dWRED (differentiated services-based WRED) • Congestion Management: LLQ and dLLQ • Traffic Conditioning: GTS and ATM Traffic Shaping • Link efficiency Mechanisms: MLPPP LFI, cRTP, and dcRTP Test Plan The procedure used to perform the QoS setup test follows: Step 1 Step 2 Step 3 Define the access lists and traffic classes on the distribution layer switches (egsj-6509-b1d1, egsj-6509-b1d2, egsj-4006-b2d1, and egsj-4506-b2d2) using the following guidelines: • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Lotus Notes and Oracle, into a class map called “Transactional.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Streaming” class. • Classify HTTP and FTP traffic into the “class-default” class. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure a policy map called "IN-bound" on distribution layer switches egsj-6509-b1d1, egsj-6509-b1d2, egsj-4006-b2d1, and egsj-4506-b2d2. This configuration tests the DSCP feature. b. Configure a policy map called "OUT-bound-XXX" on the core switches egsj-6509-C1, egsj-6509-C2, egsj-6509-C3, and egsj-6509-C4. This configuration tests the LLQ feature of QoS. c. Configure a policy map called "OUT-bound-XXX" on intercampus WAN aggregation routers egsj-7609-w1, and egsj-7609-w2. This configuration tests the dWRED and LLQ features of QoS. d. Configure a policy map called "OUT-bound-XXX" on campus-remote WAN aggregation router egsj-7204-w3. This configuration tests the MLPP LFI, cRTP, and dTS features of QoS. e. Configure a policy map called “OUT-Voice” on the egsj-3640-v router. This configuration tests the access lists, port numbers, and DSCP features of QoS. Attach policy maps to the interfaces listed in Table 27, and apply the other appropriate QoS features. Table 27 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 48 Test Suite 1: San Jose Campus with Data Center Table 27 Routers, Policy Maps, and Interfaces for the QoS Setup Test Router Policy Map Interface egsj-7609-w2 OUT-WAN-HW1 Serial2/0/0 egsj-7609-w2 OUT-WAN-HW2 P3/1/0 egsj-7609-w2 OUT-LAN-FE Fa4/1, Fa4/2 egsj-7609-w2 OUT-LAN-GE Gi1/1, Gi1/2 egsj-7609-w1 OUT-WAN-HW7 H2/0/0 egsj-7609-w1 OUT-LAN-GE Gi1/1, Gi1/2, Gi6/3 egsj-7206-w3 OUT-LAN-FE Fa1/0, Fa2/0 egsj-7206-w3 OUT-WAN-DT1 Serial4/0:0 egsj-6506-b1d1 OUT-LAN-GE Vlan11, Vlan12, Vlan13, Vlan18, Vlan19, Vlan20, Vlan800, Vlan801 egsj-6506-b1d2 OUT-LAN-GE Gi1/1, Gi1/2 egsj-4006-b2d1 OUT-LAN-GE Gi1/1, Gi1/2, Gi2/1, Gi2/2 egsj-4506-b2d2 OUT-LAN-GE Gi1/1, Gi1/2, Gi2/1, Gi2/2 egsj-6509-c1 OUT-LAN-GE Gi3/1, Gi3/2, Gi3/3, Gi3/11, Gi3/12, Gi3/15, Gi3/16 egsj-6509-c1 OUT-LAN-FE Fa6/1 egsj-6509-c2 OUT-LAN-GE G3/1, 3/2, 3/3, 3/11, 3/12, 3/15, 3/16 egsj-6509-c2 OUT-LAN-FE Fa6/1 egsj-6509-c3 OUT-LAN-GE Gi3/1, Gi3/2, Gi3/3, Gi3/14, Gi3/15, Gi3/16 egsj-6509-c4 OUT-LAN-GE Gi3/1, Gi3/2, Gi3/3, Gi3/14, Gi3/15, Gi3/16 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • QoS features were configured and were functioning properly. Results Table 28 shows the San Jose QoS setup test results. Table 28 San Jose QoS Setup Test Results Test Results San Jose QoS setup Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 49 Test Suite 1: San Jose Campus with Data Center QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic was used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Step 2 Analyze the output of the Cisco IOS show commands listed in Table 29. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 29 show Commands Used on the WAN Aggregation Routers and Interfaces Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. The show commands listed in Table 29 were used on the WAN aggregation routers and interfaces listed in Table 30. Table 30 Step 3 San Jose WAN Aggregation Routers and Interfaces Router Interface egsj-7209-w1 ATM2/1/0 egsj-7209-w2 Serial2/0/0, ATM3/0/0, POS3/1/0 egsj-7206-w3 Serial4/0:0 Analyze the output of the Cisco IOS show commands listed in Table 31. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 50 Test Suite 1: San Jose Campus with Data Center Table 31 show Commands Used on the Core Switches and Interfaces Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 31 were used on the core switches and interfaces listed in Table 32. Table 32 Step 4 San Jose Core Switches and Interfaces Router Interface egsj-6509-c1 Gi3/1, Gi3/2, Gi3/3, Gi3/15, Gi3/16 egsj-6509-c2 Gi3/1, Gi3/2, Gi3/3, Gi3/15, Gi3/16 egsj-6509-c3 Gi3/1, Gi3/2, Gi3/3, Gi3/16 egsj-6509-c4 Gi3/1, Gi3/2, Gi3/3, Gi3/16 Analyze the output of the Cisco IOS show commands listed in Table 33. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 33 show Commands Used on the Distribution Layer Switches and Interfaces Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 33 were used on the distribution layer switches and interfaces listed in Table 34. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 51 Test Suite 1: San Jose Campus with Data Center Table 34 Step 5 San Jose Distribution Layer Switches and Interfaces Router Interface egsj-6506-b1d1 Gi2/1, Gi2/2, Gi2/3, Gi2/16 egsj-6506-b1d2 Gi2/1, Gi2/2, Gi2/3, Gi2/16 egsj-4006-b2d1 Gi2/1, Gi2/1, Gi2/16 egsj-4506-b2d2 Gi2/1, Gi2/1, Gi2/16 egsj-6506-sd1 Gi2/1, Gi2/2, Gi2/3, Gi2/16 egsj-6506-sd2 Gi2/1, Gi2/2, Gi2/3, Gi2/16 Analyze the output of the show commands listed in Table 35. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 35 show Commands Used on the Access Layer Switches and Interfaces Command Purpose show clock • Verifies the current time. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. The show commands listed in Table 35 were used on the access layer switches and interfaces listed in Table 36. Table 36 Step 6 San Jose Access Layer Switches and Interfaces Router Interface egsj-4003-b1a1 Gi2/1, Gi2/2 egsj-5505-b1a2 Gi1/1, Fa2/2 egsj-6505-b1a3 Gi1/1, Gi1/2 egsj-4006-b2a1 Gi2/1, Gi2/2 egsj-6505-b2a2 Gi1/1, Gi1/2 Analyze the output of the Cisco IOS show commands listed in Table 37 after the two-hour test referred to in Step 2 is completed. These commands were used on all the WAN routers and core switches. Table 37 show Commands Used for the QoS Verification Test Command show class-map Purpose • Verifies that the class map configured for the device is displayed. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 52 Test Suite 1: San Jose Campus with Data Center Table 37 show Commands Used for the QoS Verification Test (continued) Command Step 7 Purpose show policy-map • Verifies that the policy map configured for the device is displayed. show access-lists • Verifies that the configured access lists have the correct amount of matching packets. Capture the data statistics from the Chariot, IXIA, and Callgen testing tools after the two-hour test referred to in Step 2 is completed. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch crashes, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 38 shows the San Jose QoS verification test results. Table 38 San Jose QoS Verification Test Results Test Results San Jose QoS verification Passed San Jose System Test The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into the San Jose campus. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test category verified system performance using IP routing, SNMP, security, multicast, VoIP, and QoS. The features that were configured for the San Jose functionality test were carried over to this test. The following additional features were configured in this test case: • BGP 4 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 53 Test Suite 1: San Jose Campus with Data Center • CBWFQ • PQ • MLPPP performance enhancements • CEF support for IP routing • CGMP • dCBWFQ • dLLQ • dTS • dWRED • GTS • HSRP • IEEE 802.1Q VLAN support • IGMP MIB support enhancements for SNMP • IGMP snooping querier • IGMP version 2 • IPSec certificate server • MD5 password encryption • PIM version 2 • QoS enhancements • RTP header compression • LLQ • TACACS+ • VoIP • WRED Test Plan The procecure used to perform the San Jose system test follows: Step 1 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for four hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 39 at the start and end of the four-hour test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 54 Test Suite 1: San Jose Campus with Data Center Table 39 show Commands Used for the San Jose System Test Start and End View Command Step 4 Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifes that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies the user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 40 at 60-minute intervals. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 55 Test Suite 1: San Jose Campus with Data Center Table 40 show Commands Used for the San Jose System Test 60-Minute View Command Step 5 Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 41 at 10-minute intervals. Table 41 show Command Used for the San Jose System Test 10-Minute View Command Purpose show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch crashes, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 42 shows the San Jose system test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 56 Test Suite 1: San Jose Campus with Data Center Table 42 San Jose System Test Results Test Results San Jose system Passed San Jose Reliability Test This section describes in detail the reliability test as it pertained to the San Jose campus, using EIGRP as the routing protocol. The reliability test ran continuously for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. The following additional features were configured in this test category: • BGP 4 • CBWFQ • PQ • MLPPP performance enhancements • CEF support for IP routing • CGMP • dCBWFQ • dLLQ • dTS • dWRED • GTS • HSRP • IEEE 802.1Q VLAN support • IGMP MIB support enhancements for SNMP • IGMP snooping querier • IGMP version 2 • IPSec certificate server • MD5 password encryption • PIM version 2 • QoS enhancements • RTP header compression • LLQ • TACACS+ • VoIP • WRED Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 57 Test Suite 1: San Jose Campus with Data Center The objective of this test case was to verify that the software (at 100 percent traffic load capacity on each WAN link) performed reliably for the 150-hour test period. Test Plan The procedure used to perform the San Jose reliability test follows: Step 1 Start traffic streams for a 100 percent traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 150 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 43 at the start and end of the 150-hour test period. Table 43 show Commands Used for the San Jose Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 58 Test Suite 1: San Jose Campus with Data Center Table 43 show Commands Used for the San Jose Reliability Test Start and End View (continued) Command Step 4 Purpose show mls ip multicast • Verifes that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies the user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 44 at 24-hour intervals. Table 44 show Commands Used for the San Jose Reliability Test 24-Hour View Command Step 5 Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 45 at 6-hour intervals. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 59 Test Suite 2: Boston Campus Table 45 show Commands Used for the San Jose Reliability Test 6-Hour View Command Purpose show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect that the software (at 100 percent traffic load capacity on each WAN link) performs reliably during the 150-hour test period. Results Table 46 shows the San Jose reliability test results. Table 46 San Jose Reliability Test Results Test Results San Jose reliability Passed with exceptions Passed with Exceptions Explanation The San Jose reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. Test Suite 2: Boston Campus This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP QoS at the Boston campus. The Boston campus is one component of the larger global enterprise topology. The global enterprise topology comprises five multilayer-design campuses—two large campuses with data centers and three regional campuses—and ten remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section of this document. In the test suite for the Boston campus, the following categories (or types) of testing were conducted: • Functionality testing: This test category verified basic IP functionality. The test involves Layer 2 protocols—VTP, VLAN trunking, Layer 3 protocol for EIGRP as the interior routing protocol and BGP as exterior routing protocol, SNMP, multicast, security, VoIP, QoS, convergence, and negative testing. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 60 Test Suite 2: Boston Campus • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing: This test category verified system reliability. This test suite contains the following sections: • Topology Description, page 61 • Boston Functionality Test, page 64 • Boston System Test, page 81 • Boston Reliability Test, page 84 Topology Description The Enterprise Global Boston testbed represents a small enterprise campus that would be located in a North American region. The WAN routers connecting to the other global enterprise sites and to the Internet consist of two Cisco 7206VXR NPE-400 WAN routers and one Cisco 7206VXR NPE-G1 WAN router running Serial P2P and ATM links. The campus also consists of a GE and an FE LAN. There are two Catalyst 6506s, each with an MSFC2/PFC2 in the core, and which also provide the distribution layer functionality. One Catalyst 6506 and two Catalyst 4006s make up the access layer. A Cisco 2651 router is used as a VoIP voice gateway that registers into a gatekeeper located at San Jose headquarters, and which places real VoIP calls to other gateways located at different campuses. The test beds are used to perform the test for functionality, which includes IP routing, SNMP, multicast, security, VoIP, and QoS. EIGRP is the IP IGP routing protocol and route generators inject a total of five simulated subnets at various points in the topology. Global application servers are located at the WAN regional aggregation routers to the remote campuses. Applications such as voice, NetMeeting, FTP, and HTTP are simulated by Chariot and other traffic-generating test tools. Each remote campus will simulate end users through the use of traffic generators and real Linux and UNIX workstations. Figure 6 shows the Boston campus topology with IP addresses. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 61 Test Suite 2: Boston Campus Boston Campus Topology with IP Addresses Submask: Loopback, 32 bits P2P, 30 bits PC, 24 bits ebgos-7206-w1 221.10.1/32 San Jose .26 Building 1 address range: 1.16.0.0/19 1.17.0.0/19 1.18.0.0/19 221.10.8.0/21 .9 96.1.0.24 .1 .5 Washington, D.C. .30 ISP 3 .69 96.1.0.68 ebgos-7206-w2 221.10.0.2/32 .2 .13 .17 .21 221.10.1.12 bos-pc2 1.18.0.100 .26 .33 221.10.1.14 ebgos-4006-a2 221.10.1.16 .22 .6 .5 1.231.240.4 .29 .1 bos-pc2 221.10.8.100 .34 .18 .25 ATM/FR 221.10.1.32 221.10.1.24 ISDN BRI 221.10.1.28 ebgos-7206-w3 221.10.0.3/32 bos-pc3 1.16.1.100 .30 ebgos-6506-c2 221.10.0.6/32 1.231.240.0 Pittsburgh bos-pc1 1.17.0.100 .14 221.10.1.20 ebgos-2651-v1 New York 221.10.0.4/32 128 ebgos-6506-a1 ebgos-6506-c1 221.10.0.5/32 .10 221.10.1.8 221.10.1.0 96.1.0.28 bos-pc1 1.16.0.100 T1 (P2P) T3 GE FE ebgos-4006-a3 76330 Figure 6 bos-pc3 1.17.1.100 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 62 Test Suite 2: Boston Campus Figure 7 shows the Boston campus topology with interface types. Figure 7 Boston Campus Topology with Interface Types bos-pc1 ebgos-7206-w1 s4/0 San Jose fa2/0 fa3/0 Washinton, D.C. s3/0 fa1/0 fa1/0 g3/5 fa4/0 g1/1 fa3/16 bos-ux1 g1/2 g3/13 fa4/14 fa2/0 ebgos-7206-w2 fa3/14 ebgos-6506-c1 fa4/25 g3/11 fa0/0 s6/0:0 ISP 3 ebgos-6506-a1 bos-pc2 g3/15 g3/1 ebgos-4006-a2 fa1/0 fa5/14 g1/1 g1/2 ebgos-2651-v1 New York 128 fa4/14 ISDN BRI ATM/FR fa1/0 bri6/0 s3/0:0 fa4/16 bos-ux2 g3/1 g3/11 fa4/25 g2/0 bos-pc3 g3/13 g1/1 g3/15 g1/2 ebgos-7206-w3 fa5/16 fa2/14 fa2/16 ebgos-6506-c2 ebgos-4006-a3 T1 (P2P) T3 GE FE bos-ux3 95535 Pittsburgh Platform and Software Version Information Table 47 lists the platforms, router names, software versions, and software images configured in the Boston network topology for this test suite. Table 47 Boston Platform, Router Name, Software Version, and Software Images Platform Router Name Software Version Software Image Cisco 7206 egbos-7206-w1 12.2(16b) c7200-js-mz.122-16b Cisco 7206 egbos-7206-w2 12.2(16b) c7200-js-mz.122-16b Cisco 7206 egbos-7206-w3 12.2(15)T5 c7200-js-mz.122-15.T5 Cisco 2651 egbos-2651-v1 12.2(16b) c2600-js-mz.122-16b Catalyst 6500 egbos-6506-c1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egbos-6506-c2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egbos-6506-a1 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 4000 egbos-4006-a2 7.6(1) cat4000-k8.7-6-1 Catalyst 4000 egbos-4006-a3 7.6(1) cat4000-k8.7-6-1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 63 Test Suite 2: Boston Campus Boston Functionality Test The functionality test category verified basic IP functionality and the tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS Basic IP The overall objective of the basic IP test case was as follows: • Verify the basic network operation (that is, network connectivity). • Verify the configurability and stability in a controlled environment for each of the functionality tests. • Verify that the selected software versions can be loaded into the devices. • Verify that the major IP routing features work as expected. The following features were included in the test plan: • VTP and VLAN • VLAN trunking • STP • HSRP • Routing summarization • Route filtering • EIGRP stub router • Route redistribution and default route generation • Log event or change • BGP policy control • Tuning EIGRP routing metric via link delay and bandwidth • Route convergence Test Plan This is a basic IP functionality test for the Boston campus. The test category verified basic IP functionality, the Layer 2 protocols such as STP and VLAN trunking, and Layer 3 protocols, such as HSRP and EIGRP (for interior routing), and BGP (for exterior routing). The procedure used to perform the Boston campus basic IP test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 64 Test Suite 2: Boston Campus Step 1 Set up the VLANs. The access switch VLAN model is “unique VLANs per Access Layer switches” for this campus. The entire building is in a standalone VTP domain. All switches work in VTP transparent mode. VLAN 1 is for control traffic on all switches by default. VLAN 10 is for a backdoor network connection, configured only on the access layer switches. Five unique VLANs are assigned per access layer switches in addition to VLANs 1 and 2. VLANs 11 to 15 are for the first access layer switch, VLANs 16 to 20 are for the second access layer switch, VLANs 21 to 25 are for the third access layer switch, and so on. VLANs 1 and 2 are filtered on the trunk link to make Layer 2 loop free. VLANs 26 to 110 are used to generate routes, which are configured only on core layer switches. Step 2 Set up VLAN trunking. The links between access layer switches and core layer switches are L2 dot1q trunking. The trunk mode is desirable/desirable. Th link between core layer switches is L3 P2P. Step 3 Set up the STP feature in case a misconfiguration causes a Layer 2 loop. STP portfast is enabled on all access switches end-user ports. All other STP features are on by default. Step 4 Set up HSRP. Switch egbos-6506-c1 serves as the HSRP active group for all odd-numbered VLANs. Switch egbos-6506-c2 serves as the HSRP active group for all even-numbered VLANs. HSRP preempt is used to ensure that the high-priority group is the active group. Load balancing is per VLAN. Step 5 Set up route summarization. Boston is a small campus in a single building. The network is organized into three layers: WAN access, L3 core, and L2 access, with distribution being done in the core. The Boston WAN router connects to two remote sites, with a routing summarization ratio of about 10 to 1. Configure WAN routers egbos-7206-w1 and egbos-7206-w2 to summarize the end-user networks within the building to /20 and /21 prefixes. Summarize the campus devices interconnectivity and loopback routes into one /21 route. These summarizations are done on the WAN links connected to the remote sites. Configure WAN regional aggregation router egbos-7206-w3 to summarize the end-users networks in the building to /20 and /21 prefixes. Summarize the campus devices interconnectivity and loopback routes into one /21 route. These summarizations are done on the WAN links connected to the remote sites. Configure WAN regional aggregation router egbos-7206-w3 to summarize routes to the remote sites to one /21 route for each remote site group and apply statements to the LAN interfaces of egbos-7206-w3. Auto-summary is turned off. Step 6 For route filtering, configure a distribution list on WAN aggregation router egbos-7206-w3 to allow only local summarized routes and default routes to be advertised out to the remote sites. Step 7 Configure the voice router to be a stub router. Step 8 Configure BGP and EIGRP routing on WAN access router egbos-7206-w2. BGP will acquire the default route from ISP3. Redistribute BGP into EIGRP and permit the default route and the intercampus routes to be redistributed into EIGRP. Redistribute untagged EIGRP routes into BGP. Step 9 Configure eigrp log-neighbor-changes under router eigrp 2 on all the WAN routers. Step 10 BGP AS 64502 is used for the Boston campuses' AS border routers. Routes to SJ and WAS are filtered through egbos-7206-w1 and egbos-7206-w2 by the route-map. This default route and the intercampus routes are redistributed into EIGRP for the connection to ISP3 from the Boston campus. Configure egbos-7206-w1 and egbos-7206-w2 BGP for inter-BGP routing. Step 11 On egbos-7206-w3, change the bandwidth of Bri6/0 to 128 kbps. Adjust the bandwidth command to match the QoS bandwidth settings. Step 12 Verify the test setup by analyzing the output of the Cisco IOS show commands listed in Table 48. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 65 Test Suite 2: Boston Campus Table 48 show Commands Used for the Boston Basic IP Test Verification Command Purpose show trunk (CatOS) • Verifies that the VLAN trunkings are formed correctly. show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show ip route • Verifies that the routes are summarized as expected. • Verifies that the routing filters work as expected. • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or errors. show log • Verifies that there are no other significant errors for EIGRP routing. show vlan • Verifies the VTP and VLAN configurations. • Verifies that each core router is the the active HSRP router for half of the VLANs. show interface trunk and show ip route summary show processes cpu show vtp domain (CatOS) show vtp status show standby brief Step 13 Conduct a negative HSRP test by shutting down or disconnecting the uplink from egbos-6506-a1 to egbos-6506-c1. Use the show standby brief command to verify that the HSRP active group fails over to egbos-6506-c2. Bring the uplink back up to verify that the HSRP active group switches back on. Step 14 Analyze the output of the Cisco IOS show commands listed in Table 49. Table 49 Additional show Commands Used for the Boston Basic IP Test Verification Command show ip route Purpose • Verifies that the routes are summarized as expected. • Verifies that the routing filters work as expected. • Verifies that the closest path to ISP3 is used for the traffic from or destined to the campus. and show ip route summary show interfaces For all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 66 Test Suite 2: Boston Campus Table 49 Additional show Commands Used for the Boston Basic IP Test Verification (continued) Command Purpose show ip eigrp neighbors detail On router egbos-7206-w3: • show ip bgp On router egsj-7609-w2: and • Verifies the BGP route filtering. show ip route • Verifies the network reachability to ISP3. and • Verifies BGP AS policy control on the ISP routers. ping Step 15 Verifies that the router is stub-enabled. Verify route convergence by performing the following steps: a. Use the show ip route command to verify that all simulated routes exists. b. Set up continuous 512-byte pings between the bos-ux3 PC and the hou-ux1 PC in the topology. Set the ping timeout to 1 sec. c. During the pinging, fail the egbos-7206-w2 link. d. Capture the number of ping packets lost and derive the convergence time from the product of the total number of packets lost and the ping timeout. e. Restore the failed link. f. After the link is up, repeat steps b through e with bos-ux3 PC and phx-ux1 PC by failing egbos-7206-w1. Expected Results We expect the following results: • The selected software versions can be loaded into the devices. • The major IP routing features work as expected. • The VTP and VLAN configuration will work correctly. • Each distribution switch is an active HSRP route for half of the VLANs (either the even-numbered VLANs or the odd-numbered VLANs). • During HSRP negative testing of STP and HSRP, the HSRP secondary router takes over the active state for all VLANs. • The HSRP active group switches back correctly. • The spanning tree roots on the distribution switches work correctly. Results Table 50 shows the Boston basic IP test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 67 Test Suite 2: Boston Campus Table 50 Boston Basic IP Test Results Test Results Boston basic IP Passed Network Management This section describes the network management testing in the Boston campus. The following features were included in the test plan: • MIB walk (snmp_walk_test) and traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB walk and traps. MIB walk will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the MIB Walk script will work properly. Step 3 Upload the following MIBs to the MIB Walk script: • Basic IP: – OLD-CISCO-CPU-MIB – CISCO-PROCESS-MIB – OLD-CISCO-INTERFACE-MIB – OLD-CISCO-ENV-MIB – OLD-CISCO-MEMORY-MIB – CISCO-EIGRP-MIB – CISCO-OSPF-MIB • Multicast: – CISCO-IPMROUTE-MIB – CISCO-IGMP-MIB – CISCO-PIM-MIB • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB – CISCO-CCM-MIB Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 68 Test Suite 2: Boston Campus • QoS: – CISCO-QOS-MIB Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send email notification for error conditions on the routers or switches. Step 11 Use the show log command or the show align command to verify that there are no other significant errors. Step 12 Use the show snmp command to verify the SNMP configuration information. Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 51 shows the Boston network management test results. Table 51 Boston Network Management Test Results Test Results Boston network management Passed Multicast The objective of the Boston campus multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • CGMP • IGMP-v2 • IGMP snooping • PIM sparse-dense mode The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 69 Test Suite 2: Boston Campus Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV client to switch egden-6506-a1. c. Configure the IP/TV server to stream three programs as follows: • The first program contains a 239.192.0.1/14 multicast address scope and consists of a 128-kbps video stream and a 100-kbps audio stream. The IP/TV clients at all campuses and remote sites will receive this program. • The second program contains a 239.255.0.1/16 multicast address scope and consists of a 500-kbps video stream and a 100-kbps audio stream. The IP/TV clients at all campuses will receive this program. • The third program contains a 239.194.0.1/14 multicast address scope and consists of a 1500-kbps video stream and a 100-kbps audio stream. Only the IP/TV client at the San Jose campus will receive this program. Step 2 Enable CGMP on the egbos-4006-a3 Boston campus Layer 2 access switch. Step 3 Enable IGMP-v2. This feature is enabled by default in Native IOS and Cisco IOS software, so no additional configuration is required. Step 4 Enable IGMP snooping on the egbos-6506-a1 Boston campus Layer 2 switch. This feature is enabled by default in Native IOS, so no additional configuration for Layer 3 is required. Step 5 Enable PIM sparse-dense mode on all Boston campus Layer 3 Native IOS and Cisco IOS multicast devices. Verification The procedure used to perform the multicast verification test follows: Step 1 Use DART to capture the output of the generic show commands listed in Table 52. Table 52 Generic show Commands Used in the Boston Multicast Verification Test Command Purpose • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show buffer failure • Verifies a buffer or memory failure. show processes cpu Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 70 Test Suite 2: Boston Campus Table 52 Generic show Commands Used in the Boston Multicast Verification Test (continued) Command Purpose show interfaces [interface type] show logging Step 2 • Verifies the router's throughput. • Verifies that there are no other significant errors. show Commands Used in the Boston Multicast CGMP Verification Test Command Purpose show cgmp statistics • Displays the CGMP statistics. show cgmp leave • Verifies the status of the CGMP leave feature. show multicast router • Displays the ports that have IGMP or RGMP-capable routers assigned to them. show multicast group • Verifies the multicast group information. show multicast group cgmp • Displays the multicast group configuration information learned via CGMP. Using the show commands listed in Table 54, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. In addition, verify the following: • The router with the lower IP address is the correct IGMP querier. • The router installs group members upon receipt of IGMP join messages. • All groups are seen for all IGMP joined groups. • The router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Table 54 show Commands Used in the San Jose Multicast IGMPv2 Verification Test Command Step 4 Verifies that there are no input errors, output errors, or queue drops. Using the show commands listed in Table 53, verify that CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. Table 53 Step 3 • Purpose show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. Using the show commands listed in Table 55, verify that IGMP snooping functions as follows: • IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 71 Test Suite 2: Boston Campus Table 55 show Commands Used in the Boston Multicast IGMP Snooping Verification Test Command Purpose show igmp statistics On Layer 2 switches: • show multicast group igmp On Layer 2 switches: • show multicast group count igmp Verifies that the correct multicast router has been learned. On Layer 3 switches: • Step 5 Verifies that IGMP snooping is globally enabled. On Layer 3 switches: • show mac-address-table multicast vlan-id Verifies the total count of multicast addresses (groups) in a VLAN learned via IGMP. On Layer 3 switches: • show ip igmp snooping mrouter Verifies the multicast group configuration information learned via IGMP. On Layer 2 switches: • show ip igmp interface Verifies the IGMP statistics for a particular VLAN. Verifies that the correct multicast addresses are present in the output. Using the show commands listed in Table 56, verify that PIM sparse-dense mode functions as follows: • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 72 Test Suite 2: Boston Campus Table 56 show Commands Used in the Boston Multicast PIM Sparse-Dense-Mode Verification Test Command Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. Expected Results We expect the following results: • CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. • IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast forwarding is achieved using PIM. Results Table 57 shows the Boston multicast test results. Table 57 Boston Multicast Test Results Test Results Boston multicast Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 73 Test Suite 2: Boston Campus Security This security test was conducted for the Boston campus. This test catagory verified the functionality of AAA and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. The objectives of the security test were as follows: • Verify TACACS+ AAA services at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • AAA and TACACS+ • Other security commands Test Plan Setup The procedure used to set up the Boston security test follows: Step 1 Configure encryption service facility and AAA and TACACS+. Step 2 Configure the times-stamping service facility for logging. Step 3 Disable all unnecessary services. Step 4 Configure an enable password. Step 5 Configure a console port password. Step 6 Configure a vty password. Verification The procedure used to perform the Boston security verification test follows: Step 1 Use the show tacacs command to verify the TACACS+ configuration values. Step 2 Use the show accounting command to verify the user account on the router and switch. Expected Results We expect the following results: • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 58 shows the Boston security test results. Table 58 Boston Security Test Results Test Results Boston security Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 74 Test Suite 2: Boston Campus Voice The purpose of the Boston voice test was to verify that voice can be incorporated into the Boston campus, to verify the successful operation of the Cisco IOS release, to test AVVID and legacy voice interoperability, to collect and document the necessary results, and to verify that the system functions as expected. The following features were configured for voice testing: • Legacy H.323 VoIP • SCCP Test Plan The voice test verified that voice traffic operated properly across the network. Set Up Legacy H.323 The procedure used to set up the legacy H.323 voice test follows: Step 1 Configure the H.323 voice gateway egbos-2651-v1. Step 2 Check that egbos-2651-v1 is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egbos-2651-v1 router. Step 3 Configure Callgen telephony. Set Up SCCP The procedure used to set up the SCCP voice test follows: Step 1 Configure T1 CAS and FXS SCCP voice gateways on the Catalyst 4006. Step 2 Configure inline power and real IP telephones on the Catalyst 4006. Step 3 Verify that the T1 CAS, the FXS, any transcoding devices, and all real or simulated IP telephones on the Catalyst 4006 appear and are registered in CallManager. Step 4 Configure Callgen SCCP to generate test traffic. Step 5 Enable IP telephony gateway mode on the Catalyst 4006. Step 6 Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. Step 7 Configure Callgen telephony. Voice Traffic Verification Test This test verified that incoming and outgoing voice traffic is handled properly on the network. Test Plan The procedure use to perform the voice traffic verification test follows: Step 1 Start all BCG channels to Boston (2 calls). Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 75 Test Suite 2: Boston Campus Step 2 Using the show channel command on the Callgens, verify for 5 minutes that all originate and terminate BCG channels have started and are progressing correctly with no problems. Step 3 Verify for 5 minutes that all originate and terminate Callgen SCCP endpoints have started and are progressing correctly with no problems. Step 4 Analyze the output of the show commands listed in Table 59. Use the listed commands on all the WAN routers using the DART tool every 60 seconds for the show processes cpu command, and every 5 minutes for all the others—for a duration of 1 hour. Table 59 show Commands Used for the Boston Campus Voice Traffic Verification Test Command Purpose show clock • show interfaces [interface type] Verifies the current time. On all outbound WAN interfaces: • Verifies the link speed and drop rate. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 59 were used on the WAN routers and interfaces listed in Table 60. Table 60 Boston WAN Routers and Interfaces Router Interface egbos-7206-w1 Serial4/0 egbos-7206-w2 Serial3/0 egbos-7206-w3 Serial3/0:0 Step 5 Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels function properly, without any significant errors. Step 6 Verify for 5 minutes that all originate and terminate Callgen SCCP endpoints have started and are progressing correctly with no problems. Step 7 Stop the bulk call traffic generators and verify results by performing the following steps: Step 8 a. Stop Callgen SCCP endpoints after 1 hour of run time. b. Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels are functioning correctly without any significant errors. c. Capture the output statistics of Callgen by using CIC. d. Capture the output statistics of Callgen SCCP endpoints. e. Use Performance monitor to check real time the number of gateways and IP phones registered and CDR on the CallManager to also check the percentage of successful calls. Configure an IP phone manually, install it in each campus, and make calls to test voice quality. Expected Results We expect the following results: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 76 Test Suite 2: Boston Campus • Voice traffic sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. Results Table 61 shows the Boston voice traffic verification test results. Table 61 Boston Voice Traffic Verification Test Results Test Results Boston voice traffic verification Passed QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 ToS. The following features were included in the test plan: • Classification and marking: access lists, DSCP values, port numbers, IP precedence, and NBAR • Congestion management: CBWFQ and LLQ • Traffic conditioning: FRTS and GTS • Link efficiency mechanisms: cRTP and MLP interleaving QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. Test Plan The procedure used to perform the QoS setup test follows: Step 1 Perform L2CoS to L3QoS remarking on the egbos-6506-a1, egbos-4006-a2, and egbos-4006-a3 access layer switches. Step 2 Define the access lists and traffic classes using the following guidelines: Step 3 • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Lotus Notes and Oracle, into a class map called “Transactional.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Streaming” class. • Classify HTTP and FTP traffic into the “class-default” class, which is the class map for best-effort service. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure a policy map called “OUT-Voice” on the egbos-2651-v1 router. b. Configure a policy map called "IN-bound" on egbos-7206-w1 and egbos-7206-w2. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 77 Test Suite 2: Boston Campus c. Step 4 Configure a policy map called "out-bound-dt1" on egbos-7206-w3. Attach policy maps to the interfaces listed in Table 62, and apply the other appropriate QoS features. Table 62 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). Table 62 Routers, Policy Maps, and Interfaces for the Boston QoS Setup Test Router Policy Map Interface egbos-2651-v1 OUT-VOICE Fa0/1 egbos-7206-w1 OUT-LAN-FE Fa1/0, Fa2/0, Fa3/0 egbos-7206-w1 OUT-WAN-HW1 Serial4/0 egbos-7206-w2 OUT-LAN-FE Fa0/0, Fa1/0, Fa2/0 egbos-7206-w2 OUT-WAN-HW4 Serial3/0 egbos-7206-w2 OUT-LAN-FE Fa1/0, Fa2/0 egbos-7206-w3 OUT-WAN-DT5 Serial3/0:0 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • QoS features were configured and were functioning properly. Results Table 63 shows the Boston QoS setup test results. Table 63 Boston QoS Setup Test Results Test Results Boston QoS setup Passed QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic was used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 78 Test Suite 2: Boston Campus Step 2 Analyze the output of the Cisco IOS show commands listed in Table 64. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 64 show Commands Used for the Boston QoS Verification Test Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] On all the outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show traffic-shape statistics • Verifies that traffic shaping is enabled. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show ppp multilink [interface type] • Verifies multilink PPP status, such as number of member interfaces configured per bundled interface. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. The show commands listed in Table 64 were used on the WAN routers and interfaces listed in Table 65. Table 65 Step 3 Boston WAN Routers and Interfaces Router Interface egbos-2651-v1 Fa0/1 egbos-7206-w1 Fa1/0, Fa2/0 egbos-7206-w2 Fa0/0, Fa1/0, Fa2/0 egbos-7206-w3 Serial3/0:0 Use DART to capture the output of the Cisco IOS show commands listed in Table 66 on all routers once at the end of the 2-hour test run. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 79 Test Suite 2: Boston Campus Table 66 show Commands Used on the Boston Switches and Interfaces Command Purpose show class-map • Displays the class map configured for the device show policy-map • Displays the policy map configured for the device. show access-list • Verifies that the configured access lists have the correct amount of packet matches. The show commands listed in Table 66 were used on the routers and interfaces listed in Table 67. Table 67 Step 4 Boston Routers and Interfaces Router Interface egbos-2651-v1 Fa0/1 egbos-7206-w1 Fa1/0, Fa2/0 egbos-7206-w2 Fa0/0, Fa1/0, Fa2/0 egbos-7206-w3 Serial3/0:0 Capture the data statistics from Chariot, IXIA, and BCG after the 2-hour test run. Throughput observed on the test equipmet should be comparable to what is observed on the router or switch. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors occurred during testing, such as router or switch failures, reloads, CPU hogs, or significant errors (that is, memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles). • Routing tables correctly reflected all available super- and subnets. All client/server traffic traversed from source to destination through the expected route for the duration of the test. Routes converged correctly without major delay. • All the other procedures were executed. • Access lists and traffic classes were correctly defined. • Traffic shaping was enabled and functioned correctly. • Class maps were correctly configured. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • Voice and data traffic were assigned the proper amount of bandwidth in the policy maps. Results Table 68 shows the Boston QoS verification test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 80 Test Suite 2: Boston Campus Table 68 Boston QoS Verification Test Results Test Results Boston QoS verification Passed Boston System Test The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into all Boston campuses. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test category verified system performance for a number of QoS features, using EIGRP and BGP as the routing protocols. The features that were configured for the Boston functionality test were carried over to this test. The following additional features were configured in this test category: • BGP 4 • CBWFQ • PQ • MLPPP performance enhancements • CEF support for IP routing between IEEE 802.1Q VLANs • CGMP • CLI string search • dCBWFQ • dLLQ • dTS • dWRED • EIGRP stub routing • FRF.12 support on switched Frame Relay PVCs • GTS • H.323 gatekeeper • H.323 Version 2 support • HSRP • IEEE 802.1Q VLAN support • LFI for Frame Relay and ATM Virtual Circuits • MLPPP with LFI • NBAR real time streaming protocol • PIM version 2 • RTP header compression • TACACS+ Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 81 Test Suite 2: Boston Campus • VLAN Database Test Plan The procecure used to perform the Boston system test follows: Step 1 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 69 at the start and end of the 4-hour test. Table 69 show Commands Used for the Boston System Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifes that multicast flows create MMLS entries and that switching of the flow is performed. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 82 Test Suite 2: Boston Campus Table 69 show Commands Used for the Boston System Test Start and End View (continued) Command Step 4 Purpose show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 70 at 60-minute intervals. Table 70 show Commands Used for the Boston System Test 60-Minute View Command Step 5 Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 71 at 10-minute intervals. Table 71 show Command Used for the Boston System Test 10-Minute View Command show processes cpu Purpose • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 83 Test Suite 2: Boston Campus Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch crashes, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 72 shows the Boston system test results. Table 72 Boston System Test Results Test Results Boston system Passed Boston Reliability Test This section describes in detail the reliability test as it pertained to the Boston campus, using EIGRP as the interior routing protocol and BGP as the exterior routing protocol. Successful execution of the Boston system test was prerequisite to the execution of this test. The reliability test ran for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. The following additional features were configured in this test category: • BGP 4 • CBWFQ • PQ • MLPPP performance enhancements • CEF support for IP routing • CGMP • CLI string search • dCBWFQ • dTS • dWRED • EIGRP stub routing • FRF.12 support on Switched Frame Relay PVCs • MQC - based FRTS Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 84 Test Suite 2: Boston Campus • GTS • H.323 gatekeeper • H.323 Version 2 support • H.323/H.320 gateway • HSRP • Cisco IP phone support • EIGRP route authentication • IEEE 802.1Q VLAN support • IGMP MIB support enhancements for SNMP • IGMP snooping querier • IGMP version 2 • IP routing • LFI for Frame Relay and ATM virtual circuits • LLQ with priority percentage support • LLQ • MD5 password encryption • MLPPP with LFI • MQC • NBAR real-time streaming protocol • PIM MIB extension for IP multicast • PIM version 2 • QoS enhancements • RTP header compression • TACACS+ • VLAN database • VoIP • WRED The overall objective of this test case was to verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into all Boston Campuses, to verify the successful operation of the Cisco IOS release, and to verify that the system behaved as expected and performed reliably for the 150-hour test period. Test Plan The procedure used to perform the Boston reliability test follows: Step 1 Start traffic streams for a 100 percent traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 85 Test Suite 2: Boston Campus c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 150 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 73 at the start and end of the 150-hour test period. Table 73 show Commands Used for the Boston Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifes that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifes that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 86 Test Suite 2: Boston Campus Table 73 show Commands Used for the Boston Reliability Test Start and End View (continued) Command Step 4 Purpose show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 74 at 24-hour intervals. Table 74 show Commands Used for the Boston Reliability Test 24-Hour View Command Step 5 Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 75 at 6-hour intervals. Table 75 show Command Used for the Boston Reliability Test 6-Hour View Command Purpose show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 87 Test Suite 2: Boston Campus • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 76 shows the Boston reliability test results. Table 76 Boston Reliability Test Results Test Results Boston reliability Passed with exceptions Passed with Exceptions Explanation The Boston reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • Chariot endpoint station bos-ux1 failed during the test. Chariot reported the problem as a bus error in the Sun workstation that served as bos-ux1 and did not reflect any problems in the network. The test results were not affected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 88 Test Suite 3: Washington, D.C. Campus with Data Center Test Suite 3: Washington, D.C. Campus with Data Center This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP and QoS at the Washington, D.C. campus with data center. The Washington, D.C. campus with data center is one component of the larger global enterprise topology. The global enterprise topology consists of five multilayer-design campuses—two large campuses with data centers and three regional campuses—and 12 remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section in this document. In the test suite for the Washington, D.C. campus with data center, the following categories (or types) of testing were conducted: • Functionality testing: This test category verified basic IP functionality, using EIGRP and BGP as the routing protocols. • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing: This test category verified system reliability. This test suite contains the following sections: • Topology Description, page 89 • Washington, D.C. Functionality Test, page 92 • Washington, D.C. System Test, page 112 • Washington, D.C. Reliability Test, page 116 Topology Description The global enterprise Washington, D.C. testbed represents one of the medium-size enterprise campuses that would be located in a United States region. The Washington, D.C. testbed simulates one of the large enterprise headquarters campuses with a data center. It consists of two Catalyst 6506 switches with MSFC2/PFC2 cards acting as core routers, two Cisco OSR-7609s as campus WAN routers, one Cisco 7507 as the WAN aggregation router, one Catalyst 6506 as the distribution router for the data center, and a Cisco 3640 acting as the voice gateway. The two OSR-7609 routers provide connection to the internet and other large campuses in this testbed through POS OC-3, ATM OC-3, ATM-T3, E3, and T3 WAN links. The Cisco 7507 router acts as the WAN aggregation router for the many remote sites connected to this campus through ATM or Frame Relay links with less bandwidth than a T1. High-speed L3 GE links are used to connect these devices together, with sufficient redundancy. The voice gateway is connected using Fast Ethernet connectivity. The voice gateway uses the gatekeeper in the San Jose campus for registration, and places VoIP calls to the voice gateways in the other campuses. The Washington, D.C. testbed is used to perform the test for functionality, which includes IP routing, SNMP, multicast, security, VoIP, and QoS. EIGRP is the IP IGP routing protocol, and a total of about 600 routes are generated in this campus. BGP is the IP EGP routing protocol. Application servers located in the data center serve the end users in this campus. The database servers located in the data center serving this campus and the database servers located in the data center store the data for the whole enterprise global topology, with redundant database servers in the San Jose campus. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 89 Test Suite 3: Washington, D.C. Campus with Data Center Voice, NetMeeting, Telnet, Oracle, SAP, MS Exchange, Lotus Notes, HTTP, and FTP are the applications simulated by the test tools in this campus. The testbed simulates 1000 end users through the use of traffic generators and real PC and UNIX workstations. Figure 8 shows the Washington, D.C. campus with data center topology with IP addresses. Figure 8 Washington, D.C. Campus with Data Center Topology with IP Addresses Pittsburg Miami New York Dallas ATM/FR T3 Boston San Jose T1 ATM San Jose Denver E3 T1 ATM-OC3 POS OC3 ATM-T3 A3/0/0 T3 A3/0/0 1 6/1 6/2 isp3-7507 S3/0/0 32 6/1 = FE = GE T3 WAN Access P4/1/0 S3/1/0/1 S4/0/1:0 A4/1/0.768 S4/0/0:0 2 egwas7600-w2 egwas7507-w3 6/3 7 37 0/0/0 ISP3 6/2 Data Center was-pc1 egwas-6506-sd1 S3/0/1 6/2 egwas-3641-v1 31 5/1 6 36 33 6/1 0/1 1/2 3 6/3 1/1 Traffic generators was-ux1 5/0/0 L3 Core was-pc3 2/4 2/3 2/2 6/2 6/1 2/5 4 2/2 2/3 2/1 37 egwas6506-c1 was-ux3 5 X Loopback - 96.10.0.x XX Backdoor - 223.255.10.XX 6/2 2/5 egwas6506-c2 was-pc2 35 6/1 was-ux2 Traffic generators 95529 Traffic generators 2/1 2/4 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 90 Test Suite 3: Washington, D.C. Campus with Data Center Figure 9 shows the Washington, D.C. campus with data center topology with interface types. Figure 9 Washington, D.C. Campus with Data Center Topology with Interface Types Pittsburg 96.1.0.28 San Jose T3 ATM 96.1.0.40 San Jose T1 96.1.0.12 E3 T1 ISP3 96.1.0.20 Dallas ATM/FR = GE = FE Boston Miami New York Denver POS OC3 96.1.0.36 T3 T3 ATM-T3 ATM-OC3 isp3-7507 96.1.0.32 WAN Access .6 .6 .6 .6 .6 1.231.248.4 1231.246.0 1.223248.0 2 egwas32 7609-w2 egwas7609-w1 .6 .13 .1 .1 7 37 egwas7507-w3 .6 .13 .21 egwas-3640-v1 31 1 .5 .17 .9 96.10.1.4 .38 .37 6 96.10.1.36 96.10.1.20 96.10.1.8 96.10.3.8 96.10.1.28 .6 36 96.10.3.4 96.10.1.16 96.10.1.12 96.10.1.32 L3 Core .14 was-pc3 96.10.17.100 .34 .18 .22 .6 Data Center was-pc1 96.10.137.100/V37 egwas-6506-sd1 .6 .10 .30 .10 was-pc2 96.10.9.100 3 .5 33 .9 96.10.138.100/38 Traffic was-ux1 generators X Loopback - 96.10.0.x XX Backdoor - 223.255.10.XX .25 96.10.18.1 4 was-ux3 96.10.18.100 96.10.1.24 34 96.10.17.1 egwas6506-c1 35 96.10.10.1 was-ux2 96.10.10.100 Traffic generators 95530 Traffic generators .26 96.10.9.1 5 egwas6506-c2 Platform and Software Version Information Table 77 lists the platforms, router names, software versions, and software images configured in the Washington, D.C. network topology for this test suite. Table 77 Washington, D.C. Platform, Router Name, Software Version, and Software Image Table Platform Router Name Software Version Software Image Cisco 7609 egwas-7609-w1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 7609 egwas-7609-w2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egwas-6506-sd1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egwas-6506-c1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 3660 egwas-3660-v1 12.2(16b) c3660-js-mz.122-16b Cisco 7507 egwas-7507-w3 12.2(15)T5 rsp-pv-mz.122-15.T5 Catalyst 6500 egwas-6505-c2-sup2 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 6500 egwas-6505-c2-msfc2 12.1(13)E9 c6msfc2-jsv-mz.121-13.E9 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 91 Test Suite 3: Washington, D.C. Campus with Data Center Washington, D.C. Functionality Test The functionality test category verified basic IP functionality. The tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS The testing in each section was performed sequentially and as independently as possible. The Washington, D.C. functionality testing was conducted as follows: 1. Basic IP testing was performed in conjunction with Network Management Testing (NMS). Network Management was utilized to collect the test information. 2. After completion of the basic IP test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 3. Multicast testing was performed, again with NMS monitoring. 4. After completion of the multicast test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 5. Security testing was performed in conjunction with NMS monitoring. 6. After completion of the security test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 7. Voice testing was performed in conjunction with NMS monitoring. 8. After completion of the voice test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 9. QoS testing was performed in conjunction with NMS monitoring. 10. After completion of the QoS test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. Basic IP This is a basic IP functionality test for the Washington, D.C. campus with data center. This test case verified basic IP functionality, the Layer 2 protocol VTP, and the Layer 3 protocols EIGRP (for the interior routing) and BGP (for the exterior routing). The objectives for this test case were as follows: • Verify the basic network operation (that is, network connectivity). • Verify the configurability and stability in a controlled environment for each of the functionality tests. • Verify that the software can be loaded and used in the devices. • Verify that the major IP routing features work as expected. • Collect the network baseline information and provide the necessary test results. In this test case, the following individual tests were conducted: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 92 Test Suite 3: Washington, D.C. Campus with Data Center • Layer 2 Protocols and HSRP • EIGRP with BGP routing test In addition to basic IP, the VTP and VLAN feature was configured. Layer 2 Protocols and HSRP This test involved testing various Layer 2 protocols and HSRP. The VTP and VLAN feature was included in the test plan. Test Plan The procedure used to perform the Layer 2 protocols and HSRP test follows: Step 1 Set up the VLANs. The access switch VLAN model is model number 1, “share VLANs across Access Layer switches,” for this campus. Each building is in a separate VTP domain. The two distribution layer switches work in VTP server mode, and all access layer switches work in VTP transparent mode. VLAN 1 is for control traffic on all switches by default. VLAN 2 is for a backdoor network connection, configured only on the access layer switches. VLANs 11 to 20 are used for end-user networks that are configured across all access layer switches and the distribution layer routers. VLANs 21 to 110 are used to generate routes, which are configured only on distribution layer routers. Step 2 In the data center, configure the distribution layer switch egwas-6506-sd1 as a VTP server. Step 3 Perform the Layer 2 configuration on egwas-6505-sd1, the distribution switch in the data center. VLAN 1 is configured for control traffic and VLANs 11 to 110 are configured to carry end-user network traffic in the data center. VLAN interfaces from 11 to 110 are configured to route the VLAN traffic in this distribution switch. Step 4 On switch egwas-6505-sd1, use the CatOS show vlan brief command, and the Cisco IOS show vtp status command to verify the VTP and VLAN configuration. Expected Results We expect that the VTP and VLAN configuration will work correctly. Results Table 78 shows the Washington, D.C. Layer 2 protocols and HSRP test results. Table 78 Washington, D.C. Layer 2 Protocols and HSRP Test Results Test Results Washington, D.C. Layer 2 protocols and HSRP Passed EIGRP with BGP Routing This test involved testing EIGRP with BGP routing. The following features were included in the test plan: • Route summarization • Route filtering • EIGRP stub router functionality Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 93 Test Suite 3: Washington, D.C. Campus with Data Center • Route redistribution and default route generation • Log event or change functionality • BGP policy control (specifically, autonomous system [AS] prepend and route filtering) • EIGRP metric tuning—link delay and bandwidth Test Plan This test verified route summarization, route filtering, route redistribution, EIGRP stub router functionality, route redistribution and default route generation, log event or change functionality, BGP policy control, and EIGRP metric tuning. Several parts to this test plan are described in the sections that follow. Route Summarization and Filtering Test The procedure used to perform the route summarization and filtering test follows: Step 1 Turn off EIGRP auto-summary on all EIGRP-enabled routers. Route summarization is manually done on the following devices: a. On WAN access routers egwas-7509-w1 and egwas-7509-w2, end-user networks from the buildings are summarized into /20 and /21 routes. The devices’ interconnectivity network and loopback interface routes within the whole campus including data center will be summarized into one /21 route. b. On campus WAN aggregation router egwas-7507-w1, the summarized routes are redistributed into BGP and advertised to BGP neighbors. Intercampus WAN connectivity network routes are summarized, by the sourcing campus, into one /21 route and advertised into the local campus. Intercampus eBGP connections are sourced and destined to the respective loopback interfaces on the routers. iBGP is configured between WAN aggregation routers' respective loopback interfaces. c. EIGRP (passive-interface) is disabled on the WAN links to the other major campuses. Other campus routes learned by BGP are redistributed into EIGRP with varying metrics to ensure that the core layer routers select the best intercampus route. d. On campus distribution layer router egwas-6506-sd1, building routes are summarized to /21 and /20 routes and subsequently advertised to the connected core layer routers. e. On campus WAN aggregation router egwas-7507-w1, all remote site WAN links routes in remote group 1 are summarized into one /21 route. The summary route is then advertised by the WAN aggregation router to the campus core layer routers. Summarized local campus routes and the default route are advertised to the remote sites by the WAN aggregation router. Filtration may use tag matching using route maps. The remote site branch router has the same local campus route summarization schema as the campus WAN aggregation routers mentioned earlier. Step 2 Configure a distribution list on the core layer routers, the egwas-6506-c1 and egwas-mfsc2-c2, to allow only local campus routes and default routes to be advertised to the distribution layer routers. Redistribute untagged EIGRP routes into BGP. Step 3 Configure a distribution list on the WAN aggregation router, egwas-7507-w3, to allow only local campus summarized routes and the default route to be advertised to the remote sites. As an alternative, configure a route map to permit routes matching local campus tags to be advertised to remote sites. Step 4 Configure all the building and data center distribution layer routers and voice routers as EIGRP stub routers, so that the EIGRP queries do not propagate to the distribution layer routers or the voice routers. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 94 Test Suite 3: Washington, D.C. Campus with Data Center Step 5 Configure distribution layer router egwas-6506-sd1 as an EIGRP stub router to prevent advertisement of EIGRP queries into the access layer. Voice gateway egwas-3660-v1 is also configured as an EIGRP stub router. Route Redistribution and Default Route Generation Test The procedure used to perform the route redistribution and default route generation test follows: Step 1 Configure BGP and EIGRP routing on the campus WAN aggregation router egwas-7509-w2. BGP will receive ISP advertised routes in addition to intercampus routes. Step 2 Redistribute BGP into EIGRP and permit only the intercampus routes to be tagged and redistributed into EIGRP. A static default route will be created by the router connected to the ISP and advertised into the whole EIGRP AS and will be permitted into the remote sites. A backup static default route will be advertised by the secondary ISP-connected router, using a floating static route. The default route will not be advertised by BGP. Varying metrics will be applied to the routes being redistributed based on the number of BGP ASs that the intercampus route learned. BGP Policy Control Test The procedure used to perform the BGP policy control test follows: Step 1 Configure logging of changes on all the EIGRP- and BGP-enabled routers by using the Cisco IOS eigrp log-neighbor-changes command and the bgp log-neighbor-changes command. The BGP AS 64503 is the AS used for all Washington, D.C. campus AS border routers. All BGP routes are accepted on the BGP routers. Step 2 Configure egwas-7509-w2 for route filtering. This default route is redistributed into EIGRP for the connection to the ISP. Step 3 Configure the egwas-7609-w2 BGP policy so that the traffic from the ISP destined for the local campus prefixes gets high priority (by using AS prepending) to the advertised prefixes of the nonlocal campuses. All intercampus routes will be advertised to the ISP, but the AS will be prepended three times. Step 4 Leak a 24-bit route to the Chariot endpoints into the remote AS via link ATM3/0/0 on egwas-7609-w2. Set the community attribute no-advertise on these routes. EIGRP Metric Tuning Test The procedure used to perform the EIGRP metric tuning test follows: Step 1 Tune the switch virtual interface (SVI) delay on the distribution layer routers to enable symmetric routing for the building end-user networks. On the left distribution layer switch (the HSRP primary group for all the odd-numbered VLANs), change the SVI delay on the even-numbered VLAN interface from 10 microseconds to 50 microseconds. This configuration enables the left distribution layer switch to advertise a less desirable routing metric to the core routers for all the even-numbered VLAN interfaces. Similarly configure the right distribution layer switch. Step 2 Analyze the output of the Cisco IOS show commands listed in Table 79. Table 79 lists each show command and the role it plays in the Washington, D.C. EIGRP with BGP routing test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 95 Test Suite 3: Washington, D.C. Campus with Data Center Table 79 show Commands Used in the Washington, D.C. EIGRP with BGP Routing Test Command Purpose show ip route On all routers: and • Verifies that the routes are summarized as expected. • Verifies that the route filters work as expected. • Verifies that the default route is generated as expected. show ip route summary show ip route On the core layer and distribution layer routers: • show processes cpu show memory summary show logging show ip bgp and Verifies the symmetric routing for the building end-user networks. On all routers every 10 minutes: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. On all routers every 60 minutes: • Verifies that there are no memory leaks or other memory errors. • Verifies that there are no significant errors for EIGRP or BGP routing. On egwas-7509-w2 • Verifies that BGP routing is working correctly. show ip bgp summary show ip bgp On the ISP routers: and • Verifies BGP AS prepending policy control. show ip route and Note ping show interfaces [interface type] show ip eigrp neighbors detail The show ip bgp command in this phase of testing will be a verbose output (at least 50,000 lines long), so only two captures (beginning and end) of this command output should be collected. On all the WAN routers: • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. On the core layer routers egwas-6506-c1 and egwas-mfsc2-c2: • Verifies that the distribution layer routers are EIGRP stub-enabled. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 96 Test Suite 3: Washington, D.C. Campus with Data Center Table 79 show Commands Used in the Washington, D.C. EIGRP with BGP Routing Test (continued) Command Purpose show ip eigrp neighbors On the distribution layer routers: show ip route [interface name] • Verifies that the EIGRP neighbor was not created between two distribution layer routers. • Verifies that specific WAN interface routes are not in the routing table. Expected Results We expect the following results: • The routes are summarized correctly. • The route filters function correctly. • CPU utilization is less than 90 percent. • Memory consumption is stable. • The distribution layer routers are EIGRP stub-enabled. • The default route is generated correctly. • The BGP AS prepending policy control is enabled on the ISP routers. • There are no significant EIGRP or BGP routing errors and the link delay and bandwidth have been tuned correctly. • BGP route filtering functions correctly. • The EIGRP neighbor was not created between two distribution layer routers. • The routing table displays the appropriate routes. Results Table 80 shows the Washington, D.C. EIGRP with BGP routing test results. Table 80 Washington, D.C. EIGRP with BGP Routing Test Results Test Results Washington, D.C. EIGRP with BGP routing Passed Network Management This section describes the network management testing in the Washington, D.C. campus with data center. The following features were included in the test plan: • MIB walk automation script (snmp_walk_test) and traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 97 Test Suite 3: Washington, D.C. Campus with Data Center Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB walk and traps. The MIB walk automation script (snmp_walk_test) will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the script will work properly. Step 3 Upload the following MIBs to the snmp_walk_test script: • Basic IP: – CISCO-BGP4-MIB – CISCO-VTP-MIB – CISCO-HSRP-MIB • Multicast: – CISCO-IPMROUTE-MIB.my – CISCO-IGMP-MIB.my – CISCO-MSDP-MIB.my – CISCO-PIM-MIB.my • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB • QoS: – CISCO-QOS-MIB Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command and the CatOS show time command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send e-mail notification for error conditions on the routers or switches. Step 11 Use the show crypto mib ipsec flowmib version command to verify that the device has IPsec MIB support. Step 12 Use the show log command or the show align command to verify that there are no other significant errors. Step 13 Use the show snmp command to verify the SNMP configuration information. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 98 Test Suite 3: Washington, D.C. Campus with Data Center Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 81 shows the Washington, D.C. network management test results. Table 81 Washington, D.C. Network Management Test Results Test Results Washington, D.C. network management Passed Multicast The objective of the Washington, D.C. campus with data center multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • MDS • PIM sparse-dense mode • Multicast boundary • Anycast-RP with Auto-RP • IGMP-v2 • IGMP snooping • MMLS • Auto-RP The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV client to switch egwas-6506-c1. c. Configure the IP/TV server to stream two programs as follows: • The program “G1” contains a 239.192.1.0/24 multicast address scope and consists of a 600-kbps video and audio stream. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 99 Test Suite 3: Washington, D.C. Campus with Data Center • The program “G2” contains a 239.192.2.0/24 multicast address scope and consists of a 300-kbps video and audio stream. Step 2 Enable MDS on router egwas-7505-w3. Step 3 Enable PIM sparse-dense mode on all Layer 3 Native IOS and Cisco IOS multicast devices. Step 4 Enable multicast boundary on router egwas-7505-w3. Step 5 Enable Anycast-RP with Auto-RP on switches egwas-6506-sd1 and egsj-6506-sd1. Step 6 Enable IGMP snooping on the Layer 2 switches. Step 7 Enable MMLS on the Layer 3 switches. This feature is enabled by default in Native IOS, so no additional configuration is required. Verification The procedure used to perform the multicast verification test follows: Step 1 Use DART to capture the output of the generic show commands listed in Table 82. Table 82 Generic show Commands Used in the Washington, D.C. Multicast Verification Test Command Purpose • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. • Verifies that there are no other significant errors. show processes cpu show logging Step 2 Using the show commands listed in Table 83, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. Table 83 show Commands Used in the Washington, D.C. Multicast IGMPv2 Verification Test Command show ip igmp interface Purpose • Verifes that the router with the lower IP address is the correct IGMP querier, and that the router with the higher IP address is the correct multicast DR. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 100 Test Suite 3: Washington, D.C. Campus with Data Center Table 83 show Commands Used in the Washington, D.C. Multicast IGMPv2 Verification Test Command Purpose show ip igmp groups show ip mroute Step 3 • Verifies that the routers install group members upon receipt of IGMP join messages. • Verifies that all groups are seen for all IGMP-joined groups. • Verifies that the router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Using the show commands listed in Table 84, verify that MDS functions as follows: • The VIP interfaces on Cisco 7500 routers are MDS-enabled. • Multicast distributed switching is enabled. • Multicast traffic is distributed-switched. Table 84 show Commands Used in the Washington, D.C. Multicast MDS Verification Test Command Purpose show ip mds interface • Verifies the status of multicast distributed switching (MDS) interfaces. show ip pim interface count • Verifies that the switching state is distributed. show ip mds stats switching • Verifies that multicast traffic is distributed-switched. show ip mds forwarding On the line card console: • show ip mds summary On the line card console: • Step 4 Verifies the MFIB table and forwarding information for MDS. Displays a summary of the MFIB table for MDS. Using the show commands listed in Table 85, verify that PIM sparse-dense mode functions as follows: • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 101 Test Suite 3: Washington, D.C. Campus with Data Center Table 85 show Commands Used in the Washington, D.C. Multicast PIM Sparse-Dense Mode Verification Test Command Step 5 Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Using the show commands listed in Table 86, verify that multicast boundary functions as follows: • RP messages are prevented from traveling beyond the boundaries of the network using multicast boundaries. • Routers within the TTL number of hops from the source RP mapping agent receive the Auto-RP discovery messages. • Routers learn about correct RP mapping information within the TTL range. • Routers out of the TTL range cannot receive the Auto-RP Discovery messages. • A border router with a multicast boundary configured will not leak Auto-RP messages out of the network. • Multicast traffic cannot be forwarded out of the defined admin scope. Table 86 show Commands Used in the Washington, D.C. Multicast Boundary Verification Test Command Purpose show ip mroute • Verifies that multicast traffic cannot be forwarded out of the defined boundary. show ip pim interface count • Verifies that the multicast traffic on the interface is correct. show ip mroute and On the New York and Miami routers: • show ip mroute active Step 6 Verifies that the downstream routers receive the correct multicast traffic rate. Using the show commands listed in Table 87, verify that Anycast-RP with Auto-RP functions as follows: • Auto-RP dynamically updates the RP information in every device in the network. • Traffic for the two Auto-RP groups 224.0.1.39 and 224.0.1.40 are dense-mode flooded network. • All routers learn about RP mapping information. • The correct RP mapping is shown for the specified group. • The RP mapping information is consistent through the network. • Anycast RP information is distributed to the routers and no multicast groups are reverting to dense mode. • MSDP peers are operational. • There is an SA cache entry for each source. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 102 Test Suite 3: Washington, D.C. Campus with Data Center Table 87 show Commands Used in the Washington, D.C. Multicast Anycast-RP with Auto-RP Verification Test Command Step 7 Purpose show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip msdp peer • Verifies that MSDP peers are operational. show ip msdp sa-cache • Verifies that there is an SA cache entry for each source. Using the show commands listed in Table 88, verify that IGMP snooping is functioning correctly. IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that should receive it. Table 88 show Commands Used in the Washington, D.C. Multicast IGMP Snooping Verification Test Command Step 8 Purpose show ip igmp snooping • Verifies that IGMP snooping is globally enabled. show ip igmp snooping • Verifies that the correct multicast router has been learned. Using the show commands listed in Table 89, verify that multicast flows create MMLS entries, and that switching of the flow is performed using hardware shortcuts. Table 89 show Commands Used in the Washington, D.C. Multicast MMLS Verification Test Command Step 9 Purpose show mls ip multicast • Verifies that the flows are using the expected multicast forwarding entry, (*,G) or (S,G). show mls ip multicast summary • Verifies that the hardware-based flows are created where expected. Using the show commands listed in Table 90, verify that Auto-RP dynamically updates the RP information in every device in the network. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 103 Test Suite 3: Washington, D.C. Campus with Data Center Table 90 show Commands Used in the Washington, D.C. Multicast Auto-RP Verification Test Command show ip pim rp mapping Purpose • Verifies that all routers learn about RP mapping information. • Verifies that the correct RP mapping is shown for the specified group. • Verifies that the RP mapping information is consistent throughout the network. • Verifies that the traffic for the two Auto-RP groups (224.0.1.39 and 224.0.1.40) is dense mode. and show ip pim rp mapping in-use show ip mroute 224.0.1.39/40 Expected Results We expect the following results: • CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. • IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • Multicast forwarding is achieved using PIM. • Auto-RP dynamically updates the RP information in every device in the network. • Anycast RP information is distributed to the routers and none of the multicast groups reverts to dense mode. • Routers learn RP mapping information within the defined TTL number of hops and multicast flows are restrained in the TTL range. • RP messages are prevented from traveling beyond the boundaries of the network by using multicast boundaries. • The rate that a sender from the source list can send to a multicast group in the group list is appropriate. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 104 Test Suite 3: Washington, D.C. Campus with Data Center Results Table 91 shows the Washington, D.C. multicast test results. Table 91 Washington, D.C. Multicast Test Results Test Results Washington, D.C. multicast Passed Security This security test was conducted for the Washington, D.C. campus with data center. This test case verified the functionality of AAA and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. The objectives of the security test were as follows: • Verify TACACS+ services, authentication, authorization, and accounting, at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • AAA TACACS+ • Other security commands Test Plan Setup The procedure used to set up the Washington, D.C. security test follows: Step 1 Perform Step 2 through Step 7 to configure security features on the following devices: • egwas-7600-w1 • egwas-7600-w2 • egwas-7505-w3 • egwas-3660-v1 • egwas-6506-c1 • egwas-6506-msfc2 • egwas-6506-sd1 Step 2 Configure encryption service facility and AAA TACACS+. Step 3 Configure the time-stamping service facility for logging. Step 4 Disable all unnecessary services. Step 5 Configure an enable password. Step 6 Configure a console port password. Step 7 Configure a vty password. Verification The procedure used to perform the Washington, D.C. security verification test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 105 Test Suite 3: Washington, D.C. Campus with Data Center Step 1 Use the show tacacs command to verify the TACACS+ configuration values. Step 2 Use the show accounting command to verify the user account on the router and switch. Expected Results We expect the following results: • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 92 shows the Washington, D.C. security test results. Table 92 Washington, D.C. Security Test Results Test Results Washington, D.C. security Passed Voice The purpose of the voice test was to deploy and verify the VoIP deployment scenarios for large Enterprise customers that want to minimize the operations cost of telephony by utilizing IP telephony over traditional services. The overall objectives of the voice test case were as follows: • Verify that voice can be incorporated into the Washington, D.C. campus. • Verify the operation of the Cisco IOS release to test the AVVID and legacy voice interoperability. • Collect and document the test results. • Ensure that the system behaves as expected. Voice Testing The following features were configured for voice testing: • Legacy H.323 VoIP • SCCP Test Plan The voice test verified that voice traffic operated properly accross the network. There are several parts to this test plan, described in the sections that follow. Set Up Legacy H.323 The procedure used to set up the legacy H.323 voice test follows: Step 1 Configure H.323 voice gateway egwas-3640-v for T1 CAS and FXS. Step 2 Check that egwas-3640-v is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egwas-3640-v router. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 106 Test Suite 3: Washington, D.C. Campus with Data Center Step 3 Configure Callgen telephony. Set Up SCCP The procedure used to set up the SCCP voice test follows: Step 1 Configure T1 CAS and FXS SCCP voice gateways on the Catalyst 6506. Step 2 Configure inline power and real IP telephones on the Catalyst 6506. Step 3 Verify that the T1 CAS, the FXS, and all real or simulated IP telephones on the Catalyst 6506 appear and are registered in CallManager. Step 4 Configure Callgen SCCP to generate test traffic. Step 5 The WS-X6608-T1/E1 blade is used as a T1 or E1 gateway in egwas-6506-c2. It uses the Skinny protocol to communicate with the Cisco CallManager server to set up and tear down calls. Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. Step 6 The WS-X6624 is used in egwas-6506-c2 and has a single MAC address and a single IP address. The IP address, IP default gateway, and TFTP server address parameters can be configured manually or they can be configured dynamically from a DHCP server. This test uses manually configured (static) parameters. Step 7 Use the set port voice interface dhcp disable tftp gateway command to disable DHCP on a port and assign IP parameters manually. Voice Traffic Verification Test This test verified that incoming and outgoing voice traffic is handled properly on the network. In this test plan, no QoS features are configured and the network was free from traffic congestion. Test Plan The procedure use to perform the voice traffic verification test follows: Step 1 Configure an IP phone manually, install it in each campus, and make calls to test voice quality. Step 2 Start the bulk call traffic generators by performing the following steps: a. Start all BCG channels to San Jose (19 calls), Boston (3 calls), Dallas (6 calls), Miami (2 calls), and New York (2 calls). Note: Refer to the dial plan and voice design document. b. Using the show channel command on the Callgens, verify for 5 minutes that all originate and terminate BCG channels have started and are progressing correctly with no problems. Step 3 Verify for 5 minutes that all originate and terminate SimClient+ channels have started and are progressing correctly with no problems. Step 4 Analyze the output of the show commands listed in Table 93. Use the listed commands on all the WAN routers using the DART tool every 60 seconds for the show processes cpu command, and every 5 minutes for all the others—for a duration of 2 hours. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 107 Test Suite 3: Washington, D.C. Campus with Data Center Table 93 show Commands Used for the Washington, D.C. Voice Traffic Verification Test Command Purpose show clock • show interfaces [interface type] Verifies the current time. On all outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the rate will be dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 93 were used on the WAN routers and interfaces listed in Table 94. Table 94 Step 5 Washington, D.C. WAN Routers and Interfaces Router Interface egwas-7609-w1 ATM3/1/0, Serial3/0/0, POS4/1/0 egwas-7609-w2 Serial3/1/0/1, ATM3/0/0 egwas-7507-w3 Serial4/0/1:0, Serial4/0/0:0, ATM4/1/0.768 Stop the bulk call traffic generators and verify results by performing the following steps: a. Stop all BCGs after 1 hour of run time. b. Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels are functioning correctly without any significant errors. c. Capture the output statistics of Callgen by using CIC. d. Use Performance monitor to check real time the number of gateways and IP phones registered and CDR on the CallManager to also check the percentage of successful calls. Expected Results We expect the following results: • Voice traffic sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. Results Table 95 shows the voice traffic verification test results. Table 95 Washington, D.C. Voice Traffic Verification Test Results Test Results Washington, D.C. voice traffic verification Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 108 Test Suite 3: Washington, D.C. Campus with Data Center QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 ToS. QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. The following features were included in the test plan: • Classification and marking—Access lists, NBAR, Table maps, IP precedence, and DSCP • Congestion avoidance—dWRED (differentiated services-based WRED) • Congestion management—LLQ and dLLQ • Traffic conditioning—FRTS, GTS, and ATM Traffic Shaping • Link efficiency mechanisms—MLPPP LFI Test Plan The procedure used to perform the QoS setup test follows: Step 1 Step 2 Step 3 Define the access lists and traffic classes using the following guidelines: • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Lotus Notes and Oracle, into a class map called “Transactional.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Streaming” class. • Classify HTTP and FTP traffic into the “class-default” class, which is the class map for best-effort service. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure a policy map called "OUT-LAN-XX" on the core switches egwas-6506-sd1, egwas-6506-c1, and ewas-6506-c2. This configuration tests the LLQ feature of QoS. b. Configure a policy map called "OUT-WAN-XX" on intercampus WAN aggregation routers egwas-7600-w1 and egwas-7600-w2. This configuration tests the dWRED and LLQ features of QoS. c. Configure a policy map called "OUT-WAN-XX" on campus-remote WAN aggregation router egwas-7505-w3. This configuration tests the MLPP LFI and cRTP features of QoS. d. Configure a policy map called “OUT-LAN-XX” on the egwas-3660-v1 router. This configuration tests the access lists, port numbers, and DSCP features of QoS. Attach policy maps to the interfaces listed in Table 96, and apply the other appropriate QoS features. Table 96 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 109 Test Suite 3: Washington, D.C. Campus with Data Center Table 96 Routers, Policy Maps, and Interfaces for the Washington, D.C. QoS Setup Test Router Policy Map Interface egwas-7609-w1 OUT-LAN-GE Gi6/1, Gi6/2, Gi6/3 egwas-7609-w1 OUT-WAN-HW2 POS4/1/0 egwas-7609-w1 OUT-WAN-HW4 Serial3/0/0 egwas-6506-sd1 OUT-LAN-GE Gi1/1, Gi1/2 egwas-7609-w2 OUT-LAN-GE Gi6/1, Gi6/2, Gi6/3 egwas-6506-c1 OUT-LAN-GE Gi2/1,Gi2/2, Gi2/3, Gi2/4, Gi2/5 egwas-7507-w3 OUT-LAN-GE Gi0/0/0 egwas-7507-w3 OUT-WAN-DT6 Serial4/0/0 egwas-7507-w3 OUT-WAN-DT7 Serial4/0/1 egwas-3660-v1 OUT-LAN-FE F0/1 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • QoS features were configured and were functioning properly. Results Table 97 shows the QoS setup test results. Table 97 Washington, D.C. QoS Setup Test Results Test Results Washington, D.C. QoS setup Passed QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic was used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 110 Test Suite 3: Washington, D.C. Campus with Data Center Step 2 Analyze the output of the Cisco IOS show commands listed in Table 98. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 98 show Commands Used on the Washington, D.C. WAN Routers Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. The show commands listed in Table 98 were used on the Washington, D.C. WAN aggregation routers and interfaces listed in Table 99. Table 99 Step 3 Washington, D.C. WAN Aggregation Routers and Interfaces Router Interface egwas-7609-w1 ATM3/1/0, Serial3/0/0, POS4/1/0 egwas-7609-w2 Serial3/1/0/1, ATM3/0/0 egwas-7606-w3 Serial4/0/1:0, Serial4/0/0:0, ATM4/1/0.768 Use DART to capture the output of the Cisco IOS show commands listed in Table 100. Use the commands on the routers and switches listed in Table 99 and issue the commands once at the end of the two-hour test. Table 100 show Commands Used for the Washington, D.C. QoS Verification Test Command Purpose show class-map • Verifies that the class map configured for the device is displayed. show policy-map • Verifies that the policy map configured for the device is displayed. show access-lists verify • Verifies that the configured access lists have the correct amount of matching packets. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 111 Test Suite 3: Washington, D.C. Campus with Data Center Step 4 Capture the data statistics from the Chariot, IXIA, and Callgen testing tools after the 2-hour test referred to in Step 2 is completed. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch crashes, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 101 shows the Washington, D.C. QoS verification test results. Table 101 Washington, D.C. QoS Verification Test Results Test Results Washington, D.C. QoS verification Passed Washington, D.C. System Test The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into the Washington, D.C. campus. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test category verified system performance for a number of QoS features, using EIGRP and BGP as the routing protocols. The features that were configured for the Washington, D.C. functionality test were carried over to this test. The following additional features were configured in this test case: • Auto-RP RP select on scope • BGP MIB feature • BGP 4 • CBWFQ • Cisco-Process-MIB • CGMP • EIGRP • H.323 gateway trunk and carrier-based routing enhancements Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 112 Test Suite 3: Washington, D.C. Campus with Data Center • H.323/H.320 gateway • IGMP MIB support enhancements for SNMP • IGMP snooping querier • IGMP Version 2 • IP MMLS global threshold • MLPPP performance enhancements • MSDP • PIM MIB extension for IP multicast • PIM Version 2 • PQ • QoS—classification and WRED • QoS—policing and DSCP classification • QoS—packet marking • RFC1850 OSPFv2 MIB Support • RTP header compression • TACACS+ Test Plan The procedure used to perform the Washington, D.C. system test follows: Step 1 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 102 at the start and end of the 4-hour test. Table 102 show Commands Used for the Washington, D.C. System Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 113 Test Suite 3: Washington, D.C. Campus with Data Center Table 102 show Commands Used for the Washington, D.C. System Test Start and End View Command Step 4 Purpose show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 103 at 60-minute intervals. Table 103 show Commands Used for the Washington, D.C. System 60-Minute View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 114 Test Suite 3: Washington, D.C. Campus with Data Center Table 103 show Commands Used for the Washington, D.C. System 60-Minute View (continued) Command Step 5 Purpose show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy-maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 104 at 10-minute intervals. Table 104 show Commands Used for the Washington, D.C. System Test 10-Minute View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 105 shows the Washington, D.C. system test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 115 Test Suite 3: Washington, D.C. Campus with Data Center Table 105 Washington, D.C. System Test Results Test Results Washington, D.C. system Passed Washington, D.C. Reliability Test This section describes in detail the reliability test case as it pertains to the Washington, D.C. campus, using EIGRP as the interior routing protocol and BGP as the exterior routing protocol. Successful execution of the system test case is a prerequisite for the execution of this test. The reliability test ran continuously for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. The following additional features were configured in this test category: • Auto-RP RP select on scope • BGP MIB feature • BGP 4 • CBWFQ • MLPPP performance enhancements • CGMP • Cisco-Enhanced-Mempool-MIB • Cisco-Process-MIB • EIGRP • H.323 gateway trunk and carrier-based routing enhancements • H.323/H.320 gateway • IGMP MIB support enhancements for SNMP • IGMP snooping querier • IGMP Version 2 • IP MMLS global threshold • MSDP • PIM MIB extension for IP multicast • PIM Version 2 • PQ • QoS—classification and WRED • QoS—policing and DSCP classification • QoS—packet marking • RTP header compression • TACACS+ The objective of this test case was to verify that the software (at 100 percent traffic load capacity on each WAN link) performed reliably for the 150-hour test period. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 116 Test Suite 3: Washington, D.C. Campus with Data Center Test Plan The procedure used to perform the Washington, D.C. reliability test follows: Step 1 Start traffic streams for a 100 percent traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 150 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 106 at the start and end of the 150-hour test period. Table 106 show Commands Used for the Washington, D.C. Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 117 Test Suite 3: Washington, D.C. Campus with Data Center Table 106 show Commands Used for the Washington, D.C. Reliability Test Start and End View Command Step 4 Purpose show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 107 at 24-hour intervals. Table 107 show Commands Used for the Washington, D.C. Reliability Test 24-Hour View Command Step 5 Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 108 at 6-hour intervals. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 118 Test Suite 3: Washington, D.C. Campus with Data Center Table 108 show Command Used for the Washington, D.C. Reliability Test 6-Hour View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 109 shows the Washington, D.C. reliability test results. Table 109 Washington, D.C. Reliability Test Results Test Results Washington, D.C. reliability Passed with exceptions Passed with Exceptions Explanation The Washington, D.C. reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • About two-thirds into the test, 2 Chariot endpoint stations (EPs) failed due to problems with their network interface cards. The failures were with the Chariot EPs and did not reflect any problems in the network. The test results were not affected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 119 Test Suite 4: Denver Campus Test Suite 4: Denver Campus This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP QoS at the Denver campus. The Denver campus is one component of the larger global enterprise topology. The global enterprise topology comprises five multilayer-design campuses—two large campuses with data centers and three regional campuses—and 12 remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section of this document. In the test suite for the Denver campus, the following categories (or types) of testing were conducted: • Functionality testing: This test case verified basic IP functionality. The test involves Layer 2 protocols—VTP, VLAN trunking, Layer 3 protocol for EIGRP as the interior routing protocol and BGP as exterior routing protocol, SNMP, multicast, security, VoIP, QoS, Convergence, and Negative Testing. • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing: This test case verified system reliability. This test suite contains the following sections: • Topology Description, page 120 • Denver Functionality Test, page 123 • Denver System Test, page 146 • Denver Reliability Test, page 150 Topology Description The Enterprise Global Denver testbed represents one of the medium-size enterprise campuses in the North America region. The WAN aggregation routers connecting to the other enterprise global campuses and to the Internet consist of three Cisco 7206VXR NPE400 routers and a Cisco 7507 RSP8 router running ATM-T1/T3, P2P T1, HSSI, ATM/FR, or FR/FR links, with ISDN on a Cisco 2600 router as a backup. The campus also consists of a GE/FE backbone core layer and distribution layer comprised of four Catalyst 6506s, each with an MSFC2/PFC2. One Catalyst 6506, one Catalyst 4506, and one Catalyst 4003 make up the access layer. A Cisco 3640 router is used as a VoIP voice gateway and registers into the gatekeeper located at the San Jose headquarters, which places real VoIP calls to other gateways located at different campuses. The testbed is used to perform the test for functionality, which includes: IP routing, SNMP, multicast, security, VoIP, and QoS. EIGRP is the IP IGP routing protocol, and a total of approximately 10,000 routes will be injected by Pagent's route generator at various points in the topology. BGP is the IP EGP routing protocol for the ISP connection. Global application servers are located at this campus serving the other campuses and remote sites. The testbed simulates a large amount of end users by using traffic generators and real UNIX or Linux workstations. Applications such as voice, Telnet, Lotus Notes, Oracle, FTP, and HTTP are simulated by Callgen, Chariot, IXIA, and Pagent. IPTV is used to generate multicast traffic. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 120 Test Suite 4: Denver Campus Figure 10 shows the Denver campus topology with IP addresses. Washington, D.C. ATM Denver Campus Topology with IP Addresses egden-7206-w1 221.1.0.1/32 ATM OC3 .38 96.1.0.36 ISP 1 .9 egden-6506-c1 221.1.0.6/32 egden-6506-d1 221.1.0.8/32 221.1.14 221.1.1.0 96.1.0.8 HSSI .10 .2 (P2P) .46 96.1.0.44 Building 1 address range: 1.8.0.0/19 1.9.0.0/19 1.10.0.0/19 221.1.8.0/21 .5 .1 San Jose Submask: Loopback, 32 bits P2P, 30 bits PC, 24 bits .21 221.1.18 den-pc1 1.8.0.100 egden-6506-a1 den-ux1 1.9.0.100 .6 .13 221.1.1.12 .14 .17 .26 egden-7206-w2 221.1.0.2/32 221.1.1.16 221.1.1.20 .22 .1 221.1.4.0 .9 den-pc2 1.10.0.100 .2 .6 .13 .38 .45 221.1.48 221.1.1.44 221.1.4.12 egden-3640-v1 221.1.44 221.1.0.5/32 128 221.1.1.24 Colorado Springs .10 .46 .14 Phoenix egden-7206-w3 .10 .5 .18 1.215.240.0 221.1.0.3/32 Santa Fe .25 .1 221.1.4.16 .30 ISDN .29 221.1.1.28 .18 .17 .5 .42 .33 128 egden-6506-c2 egden-6506-d2 221.1.1.36 Col. Springs 221.1.1.32 221.1.0.7/32 221.1.0.9/32 128 221.1.1.40 Santa Fe 1.215.240.4 .34 .37 .1 1.207.240.0 .5 1.207.240.4 ATM/FR .41 .9 1.207.248.8 .1 egden-7507-w4 221.1.0.4/32 New Orleans 1.199.2480 128 Houston L.A. 384 egden-4003-a2 den-ux2 221.1.8.100 egden-4506-a3 ISDN BRI ISDN PRI T1 (P2P) GE FE den-pc3 1.8.1.100 den-ux3 1.9.1.100 98809 Figure 10 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 121 Test Suite 4: Denver Campus Figure 11 shows the Denver campus topology with interface types. Figure 11 Denver Campus Topology with Interface Types den-pc1 Washington, D.C. egden-7206-w1 ATM OC3 a4/0 ATM g2/0 fa1/0 fa3/0 San Jose fa4/14 egden-6506-a1 egden-6506-c1 HSSI (P2P) h3/0 g2/0 fa1/0 egden-7206-w2 g3/3 g3/9 g3/7 g3/1 den-ux1 g1/2 g3/9 fa4/14 g3/5 fa4/0 den-pc2 g3/3 g3/1 g3/5 g3/11 fa1/0 fa4/16 g1/1 g3/7 fa0/0 s6/0-2 ISP 1 egden-6506-d1 g3/11 egden-4003-a2 fa3/14 g3/1 128 Colorado Springs Santa Fe egden-3640-v1 g3/2 fa4/14 Phoenix egden-7206-w3 fa1/0 s3/0:0 g2/0 fa4/16 g3/1 g3/5 g3/3 g3/1 fa4/1/0 g3/7 g3/5 g3/3 s5/0/0:0 New Orleans 128 g3/11 g3/1 egden-6506-c2 egden-6506-d2 fa3/14 g3/2 fa3/16 egden-4506-a3 g0/00 a5/1/0 ATM/FR den-pc3 g3/9 fa0/0 128 Col. Springs 128 Santa Fe den-pc2 g3/7 g3/9 ISDN a5/0 fa3/16 ISDN BRI ISDN PRI T1 (P2P) GE FE g1/00 egden-7507-w4 L.A. 98810 Houston 384 den-pc3 Platform and Software Version Information Table 110 lists the platforms, router names, software versions, and software images configured in the Denver network topology for this test suite. Table 110 Denver Platform, Router Name, Software Version, and Software Image Table Platform Router Name Software Version Software Image Cisco 7206VXR egden-7206-w1 12.2(16b) c7200-js-mz.122-16b Cisco 7206VXR egden-7206-w2 12.2(16b) c7200-js-mz.122-16b Cisco 7206VXR egden-7206-w3 12.2(16b) c7200-js-mz.122-16b Cisco 7507 egden-7507-w4 12.2(15)T5 rsp-jsv-mz.122-15.T5 Cisco 3640 egden-3640-v1 12.2(16b) c3640-a3js-mz.122-16b Cisco 2621 egden-2600-isdn 12.2(16b) c2600-js-mz.122-16b 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 MSFC egden-6506-c1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 122 Test Suite 4: Denver Campus Table 110 Denver Platform, Router Name, Software Version, and Software Image Table (continued) Platform Router Name Software Version Software Image Catalyst 6500 MSFC egden-6506-c2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 MSFC egden-6506-d1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 MSFC egden-6506-d2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egden-6506-a1 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 4000 egden-4003-a2 7.6(1) cat4000-k8.7-6-1 Catalyst 4500 egden-4506-a3 12.1(13)EW2 cat4000-is-mz.121-13.EW2 Denver Functionality Test This is the functionality test case for the Cisco IOS nEverest Enterprise Global project as it pertains to the Denver campus. The test involves basic IP testing (Layer 2 protocols, such as STP and VLAN trunking, and Layer 3 protocols, such as HSRP, EIGRP for the interior routing protocol, and BGP for the exterior routing protocol.), network management testing, multicast testing, security testing, voice testing, and QoS testing. The functionality test case verified basic IP functionality. The tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS The testing in each section was performed sequentially and as independently as possible. The Denver functionality testing was conducted as follows: 1. Basic IP testing was performed in conjunction with Network Management Testing (NMS). Network Management was utilized to collect the test information. 2. After completion of the basic IP test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 3. Multicast testing was performed, again with NMS monitoring. 4. After completion of the multicast test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 5. Security testing was performed in conjunction with NMS monitoring. 6. After completion of the security test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 7. Voice testing was performed in conjunction with NMS monitoring. 8. After completion of the voice test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 9. QoS testing was performed in conjunction with NMS monitoring. 10. After completion of the QoS test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 123 Test Suite 4: Denver Campus Basic IP The objectives for this test case were as follows: • Verify the basic network operation (that is, network connectivity). • Verify that the routing protocol features can be incorporated into the Denver campus. • Verify that the major IP routing features work as expected. In this test case, the following individual tests were conducted: • Layer 2 Protocols and HSRP • EIGRP with BGP routing test Layer 2 Protocols and HSRP This test involved testing various Layer 2 protocols and HSRP. The following features were included in the test plan: • VTP and VLAN • VLAN trunking • STP • HSRP Test Plan The procedure used to perform the Layer 2 protocols and HSRP test follows: Step 1 Set up the VLANs. The access switch VLAN model is model number 1, “share VLANs across Access Layer switches,” for this campus. Each building is in a separate VTP domain. The two distribution layer routers work in VTP server mode, and all access layer switches work in VTP transparent mode. VLAN 1 is for control traffic on all switches by default. VLAN 2 is for a backdoor network connection, configured only on the access layer switches. VLANs 11 to 20 are used for end-user networks that are configured across all access layer switches and the distribution layer routers. VLANs 21 to 110 are used to generate routes, which are configured only on distribution layer routers. Step 2 Use the CatOS show vlan command, the CatOS show vtp domain command, and the Cisco IOS show vtp status command to verify the VTP and VLAN configuration. Step 3 Set up VLAN trunking. All links between switches are L2 dot1q trunking. The trunk mode is desirable/desirable. Step 4 Use the Cisco Native IOS show interface trunk command and the CatOS show trunk command to verify that the VLAN trunks are formed correctly. Step 5 Set up the STP feature (root placement). Enable portfast on all ports of the access layer switches. Enable uplinkfast on all access layer switches. Use the Cisco IOS show spanning-tree root command to verify that the spanning tree roots are on the distribution layer routers. The left distribution layer router in a building block is the primary root for all odd-numbered VLANs and the secondary root for all even-numbered VLANs. The right distribution router in a building block is the primary root for all even-numbered VLANs and the secondary root for all odd-numbered VLANs. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 124 Test Suite 4: Denver Campus Step 6 Step 7 Step 8 Set up HSRP. The left distribution layer router serves as the HSRP active group for all odd-numbered VLANs. The right distribution layer router serves as the HSRP active group for all even-numbered VLANs. a. Enable the HSRP interface track feature so that if both uplinks from any distribution layer router to the core go down, then the HSRP active group will fail over to the other distribution layer router. b. Use HSRP preempt to ensure that the high-priority group is the active group. c. Set HSRP active group and STP root consistently to keep symmetry between Layer 2 and Layer 3. Layer 2 and Layer 3 load balancing are per VLAN and are done through STP and HSRP. Use the Cisco IOS show standby brief command every 5 minutes to verify that each distribution layer router is the active HSRP router for half of the VLANs (either the even-numbered VLANs or the odd-numbered VLANs). The expected output should show the following: • The HSRP state is either active or standby. • The proper router is active for the appropriate HSRP groups (the left router should be active for odd-numbered groups, the right router should be active for even-numbered groups). • HSRP priority is either 110 or 95 respective to the active or standby state. • The router sees other HSRP routers for the VLAN. • HSRP group numbers are unique per switched domain. • The HSRP group address is correct. Conduct a negative test of STP and HSRP by performing the following steps: a. Shut down any one of the distribution routers in the same building and use the Cisco IOS show spanning-tree root command to verify that the spanning tree root changed to the active distribution layer router in the building. b. Use the show standby brief command to verify that the HSRP secondary router takes over the active state for all the VLANs. The expected output should show the following: • The HSRP state is either active or standby. • The proper router is active for the appropriate HSRP groups (the left router should be active for odd-numbered groups, the right router should be active for even-numbered groups). • HSRP priority is either 110 or 95 respective to the active or standby state. • The router sees other HSRP routers for the VLAN. • HSRP group numbers are unique per switched domain. • The HSRP group address is correct. c. Disconnect (unplug) both uplinks from one distribution layer router to the core layer in the building and use the Cisco IOS show standby brief command to verify that the HSRP active group will fail over to another distribution layer router. d. Recover the uplinks, then use the show standby brief command to verify that the HSRP active group will switch back. The expected output should show the following: • The HSRP state is either active or standby. • The proper router is active for the appropriate HSRP groups (the left router should be active for odd-numbered groups, the right router should be active for even-numbered groups). • HSRP priority is either 110 or 95 respective to the active or standby state. • The router sees other HSRP routers for the VLAN. • HSRP group numbers are unique per switched domain. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 125 Test Suite 4: Denver Campus • The HSRP group address is correct. Expected Results We expect the following results: • The VTP and VLAN configuration will work correctly. • The spanning tree roots on the distribution switches work correctly. • Each distribution switch is an active HSRP route for half of the VLANs (either the even-numbered VLANs or the odd-numbered VLANs). • During negative testing of STP and HSRP, the HSRP secondary router takes over the active state for all VLANs. • The HSRP active group switches back correctly. Results Table 111 shows the Denver Layer 2 protocols and HSRP test results. Table 111 Denver Layer 2 Protocols and HSRP Test Results Test Results Denver Layer 2 protocols and HSRP Passed EIGRP with BGP Routing This test involved testing EIGRP with BGP routing. The following features were included in the test plan: • Route summarization • Route filtering • EIGRP stub router functionality • Route redistribution and default route generation • Log event or change functionality • BGP policy control (specifically, autonomous system [AS] prepend and route filtering) • EIGRP metric tuning—link delay and bandwidth Test Plan This test verified route summarization, route filtering, route redistribution, EIGRP stub router functionality, route redistribution and default route generation, log event or change functionality, BGP policy control, and EIGRP metric tuning. Several parts to this test plan are described in the sections that follow. Route Summarization and Filtering Test The procedure used to perform the route summarization and filtering test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 126 Test Suite 4: Denver Campus Step 1 Turn off EIGRP auto-summary on all EIGRP-enabled routers. Route summarization is manually done on the following devices: a. On campus core layer routers egden-6506-c1 and egden-6506-c2, end-user networks from the buildings will be summarized into /20 and /21 routes. The devices’ interconnectivity network and loopback interface routes within the whole campus including data center are summarized into one /21 route. b. On campus WAN aggregation routers egden-7206-w1 and egden-7206-w2, the summarized routes are redistributed into BGP and advertised to BGP neighbors. Inter-campus WAN connectivity network routes are summarized, by the sourcing campus, into one /21 route and advertised into the local campus. Intercampus eBGP connections are sourced and destined to the respective loopback interfaces on the routers. iBGP is configured between WAN Aggregation routers' respective loopback interfaces. c. Disable EIGRP (passive-interface) on the WAN links to the other major campuses. Other campus routes learned by BGP are redistributed into EIGRP with varying metrics to ensure that the core layer routers select the best intercampus route. d. On campus distribution layer routers egden-6506-d1 and egden-6506-d2, building routes are summarized to /21 and /20 routes and subsequently advertised to the connected core layer routers. e. On campus WAN aggregation routers egden-7206-w3 and egden-7507-w4, all remote site WAN links routes in remote group 1 are summarized into one /21 route. The summary route is then advertised by the WAN aggregation router to the campus core layer routers. Summarized local campus routes and the default route are advertised to the remote sites by the WAN aggregation router. Filtration may use tag matching using route maps. The remote site branch router has the same local campus route summarization schema as the campus WAN aggregation routers mentioned earlier. Step 2 Configure a distribution list on the core layer routers egden-6506-c1 and egden-6506-c2 to allow only local campus routes and default routes to be advertised to the distribution layer routers. Step 3 Configure a distribution list on the WAN aggregation routers egden-7206-w3 and egden-7507-w4 to allow only local campus summarized routes and the default route to be advertised to the remote sites. As an alternative, configure a route map to permit routes matching local campus tags to be advertised to the remote sites. Step 4 Configure all the building and data center distribution layer routers and voice routers as EIGRP stub routers, so that the EIGRP queries do not propagate to the distribution layer routers or the voice routers. Route Redistribution and Default Route Generation Test The procedure used to perform the route redistribution and default route generation test follows: Step 1 Configure BGP and EIGRP routing on the campus WAN aggregation routers egden-7206-w1 and egden-7206-w2. BGP will receive ISP advertised routes in addition to intercampus routes. Step 2 Redistribute BGP into EIGRP and permit only the intercampus routes to be tagged and redistributed into EIGRP. A static default route is created by the router connected to the ISP and advertised into the whole EIGRP AS and will be permitted into the remote sites. Redistribute untagged EIGRP routes into BGP. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 127 Test Suite 4: Denver Campus A backup static default route will be advertised by the secondary ISP-connected router, using a floating static route. The default route will not be advertised by BGP. Varying metrics will be applied to the routes being redistributed based on the number of BGP ASs that the intercampus route learned. BGP Policy Control Test The procedure used to perform the BGP policy control test follows: Step 1 Configure logging of changes on all the EIGRP- and BGP-enabled routers by using the Cisco IOS eigrp log-neighbor-changes command and the bgp log-neighbor-changes command. The BGP AS 64504 is the AS used for all Denver campus AS border routers. All BGP routes are accepted on the BGP routers. Step 2 Configure egden-7206-w2 for route filtering. This default route is redistributed into EIGRP for the connection to the ISP. Step 3 Configure the egden-7206-w2 BGP policy so that the traffic from the ISP destined for the local campus prefixes gets high priority (by using AS prepending) to the advertised prefixes of the nonlocal campuses. All intercampus routes will be advertised to the ISP, but the AS will be prepended three times. EIGRP Metric Tuning Test The procedure used to perform the EIGRP metric tuning test follows: Step 1 Tune the switch virtual interface (SVI) delay on the distribution layer routers to enable symmetric routing for the building end-user networks. On the left distribution layer router (the HSRP primary group for all the odd-numbered VLANs), change the SVI delay on the even-numbered VLAN interface from 10 microseconds to 50 microseconds. This configuration enables the left distribution layer router to advertise a less desirable routing metric to the core layer routers for all the even-numbered VLAN interfaces. Similarly configure the right distribution layer router. Step 2 Configure all the SVI interfaces on the distribution layer routers as EIGRP passive interfaces, so that an EIGRP neighbor will not be created between two distribution layer routers. Step 3 Configure the Cisco IOS no peer neighbor-route command for all the encapsulated PPP WAN interfaces to avoid suboptimal routing for these WAN interface routes. The interfaces are as follows: • Interface h3/0 on egden-7206-w2 • Interface s3/0:0 on egden-7206-w3 • Interface s5/0/0:0 on egden-7507-w4 Step 4 Apply MD5 hashed authentication to all WAN links running EIGRP, provided the authentication configuration passes a test bed configuration test, is configurable, neighbors are formed, and minimal routes are advertised. Step 5 Enable BGP route dampening on neighbor relationships between the ISP and intercampus neighbors. Step 6 Analyze the output of the Cisco IOS show commands listed in Table 112, which lists each show command and the role it plays in the Denver EIGRP with BGP routing test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 128 Test Suite 4: Denver Campus Table 112 show Commands Used in the Denver EIGRP with BGP Routing Test Command Purpose show ip route On all routers: and • Verifies that the routes are summarized as expected. • Verifies that the route filters work as expected. • Verifies that the default route is generated as expected. show ip route summary show ip route On the core layer and distribution layer routers: • show processes cpu show memory summary show logging show ip bgp and Verifies the symmetric routing for the building end-user networks. On all routers every 10 minutes: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. On all routers every 60 minutes: • Verifies that there are no memory leaks or other memory errors. • Verifies that there are no significant errors for EIGRP or BGP routing. On egden-7206-w2 • Verifies that BGP routing is working correctly. show ip bgp summary show ip bgp On the ISP routers: and • Verifies BGP AS prepending policy control. show ip route and Note ping show interfaces [interface type] show ip eigrp neighbors detail The show ip bgp command in this phase of testing will be a verbose output (at least 50,000 lines long), so only two captures (beginning and end) of this command output should be collected. On all the WAN routers: • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. On the core layer routers egden-6506-c1 and egden-6506-c2: • Verifies that the distribution layer routers are EIGRP stub-enabled. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 129 Test Suite 4: Denver Campus Table 112 show Commands Used in the Denver EIGRP with BGP Routing Test (continued) Command Purpose show ip eigrp neighbors On the distribution layer routers: show ip route [interface name] • Verifies that the EIGRP neighbor was not created between two distribution layer routers. • Verifies that specific WAN interface routes are not in the routing table. Expected Results We expect the following results: • The routes are summarized correctly. • The route filters function correctly. • CPU utilization is less than 90 percent. • Memory consumption is stable. • The distribution layer routers are EIGRP stub-enabled. • The default route is generated correctly. • The BGP AS prepending policy control is enabled on the ISP routers. • There are no significant EIGRP or BGP routing errors and the link delay and bandwidth have been tuned correctly. • BGP route filtering functions correctly. • The EIGRP neighbor was not created between two distribution layer routers. • The routing table displays the appropriate routes. Results Table 113 shows the Denver EIGRP with BGP routing test results. Table 113 Denver EIGRP with BGP Routing Test Results Test Results Denver EIGRP with BGP routing Passed Network Management This section describes the network management testing in the Denver campus. The following features were included in the test plan: • MIB walk automation script (snmp_walk_test) and traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 130 Test Suite 4: Denver Campus Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB walk and traps. The MIB walk automation script (snmp_walk_test) will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the snmp_walk_test script will work properly. Step 3 Upload the following MIBs to the snmp_walk_test script: • Basic IP: – CISCO-PROCESS-MIB – OLD-CISCO-INTERFACE-MIB – OLD-CISCO-ENV-MIB – CISCO-BGP4-MIB • Multicast: – CISCO-IPMROUTE-MIB.my – CISCO-IGMP-MIB.my – CISCO-MSDP-MIB.my – CISCO-PIM-MIB.my • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB.my • QoS: – CISCO-CLASS-BASED-QOS-MIB-CAPABILITY.my – CISCO-CLASS-BASED-QOS-MIB.my – CISCO-PORT-QOS-MIB.my – CISCO-QOS-POLICY-CONFIG-MIB.my Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command and the CatOS show time command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send e-mail notification for error conditions on the routers or switches. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 131 Test Suite 4: Denver Campus Step 11 Use the show log command or the show align command to verify that there are no other significant errors. Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 114 shows the Denver network management test results. Table 114 Denver Network Management Test Results Test Results Denver network management Passed Multicast The objective of the Denver campus multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • IGMP-v2 • IGMP snooping • MMLS • MDS • PIM sparse-dense mode The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV clients to switch egden-6506-a1. c. Configure the IP/TV server to stream two programs as follows: • The program “G1” contains a 239.192.1.0/24 multicast address scope and consists of a 600-kbps video and audio stream. The IP/TV clients at all campuses and remote sites will receive this program. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 132 Test Suite 4: Denver Campus • The program “G2” contains a 239.192.2.0/24 multicast address scope and consists of a 300-kbps video and audio stream. Step 2 Enable IGMP-v2. This feature is enabled by default in Native IOS and Cisco IOS software, so no additional configuration is required. Step 3 Enable IGMP snooping on the following Denver campus Layer 2 access switch egden-6506-a1. Step 4 Enable MMLS. This feature is enabled by default in Native IOS, so no additional configuration is required. Step 5 Enable MDS on router egden-7505-w4. Step 6 Enable PIM sparse-dense mode on all Layer 3 Native IOS and Cisco IOS multicast devices in the Denver campus. Verification The procedure used to perform the multicast verification test follows: Step 1 Use DART to capture the output of the generic show commands listed in Table 115. Table 115 Generic show Commands Used in the Denver Multicast Verification Test Command Purpose • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show buffer failure • Verifies a buffer or memory failure. show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. • Verifies that there are no other significant errors. show processes cpu show logging Step 2 Using the show commands listed in Table 116, verify that CGMP is communicated among routers and switches to dynamically join or leave a multicast group on a LAN segment. Table 116 show Commands Used in the Denver Multicast CGMP Verification Test Command Purpose show cgmp statistics • Displays the CGMP statistics. show cgmp leave • Verifies the status of the CGMP leave feature. show multicast router • Displays the ports that have IGMP- or RGMP-capable routers assigned to them. show multicast group • Verifies the multicast group information. show multicast group cgmp • Displays the multicast group configuration information learned via CGMP. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 133 Test Suite 4: Denver Campus Step 3 Using the show commands listed in Table 117, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. In addition, verify the following: • The router with the lower IP address is the correct IGMP querier. • The router installs group members upon receipt of IGMP join messages. • All groups are seen for all IGMP joined groups. • The router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Table 117 show Commands Used in the Denver Multicast IGMPv2 Verification Test Command Step 4 Purpose show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. Using the show commands listed in Table 118, verify that IGMP snooping functions as follows: • IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. Table 118 show Commands Used in the Denver Multicast IGMP Snooping Verification Test Command Purpose show igmp statistics On Layer 2 switches: • show multicast group igmp On Layer 2 switches: • show multicast group count igmp Verifies the multicast group configuration information learned via IGMP. On Layer 2 switches: • show ip igmp interface Verifies the IGMP statistics for a particular VLAN. Verifies the total count of multicast addresses (groups) in a VLAN learned via IGMP. On Layer 3 switches: • Verifies that IGMP snooping is globally enabled. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 134 Test Suite 4: Denver Campus Table 118 show Commands Used in the Denver Multicast IGMP Snooping Verification Test Command Purpose show ip igmp snooping mrouter On Layer 3 switches: • show mac-address-table multicast vlan-id On Layer 3 switches: • Step 5 Verifies that the correct multicast addresses are present in the output. Using the show commands listed in Table 119, verify that MMLS functions as follows: • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts. In the Catalyst 6500s, the flows are taking the correct paths. • The flows are using the expected multicast forwarding entry (*,G) or (S,G). • Hardware-based flows are created where expected. • Identify the lowest rate of the traffic flow at which a hardware shortcut is created. • CPU utilization does not increase. If it does, then there is a possibility that flows are being software switched. • On DFC cards, forwarding tables on line cards are the same as on the processor card. Table 119 show Commands Used in the Denver Multicast MMLS Verification Test Command Step 6 Verifies that the correct multicast router has been learned. Purpose show mls ip multicast summary • Verifies that hardware-based flows are created where expected. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show mls ip multicast group • Displays multilayer IP multicast group information. show mls ip multicast source • Displays the MLS IP information for a specific destination IP address. show mls ip multicast interface • Displays the MLS IP information for a specific interface. show mls ip multicast statistics • Displays the statistics for the MLS IP multicast entries. Using the show commands listed in Table 120, verify that MDS functions as follows: • The VIP interfaces on Cisco 7500 routers are MDS-enabled. • Multicast distributed switching is enabled. • Multicast traffic is distributed-switched. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 135 Test Suite 4: Denver Campus Table 120 show Commands Used in the Denver Multicast MDS Verification Test Command Step 7 Purpose show ip mds interface • Verifies the status of MDS interfaces. show ip pim interface detail • Displays detailed information about each interface configured for PIM. show ip mds forwarding • Verifies the MFIB table and forwarding information for multicast distributed switching (MDS). show ip mds summary • Displays a summary of the MFIB table for MDS. Using the show commands listed in Table 121, verify that PIM sparse-dense mode functions as follows: • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Table 121 show Commands Used in the Denver Multicast PIM Sparse-Dense-Mode Verification Test Command Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 136 Test Suite 4: Denver Campus Expected Results We expect the following results: • IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • Multicast forwarding is achieved using PIM. • The rate that a sender from the source list can send to a multicast group in the group list is appropriate. Results Table 122 shows the Denver multicast test results. Table 122 Denver Multicast Test Results Test Results Denver multicast Passed Security This security test was conducted for the Denver campus. This test case verified the functionality of AAA and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. The objectives of the security test were as follows: • Verify TACACS+ AAA services at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • AAA TACACS+ • Other Security commands Test Plan Setup The procedure used to set up the Denver security test follows: Step 1 Configure encryption service facility and AAA TACACS+. Step 2 Configure the time-stamping service facility for logging. Step 3 Disable all unnecessary services. Step 4 Configure an enable password. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 137 Test Suite 4: Denver Campus Step 5 Configure a console port password. Step 6 Configure a vty password. Verification The procedure used to perform the Denver security verification test follows: Step 1 Use the show tacacs command to verify the TACACS+ configuration values. Step 2 Use the show accounting command to verify the user account on the router and switch. Expected Results We expect the following results: • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 123 shows the Denver security test results. Table 123 Denver Security Test Results Test Results Denver security Passed Voice The purpose of the voice test was to deploy and verify the VoIP deployment scenarios for large Enterprise customers that want to minimize the operations cost of telephony by utilizing IP telephony over traditional services. The overall objectives of the voice test case were as follows: • Verify that voice can be incorporated into the Denver campus. • Verify the operation of the Cisco IOS release to test the AVVID and legacy voice interoperability. • Collect and document the test results. • Ensure that the system behaves as expected. Voice Testing The following features were configured for voice testing: • Legacy H.323 VoIP • SCCP Test Plan The voice test verified that voice traffic operated properly across the network. There are several parts to this test plan, described in the sections that follow. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 138 Test Suite 4: Denver Campus Set Up Legacy H.323 The procedure used to set up the legacy H.323 voice test follows: Step 1 Configure voice gateway egden-3640-v1 for H.323. Step 2 Check that egden-3640-v1 is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egden-3640-v1 router. Step 3 Configure Callgen telephony. Step 4 Configure the BCG to generate traffic. Set Up SCCP The procedure used to set up the SCCP voice test follows: Step 1 Configure T1 CAS and FXS SCCP voice gateways on the Catalyst 4506. Step 2 Configure inline power and real IP telephones on the Catalyst 4506 Step 3 Verify that the T1 CAS, the FXS, any transcoding devices, and all real or simulated IP telephones on the Catalyst 4506 appear and are registered in CallManager. Step 4 Configure Callgen SCCP to generate test traffic. Step 5 Enable IP telephony gateway mode for the Catalyst the 4506. Step 6 Enable IP telephony transcoding service. Voice Traffic Verification Test This test verified that incoming and outgoing voice traffic is handled properly on the network. In this test plan, no QoS features are configured and the network was free from traffic congestion. Test Plan The procedure use to perform the voice traffic verification test follows: Step 1 Configure an IP phone manually, install it in each campus, and make calls to test voice quality. Step 2 Start the bulk call traffic generators by performing the following steps: a. Start all BCG channels to San Jose (3 calls), Phoenix (8 calls), New Orleans (1 call), and Colorado Springs (1 call). Note: Refer to the dial plan and voice design document. b. Using the show channel command on the Callgens, verify for 5 minutes that all originate and terminate BCG channels have started and are progressing correctly with no problems. Step 3 Verify for 5 minutes that all originate and terminate Callgen SCCP channels have started and are progressing correctly with no problems. Step 4 Analyze the output of the show commands listed in Table 124. Use the listed commands on all the WAN routers using the DART tool every 60 seconds for the show processes cpu command, and every 5 minutes for all the others—for a duration of 2 hours. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 139 Test Suite 4: Denver Campus Table 124 show Commands Used for the Denver Voice Traffic Verification Test Command Purpose show clock • show interfaces [interface type] Verifies the current time. On all outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the rate will be dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 124 were used on the WAN routers and interfaces listed in Table 125. Table 125 Step 5 Denver WAN Aggregation Routers and Interfaces Router Interface egden-7206-w2 HSSI3/0 egden-7206-w3 Serial3/0:0, ATM5/0.127 egden-7507-w4 ATM5/1/0 Stop the bulk call traffic generators and verify results by performing the following steps: a. Stop all BCGs after 1 hour of run time. b. Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels are functioning correctly without any significant errors. c. Capture the BCG output statistics by using the show channel command in the BCG. Expected Results We expect the following results: • Voice traffic sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. Results Table 126 shows the voice traffic verification test results. Table 126 Denver Voice Traffic Verification Test Results Test Results Denver voice traffic verification Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 140 Test Suite 4: Denver Campus QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 QoS. QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. The following features were included in the test plan: • Classification and marking—ACLs, NBAR (remote campuses only), Table Maps, IP Precedence, and DSCP • Congestion avoidance—dWRED (differentiated services-based WRED) • Congestion management—LLQ and dLLQ • Traffic conditioning—FRTS and ATM Traffic Shaping • Link efficiency mechanisms—MLPPP LF, cRTP, dcRTP, FRF.12 Test Plan The procedure used to perform the QoS setup test follows: Step 1 Step 2 Step 3 Configure L2 CoS to L3 QoS remarking on the following access layer switches: • egden-6505-a1 • egden-4003-a2 • egden-4507-a3 Define the access lists and traffic classes using the following guidelines: • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Lotus Notes and Oracle, into a class map called “Transactional.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Streaming” class. • Classify HTTP and FTP traffic into the “class-default” class, which is the class map for best-effort service. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure a policy map called "OUT-LAN-GE" on distribution layer switches egden-6506-d1 and egden-6504-d2. This configuration tests the DSCP feature. b. Configure a policy map called "OUT-LAN-XXX" on the core switches egden-6506-C1 and egden-6506-C2. This configuration tests the LLQ feature of QoS. c. Configure a policy map called "OUT-WAN-XXX" on intercampus WAN aggregation routers egden-7206-w1 and egden-7206-w2. This configuration tests the dWRED and LLQ features of QoS. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 141 Test Suite 4: Denver Campus Step 4 d. Configure a policy map called "OUT-WAN-XXX" on campus-remote WAN aggregation router egden-7507-w4. This configuration tests the MLP interleaving, cRTP, FRTS, dTS, and ATM shaping features of QoS. e. Configure a policy map called “OUT-LAN-FE” on the egden-3640-v1 router. This configuration tests the ACLs, port numbers, and DSCP features of QoS. Attach policy maps to the interfaces listed in Table 127, and apply the other appropriate QoS features. Table 127 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). Table 127 Routers, Policy Maps, and Interfaces for the Denver QoS Setup Test Router Policy Map Interface egden-7206-w1 OUT-LAN-FE Fa1/0, Fa2/0, Fa3/0 egden-7206-w2 OUT-WAN-HSSI Hssi 3/0 egden-7206-w2 OUT-LAN-FE Fa0/0, Fa1/0, Fa2/0 egden-7206-w3 OUT-WAN-T1 Serial3/0:0 egden-7206-w3 OUT-WAN-128K Virtual-Template 20, Virtual-Template 21 egden-7206-w3 OUT-LAN-GE Gi2/0 egden-7206-w3 OUT-LAN-FE Fa0/0, Fa1/0 egden-7507-w4 OUT-WAN-T1 Serial5/0/0:0 egden-7206-w4 OUT-LAN-GE Gi0/0/0, Gi1/0/0 egden-7206-w4 OUT-LAN-FE Fa4/1/0 egden-7507-w4 OUT-WAN-128K Serial5/0/1:1 egden-6506-d1 OUT-LAN-GE Gi3/1, Gi3/3 egden-6506-d2 OUT-LAN-GE Gi3/1, Gi3/3 egden-6506-c1 OUT-LAN-GE Gi3/3, Gi3/5, Gi3/11 egden-6506-c1 OUT-LAN-FE Fa4/14, Fa4/25, Fa4/26 egden-6506-c2 OUT-LAN-GE Gi3/1, Gi3/3, Gi3/5, Gi3/7, Gi3/9 egden-6506-c2 OUT-LAN-FE Fa4/14, Fa4/16, Fa4/47 egden-3640-v1 OUT-LAN-FE Fa1/0 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • QoS features were configured and were functioning properly. Results Table 128 shows the QoS setup test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 142 Test Suite 4: Denver Campus Table 128 Denver QoS Setup Test Results Test Results Denver QoS setup Passed QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic was used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Step 2 Use DART to capture the output of the Cisco IOS show commands listed in Table 129 and analyze the output of those commands. Use the commands on the WAN aggregation routers listed in Table 130. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 129 show Commands Used on the Denver WAN Aggregation Routers Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. The show commands listed in Table 129 were used on the Denver WAN aggregation routers and interfaces listed in Table 130. Table 130 Denver WAN Aggregation Routers and Interfaces Router Interface egden-7206-w2 Hssi3/0 egden-7206-w3 Serial3/0:0, Virtual-Template 20, Virtual-Template 21 egden-7507-w4 Serial5/0/0:0, Serial5/0/1:1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 143 Test Suite 4: Denver Campus Step 3 Use DART to capture the output of the Cisco IOS show commands listed in Table 131 and analyze the output of those commands. Use the commands on the core layer switches listed in Table 132. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 131 show Commands Used on the Denver Core Layer Switches Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. The show commands listed in Table 131 were used on the Denver core layer switches and interfaces listed in Table 132. Table 132 Step 4 Denver Core Layer Switches and Interfaces Switch Interface egden 6506-c1 Gi3/1, Gi3/3, and Gi3/5 egden 6506-c2 Gi3/1, Gi3/3, and Gi3/5 Use DART to capture the output of the Cisco IOS show commands listed in Table 133 and analyze the output of those commands. Use the commands on the distribution layer switches listed in Table 134. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 133 show Commands Used on the Denver Distribution Layer Switches Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 144 Test Suite 4: Denver Campus The show commands listed in Table 133 were used on the Denver distribution layer switches and interfaces listed in Table 134. Table 134 Step 5 Denver Distribution Layer Switches and Interfaces Switch Interface egden 6506-d1 Gi3/5, Gi3/7, Gi3/9, and Gi3/11 egden 6506-d2 Gi3/5, Gi3/7, Gi3/9, and Gi3/11 Use DART to capture the output of the Cisco IOS show commands listed in Table 135 and analyze the output of those commands. Use the commands on the access layer switches listed in Table 136. The commands were used every 5 minutes for 2 hours. Table 135 show Commands Used on the Denver Access Layer Switches Command Purpose show clock • show interfaces [interface type] Verifies the current time. On all outbound WAN interfaces: • Verifies the link speed and drop rate. The show commands listed in Table 135 were used on the Denver access layer switches and interfaces listed in Table 136. Table 136 Step 6 Denver Access Layer Switches and Interfaces Switch Interface egden-6506-a1 Fa4/16, Fa4/14 egden-4003-a2 Fa3/16, Fa3/14 egden 4506-a3 Fa3/14, Fa3/16 Use DART to capture the output of the Cisco IOS show commands listed in Table 137. Use the commands on the routers and switches listed in Table 130, Table 132, Table 134, and Table 136, and issue the commands once at the end of the 2-hour test. Table 137 show Commands Used for the Denver QoS Verification Test Command Purpose show class-map • Verifies that the class map configured for the device is displayed. show policy-map • Verifies that the policy map configured for the device is displayed. show access-lists • Verifies that the configured access lists have the correct amount of matching packets. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 145 Test Suite 4: Denver Campus Step 7 Capture the data statistics from the Chariot, IXIA, and Callgen testing tools after the 2-hour test is completed. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • All other procedures executed. Results Table 138 shows the Denver QoS verification test results. Table 138 Denver QoS Verification Test Results Test Results Denver QoS verification Passed Denver System Test This is the system test case for IP routing, SNMP, security, multicast, VoIP and QoS features for the nEverest Enterprise Global project as it pertains to the Denver campus. The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into the Denver campus. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test case verified system performance for a number of QoS features, using EIGRP and BGP as the routing protocols. The features that were configured for the Denver functionality test were carried over to this test. The following additional features were configured in this test case: • BGP MIB feature • BGP 4 • CBWFQ • PQ • MLPPP performance enhancements • Cisco-Enhanced-Mempool-MIB • Cisco-Process-MIB Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 146 Test Suite 4: Denver Campus • DES/3DES VPN Encryption AIM for 2600/3600 • EIGRP • Enhanced IGRP stub routing • FRF.12 support on switched Frame Relay PVCs • H.323 gateway trunk and carrier based routing enhancements • H.323/H.320 gateway • IGMP snooping querier • IGMP Version 2 • QoS—classification and WRED • QoS—policing and DSCP classification • QoS—packet marking • RFC1850 OSPFv2 MIB Support • RTP header compression • TACACS+ Test Plan The procedure used to perform the Denver system test follows: Step 1 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 139 at the start and end of the 4-hour test. Table 139 show Commands Used for the Denver System Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 147 Test Suite 4: Denver Campus Table 139 show Commands Used for the Denver System Test Start and End View (continued) Command show ip eigrp interface show interfaces Step 4 Purpose • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 140 at 60-minute intervals. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 148 Test Suite 4: Denver Campus Table 140 show Commands Used for the Denver System Test 60-Minute View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary Step 5 On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 141 at 10-minute intervals. Table 141 show Command Used for the Denver System Test 10-Minute View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 149 Test Suite 4: Denver Campus • Routes converged correctly without major delay. Results Table 142 shows the Denver system test results. Table 142 Denver System Test Results Test Results Denver system Passed Denver Reliability Test This section describes in detail the reliability test case as it pertains to the Denver campus, using EIGRP as the interior routing protocol and BGP as the exterior routing protocol. Successful execution of the system test case is a prerequisite for the execution of this test. The reliability test ran continuously for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. The following additional features were configured in this test category: • BGP MIB feature • BGP 4 • CBWFQ • PQ • MLPPP performance enhancements • Cisco-Enhanced-Mempool-MIB • Cisco-Process-MIB • DES/3DES VPN encryption AIM for 2600/3600 • EIGRP • Enhanced IGRP stub routing • FRF.12 support on switched Frame Relay PVCs • H.323 gateway trunk and carrier-based routing enhancements • H.323/H.320 Gateway • IGMP snooping querier • IGMP Version 2 • QoS—classification and WRED • QoS—policing and DSCP classification • QoS—packet marking • RFC1850 OSPFv2 MIB support • RTP header compression • TACACS+ The objective of this test case was to verify that the software (at 100 percent traffic load capacity on each WAN link) performed reliably for the 150-hour test period. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 150 Test Suite 4: Denver Campus Test Plan The procedure used to perform the Denver reliability test follows: Step 1 Start traffic streams for a 100 percent traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 150 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 143 at the start and end of the 150-hour test period. Table 143 show Commands Used for the Denver Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp summary • Verifies the BGP routes. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip eigrp interface • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show interfaces On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 151 Test Suite 4: Denver Campus Step 4 Table 143 show Commands Used for the Denver Reliability Test Start and End View (continued) Command Purpose show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 144 at 24-hour intervals. Table 144 show Commands Used for the Denver Reliability Test 24-Hour View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the remote WAN routers. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 152 Test Suite 4: Denver Campus Step 5 Analyze the output of the Cisco IOS show command listed in Table 145 at 6-hour intervals. Table 145 show Command Used for the Denver Reliability Test 6-Hour View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. Results Table 146 shows the Denver reliability test results. Table 146 Denver Reliability Test Results Test Results Denver reliability Passed with exceptions Passed with Exceptions Explanation The Denver reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • An H.323 VoIP traffic generator failed to start, resulting in a 2-hours delay of the start of VoIP traffic between the Denver campus and the remote campuses. The test results were not affected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 153 Test Suite 5: Dallas Campus Test Suite 5: Dallas Campus This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP QoS at the Dallas campus. The Dallas campus is one component of the larger global enterprise topology. The global enterprise topology comprises five multilayer-design campuses—two large campuses with data centers and three regional campuses—and 12 remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section of this document. In the test suite for the Dallas campus, the following categories (or types) of testing were conducted: • Functionality testing: This test case verified basic IP functionality. This test also involved Layer 3 protocols (OSPF as the interior routing protocol and BGP as the exterior routing protocol), network management, multicast, security, voice, and QoS. • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing: This test category verified system reliability. This test suite contains the following sections: • Topology Description, page 154 • Dallas Functionality Test, page 157 • Dallas System Test, page 177 • Dallas Reliability Test, page 181 Topology Description The IOS Enterprise Global Dallas testbed represents one of the medium-size enterprise campuses that would be located in a European region. The WAN routers connecting to the other enterprise global sites and to the Internet consist of three Cisco 7206VXR NPE400 routers and a Cisco 7507 RSP8 router running ATM and PPP on the WANs. The campus also consists of a GE and FE LAN connected to two Catalyst 6506s, each with an MSFC2/PFC2. A Cisco 3640 router is used as a VoIP voice gateway and registers into the gatekeeper located at the San Jose headquarters, which places real VoIP calls to other gateways located at different campuses. The testbed is used to perform the test for functionality, which includes IP routing, network management, multicast, security, voice, and QoS. OSPF is the IP IGP routing protocol and route generators inject a total of 320 simulated subnets at various points in the topology. Global application servers are located at this campus serving the smaller and remote campuses. Applications such as Voice, NetMeeting, FTP, and HTTP are simulated by Chariot and other traffic generating test tools. The testbed simulates large amount of end users through the use of traffic generators and real UNIX or Linux workstations. The Dallas enterprise campus networks are under one OSPF process with multiple OSPF areas, including area 0. Figure 12 shows the Dallas campus topology with IP addresses. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 154 Test Suite 5: Dallas Campus Figure 12 Dallas Campus Topology with IP Addresses 96.1.0.17/30 ATM Provider Enterprise WAN egboc1760-w1 .18 11 135 110 boc-ux1 T1 221.5.23.100 98 egaus2621-w1 8 96.1.0.41/30 Washington, D.C. E3 WAN access 109 37 101 egdal7206-w1 1 97 3xE1 E3 egdal-3640-v .42 38 2 egdal7206-w2 9 5 65 .58 42 102 41 5 105 egdal-7507-w4 13 4 17 21 109 45 3 113 25 egaus3550-a 9 96.1.0.57/30 ISP 3 San Jose 29 dal-ux13 106 104 105 46 101 103 10 egdal7206-w3 9 egarl3640-w1 110 134 egdal3660-w5 102 221.5.27.100 arl-ux1 133 221.5.28.100 aus-ux1 221.5.22.100 10 66 dal-ux4 6 106 221.5.10.100 egdal-6506c1-msfc2 33 dal-ux11 221.5.29.100 Miami 22 26 egdal-6506c1-sup2 221.5.9.100 dal-ux1 18 14 6 30 egdal-6506-c2 34 7 107 dal-ux12 221.5.30.100 dal-ux5 221.5.17.100 dal-ux6 FE GE ATM/FR (nx64k) E1(P2P) E3(P2P) ATM E3 ATM T3 X 223.255.10.X X 221.5.1.X - Loopback 95527 Layer 3 core 221.5.21.100 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 155 Test Suite 5: Dallas Campus Figure 13 shows the Dallas campus topology with interface types. Dallas Campus Topology with Interface Types Enterprise WAN egboc1760-w1 a4/0 11 fa0/0 135 s0/0 boc-ux1 egaus3550-a isp 3-7507 Washington, D.C. E3 WAN access s6/2 f0/0 101 egdal7206-w1 1 s6/3 T1 f1/0 s0/0 egaus2621-w1 8 ISP 3 San Jose ATM Provider g0/1 9 110 g0/2 g3/2 f0/0 102 dal-ux13 arl-ux1 f4/2 g3/1 g3/1 Layer 3 core egdal-6506c1-msfc2 g1/1 dal-ux4 f4/13 6 f4/14 106 egdal-6506c1-sup2 f4/1 f4/2 egdal-6506-c2 f4/13 g1/1 7 107 f4/14 f4/15 dal-ux1 s6/0-2 5 105 f1/0 egdal-7507-w4 f0/0 f5/1/0 f0/1 10 134 g/1/0/0 4 104 g2/0 s0/1/1:0 egdalf5/0/0 3660-w5 g4/1/0 s1/0 3 103 f1/1 f1/0 9 133 f2/0 egdal7206-w3 egarl3640-w1 g3/2 109 f4/1 egdal-3640-v s3/0 f0/0 2 egdal7206-w2 f4/0 g2/0 aus-ux1 3xE1 E3 dal-ux5 f4/17 dal-ux11 dal-ux12 dal-ux6 FE GE ATM/FR (nx64k) E1(P2P) E3(P2P) ATM E3 ATM T3 X 223.255.10.X X 221.5.1.X - Loopback Platform and Software Version Information Table 147 lists the platforms, router names, software versions, and software images configured in the Dallas network topology for this test suite. Table 147 Dallas Platform, Router Name, Software Version, and Software Image Platform Router Name Software Version Software Image Cisco 7206 egdal-7206-w1 12.2(16b) c7200-jk9s-mz.122-16b Cisco 7206 egdal-7206-w2 12.2(16b) c7200-jk9s-mz.122-16b Cisco 7206 egdal-7206-w3 12.2(16b) c7200-jk9s-mz.122-16b Cisco 7507 egdal-7507-w4 12.2(15)T5 rsp-jsv-mz.122-15.T5 Cisco 3640 egdal-3640-v 12.2(16b) c3640-a3js-mz.122-16b Cisco 3660 egdal-3660-w5 12.2(16b) c3660-jk9s-mz.122-16b Catalyst 6500 egdal-6506-c1 7.6(1) cat6000-sup2k8.7-6-1 Catalyst 6500 egdal-6506-c2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 2621 egaus-2621-w1 12.2(16b) c2600-jk9s-mz.122-16b Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 156 95528 Figure 13 Test Suite 5: Dallas Campus Table 147 Dallas Platform, Router Name, Software Version, and Software Image (continued) Platform Router Name Software Version Software Image Catalyst 3550 egaus-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 3640 egarl-3640-w1 12.2(16b) c3640-jk9s-mz.122-16b Cisco 1760 egboc-1760-w1 12.2(15)T5 c1700-k9o3sv8y7-mz.122-15.T5 Dallas Functionality Test This is the functionality test case for the Cisco IOS nEverest Enterprise Global project as it pertains to the Dallas campus. The test involves basic IP testing (Layer 3 protocols, such as HSRP, OSPF for the interior routing protocol, and BGP for the exterior routing protocol.), network management testing, multicast testing, security testing, voice testing and QoS testing. The functionality test case verified basic IP functionality. The tests are described in the following sections: • Basic IP • Network Management • Multicast • Security • Voice • QoS The testing in each section was performed sequentially and as independently as possible. The Dallas functionality testing was conducted as follows: 1. Basic IP testing was performed in conjunction with Network Management Testing (NMS). Network Management was utilized to collect the test information. 2. After completion of the basic IP test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 3. Multicast testing was performed, again with NMS monitoring. 4. After completion of the multicast test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 5. Security testing was performed in conjunction with NMS monitoring. 6. After completion of the security test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 7. Voice testing was performed in conjunction with NMS monitoring. 8. After completion of the voice test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. 9. QoS testing was performed in conjunction with NMS monitoring. 10. After completion of the QoS test, IP configurations were made stable, and any traffic loading was terminated in preparation for the next test. Basic IP The objectives for this test case were as follows: • Verify the basic network operation (that is, network connectivity). Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 157 Test Suite 5: Dallas Campus • Verify that the selected Cisco IOS software versions can be successfully loaded into the devices. • Verify that the routing protocol features can be incorporated into the Dallas campus. • Verify that the major IP routing features work as expected. OSPF with BGP Routing This test involved testing OSPF with BGP routing. The following features were included in the test plan: • Route summarization • Route filtering • OSPF stub areas • Route redistribution and default route generation • Log event or change • BGP policy control: AS prepend and route filtering Test Plan This test verified route summarization, route filtering, OSPF stub router functionality, route redistribution and default route generation, log event or change functionality, BGP policy control, and other routing features. There are several parts to this test plan, described in the sections that follow. Route Summarization and Filtering Test OSPF will have area range and summary-address commands to be applied in the Dallas campus. The area range commands will summarize all interarea routes and the summary-address commands will summarize as many external routes as possible. The procedure used to set up route summarization and filtering follows: Step 1 On campus WAN and aggregration routers egdal-7206-w2, egdal-7206-w3, and egdal-7507-w4 summarize the area range. Step 2 On campus WAN routers egdal-7206-w1 and egdal-7206-w2, summarize the summary address. Step 3 On routers egdal-7206-w1 and egdal-7206-w2, use the no auto-summary command to enforce subnet information to be propagated, unless manual summarization is applied. Configure OSPF stub routing by performing the following steps: a. Configure a totally stubby area on the egdal-7206-w1 links to the IPSec Austin (egaus-2651-w1) remote campus. b. Configure the voice gateway router egdal-3640-v as the stub area, which is connected to egdal-7206-w2. egdal-7206-w3 and egdal-7507-w4 have a virtual link to egdal-6506-c1-msfc2 and egdal-6506-c2 to allow the totally stubby area to be cascaded off area 3 and area 4. c. Configure area 1 as the transit links for egdal-7206-w3 and egdal-7507-w4 to access core routers egdal-6506-c1-msfc2 and egdal-6506-c2 by virtual-links. d. Configure a totally stubby area on egarl-3640-w1, egboc-1760-w1, and egaus-2621-w1. Route Redistribution and Default Route Generation Test The procedure used to set up for the route redistribution and default route generation test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 158 Test Suite 5: Dallas Campus Step 1 Configure eBGP and iBGP WAN routers egdal-7206-w1 and egdal-7206-w2. Default routes will be advertised by the WAN routers forming eBGP neighbors with the ISP routers. These default routes will point to the null0 interface. The BGP routers will inject a default route into their respective IGP. The default route will not be advertised by BGP. When advertising the default route into OSPF, configure the default route as metric-type 1 to include internal cost to those AS border routers. This is to send traffic destined to the Internet as close as possible. This default route will be advertised into the whole OSPF 1 and will be permitted into the remote sites. Alternative metrics, based on the number of ASs listed in the BGP path, will be applied to intercampus routes being redistributed from BGP into OSPF. Untagged OSPF routes will be redistributed into BGP. Intercampus routes will be tagged and redistributed into OSPF. Step 2 Configure "log-adjacency-changes" under "router ospf 1" on all the WAN routers, 7206VXRs, 7507s and Layer 3 switches. Step 3 Configure "bgp log-neighbor-changes" under "router bgp 64505" on egdal-7206-w1 and egdal-7206-w2. BGP Policy Control Test The procedure used to set up for the BGP policy control test follows: Step 1 The BGP AS 64504 is the AS used for the Dallas campus AS border routers. All BGP routes are accepted on the BGP routers. Step 2 Configure egdal-7206-w2 for route filtering. This default route is redistributed into OSPF for the connection to the ISP. Step 3 Configure the egdal-7206-w2 BGP policy so that the traffic from the ISP destined for the local campus prefixes gets high priority (by using AS prepending) to the advertised prefixes of the nonlocal campuses. All intercampus routes will be advertised to the ISP, but the AS will be prepended three times. Other Routing Features Test The procedure used to set up the other routing features test follows: Step 1 Apply route dampening to the BGP routers egdal-7206-w1 and egdal-7206-w2. Route dampening is used to minimize the instability caused by route flapping and oscillation over the network. Step 2 Configure authentication on egdal-7206-w1, egdal-7206-w2, egdal-7206-w3 and egdal-7507-w4. OSPF authentication allows for the configuration of a password for a specific area. Routers that want to become neighbors must exchange the same password on a particular segment. Configure Local-Preference200 on egdal-7206-w1 and egdal-7206-w2. A path with a higher local preference number is preferred. The default value for local preference is 100. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 159 Test Suite 5: Dallas Campus Verification Test The procedure used to set up the verification test follows: Step 1 Use the show commands listed in the following steps and use DART to capture the information from the routers. Step 2 Analyze the output of the Cisco IOS show commands listed in Table 148. Table 148 show Commands Used in the Dallas Core and WAN Routers Command Purpose show ip route On the core and WAN routers: and • Verifies that the routes are summarized as expected. • Verifies that the route filters work as expected. • Verifies that the default route is generated as expected. show ip route summary Step 3 Fail the WAN connection s3/0 on the egdal-7206-w2 to Washington and use the show commands in Table 148 to verify that the traffic is rerouted via an expected alternate path through the other campuses and remote sites. Step 4 Use the commands listed in Table 149 to verify that the egdal-7206-w1 and egdal-7206-w2 routers are configured and functioning correctly. Table 149 Commands Used in the Dallas WAN Routers Command Purpose show ip bgp On the WAN routers: and • Verifies BGP route filtering. show ip route • Verifies network reachability to ISP3. and • Verifies BGP AS prepending policy control. ping Step 5 Use the show ip ospf neighbors command on all the routers to verify OSPF neighbors. Step 6 Use the show ip ospf neighbors command on the egdal-7206-w1 and egdal-7206-w2 routers to verify BGP neighbors Step 7 Use the show memory summary command and the show processes cpu command on the core and WAN routers every 30 seconds to verify CPU utilization and that CPU capacity is not being monopolized by a single router. Step 8 Use the show memory summary command and the show processes cpu command on all the routers every 5 minutes to verify that there are no memory leaks or other memory errors. Step 9 Use the show logging command to verify that there are no other significant errors. Step 10 Use the show interfaces command on all the WAN routers to verify if there are any input errors, output errors, or queue drops, and to verify the routers’ throughput. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 160 Test Suite 5: Dallas Campus Expected Results We expect the following results: • The routes are summarized correctly. • The route filters function correctly. • CPU utilization is less than 90 percent. • Memory consumption is stable. • The distribution layer routers are OSPF stub-enabled. • The default route is generated correctly. • The BGP AS prepending policy control is enabled on the ISP routers. • There are no significant OSPF or BGP routing errors and the link delay and bandwidth have been tuned correctly. • BGP route filtering functions correctly. • The routing table displays the appropriate routes. Results Table 150 shows the Dallas OSPF with BGP routing test results. Table 150 Dallas OSPF with BGP Routing Test Results Test Results Dallas OSPF with BGP routing Passed Network Management This section describes the network management testing in the Dallas campus. The following features were included in the test plan: • MIB Walk automation script (snmp_walk_test) and Traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB walk and traps. The MIB walk automation script (snmp_walk_test) will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the snmp_walk_test script will work properly. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 161 Test Suite 5: Dallas Campus Step 3 Upload the following MIBs to the snmp_walk_test script: • Basic IP: – CISCO-BGP4-MIB – CISCO-OSPF-MIB • Multicast: – CISCO-IGMP-MIB.my – CISCO-MSDP-MIB.my – CISCO-PIM-MIB.my • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB • QoS: – CISCO-QOS-MIB • Security: – CISCO-IPSEC-FLOW-MONITOR-MIB Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command and the CatOS show time command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send e-mail notification for error conditions on the routers or switches. Step 11 Use the show crypto mib ipsec flowmib version command to verify that the device has IPsec MIB support. Step 12 Use the show log command or the show align command to verify that there are no other significant errors. Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 151 shows the Dallas network management test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 162 Test Suite 5: Dallas Campus Table 151 Dallas Network Management Test Results Test Results Dallas network management Passed Multicast The objective of the Dallas campus multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • MDS • PIM sparse-dense mode • Admin scoping and multicast boundary • IGMP snooping • MMLS The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV client to switch egdal-6506-c2. c. Configure the IP/TV server to stream two programs as follows: • The program “G1” contains a 239.192.1.0/24 multicast address scope and consists of a 600-kbps video and audio stream. • The program “G2” contains a 239.192.2.0/24 multicast address scope and consists of a 300-kbps video and audio stream. • The program TBD3 contains a 239.194.0.1/14 multicast address scope and consists of a 1500-kbps video stream and a 100-kbps audio stream. Only the IP/TV client at the San Jose campus will receive this program. Step 2 Enable MDS on Dallas router egdal-7507-w4. Step 3 Enable PIM sparse-dense mode on all Layer 3 Native IOS and Cisco IOS multicast devices. Step 4 Enable multicast admin scoping and multicast boundary on the Dallas campus—egdal-7507-w4 Verification The procedure used to perform the multicast verification test follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 163 Test Suite 5: Dallas Campus Step 1 Use DART to capture the output of the generic show commands listed in Table 152. Table 152 Generic show Commands Used in the Dallas Multicast Verification Test Command Purpose show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show buffer failure • Verifies a buffer or memory failure. show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. • Verifies that there are no other significant errors. show logging Step 2 Using the show commands listed in Table 153, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. In addition, verify the following: • The router with the lower IP address is the correct IGMP querier. • The router installs group members upon receipt of IGMP join messages. • All groups are seen for all IGMP joined groups. • The router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Table 153 show Commands Used in the Dallas Multicast IGMPv2 Verification Test Command Step 3 Purpose show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. Using the show commands listed in Table 154, verify that MDS functions as follows: • The VIP interfaces on Cisco 7500 routers are MDS-enabled. • Multicast distributed switching is enabled. • Multicast traffic is distributed-switched. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 164 Test Suite 5: Dallas Campus Table 154 show Commands Used in the Dallas Multicast MDS Verification Test Command Step 4 Purpose show ip mds interface • Verifies the status of MDS interfaces. show ip pim interface detail • Displays detailed information about each interface configured for Protocol Independent Multicast (PIM). show ip mds forwarding • Verifies the MFIB table and forwarding information for MDS. show ip mds summary • Displays a summary of the MFIB table for MDS. Using the show commands listed in Table 155, verify that PIM sparse-dense mode functions as follows: • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Table 155 show Commands Used in the Dallas Multicast PIM Sparse-Dense Mode Verification Test Command Step 5 Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. Using the show commands listed in Table 156, verify that admin scoping and multicast boundary functions as follows: • RP messages are prevented from traveling beyond the boundaries of the network using multicast boundaries. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 165 Test Suite 5: Dallas Campus • Routers within the TTL number of hops from the source RP mapping agent receive the Auto-RP discovery messages. • Routers learn about correct RP mapping information within the TTL range. • Routers out of the TTL range cannot receive the Auto-RP Discovery messages. • A border router with a multicast boundary configured will not leak RP messages out of the network. • Multicast traffic cannot be forwarded out of the defined admin scope. Table 156 show Commands Used in the Dallas Admin Scoping and Multicast Boundary Verification Test Command Step 6 Purpose show ip pim rp mapping • Verifies all the group-to-RP mappings of which the router is aware (either configured or learned from Auto-RP). show ip pim rp • Verifies that the active rendezvous points (RPs) are cached with the associated multicast routing entries. show ip mroute count • Displays statistics about the group and source, including number of packets, packets per second, average packet size, and bytes per second. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Using the show commands listed in Table 157, verify that IGMP snooping functions as follows: • IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. Table 157 show Commands Used in the Dallas Multicast IGMP Snooping Verification Test Command Step 7 Purpose show ip igmp interface • Verifies that IGMP snooping is globally enabled. show ip igmp snooping mrouter • Verifies that the correct multicast router has been learned. show mac-address-table multicast vlan-id • Verifies that the correct multicast addresses are present in the output. Using the show commands listed in Table 158, verify that MMLS functions as follows: • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts. In the Catalyst 6500s, the flows are taking the correct paths. • The flows are using the expected multicast forwarding entry (*,G) or (S,G). • Hardware-based flows are created where expected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 166 Test Suite 5: Dallas Campus • Identify the lowest rate of the traffic flow at which a hardware shortcut is created. • CPU utilization does not increase. If it does, then there is a possibility that flows are being software switched. • On DFC cards, forwarding tables on line cards are the same as on the processor card. Table 158 show Commands Used in the Dallas Multicast MMLS Verification Test Command Purpose show mls ip multicast • Verifies that the flows are using the expected multicast forwarding entry (*,G) or (S,G). show mls ip multicast summary • Verifies that hardware-based flows are created where expected. show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • Multicast forwarding is achieved using PIM. • RP messages are prevented from traveling beyond the boundaries of the network by using multicast boundaries. • The rate that a sender from the source list can send to a multicast group in the group list is appropriate. Results Table 159 shows the Dallas multicast test results. Table 159 Dallas Multicast Test Results Test Results Dallas multicast Passed Security This security test was conducted for the Dallas campus. This test case verified the functionality of AAA, and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 167 Test Suite 5: Dallas Campus The objectives of the security test were as follows: • Verify that the IPSec GRE tunnel is established between the campus and the remote WAN edge routers. Authentication was done with IKE preshared keys. • Verify the ability of the campus and remote WAN edge routers to request and complete the certificate authentication process with the CA server in the data center and establish an IPSec tunnel between them. • Verify the interaction of encrypted data streams with unencrypted voice streams between the campus and the remote WAN edge routers. Observe the ability of the router to do voice and IPSec. • Verify TACACS+ AAA services, at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • IPSec IKE preshared keys GRE tunnel • IPSec IKE CA • IPSec IKE Pre-shared transport or tunnel mode • AAA TACACS+ • Security commands Test Plan Setup The procedure used to set up the Dallas security test follows: Step 1 Perform Step 2 through Step 6 to configure security features on the following devices: • egdal-7206-w1 • egaus-2621-w1 • egboc-1760-w1 Step 2 Configure IKE policy. Step 3 Configure IPSec transforms and protocol. Step 4 Create access lists for encryption. Step 5 Apply the crypto maps on the serial interfaces. Step 6 Configure GRE tunnels. Step 7 Perform Step 8 through Step 14 to configure security features on the following devices: • egdal-3640-w5 • egarl-3660-w1 Step 8 Configure a hostname and IP domain name. Step 9 Enable query mode to store certificates on the CA server. Step 10 Configure to generate an RSA key pair. Step 11 Request the certificate. Step 12 Create a crypto map entry in IPSec ISAKMP mode. Step 13 Assign the crypto maps to the tunnel and physical interfaces. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 168 Test Suite 5: Dallas Campus Step 14 Perform Step 15 through Step 19 to configure security features on the following devices: • egdal-7206-w3 • eghou-3660-vw Step 15 Configure IKE policy. Step 16 Configure IPSec transforms and protocol. Step 17 Configure tunnel mode. Step 18 Create access lists for encryption. Step 19 Apply the crypto maps on the serial interfaces. Step 20 Perform Step 21 through Step 26 to configure security features on the following devices: • egdal-7206-w1 • egdal-7206-w2 • egdal-7206-w3 • egdal-7206-w4 • egdal-7206-w5 • egdal-3660-v • egdal-6506-c1 • egdal-6506-c2 Step 21 Configure encryption service facility and AAA and TACACS+. Step 22 Configure the time-stamping service facility for logging. Step 23 Disable all unnecessary services. Step 24 Configure an enable password. Step 25 Configure a console port password. Step 26 Configure a vty password. Verification The procedure used to perform the Dallas security verification test follows: Step 1 Use the show crypto isakmp policy command to verify that the policy number has the correct security algorithm. Step 2 Use the show crypto isakmp sa command to verify the IKE security association with the source and destination. Step 3 Use the show crypto engine connections active command to verify that each Phase 2 SA is built and the correct amount of traffic sent. Step 4 Use the show crypto map command to verify that the crypto map is configured properly on the tunnel and the physical interface. Step 5 Use the show crypto key mypubkey rsa command to verify the router RSA public keys. Step 6 Use the show crypto ca certificates command to view information about the CA's certificate. Step 7 Use the show crypto ipsec sa command to verify that the packets are encap/encrypt/decrypt. Step 8 Use the show crypto isakmp sa command to verify that the ISAKMP Security Association (SA) is built between peers. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 169 Test Suite 5: Dallas Campus Step 9 Use the show tacacs command to verify the user is logging in to the TACACS+ server 223.255.10.30. Step 10 Use the show accounting command to verify the user account on the router and switches with privilege 15. Expected Results We expect the following results: • The IPSec GRE Tunnel is established between the campus and remote WAN edge routers. • The campus and remote WAN edge routers can request and complete the CA process with the CA server in the data center and establish an IPSec tunnel between them. • Encrypted data streams can interact with unencrypted voice streams between the Dallas campus and the Austin remote WAN edge routers. The router can do Voice and IPSec. • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 160 shows the Dallas security test results. Table 160 Dallas Security Test Results Test Results Dallas security Passed Voice The purpose of the voice test was to deploy and verify the VoIP deployment scenarios for large Enterprise customers that want to minimize the operations cost of telephony by utilizing IP telephony over traditional services. The overall objectives of the voice test case were as follows: • Verify that voice can be incorporated into the Dallas campus. • Verify the operation of the Cisco IOS release to test the AVVID and legacy voice interoperability. • Collect and document the test results. • Ensure that the system behaves as expected. Voice Testing The following feature was configured for voice testing: • Legacy H.323 VoIP Test Plan The voice test verified that voice traffic operated properly across the network. There are several parts to this test plan, described in the sections that follow. Set Up Legacy H.323 The procedure used to set up the legacy H.323 voice follows: Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 170 Test Suite 5: Dallas Campus Step 1 Configure H.323 voice gateway egdal-3640-v. Step 2 Check that egdal-3640-v is registered with gatekeeper egsj-3640-gk in the San Jose campus by using the show gateway command on the egdal-3640-v router. Step 3 Configure Callgen telephony. Voice Traffic Verification Test This test verified that incoming and outgoing voice traffic is handled properly on the network. In this test, no QoS features are configured and the network was free from traffic congestion. Test Plan The procedure use to perform the voice traffic verification test follows: Step 1 Start the bulk call traffic generators by performing the following steps: a. Start all BCG channels to San Jose (19 calls), Boston (3 calls), Dallas (6 calls), Miami (2 calls), and New York (2 calls). Note: Refer to the dial plan and voice design document. b. Using the show channel command on the Callgens, verify for 5 minutes that all originate and terminate BCG channels have started and are progressing correctly with no problems. Step 2 Verify for 5 minutes that all originate and terminate Callgen SCCP channels have started and are progressing correctly with no problems. Step 3 Analyze the output of the show commands listed in Table 161. Use the listed commands on all the WAN routers using the DART tool every 60 seconds for the show processes cpu command, and every 5 minutes for all the others—for a duration of 2 hours. Table 161 show Commands Used for the Dallas Voice Traffic Verification Test Command show clock show interfaces [interface type] Purpose • Verifies the current time. On all outbound WAN interfaces: • Verifies the link speed and drop rate. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ppp multilink [interface type] On egdal-7206-w2: • Verifies multilink PPP status, such as the number of member interfaces configured per bundled interface. The show commands listed in Table 161 were used on the WAN routers and interfaces listed in Table 162. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 171 Test Suite 5: Dallas Campus Table 162 Step 4 Step 5 Dallas WAN Routers and Interfaces Router Interface egdal-7206-w1 ATM4/0 egdal-7206-w2 Multilink1 egdal-7206-w3 ATM3/0/0.126, ATM3/0/0.127, s6/0:0 egdal-7507-w4 ATM6/0/0.126, ATM6/0/0.127, ATM6/0/0.768, ATM0/0/0 Stop the bulk call traffic generators and verify results by performing the following steps: a. Stop all BCGs after 1 hour of run time. b. Use the show channel command of the Callgen testing tool to verify that all originate and terminate BCG channels are functioning correctly without any significant errors. c. Capture the output statistics of Callgen by using CIC. d. Use Performance monitor to check real time the number of gateways and IP Phones registered and CDR on the CallManager to also check the percentage of successful calls. Configure an IP phone manually, install it in each campus, and make calls to test voice quality. Expected Results We expect the following results: • Voice traffic sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. Results Table 163 shows the Dallas voice traffic verification test results. Table 163 Dallas Voice Traffic Verification Test Results Test Results Dallas voice traffic verification Passed QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 ToS. QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. The following features were included in the test plan: • Classification and marking—DSCP Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 172 Test Suite 5: Dallas Campus • Congestion avoidance—dWRED (differentiated services-based WRED) • Congestion management—LLQ • Traffic conditioning—FRTS, ATM shaping • Link Efficiency Mechanisms—MLPPP LFI, cRTP Test Plan The procedure used to perform the QoS setup test follows: Step 1 Step 2 Step 3 Define the access lists and traffic classes using the following guidelines: • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Lotus Notes and Oracle, into a class map called “Transactional.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Streaming” class. • Classify HTTP and FTP traffic into the “class-default” class, which is the class map for best-effort service. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure a policy map called "OUT-LAN-XX" on the core layer switches egdal-6506-c1 and edal-6506-c2. This configuration tests the LLQ feature of QoS. b. Configure a policy map called "OUT-WAN-XX" on the intercampus WAN aggregation routers. This configuration tests the WRED feature of QoS. c. Configure a policy map called "OUT-WAN-XX" on campus-Remote WAN aggregation routers egdal-7206-w3 and egdal-7206-w4. This configuration tests the MLPP LFI and FRTS features of QoS. Attach policy maps to the interfaces listed in Table 164, and apply the other appropriate QoS features. Table 164 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 173 Test Suite 5: Dallas Campus Table 164 Routers, Policy Maps, and Interfaces for the Dallas QoS Setup Test Router Policy Map Interface egdal-7206-w1 OUT-LAN-FE Fa0/0, Fa1/0, and F2/0 egdal-7206-w1 OUT-WAN-DT0 Serial6/2 egdal-7206-w1 OUT-WAN-DT8 Serial6/3 egdal-7206-w2 OUT-LAN-FE Fa0/0, Fa1/0, Fa4/0, and F2/0 egdal-7206-w3 OUT-LAN-FE F0/0, F1/0, F2/0 egdal-7206-w3 OUT-WAN-DT4 Serial6/0:0 egdal-7507-w4 OUT-LAN-GE Gi4/1/0, and Gi1/0/0 egdal-7507-w4 OUT-LAN-FE F5/0/0 egdal-7507-w4 OUT-WAN-FF2 Serial0/1/0:1.128 egdal-7507-w4 OUT-WAN-DT9 Serial0/1/1:0 egdal-6506-c2 OUT-LAN-GE Gi3/2, Gi1/1 egdal-6506-c2 OUT-LAN-FE F4/1, F4/37, F4/2 egdal-3640-V OUT-VOICE F0/0 egboc-1760-w1 OUT-LAN-FE F0/0 egboc-1760-w1 OUT-WAN-DT0 Serial0/0 egaus-2621-w1 OUT-LAN-FE F0/1 egaus-2621-w1 OUT-WAN-DT8 Serial0/0 egarl-3640-w1 OUT-LAN-FE F1/1 egarl-3640-w1 OUT-LAN-DT9 Serial1/0 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. • QoS features were configured and were functioning properly. Results Table 165 shows the Dallas QoS setup test results. Table 165 Dallas QoS Setup Test Results Test Results Dallas QoS setup Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 174 Test Suite 5: Dallas Campus QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic was used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the Dallas QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Step 2 Use DART to capture the output of the Cisco IOS show commands listed in Table 166. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 166 show Commands Used on the Dallas WAN Routers Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] On all outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. The show commands listed in Table 166 were used on the Dallas WAN aggregation routers and interfaces listed in Table 167. Table 167 Step 3 Dallas WAN Aggregation Routers and Interfaces Router Interface egdal-7206-w1 ATM4/0 egdal-7206-w2 Multilink1 egdal-7206-w3 ATM3/0/0.126, ATM3/0/0.127, s6/0:0 egdal-7507-w4 ATM6/0/0.126, ATM6/0/0.127, ATM6/0/0.768, ATM 0/0/0 Use DART to capture the output of the Cisco IOS show commands listed in Table 168 on the Dallas core layer switches. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 175 Test Suite 5: Dallas Campus Table 168 show Commands Used on the Dallas Core Layer Switches Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic in the Real-Time class gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] On all outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. show class-map • Verifies that the class map configured for the device is displayed. show policy-map • Verifies that the policy map configured for the device is displayed. show access-lists verify • Verifies that the configured access lists have the correct amount of matching packets. The show commands listed in Table 168 were used on the Dallas core layer switches and interfaces listed in Table 169. Table 169 Step 4 Dallas Core Layer Switches and Interfaces Router Interface egdal-6506-c1 Gi3/2, Gi3/1, Fa4/1, Fa4/2 egdal-6506-c2 Gi3/1, Gi3/2and Fa4/1, Fa4/2 Capture the data statistics from the Chariot, IXIA, and Callgen testing tools after the 2-hour test is completed. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch crashes, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 176 Test Suite 5: Dallas Campus • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed correctly. Results Table 170 shows the Dallas QoS verification test results. Table 170 Dallas QoS Verification Test Results Test Results Dallas QoS verification Passed Dallas System Test This is the system test case for IP routing, SNMP, security, multicast, VoIP, and QoS features for the nEverest Enterprise Global project as it pertains to the Dallas campus. The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into the Dallas campus. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test case verified system performance for a number of QoS features, using OSPF and BGP as the routing protocols. The features that were configured for the Dallas functionality test were carried over to this test. The following additional features were configured in this test case: • BGP MIB feature • BGP 4 • CBWFQ • CGMP • Cisco IP phone support • Crypto key management interface • DES/3DES VPN encryption AIM for 1700 • Encrypted pre-shared key • FRF.12 support on switched Frame Relay PVCs • GRE tunnel support • H.323 gateway trunk and carrier-based routing enhancements • H.323/H.320 gateway • IGMP snooping querier • IGMP Version 2 • IKE extended authentication (Xauth) • IKE mode configuration Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 177 Test Suite 5: Dallas Campus • IKE security protocol • LFI for Frame Relay and ATM virtual circuits • MLPPP performance enhancements • MLPPP with LFI • MSDP • OSPF ABR type 3 LSA filtering • OSPF stub router advertisement • OSPF • PIM MIB extension for IP multicast • PIM Version 2 • PQ • QoS—classification and WRED • QoS—packet marking • RFC1850 OSPFv2 MIB support • RTP header compression • TACACS+ Test Plan The procedure used to perform the Dallas system test follows: Step 1 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 171 at the start and end of the 4-hour test. Table 171 show Commands Used for the Dallas System Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp neighbors detail • Verifies the intracampus WAN routers. show ip ospf neighbors detail • Verifies that the OSPF neighbor information on a per-interface basis. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 178 Test Suite 5: Dallas Campus Table 171 show Commands Used for the Dallas System Test Start and End View (continued) Command show ip ospf interface show interfaces Purpose • Verifies if the OSPF adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. • Verifies the OSPF area and determines if OSPF is enabled. On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show crypto isakmp policy • Verifies that the IKE policy number has the correct security algorithm. show crypto map [interface x | tag map-name] • Verifies that the crypto map is configured properly on the tunnel and the physical interface. show crypto key mypubkey rsa • Verifies the router's RSA public keys. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 179 Test Suite 5: Dallas Campus Table 171 show Commands Used for the Dallas System Test Start and End View (continued) Command Step 4 Purpose show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 172 at 60-minute intervals. Table 172 show Commands Used for the Dallas System Test 60-Minute View Command show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary Step 5 Purpose On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp neighbors • Verifies the Dallas intracampus WAN router neighbors. show ip ospf neighbors • Verifies the state of the OSPF neighbors. show crypto isakmp sa • Verifies the IKE security association with the source and destination. show crypto engine connections active • Verifies that each Phase 2 SA was built and the amount of traffic sent. show crypto ipsec sa • Verifies that the packets are encap/encrypt/decrypt. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 173 at 10-minute intervals. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 180 Test Suite 5: Dallas Campus Table 173 show Command Used for the Dallas System Test 10-Minute View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed. Results Table 174 shows the Dallas system test results. Table 174 Dallas System Test Results Test Results Dallas system Passed Dallas Reliability Test This section describes in detail the reliability test case as it pertains to the Dallas campus, using OSPF as the interior routing protocol and BGP as the exterior routing protocol. Successful execution of the Dallas system test case is a prerequisite for the execution of this test. The reliability test ran continuously for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. This test case verified system performance for a number of QoS features, using OSPF and BGP as the routing protocols. The features that were configured for the Dallas functionality test were carried over to this test. The following additional features were configured in this test category: • BGP MIB feature • BGP 4 • CBWFQ • PQ Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 181 Test Suite 5: Dallas Campus • MLPPP performance enhancements • CGMP • Encrypted pre-shared key • FRF.12 support on switched Frame Relay PVCs • GRE tunnel support • H.323 gateway trunk and carrier-based routing enhancements • H.323/H.320 gateway • Cisco IP phone Support • Crypto key management interface • IGMP snooping querier • IGMP Version 2 • IKE extended authentication (Xauth) • IKE mode configuration • IKE security protocol • LFI for Frame Relay and ATM Virtual Circuits • MLPPP with LFI • MSDP • OSPF ABR Type 3 LSA filtering • OSPF stub router advertisement • OSPF • PIM MIB extension for IP multicast • PIM Version 2 • QoS—Classification and WRED • QoS—Packet marking • RFC1850 OSPFv2 MIB support • RTP header compression • TACACS+ The objective of this test is to verify that the software is stable and reliable in the testbed during the 150-hour test period, with 100 percent or more traffic load on each WAN link. Test Plan The procedure used to perform the Dallas reliability test follows: Step 1 Start the traffic streams for 100 percent of the traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 182 Test Suite 5: Dallas Campus Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 175 at the start and end of the 4-hour test. Table 175 show Commands Used for the Dallas Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp neighbors detail • Verifies the intracampus WAN routers. show ip ospf neighbors detail • Verifies the OSPF neighbor information on a per-interface basis. show ip ospf interface • Verifies if the OSPF adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. • Verifies the OSPF area and determines if OSPF is enabled. show interfaces On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show crypto isakmp policy • Verifies that the IKE Policy number has the correct security algorithm. show crypto map [interface x | tag map-name] • Verifies that the crypto map is configured properly on the tunnel and the physical interface. show crypto key mypubkey rsa • Verifies the router's RSA public keys. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 183 Test Suite 5: Dallas Campus Table 175 show Commands Used for the Dallas Reliability Test Start and End View (continued) Command Step 4 Purpose show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 176 at 24-hour intervals. Table 176 show Commands Used for the Dallas Reliability Test 24-Hour View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip bgp neighbors • Verifies the Dallas intracampus WAN router neighbors. show ip ospf neighbors • Verifies the state of the OSPF neighbors. show crypto isakmp sa • Verifies the IKE security association with the source and destination. show crypto engine connections active • Verifies that each Phase 2 SA was built and the amount of traffic sent. show crypto ipsec sa • Verifies that the packets are encap/encrypt/decrypt. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 184 Test Suite 5: Dallas Campus Table 176 show Commands Used for the Dallas Reliability Test 24-Hour View (continued) Command Step 5 Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 177 at 6-hour intervals. Table 177 show Command Used for the Dallas Reliability Test 6-Hour View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed. Results Table 178 shows the Dallas reliability test results. Table 178 Dallas Reliability Test Results Test Results Dallas reliability Passed with exceptions Passed with Exceptions Explanation The Dallas reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 185 Test Suite 6: Remote Campuses • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. Test Suite 6: Remote Campuses This test suite consisted of three test cases intended to verify the functionality, reliability, and performance of basic IP and QoS at the remote campuses. The remote campuses are one component of the larger global enterprise topology. The global enterprise topology comprises five multilayer-design campuses—two large campuses with data centers and three regional campuses—plus 12 remote sites. For more information about the global enterprise topology, see the “Global Enterprise Topology” section of this document. In the test suite for the Remote campuses, the following categories (or types) of testing were conducted: • Functionality testing This test case verified basic IP functionality. The functionality testing involved basic IP testing (Layer 2: VTP and VLAN trunking; Layer 3: EIGRP and OSPF as interior routing protocols, BGP routing, routing traffic setup and routing convergence testing, negative testing, and verification and traffic load testing), network management testing, multicast testing, security testing, voice testing, and QoS testing. • System testing: This test category verified system performance, using IP routing, NMS, voice, multicast, security, and QoS • Reliability testing This test category verified system reliability. This test suite contains the following sections: • Topology Description, page 186 • Remote Functionality Test, page 189 • Remote System Test, page 206 • Remote Reliability Test, page 211 Topology Description The remote campuses consisted of only a single branch layer. The network devices were mostly Catalyst 2950s, Catalyst 3550s, Catalyst 6506s, Cisco 2651s, Cisco 3600s, Cisco 3745s, and Cisco 7206s. The Miami and Phoenix campuses had a GE link to the WAN router. The remainder of the remote campuses consisted of an FE link to the WAN router. Two Catalyst 6506s, each with an MSFC2/PFC2, located in Miami performed both Layer 2 and Layer 3 functions. UNIX end-stations and PCs were used to simulate user traffic with Chariot and other test tools. All WAN routers, except for the Miami Cisco 7206, were used as VoIP voice gateways, registering into a gatekeeper located at San Jose headquarters and placing real VoIP calls to other gateways located at other campuses. The testbeds were used to perform the test for functionality, which included IP routing, network management, multicast, security, VoIP, and QoS. EIGRP and OSPF were the IP IGP routing protocols, and route generators injected a total of 5 simulated subnets at various points in the topology. Global application servers were located at the WAN regional aggregation routers to the remote campuses. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 186 Test Suite 6: Remote Campuses Applications such as Voice, FTP, and HTTP were simulated by Chariot and other traffic-generating test tools. Each of the remote campuses simulated end users by using traffic generators and real Linux stations. Real FTP and HTTP going from remote workstations to the Boston and Dallas campuses were tested by the scripting tool. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 187 Test Suite 6: Remote Campuses Figure 14 shows the remote campuses topology at a high level and includes the names of the individual routers. Figure 14 Remote Campuses Topology Boston Denver FE GE ATM/FR (nx64k) T1(P2P) Dallas San Jose ATM E1 Washington, D.C. E1(P2P) ATM T3 (P2P) UNIX PC Boston San Jose Denver 128 T1 128 768 Dallas Washington, D.C. T1 ATM T3 T1 EGLA-3640-VW EGCS-2651-VW EGNEO-2651-VW EGPIT-3640-VW EGMIA-7206-W1 EGMIA-3640-VW2 EGLA-3550-A EGCS-2950-A EGNEO-2950-A EGPIT-3550-A EGMIA-6506-A2 EGMIA-6506-A1 LA-UX1 CS-PC1 Los Angeles Denver T1 CS-UX1 NEO-PC1 NEO-UX1 Colorado Springs 768 New Orleans 128 PIT-PC1 MIA-UX1 MIA-UX2 MIA-PC1 MIA-PC2 PIT-UX1 Pittsburgh Dallas 384 Miami Washington, D.C. 768 E1 T1 EGPHX-7204-VW EGSAF-2651-VW EGHOU-3660-VW EGNY-3745-VW EGPHX-3550-A EGSAF-2950-A EGHOU-3550-A EGNY-3550-A PHX-PC1 PHX-UX1 SAF-PC1 SAF-UX1 HOU-PC1 HOU-UX1 Phoenix Santa Fe Houston NY-UX1 New York Dallas Dallas Dallas T1 T1 T1 egaus-2621-w1 NY-PC1 egarl-3640-w1 egboc-1760-w1 aus-ux1 arl-ux1 boc-ux1 Austin Arlington Boca Raton egaus-3550-a Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 188 95536 LA-PC1 Test Suite 6: Remote Campuses Platform and Software Version Information Table 179 lists the platforms, router names, software versions, and software images that were configured in the remote campuses network topology for this test suite. Table 179 Remote Campuses Platform, Router Name, Software Version, and Software Image Platform Router Name Software Version Software Image Cisco 3640 egla-3640-vw 12.2(15)T5 c3640-jsx-mz.122-15.T5 Catalyst 3550 egla-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 7204 egphx-7204-vw 12.2(16b) c7200-js-mz.122-16b Catalyst 3550 egphx-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 2651 egcs-2651-vw 12.2(15)T5 c2600-js-mz.122-15.T5 Catalyst 2950 egcs-2950-a 12.1(13)EA1c c2950-i6q4l2-mz.121-13.EA1c Cisco 2651 egsaf-2651-vw 12.2(16b) c2600-js-mz.122-16b Catalyst 2950 egsaf-2950-a 12.1(13)EA1c c2950-i6q4l2-mz.121-13.EA1c Cisco 2651 egneo-2651-vw 12.2(16b) c2600-js-mz.122-16b Catalyst 2950 egneo-2950-a 12.1(13)EA1c c2950-i6q4l2-mz.121-13.EA1c Catalyst 3550 egaus-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 2621 egaus-2621-w1 12.2(16b) c2600-jk9s-mz.122-16b Cisco 3660 eghou-3660-vw 12.2(16b) c3660-jk9s-mz.122-16b Catalyst 3550 eghou-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 3640 egpit-3640-vw 12.2(15)T5 c3640-jsx-mz.122-15.T5 Catalyst 3550 egpit-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Catalyst 6500 egmia-6506-a1 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Catalyst 6500 egmia-6506-a2 12.1(13)E9 c6sup22-jsv-mz.121-13.E9 Cisco 7206 egmia-7206-w1 12.2(15)T5 c7200-js-mz.122-15.T5 Cisco 3640 egmia-3640-vw2 12.2(16b) c3640-a3js-mz.122-16b Cisco 3745 egny-3745-vw 12.2(15)T5 c3745-js-mz.122-15.T5 Catalyst 3550 egny-3550-a 12.1(13)EA1c c3550-i5q3l2-mz.121-13.EA1c Cisco 3640 egarl-3640-w1 12.2(16b) c3640-jk9s-mz.122-16b Cisco 1760 egboc-1760-w1 12.2(15)T5 c1700-k9o3sv8y7-mz.122-15.T5 Remote Functionality Test This is a functionality test for the nEverest Enterprise Global project as it pertains to the remote campuses. The test involved Layer 2 protocols—VTP, VLAN trunking, Layer 3 protocols for EIGRP and OSPF as the interior routing protocol, SNMP, multicast, security, VoIP, QoS, convergence, and negative testing. The functionality test catgegory verified basic IP functionality and included the following sections: • Basic IP • Network management Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 189 Test Suite 6: Remote Campuses • Multicast • Security • Voice • QoS • Negative testing Basic IP The objectives for this test case were as follows: • Verify the basic network operation (that is, network connectivity). • Verify the configurability and stability in a controlled environment for each of the functionality tests. • Verify that the selected software versions can be successfully loaded into the devices. • Verify that the major IP routing features work as expected. The following features were included in the test plan: • VTP and VLAN • VLAN trunking • Routing summarization • EIGRP stub router • OSPF areas • Default route generation from WAN aggregation routers • Log event or change • Other EIGRP feature • Route convergence Test Plan This is a basic IP functionality test for the remote campuses. The test category verified basic IP functionality, the Layer 2 protocols such as STP and VLAN trunking, and Layer 3 protocols, such as OSPF and EIGRP (for interior routing), and BGP (for exterior routing). The procedure used to perform the Remote campuses basic IP test follows: Step 1 Set up the VLANs. All switches work in VTP transparent mode. VLAN 1 is for control traffic on all switches by default. VLAN 10 is for a backdoor network connection for all remote campuses except Santa Fe, New Orleans, and Colorado Springs. VLANs 11, 12, and 13 are used for the end users in all remote campuses except Santa Fe, New Orleans, Miami, and Colorado Springs. For the Catalyst 6506 switches in Miami, VLANs 11 and 12 are used on the first Catalyst 6506 switch, and VLANs 13 and 14 are used on the second Catalyst 6506 switch for the end users. For Colorado Springs, New Orleans, and Santa Fe, VLAN 1 is used for the back door and VLAN 11 is used for the end users. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 190 Test Suite 6: Remote Campuses Step 2 Set up VLAN Trunking. There is no VLAN trunking on Colorado Springs, Santa Fe, New Orleans, and Miami. Step 3 Set up route summarization. All remote campuses are configured as a stub campus except Miami. The WAN links are summarized into one /21 route. Remote campuses accept only WAN regional aggregation routers summarized routes and default routes. The WAN regional aggregation routers have the same local campus routing summarization schema as the campus WAN access router. Auto-summary is turned off on all remote campuses WAN routers and distribution switches. Step 4 Configure the remote site WAN access routers (egla-3640-vw, egphx-7204-vw, egcs-2651-vw, egneo-2651-vw, eghou-3660-vw, egpit-3640-vw, egny-3620-vw, and egmia-3640-vw2) as stub routers, so that the query scope is limited to the WAN regional aggregation routers. Step 5 Configure the OSPF areas for the remote campuses as follows: • egphx-7204-vw—area 3 • egcs-2651-vw—area 3 • egsaf-2651-vw—area 3 and 4 • eghou-3660-vw—area 3 • egmia-7206-vw—area 4 (Miami performs mutual redistribution between OSPF and EIGRP AS 6 [egmia-3640-vw2]). • egmia-6506-c1 and egmia-6506-c2—area 4. Step 6 For default route generation, on the WAN regional aggregation routers, such as egden-7507-w4, egden-7206-w3, egbos-7206-w3, and egwas-7507-w3, configure distribution lists to control the routes advertised into the remote campuses. Only default routes and local campus summary routes are permitted. As the result, the remote campuses will have a primary path to the directly connected campus via the directly connected link. Step 7 Configure eigrp log-neighbor-changes for egmia-3640-vw2, egphx-7204-vw, egny-3620-vw, egla-3640-vw, egcs-2651-vw, egneo-2651-vw, eghou-3660-vw, and egpit-3640-vw. Step 8 Configure log-adjacency-changes for egmia-7206-w1, egphx-7204-vw, egcs-2651-vw, egsaf-2651-vw, and eghou-3660-vw. Step 9 Add the no peer neighbor-route command to all the encapsulation ppp WAN interfaces to avoid suboptimal routing problems for remote campus WAN interface routes. Step 10 Apply MD5 hashed authentication to all WAN links running EIGRP and OSPF. Step 11 Use DART to capture the output of the Cisco IOS show commands listed in Table 180. Step 12 Verify the test setup by analyzing the output of the Cisco IOS show commands captured in Step 11. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 191 Test Suite 6: Remote Campuses Table 180 show Commands Used for the Remote Campuses Basic IP Test Verification Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show ip route On all the WAN routers: and • Verifies that the routes are summarized as expected. • Verifies that the routing filters work as expected. show ip route summary show processes cpu show memory summary Every 30 seconds on all WAN routers: • Verifies that CPU capacity is not being monopolized by a single router. • Verifies that there are no memory leaks or errors. • Verifies that there are no other significant errors for EIGRP routing. On all the WAN routers: show ip eigrp neighbors detail show ip ospf neighbor Verifies the CPU utilization. On all the WAN routers: show log show interfaces • • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. • Verifies that the remote WAN routers are EIGRP stub-enabled. On all the routers: • Verifies the state of the OSPF neighbors. Expected Results We expect the following results: • The selected software versions can be loaded into the devices. • The major IP routing features work as expected. • The VTP and VLAN configuration will work correctly. • The spanning-tree roots on the distribution switches work correctly. Results Table 181 shows the remote campuses basic IP test results. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 192 Test Suite 6: Remote Campuses Table 181 Remote Campuses Basic IP Test Results Test Results Remote campuses basic IP Passed Network Management This section describes the network management testing in the remote campuses. The following features were included in the test plan: • MIB walk automation script (snmp_walk_test) and traps • Syslog and NTP The objectives of the SNMP MIB testing were as follows: • Ensure that the information stored in the MIB database can be accessed, propagated, read, and written if applicable. • Ensure that the operation of the OID values reflects the actual operation on the device. • Ensure that there were no SNMP traps. Test Plan The procedure used to perform the network management test follows: Step 1 Configure MIB Walk and Traps. The MIB walk automation script (snmp_walk_test) will test the OID and traps by platforms and technologies, report their value, and monitor the UUT behavior. HP OpenView and CiscoWorks2000 are used as the SNMP receivers. Step 2 Configure all the routers and switches so that the snmp_walk_test script will work properly. Step 3 Upload the following MIBs to the snmp_walk_test script: • Basic IP: – CISCO-VTP-MIB – CISCO-OSPF-MIB • Multicast: – CISCO-IGMP-MIB – CISCO-PIM-MIB – CISCO-IPMROUTE-MIB • Voice: – CISCO-VOICE-DIAL-CONTROL-MIB – CISCO-CCM-MIB • QoS: – CISCO-QOS-MIB • IPSec: – CISCO_IPSEC_MIB Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 193 Test Suite 6: Remote Campuses – CISCO_IPSEC_FLOW_MONITOR_MIB Step 4 Set up the eg-cw2k (CiscoWorks2000) server in the San Jose campus as the UNIX NTP and syslog server. Step 5 Use DART to capture show command output from the routers. Step 6 Use the show processes cpu command to verify the CPU utilization and to verify that the CPU capacity is not being monopolized by a single router. Step 7 Use the show memory summary command to verify that there are no memory leaks or errors. Step 8 On server eg-cw2k, verify that syslogd is still running. Step 9 Use the Cisco IOS show clock command to verify that the clock is synchronized with the NTP server. Step 10 Verify that the Pat scripts are able to send e-mail notification for error conditions on the routers or switches. Step 11 Use the show log command or the show align command to verify that there are no other significant errors. Expected Results We expect the following results: • Information stored in the MIB can be accessed, propagated, read, and written. • Operation of the OID values reflect the actual operation of the device. Results Table 182 shows the remote network management test results. Table 182 Remote Network Management Test Results Test Results Remote network management Passed Multicast The objective of the remote campuses multicast testing was to verify the functionality of multicast features across multiple Cisco platforms with various sets of Cisco IOS and CatOS releases. The following features were included in the test plan: • IGMP-v2 • IGMP snooping • MMLS • PIM sparse-dense mode The test was set up to use Cisco IP/TV as a one-to-many video and audio streaming application by configuring an IP/TV server at the San Jose campus data center to stream six multicast groups. There were three video and three audio groups. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 194 Test Suite 6: Remote Campuses Test Plan Setup The procedure used to set up the multicast test follows: Step 1 Configure Cisco IP/TV by performing the following steps: a. Connect the IP/TV server to switch egsj-6505-sa3. b. Connect the IP/TV clients to the following devices: c. • Los Angeles remote site— egla-3550-a • Pittsburgh remote site—egpit-3550-a • New York remote site—egny-3550-a • Miami remote site—egmia-6506-a1 Configure the IP/TV server to stream the “G2” program, which contains a 239.192.2.0/24 multicast address scope and consists of a 300-kbps video and audio stream. Note The IP/TV client at Pittsburgh receives only a 100-kbps video stream from the Boston campus. Step 2 Enable IGMP-v2. This feature is enabled by default in Native IOS and Cisco IOS software, so no additional configuration is required. Step 3 Enable IGMP snooping on the following Remote campus Layer 2 switches: • egla-3550-a • egpit-3550-a • egny-3550-a • egmia-6506-a1 This feature is enabled by default in Native IOS, so no additional configuration for Layer 3 is required. Step 4 Enable MMLS on the Catalyst 6500 and Catalyst 4000 Layer 3 distribution switches. This feature is enabled by default in Native IOS, so no additional configuration is required. Step 5 Enable PIM sparse-dense mode on the following remote routers: • egla-3640-vw • egpit-3640-vw • egny-3620-vw • egmia-7206-w1 Verification The procedure used to perform the multicast verification test follows: Step 1 Use DART to capture the output of the generic show commands listed in Table 183. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 195 Test Suite 6: Remote Campuses Table 183 Generic show Commands Used in the Remote Multicast Verification Test Command Purpose show processes cpu • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. show memory summary • Verifies that there are no memory leaks or other memory errors. show buffer failure • Verifies a buffer or memory failure. show interfaces [interface type] • Verifies that there are no input errors, output errors, or queue drops. • Verifies the router's throughput. • Verifies that there are no other significant errors. show logging Step 2 Using the show commands listed in Table 184, verify that IGMPv2 is communicated among routers and switches to dynamically register or leave a multicast group on a LAN segment. In addition, verify the following: • The router with the lower IP address is the correct IGMP querier. • The router installs group members upon receipt of IGMP join messages. • All groups are seen for all IGMP joined groups. • The router sends PIM join messages as a consequence of receiving IGMP join messages and creates the corresponding (*,G) entries. Table 184 show Commands Used in the Remote Multicast IGMPv2 Verification Test Command Step 3 Purpose show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. Using the show commands listed in Table 185, verify that IGMP snooping functions as follows: • IGMP snooping manages multicast traffic at Layer 2 by configuring the Layer 2 LAN port dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 196 Test Suite 6: Remote Campuses Table 185 show Commands Used in the Remote Multicast IGMP Snooping Verification Test Command Purpose show ip igmp snooping mroute On Layer 3 switches: • show mac-address-table multicast vlan-id On Layer 3 switches: • Step 4 Verifies that the correct multicast addresses are present in the output. Using the show command listed in Table 186, verify that MMLS functions as follows: • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts. In the Catalyst 6500s, the flows are taking the correct paths. • The flows are using the expected multicast forwarding entry (*,G) or (S,G). • Hardware-based flows are created where expected. • Identify the lowest rate of the traffic flow at which a hardware shortcut is created. • CPU utilization does not increase. If it does, then there is a possibility that flows are being software switched. • On DFC cards, forwarding tables on line cards are the same as on the processor card. Table 186 show Command Used in the Remote Multicast MMLS Verification Test Command show mls ip multicast Step 5 Verifies that the correct multicast router has been learned. Purpose • Verifies that multicast flows create MMLS entries, and that switching of the flow is performed. Using the show commands listed in Table 187, verify that PIM sparse-dense mode functions as follows: • Multicast forwarding is achieved using PIM. PIM interacts with the IP unicast forwarding table to determine the correct path to the source of the multicast packets (RPF), and interacts with IGMP to recognize networks that have members of the multicast group. • All expected PIM neighbors are present and no unknown routers appear. • The correct DR election is made on the LAN segment. • The correct IIF and OIF lists, RPF, and flags are present in the (*,G) or (S,G) entries. • The correct RP mapping is shown for all groups. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 197 Test Suite 6: Remote Campuses Table 187 show Commands Used in the Remote Multicast PIM Sparse-Dense-Mode Verification Test Command Purpose show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip pim interface • Verifies the correct DR election on the LAN segment. show ip mroute • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Expected Results We expect the following results: • IGMPv2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. • IGMP snooping manages multicast traffic at Layer 2 by configuring Layer 2 LAN ports dynamically to forward multicast traffic to only those ports that want to receive it. • IGMP snooping constrains multicast traffic that exits through LAN ports to which hosts are connected. • Multicast flows create MMLS entries and switching of the flow is performed using hardware shortcuts in the Catalyst 6500. • Multicast forwarding is achieved using PIM. Results Table 188 shows the remote multicast test results. Table 188 Remote Multicast Test Results Test Results Remote multicast Passed Security This security test was conducted for the remote campuses. This test case verified the functionality of IPSec, AAA, and SNMP features commonly used by enterprise customers that integrate across multiple Cisco platforms and Cisco IOS releases at the system level. The objectives of the security test were as follows: • Verify that the IPSec tunnel is established between the campus and the remote WAN edge routers. Authentication was done with IKE preshared keys. • Verify the interaction of encrypted data streams with unencrypted voice streams between the campus and the remote WAN edge routers. Observe the ability of the router to do voice and IPSec. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 198 Test Suite 6: Remote Campuses • Verify TACACS+ AAA services at a system level for all access, distribution, core, and WAN edge devices in the global topology. The following features were configured for the security test: • IPSec IKE pre-shared transport/tunnel mode • AAA TACACS+ • Security commands Test Plan Setup The procedure used to set up the remote security test follows: Step 1 Perform Step 2 through Step 11 to configure security features on the following devices: • egdal-7206-w3 • eghou-3660-vw Step 2 Configure IKE policy. Step 3 Configure IPSec transforms and protocol. Step 4 Create access lists for encryption. Step 5 Apply the crypto maps on the serial interfaces. Step 6 Configure encryption service facility and AAA TACACS+. Step 7 Configure the time-stamping service facility for logging. Step 8 Disable all unnecessary services. Step 9 Configure an enable password. Step 10 Configure a console port password. Step 11 Configure a vty password. Verification The procedure used to perform the Remote security verification test follows: Step 1 Use the show crypto isakmp policy command to verify that the policy number has the correct security algorithm. Step 2 Use the show crypto isakmp sa command to verify the IKE security association with the source and destination. Step 3 Use the show crypto engine connections active command to verify that each Phase 2 SA is built and the correct amount of traffic sent. Step 4 Use the show crypto map command to verify that the crypto map is configured properly on the tunnel and the physical interface. Step 5 Use the show crypto key mypubkey rsa command to verify the router RSA public keys. Step 6 Use the show crypto ipsec sa command to verify that the packets are encap/encrypt/decrypt. Step 7 Use the show crypto isakmp sa command to verify that the ISAKMP Security Association (SA) is built between peers. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 199 Test Suite 6: Remote Campuses Step 8 Use the show tacacs command to verify that the user is logging in to the TACACS+ server 223.255.10.30. Step 9 Use the show accounting command to verify the user account on the router and switches with privilege 15. Expected Results We expect the following results: • The IPSec tunnel is established between the campus and remote WAN edge routers. • Encrypted data streams can interact with unencrypted voice streams between the Dallas campus and the Austin remote WAN edge routers. The router can do voice and IPSec. • TACACS+ AAA services function properly at a system level for all access, distribution, core, and WAN edge devices in the global topology. Results Table 189 shows the remote security test results. Table 189 Remote Security Test Results Test Results Remote security Passed Voice The Cisco CallManager in the San Jose campus is designed with centralized architecture. There were IP Phones installed, connected to the Remote WAN routers that were running Cisco IOS software with the Survivable Remote Site Telephony (SRST) feature set. These IP phones registered to the central CallManager. After the voice testing was done between the remotes and the main campuses, a negative test was performed by tearing down the WAN link on these gateways to verify that the IP phones reregistered to the SRST-enabled gateways and could make analog and digital calls to the end devices on the same gateway. The following features were configured for voice testing: • Legacy H.323 VoIP • SRST Test Plan The voice test verified that voice traffic operated properly across the network. The procedure used to conduct the remote campuses voice test follows: Step 1 Configure the H.323 voice gateways on the following remote campus routers: • egla-3640-vw • egphx-7204-vw • egsaf-2651-vw Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 200 Test Suite 6: Remote Campuses • egneo-2651-vw • egcs-2651-vw • egny-3620-vw • eghou-3660-vw • egpit-3640-vw • egmia-3640-vw2 Step 2 Configure the BCG test tool. Step 3 Configure the SRS telephony feature on the Los Angeles, Colorado Springs, and Pittsburgh campuses. Step 4 Configure CallManager Fallback. Step 5 Enable the Cisco CallManager Fallback capability. Step 6 Enable the routers to receive skinny messages. The default port is 2000. Step 7 Analyze the output of the show commands listed in Table 190. Use the listed commands on all the routers and collect the output using the DART tool. Table 190 show Commands Used for the Remote Campuses Voice Test Command Purpose show gateway • Verifies that the voice gateway is connected to the gatekeeper egsj-3640-gk. show processes cpu • Verifies the CPU utilization. show clock • Verifies the current time. show memory summary • Verifies that there are no memory leaks. show interfaces [interface type] • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the rate will be dropped. show call-manager-fallback all For SRST verification: • Verifies that the remote campus can still make calls within the campus. Step 8 Capture the output statistics of Callgen by using CIC. Step 9 Use performance monitor to check real time the number of gateways and IP phones registered. Step 10 Configure an IP phone manually, install it in each campus, and make call to test voice quality. Expected Results We expect the following results: • Voice traffic sent efficiently and all voice channels originated and terminated properly. • All originate and terminate BCG channels work properly and without any significant errors. • SRST functioned properly. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 201 Test Suite 6: Remote Campuses Results Table 191 shows the remote campus voice test results. Table 191 Remote Campus Voice Test Results Test Results Remote voice verification Passed QoS The high-level objective of the QoS testing was to validate a robust QoS solution for protecting critical application data, including real-time VoIP, on interarea WAN links, including classification and marking as close to the network edge as possible, and remarking from L2 CoS to L3 ToS. QoS Setup Test The QoS setup test verified that QoS features were configured correctly and that the QoS features were applied to traffic classes as anticipated. In this test, the MQC three-step model was used to configure the traffic classes, class maps, and policy maps. The following features were included in the test plan: • Classification and marking—Access lists, DSCP values, port numbers, IP precedence and NBAR • Congestion management—CBWFQ and LLQ • Traffic conditioning—FRTS and GTS • Link efficiency mechanisms—Compressed Real-Time Protocol (cRTP) and MLP Interleaving Test Plan The procedure used to perform the QoS setup test follows: Step 1 Step 2 Define the access lists and traffic classes using the following guidelines: • Classify VoIP traffic into a class map called “Real-Time.” • Classify applications with small or infrequently sent packets, such as Telnet and voice signaling, into a class map called “Interactive.” • Classify IP/TV multicast video conferencing and multicast signaling into the “Conferencing” class. • Classify the mission-critical traffic or traffic that can consume large amounts of bandwidth, such as Oracle and SAP, into a class map called “Transactional.” • Classify Real Media, a UDP-based application for video streaming, into the “Streaming” class. • Classify routing traffic into the “Control” class. • Classify HTTP and FTP traffic into the “class-default” class, which is the class map for best-effort service. Associate the policy maps and actions with each class of traffic by performing the following steps: a. Configure policy maps "OUT-WAN-FF1," "OUT-WAN-AF3," and "OUT-WAN-FF2" on egsaf-2651-vw, egneo-2651-vw, egcs-2651-vw, eghou-3660-vw, egpit-3640-vw, egny-3620-vw, and egphx-7204-vw routers that have link speeds of 768 kbps and lower. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 202 Test Suite 6: Remote Campuses b. Step 3 Configure policy maps "OUT-WAN-DT1," "OUT-WAN-DT3," "OUT-WAN-DT4," "OUT-WAN-DT5," "OUT-WAN-DT7,"on egmia-7206-w1, egla-3640-vw, egphx-7204-vw, eghou-3660-vw, egpit-3640-vw, egny-3620-vw, and egmia-3640-vw2 routers that have T1/E1/T3 links. Attach policy maps to the interfaces listed in Table 192, and apply the other appropriate QoS features. Table 192 shows the router name, the policy map created, and the interface to which the policy map was applied (attached). In some instances, instead of attaching a policy map to the interface, a specific feature was applied. Table 192 Routers, Policy Maps, and Interfaces for Remote QoS Setup Test Router Policy Map or Feature Interface egcs-2651-vw OUT-LAN-FE Fa0/1 egcs-2651-vw OUT-WAN-FF1 Serial0/0 egla-3640-vw OUT-LAN-FE Fa1/0 egla-3640-vw OUT-WAN-DT1 Serial0/0:0 egmia-3640-vw2 OUT-LAN-FE Fa0/1 egmia-3640-vw2 OUT-LAN-FE Fa1/0 egmia-3640-vw2 OUT-WAN-DT7 Serial1/0 egmia-7206-w1 OUT-LAN-FE Fa1/0 egmia-7206-w1 OUT-LAN-FE Fa2/0 egmia-7206-w1 OUT-LAN-GE Gi0/1 egneo-2651-vw OUT-WAN-FE Fa0/1 egneo-2651-vw OUT-WAN-AF3 Virtual-Template20 egny-3745-vw OUT-LAN-FE Fa0/1 egny-3745-vw OUT-WAN-DT6 Serial0/0 egphx-7204-vw OUT-LAN-GE Gi0/0 egphx-7204-vw OUT-WAN-DT3 Serial4/0:0 egpit-3640-vw OUT-LAN-FE Fa1/0 egpit-3640-vw OUT-WAN-DT5 Serial0/0 eghou-3660-vw OUT-LAN-FE Fa0/0 eghou-3660-vw OUT-WAN-DT4 Serial3/0:0 egsaf-2651-vw OUT-LAN-FE Fa0/1 egsaf-2651-vw OUT-WAN-FF2 Serial0/0 Expected Results We expect the following results: • Access lists and traffic classes were correctly defined. • Policy maps and actions were correctly associated. • Policy maps were attached to the appropriate interfaces. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 203 Test Suite 6: Remote Campuses • QoS features were configured and were functioning properly. Results Table 193 shows the remote QoS setup test results. Table 193 Remote QoS Setup Test Results Test Results Remote QoS setup Passed QoS Verification Test This test verified that incoming and outgoing data traffic was handled properly on the network, and that various QoS features (such as traffic shaping and QoS policy maps) were functioning correctly. In this test, data traffic were used, QoS features were configured, and the network was experiencing traffic congestion. Test Plan The procedure used to perform the remote QoS verification test follows: Step 1 Start the Chariot traffic testing tool to congest the network. Step 2 Use DART to capture the output of the Cisco IOS show commands listed in Table 194. The show processes cpu command was used every 30 seconds for 2 hours. The other commands were used every 5 minutes for 2 hours. Table 194 show Commands Used on the Remote WAN Routers Command Purpose show clock • Verifies the current time. show policy-map interface [interface name] • Verifies that data traffic gets the percentage of bandwidth assigned in the policy maps. show interfaces [interface type] On all outbound WAN interfaces: • Verifies the link speed and drop rate. If traffic shaping is configured on the interface, the output rate should not exceed the shaped rate. Traffic exceeding the shaped rate is dropped. show memory summary • Verifies that there are no memory leaks. show processes cpu • Verifies the CPU utilization. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show traffic-shape statistics • Verifies that traffic shaping is enabled. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 204 Test Suite 6: Remote Campuses Table 194 show Commands Used on the Remote WAN Routers (continued) Command Purpose show ppp multilink [interface type] • Verifies multilink PPP status, such as number of member interfaces configured per bundled interface. show ip rtp header compression • Verifies that IP RTP header compression is turned on and if there are any errors. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed. Results Table 195 shows the remote QoS verification test results. Table 195 Remote QoS Verification Test Results Test Results Remote QoS verification Passed Negative Test This test verifies the QoS functionality if a primary WAN link fails. Test Plan The procedure used to perform the negative test follows: Step 1 Ensure that the BCG, Chariot, and IXIA traffic testing tools are running. Step 2 Use the show ip route command to verify that all simulated routes exist. Step 3 Set up a continuous ping between two PCs located in two points in the topology. Set the ping packet size to 512 bytes. Set the ping timeout to 500 ms. Step 4 During the ping test, make one of the following link-to-router connections fail during each pass: • New York primary link • Pittsburgh primary link Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 205 Test Suite 6: Remote Campuses • Houston primary link • Phoenix primary link • New Orleans primary link Step 5 Capture the number of ping packets lost, and derive the convergence time from the product of the total number of packets lost and the ping timeout setting. Step 6 Restore the failed link. Step 7 After the link-to-router connection is up, repeat Step 4 through Step 6 for each link. Expected Results We expect the following results: • The QoS features will function correctly if a primary WAN link fails. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed correctly. Results Table 196 shows the results of the remote negative test. Table 196 Remote Negative Test Results Test Results Remote negative Passed Remote System Test This is the system test case for IP routing, SNMP, security, multicast, VoIP, and QoS features for the nEverest Enterprise Global project as it pertains to the remote campuses. The overall objectives of this test case were as follows: • Verify that the IP routing, SNMP, security, multicast, VoIP, and QoS features could be incorporated into the remote campuses. • Verify the successful operation of the Cisco IOS release. • Verify that the system behaved as expected. This test case verified system performance for a number of QoS features, using OSPF and BGP as the routing protocols. The features that were configured for the Remote functionality test were carried over to this test. The following additional features were configured in this test case: • CBWFQ Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 206 Test Suite 6: Remote Campuses • PQ • MLPPP performance enhancements • CEF support for IP routing between IEEE 802.1Q vLANs • CGMP • DES/3DES VPN encryption AIM for 2600/3600 • EIGRP • Enhanced IGRP stub routing • Frame Relay—FRF.5 and FRF.8 • MQC – based FRTS • GRE tunnel support • H.323/H.320 gateway • Cisco IP phone support • IEEE 802.1Q VLAN support • IGMP snooping querier • IGMP Version 2 • IKE security protocol • IP routing • SRST Version 3.0 • LFI for Frame Relay and ATM virtual circuits • LLQ with priority percentage support • MLPPP with LFI • MQC • MSDP • OSPF • PIM MIB extension for IP multicast • PIM Version 2 • RFC 1850 OSPFv2 MIB support • TACACS+ Test Plan The procedure used to perform the remote system test follows: Step 1 Step 2 Start the traffic streams for 100 percent of the traffic load as follows: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Use DART to capture information from the routers for 4 hours. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 207 Test Suite 6: Remote Campuses Step 3 Analyze the output of the Cisco IOS show commands listed in Table 197 at the start and end of the 4-hour test. Table 197 show Commands Used for the Remote System Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip ospf neighbors detail • Verifies that the OSPF neighbor information on a per-interface basis. show ip ospf interface • Verifies if the OSPF adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. • Verifies the OSPF area and determines if OSPF is enabled. • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show ip eigrp interface show interfaces On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show crypto isakmp policy • Verifies that the IKE Policy number has the correct security algorithm. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 208 Test Suite 6: Remote Campuses Table 197 show Commands Used for the Remote System Test Start and End View (continued) Command Step 4 Purpose show crypto map [interface x | tag map-name] • Verifies that the crypto map is configured properly on the tunnel and the physical interface. show crypto key mypubkey rsa • Verifies the router's RSA public keys. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 198 at 60-minute intervals. Table 198 show Commands Used for the Remote System Test 60-Minute View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip eigrp neighbors • Verifies the Remote WAN router neighbors. show ip ospf neighbors • Verifies the state of the OSPF neighbors. show crypto isakmp sa • Verifies the IKE security association with the source and destination. show crypto engine connections active • Verifies that each Phase 2 SA was built and the amount of traffic sent. show crypto ipsec sa • Verifies that the packets are encap/encrypt/decrypt. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 209 Test Suite 6: Remote Campuses Table 198 show Commands Used for the Remote System Test 60-Minute View (continued) Command Step 5 Purpose show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 199 at 10-minute intervals. Table 199 show Command Used for the Remote System Test 10-Minute View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. • Routes converged correctly without major delay. • All other procedures executed. Results Table 200 shows the remote system test results. Table 200 Remote System Test Results Test Results Remote system Passed Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 210 Test Suite 6: Remote Campuses Remote Reliability Test This section describes in detail the reliability test case as it pertains to the remote campuses, using EIGRP and OSPF as the interior routing protocols. Successful execution of the remote system test case is a prerequisite for the execution of this test. The reliability test ran continuously for 150 hours, with IP routing, NMS, voice, multicast, security, and QoS features enabled. This test category verified system performance for a number of QoS features. The features that were configured for the Remote functionality test were carried over to this test. The following additional features were configured in this test category: • CBWFQ • PQ • MLPPP performance enhancements • CEF Support for IP routing between IEEE 802.1Q VLANs • DES/3DES VPN encryption AIM for Cisco 2600/3600 • EIGRP • Enhanced IGRP Stub Routing • Frame Relay—FRF.5 and FRF.8 • MQC)-based FRTS • GRE tunnel support • H.323/H.320 gateway • Cisco IP phone support • IEEE 802.1Q VLAN support • IGMP snooping querier • IGMP Version 2 • IKE security protocol • IP routing • SRST Version 3.0 • LFI for Frame Relay and ATM virtual circuits • LLQ with priority percentage support • MD5 password encryption • MLPPP with LFI • MQC • NBAR Real Time Control Protocol • OSPF • PIM MIB extension for IP multicast • PIM Version 2 • RFC 1850 OSPFv2 MIB support • RTP header compression • TACACS+ Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 211 Test Suite 6: Remote Campuses The objective of this case was to verify that the software is stable and reliable in the testbed during the 150-hour test period, with 100 percent or more traffic load on each WAN link. Test Plan The procedure used to perform the remote reliability test follows: Step 1 Start traffic streams for a 100 percent traffic load by performing the following steps: a. Start the BCG (Callgen) to generate calls. b. Start Chariot to simulate NetMeeting, Telnet, Lotus, Oracle, FTP, and HTTP traffic. c. Start IP/TV, for multicast traffic. d. Start IXIA, for background traffic. Step 2 Use DART to capture information from the routers for 4 hours. Step 3 Analyze the output of the Cisco IOS show commands listed in Table 201 at the start and end of the 4-hour test. Table 201 show Commands Used for the Remote Reliability Test Start and End View Command Purpose show vtp status • Verifies that the VTP feature is enabled. show vlan brief • Verifies VLAN status and port assignments. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. show ip eigrp neighbors detail • Verifies that the remote WAN routers are EIGRP stub-enabled. show ip ospf neighbors detail • Verifies that the OSPF neighbor information on a per-interface basis. show ip ospf interface • Verifies if the OSPF adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. • Verifies the OSPF area and determines if OSPF is enabled. • Verifies if the EIGRP adjacent neighbor count is higher than the neighbor count. If so, the neighbor list could be corrupted. show ip eigrp interface show interfaces On all the WAN routers: • Verifies that there are no input or output errors or queue drops. • Verifies the routers’ throughput. show clock • Verifies that the clock is synchronized with the NTP server. show buffer failure • Verifies a buffer or memory failure. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 212 Test Suite 6: Remote Campuses Table 201 show Commands Used for the Remote Reliability Test Start and End View (continued) Command Step 4 Purpose show ip igmp interface • Verifies that IGMP v2 is communicated among routers and hosts to dynamically register or leave a multicast group on a LAN segment. show ip igmp groups • Verifies that the routers install group members upon receipt of IGMP join messages. show mac-address-table multicast vlan vlan-id • Verifies that the correct multicast addresses are present in the output. show mls ip multicast • Verifies that multicast flows create MMLS entries and that switching of the flow is performed. show crypto isakmp policy • Verifies that the IKE policy number has the correct security algorithm. show crypto map [interface x | tag map-name] • Verifies that the crypto map is configured properly on the tunnel and the physical interface. show crypto key mypubkey rsa • Verifies the router's RSA public keys. show tacacs • Verifies that you are logging in to the correct TACACS+ server. show accounting • Verifies user account on the router and switches with privilege 15. show gateway • Verifies that the voice gateway is connected to gatekeeper egsj-3640-GK. show interfaces virtual-access • Verifies the configuration of the active virtual access interface that was configured by the virtual template. show frame-relay pvc dlci • Verifies the encapsulation type, min cir, fragmentation information, and policies applied to this PVC. show ip pim interface • Verifies the correct DR election on the LAN segment. Analyze the output of the Cisco IOS show commands listed in Table 202 at 24-hour intervals. Table 202 show Commands Used for the Remote Reliability Test 24-Hour View Command Purpose show interface trunk • Verifies that the VLAN trunkings are formed correctly. show ip route summary • Verifies the current state of the routing table. show memory summary On all the WAN routers: • Verifies that there are no memory leaks or errors. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 213 Test Suite 6: Remote Campuses Table 202 show Commands Used for the Remote Reliability Test 24-Hour View (continued) Command Step 5 Purpose show ip eigrp neighbors • Verifies the Remote WAN router neighbors. show ip ospf neighbors • Verifies the state of the OSPF neighbors. show crypto isakmp sa • Verifies the IKE security association with the source and destination. show crypto engine connections active • Verifies that each Phase 2 SA was built and the amount of traffic sent. show crypto ipsec sa • Verifies that the packets are encap/encrypt/decrypt. show policy interface • Verifies that voice and data traffic get the percentage of bandwidth assigned in the policy maps. show ip rtp header compression • Verifies that IP RTP header compression is enabled for the voice traffic and if there are any errors. show call-manager-fallback all • Verifies that the remote campus can still make calls within the campus. show ip pim neighbor • Verifies that all expected PIM neighbors are present. show ip mroute summary • Verifies the correct IIF and OIF lists, RPF, and flags in the (*,G) or (S,G) entries. Analyze the output of the Cisco IOS show command listed in Table 203 at 6-hour intervals. Table 203 show Command Used for the Remote Reliability Test 6-Hour View Command Purpose show processes cpu On all the WAN routers: • Verifies the CPU utilization. • Verifies that CPU capacity is not being monopolized by a single router. Expected Results We expect the following results: • CPU utilization was always less than 90 percent. • No system or feature errors (such as router or switch failures, reloads, or CPU hogs) occurred during testing. • No significant errors occurred, such as memory allocation errors, memory access errors, memory leaks, or unexpected interface toggles. • Routing tables correctly reflected all available supernets and subnets. • All client/server traffic traversed from source to destination through the expected route for the duration of the test. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 214 Supplementary Information • Routes converged correctly without major delay. • All other procedures executed. Results Table 204 shows the remote reliability test results. Table 204 Remote Reliability Test Results Test Results Remote reliability Passed with exceptions Passed with Exceptions Explanation The Remote reliability test passed with exceptions for the following reasons: • Because of an automated job scheduling conflict with a data collection tool, 14 hours of test data was not collected. The test results were not affected. • The IXIA traffic generator was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There were no problems in the network and the test results were not affected. • An H.323 VoIP traffic generator failed to start, resulting in a 2-hours delay of the start of VoIP traffic between the Denver campus and the remote campuses. The test results were not affected. • One of the multicast clients was turned off to allow problem-characterization work on Chariot and was not turned on until several hours after the start of the test. There was no multicast traffic between San Jose and Los Angeles while the client was off, but there were no problems in the network and the test results were not affected. Supplementary Information This section contains additional information about the global enterprise system testing. It includes device characteristics for the devices used in the lab environment. Device Characteristics Table 205 through Table 291 contain the device characteristics for the devices used in the global enterprise campus testbed. Table 205 shows the device characteristics for egsj-7609-w1. Table 205 Device Characteristics for egsj-7609-w1 Hostname egsj-7609-w1 Platform Cisco 7609 Memory 458752K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 215 Supplementary Information Table 205 Hardware Device Characteristics for egsj-7609-w1 (continued) Slot 2: FWS-X6182-2PA Bay 0: Mx HSSI PA, 2 ports Bay 1: ENHANCED ATM OC3 MM PA, 1 port Slot 4: FWS-X6182-2PA Slot 6: 2-port POS-OC12-MM-SR controller Table 206 shows the device characteristics for egsj-7609-w2. Table 206 Device Characteristics for egsj-7609-w2 Hostname egsj-7609-w2 Platform Cisco 7609 Memory 458752K Hardware Slot 2: FWS-X6182-2PA Bay 0: T3+ Serial PA, 2 ports Bay 1: CT3 single wide PA, 1 port Slot 3: FWS-X6182-2PA Bay 0: ENHANCED ATM DS3 PA, 1 port Bay 1: POS PA, 1 port, PA-POSSW-MM Slot 6: 2-port POS-OC12-MM-SR controller Table 207 shows the device characteristics for egsj-7206-w3. Table 207 Device Characteristics for egsj-7206-w3 Hostname egsj-7206-w3 Platform Cisco 7206 Memory 122880K Hardware Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX-nISL PA-FE-TX PA-MC-2T1 Table 208 shows the device characteristics for egsj-6509-c1. . Table 208 Device Characteristics for egsj-6509-c1 Hostname egsj-6509-c1 Platform Catalyst 6500 Memory 458752K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 216 Supplementary Information Table 208 Hardware Device Characteristics for egsj-6509-c1 (continued) Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE 2 0 Supervisor-Other unknown 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 2 Network Analysis Module WS-X6380-NAM 5 0 Switching Fabric Module-128 (Active) WS-C6500-SFM 6 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod --1 2 3 4 5 6 MAC addresses Hw Fw ---------------------------------- ------ -----------0001.c9da.eeac to 0001.c9da.eead 3.2 6.1(3) 0000.0000.0000 to 0000.0000.0000 0.0 Unknown 0002.7ee1.55d0 to 0002.7ee1.55df 1.2 12.1(5r)E1 0008.a430.30b2 to 0008.a430.30b3 1.3 4B4LZ0XA 0001.0002.0003 to 0001.0002.0003 1.2 6.1(3) 0005.7481.d858 to 0005.7481.d887 6.0 5.4(2) Mod --1 1 3 6 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-PWR Serial No. ----------SAD0604019E unknown SAD055101NW SAD060301JP SAL0552FQA0 SAL0601FY1Z Sw -----------7.5(0.6)HUB1 Unknown 12.1(nightly 1.2(1) 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Unknown Ok Ok Ok Ok Serial Hw --------------- ------SAD060300ZB 3.0 SAD060402BG 1.3 SAD060100DS 2.0 1.0 Status ------Ok Ok Ok Ok Table 209 shows the device characteristics for egsj-6509-c2. Table 209 Device Characteristics for egsj-6509-c2 Hostname egsj-6509-c2 Platform Catalyst 6500 Memory 458752K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE 2 0 Supervisor-Other unknown 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 2 Network Analysis Module WS-X6380-NAM 5 0 Switching Fabric Module-128 (Active) WS-C6500-SFM 6 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.bc5e to 0001.6415.bc5f 3.2 6.1(3) 2 0000.0000.0000 to 0000.0000.0000 0.0 Unknown 3 0001.63d4.4bc2 to 0001.63d4.4bd1 1.2 12.1(5r)E1 4 0003.3287.bd2c to 0003.3287.bd2d 1.3 4B4LZ0XA 5 0001.0002.0003 to 0001.0002.0003 1.2 6.1(3) 6 0004.6d42.2320 to 0004.6d42.234f 1.4 5.4(2) Mod --1 1 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD060300HG unknown SAD055101JX SAD060301KE SAD060200CA SAL05031CUC Sw -----------7.5(0.6)HUB1 Unknown 12.1(nightly 1.2(1) 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Unknown Ok Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060300UE 3.0 Ok SAD060102T3 1.3 Ok SAD060100FM 2.0 Ok Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 217 Supplementary Information Table 210 shows the device characteristics for egsj-6509-c3. Table 210 Device Characteristics for egsj-6509-c3 Hostname egsj-6509-c3 Platform Catalyst 6500 Memory 112640K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE 2 0 Supervisor-Other unknown 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 5 0 Switching Fabric Module-128 (Active) WS-C6500-SFM Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6414.f0fa to 0001.6414.f0fb 2.2 6.1(3) 2 0000.0000.0000 to 0000.0000.0000 0.0 Unknown 3 0001.6477.561a to 0001.6477.5629 1.1 12.1(5r)E1 4 0002.fc1f.4298 to 0002.fc1f.42c7 2.1 5.4(2) 5 0001.0002.0003 to 0001.0002.0003 1.2 6.1(3) Mod --1 1 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-PWR Serial No. ----------SAD05060K6D unknown SAD0548014T SAD044103J6 SAD060200BS Sw -----------7.5(0.6)HUB1 Unknown 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Unknown Ok Ok Ok Serial Hw Status --------------- ------- ------SAD050610PY 1.3 Ok SAD05060YLS 1.2 Ok SAD060301EE 2.0 Ok 1.0 Ok Table 211 shows the device characteristics for egsj-6509-c4. Table 211 Device Characteristics for egsj-6509-c4 Hostname egsj-6509-c4 Platform Catalyst 6500 Memory 458752K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 218 Supplementary Information Table 211 Hardware Device Characteristics for egsj-6509-c4 (continued) Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 0 Supervisor-Other unknown 3 16 Pure SFM-mode 16 port 1000mb GBIC WS-X6816-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 5 0 Switching Fabric Module-128 (Active) WS-C6500-SFM Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.7490 to 0002.7e38.7491 3.2 6.1(3) 2 0000.0000.0000 to 0000.0000.0000 0.0 Unknown 3 0002.7ee1.2360 to 0002.7ee1.236f 1.1 12.1(5r)E1 4 0005.7481.a858 to 0005.7481.a887 6.0 5.4(2) 5 0001.0002.0003 to 0001.0002.0003 1.2 6.1(3) Mod --1 1 3 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC WS-F6K-PWR Serial No. ----------SAD06020342 unknown SAD05480183 SAL0501FUWY SAD060200FG Sw -----------7.5(0.6)HUB1 Unknown 12.1(nightly 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Unknown Ok Ok Ok Serial Hw Status --------------- ------- ------SAD060204JU 3.0 Ok SAD05520623 1.3 Ok SAD060100GE 2.0 Ok 1.0 Ok Table 212 shows the device characteristics for egsj-6506-b1d2. Table 212 Device Characteristics for egsj-6506-b1d2 Hostname egsj-6506-b1d2 Platform Catalyst 6500 Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 3 2 2-port OC-12 ATM MM WS-X6101-OC12-MMF 4 8 T1 WS-X6608-T1 5 8 T1 WS-X6608-T1 6 48 48-port 10/100 mb RJ45 WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.b0da to 0001.6415.b0db 3.2 6.1(3) 2 0001.6477.55da to 0001.6477.55e9 3.0 6.1(3) 3 00d0.d333.c88c to 00d0.d333.c8ab 1.0 Unknown 4 0001.6413.6100 to 0001.6413.6107 1.1 Unknown 5 0001.6477.5a0e to 0001.6477.5a15 1.2 Unknown 6 000b.fdf1.48f0 to 000b.fdf1.491f 1.1 5.4(2) Mod --1 1 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD055106FW SAD0551001A SAD03420972 SAD04380DAS SAD060403GX SAL0710A141 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Unknown Unknown Unknown 7.5(0.6)HUB1 Status ------Ok Ok PwrDown PwrDown PwrDown Ok Serial Hw Status --------------- ------- ------SAD055200FT 3.0 Ok SAD055101U9 1.3 Ok Table 213 shows the device characteristics for egsj-4006-b2d1. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 219 Supplementary Information Table 213 Device Characteristics for egsj-4006-b2d1 Hostname egsj-4006-b2d1 Platform Catalyst 4000 Memory 262144K Hardware Mod Ports Card Type Model Serial No. ----+-----+--------------------------------------+-----------------+----------1 2 1000BaseX (GBIC) Supervisor(active) WS-X4014 JAB06400796 2 6 1000BaseX (GBIC) WS-X4306-GB JAE063608LK 3 32 10/100BaseTX (RJ45) WS-X4232-RJ-XX JAB034206PV M MAC addresses Hw Fw Sw Status --+--------------------------------+---+------------+----------------+--------1 0008.a33f.2700 to 0008.a33f.2701 2.1 12.1(12r)EW 12.1(13)EW2, EAR Ok 2 0008.a3cf.fb18 to 0008.a3cf.fb1d 2.2 Ok 3 0030.8074.d6d0 to 0030.8074.d6ff 1.0 Ok Table 214 shows the device characteristics for egsj-4506-b2d2. Table 214 Device Characteristics for egsj-4506-b2d2 Hostname egsj-4506-b2d2 Platform Catalyst 4000 Memory 262144K Hardware Mod Ports Card Type Model Serial No. ----+-----+--------------------------------------+-----------------+----------1 2 1000BaseX (GBIC) Supervisor(active) WS-X4014 JAB064007G3 2 34 10/100BaseTX (RJ45), 1000BaseX (GBIC) WS-X4232 JAB034900UM M MAC addresses Hw Fw Sw Status --+--------------------------------+---+------------+----------------+--------1 000a.4165.9780 to 000a.4165.9781 2.1 12.1(12r)EW 12.1(13)EW2, EAR Ok 2 0030.1958.3cb0 to 0030.1958.3cd1 2.0 Ok Table 215 shows the device characteristics for egsj-6506-sd1. Table 215 Device Characteristics for egsj-6506-sd1 Hostname egsj-6506-sd1 Platform Catalyst 6500 Memory 227328K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 220 Supplementary Information Table 215 Hardware Device Characteristics for egsj-6506-sd1 (continued) Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 3 48 48 port 10/100 mb RJ-45 ethernet WS-X6248-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.a81a to 0001.6415.a81b 3.2 6.1(3) 2 00d0.c0d6.c5e4 to 00d0.c0d6.c5f3 3.0 6.1(3) 3 0010.7bff.68c8 to 0010.7bff.68f7 1.1 4.2(0.24)VAI Mod --1 1 2 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD055006ED SAD054200DT SAD03235475 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055004KG 3.0 Ok SAD05500770 2.0 Ok SAD054305WE 2.0 Ok Table 216 shows the device characteristics for egsj-6506-sd2. Table 216 Device Characteristics for egsj-6506-sd2 Hostname egsj-6506-sd2 Platform Catalyst 6500 Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 3 48 48-port 10/100 mb RJ45 WS-X6148-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6477.2e3e to 0001.6477.2e3f 3.2 6.1(3) 2 00d0.c0d7.1af4 to 00d0.c0d7.1b03 3.0 6.1(3) 3 000c.30a3.f870 to 000c.30a3.f89f 1.1 5.4(2) Mod --1 1 2 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Distributed Forwarding Card Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-DFC Serial No. ----------SAD055006RH SAD054302VE SAL0710A15H Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055004EC 3.0 Ok SAD055007FF 2.0 Ok SAD05380438 2.0 Ok Table 217 shows the device characteristics for egsj-3640-gk. Table 217 Device Characteristics for egsj-3640-gk Hostname egsj-3640-gk Platform Cisco 3640 Memory 125952K Hardware Slot 0: NM-1E1R2W Slot 1: NM-1E1R2W Slot 2: NM-1FE-TX Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 221 Supplementary Information Table 218 shows the device characteristics for egsj-3640-v. Table 218 Device Characteristics for egsj-3640-v Hostname egsj-3640-v Platform Cisco 3640 Memory 124928K Hardware Slot 0: NM-2E2W WIC 1: WIC-1B-S/T Slot Slot WIC WIC 1: 2: 0: 1: NM-1FE-TX NM-2V VIC-2FXS VIC-2FXO Slot 3: NM-HDV-2T1-48 WIC 0: VWIC-2MFT-T1-DI Table 219 shows the device characteristics for egbos-7206-w1. Table 219 Device Characteristics for egbos-7206-w1 Hostname egbos-7206-w1 Platform Cisco 7206 Memory 491520K Hardware Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-FE-TX PA-2T3+ Table 220 shows the device characteristics for egbos-7206-w2. Table 220 Device Characteristics for egbos-7206-w2 Hostname egbos-7206-w2 Platform Cisco 7206 Memory 491520K Hardware Slot Slot Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: 5: 6: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-FE-TX PA-2T3+ PA-FE-TX PA-MC-2T1 Table 221 shows the device characteristics for egbos-7206-w3. Table 221 Hostname Device Characteristics for egbos-7206-w3 egbos-7206-w3 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 222 Supplementary Information Table 221 Device Characteristics for egbos-7206-w3 (continued) Platform Cisco 7206 Memory 245760K Hardware Slot Slot Slot Slot Slot Slot 1: 2: 3: 4: 5: 6: PA-FE-TX PA-1GE PA-MC-2T1 PA-IMA-T1 PA-8E PA-4B-U Table 222 shows the device characteristics for egbos-2651-v1. Table 222 Device Characteristics for egbos-2651-v1 Hostname egbos-2651-v1 Platform Cisco 2651 Memory 124928K Hardware Slot 0: Cisco2651 2FE Mainboard Slot 1: PA-VXC-2TE1 VIC 0: VWIC-2MFT-T1-DI Table 223 shows the device characteristics for egbos-6506-c1. Table 223 Device Characteristics for egbos-6506-c1 Hostname egbos-6506-c1 Platform Catalyst 6500 Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ-45 ethernet WS-X6248-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.6f2c to 0002.7e38.6f2d 3.2 6.1(3) 3 00d0.c0d6.b284 to 00d0.c0d6.b293 3.0 6.1(3) 4 00d0.bcef.ef00 to 00d0.bcef.ef2f 1.1 4.2(0.24)VAI Mod --1 1 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD060100AG SAD0541045S SAD03465614 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD0552051B 3.0 Ok SAD0552068L 1.3 Ok Table 224 shows the device characteristics for egbos-6506-c2. Table 224 Device Characteristics for egbos-6506-c2 Hostname egbos-6506-c2 Platform Catalyst 6500 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 223 Supplementary Information Table 224 Device Characteristics for egbos-6506-c2 (continued) Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6477.2e1a to 0001.6477.2e1b 3.2 6.1(3) 3 00d0.c0d6.b704 to 00d0.c0d6.b713 3.0 6.1(3) 4 000a.417b.1cf0 to 000a.417b.1d1f 6.1 5.4(2) Mod --1 1 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD0550068D SAD054103VS SAL062720UJ Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055004K9 3.0 Ok SAD05500702 2.0 Ok 1.0 Ok Table 225 shows the device characteristics for egwas-7609-w1. Table 225 Device Characteristics for egwas-7609-w1 Hostname egwas-7609-w1 Platform Cisco 7609 Memory 458752K Hardware Slot 3: WS-X6182-2PA PA 0: [T3+ Serial PA] PA 1: [Enhanced ATM DS3 PA] Slot 4: WS-X6182-2PA PA 0: [CT3 single wide PA] PA 1: PA-POSSW-MM Table 226 shows the device characteristics for egwas-7609-w2. Table 226 Device Characteristics for egwas-7609-w2 Hostname egwas-7609-w2 Platform Cisco 7609 Memory 458752K Hardware Slot 3: WS-X6182-2PA PA 0: [Enhanced ATM OC3 MM PA] PA 1: [CE3 PA] Table 227 shows the device characteristics for egwas-6506-sd1. Table 227 Device Characteristics for egwas-6506-sd1 Hostname egwas-6506-sd1 Platform Catalyst 6500 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 224 Supplementary Information Table 227 Device Characteristics for egwas-6506-sd1 (continued) Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 6 48 SFM-capable 48-port 10/100 Mbps RJ45 WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.e264 to 0001.c9da.e265 3.2 6.1(3) 6 0001.63d4.cf5a to 0001.63d4.cf89 4.0 6.3(1) Mod --1 1 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD0601008P SAD060304UW Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Serial Hw Status --------------- ------- ------SAD0552054S 3.0 Ok SAD0552068P 1.3 Ok Table 228 shows the device characteristics for egwas-6506-c1. Table 228 Device Characteristics for egwas-6506-c1 Hostname egwas-6506-c1 Platform Catalyst 6500 Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 2 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 6 48 SFM-capable 48-port 10/100 Mbps RJ45 WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.d5e8 to 0001.c9da.d5e9 3.2 6.1(3) 2 00d0.c0d6.a734 to 00d0.c0d6.a743 3.0 6.1(3) 6 0001.63d4.c74a to 0001.63d4.c779 4.0 6.3(1) Mod --1 1 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD055006KZ SAD05410446 SAD060304UC Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055200SF 3.0 Ok SAD055101UJ 1.3 Ok Table 229 shows the device characteristics for egwas-3660-v1. Table 229 Device Characteristics for egwas-3660-v1 Hostname egwas-3660-v1 Platform Cisco 3660 Memory 92160K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 225 Supplementary Information Table 229 Hardware Device Characteristics for egwas-3660-v1 (continued) Slot 0: C3600 Mother board 2FE(TX) PA, 2 ports Slot 1: PA-VXC-2TE1 WIC 0: [VWIC-2MFT-T1-DI] Slot 2: NM-2V WIC 0: VIC-2FXS WIC 1: VIC-2FXS Slot 4: PA-VXC-2TE1 WIC 0: [VWIC-2MFT-T1-DI] Table 230 shows the device characteristics for egwas-7507-w3. Table 230 Device Characteristics for egwas-7507-w3 Hostname egwas-7507-w3 Platform Cisco 7507 Memory 262144K Hardware Slot 0: GEIP controller PA 0: PA-GE Slot 1: VIP2 R5K controller PA 0: PA-FE-TX PA 1: PA-FE-TX Slot Slot Slot PA PA 2: 3: 4: 0: 1: RSP8 RSP8 VIP4-80 RM7000 controller PA-MC-8T1 PA-A3-T3 Slot 5: GEIP controller PA 0: PA-GE Slot 6: VIP2 controller PA 0: PA-FE-TX Table 231 shows the device characteristics for egden-7206-w1. Table 231 Device Characteristics for egden-7206-w1 Hostname egden-7206-w1 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-FE-TX PA-A3-T3 Table 232 shows the device characteristics for egden-7206-w2. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 226 Supplementary Information Table 232 Device Characteristics for egden-7206-w2 Hostname egden-7206-w2 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: 5: 6: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-H1+ PA-FE-TX PA-8E PA-MC-4T1 Table 233 shows the device characteristics for egden-7206-w3. Table 233 Device Characteristics for egden-7206-w3 Hostname egden-7206-w3 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: 5: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-1GE PA-MC-2T1 PA-8E PA-IMA-T1 Table 234 shows the device characteristics for egden-7507-w4. Table 234 Device Characteristics for egden-7507-w4 Hostname egden-7507-w4 Platform Cisco 7507 Memory 262144K Hardware Slot 0: GEIP controller PA 0: PA-GE Slot 1: GEIP controller PA 0: PA-GE Slot Slot PA PA 2: 4: 0: 1: RSP8 VIP4-80 RM7000 controller PA-8E PA-FE-TX Slot 5: VIP4-80 RM7000 controller PA 0: PA-MC-4T1 PA 1: PA-A3-8E1IMA Table 235 shows the device characteristics for egden-3640-v1. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 227 Supplementary Information Table 235 Device Characteristics for egden-3640-v1 Hostname egden-3640-v1 Platform Cisco 3640 Memory 123904K Hardware Slot Slot Slot WIC WIC Slot WIC 0: 1: 2: 0: 1: 3: 0: NM-2FE2W NM-1FE-TX NM-2V VIC-FXS VIC-FXO PA-VXC-2TE1 VWIC-2MFT-T1-DI Table 236 shows the device characteristics for egden-2600-isdn. Table 236 Device Characteristics for egden-2600-isdn Hostname egden-2600-isdn Platform Cisco 2621 Memory 49152K Hardware Slot 0: C2621 2FE Mainboard PA WIC 1: WIC-1B-U-V2 Table 237 shows the device characteristics for egden-6506-c1. Table 237 Device Characteristics for egden-6506-c1 Hostname egden-6506-c1 Platform Catalyst 6500 MSFC Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.e1fc to 0001.c9da.e1fd 3.2 6.1(3) 3 0001.63d2.a9e2 to 0001.63d2.a9f1 3.0 6.1(3) 4 0005.7481.d138 to 0005.7481.d167 6.0 5.4(2) Mod --1 1 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD0601008S SAD0541045G SAL0501FUW0 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD05520507 3.0 Ok SAD05520665 1.3 Ok 1.0 Ok Table 238 shows the device characteristics for egden-6506-c2. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 228 Supplementary Information Table 238 Device Characteristics for egden-6506-c2 Hostname egden-6506-c2 Platform Catalyst 6500 MSFC Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.e1b4 to 0001.c9da.e1b5 3.2 6.1(3) 3 00d0.c0d6.b7b4 to 00d0.c0d6.b7c3 3.0 6.1(3) 4 0005.7481.d528 to 0005.7481.d557 6.0 5.4(2) Mod --1 1 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD0601008V SAD0541042K SAL0601FZCU Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD05520562 3.0 Ok SAD055205WS 1.3 Ok 1.0 Ok Table 239 shows the device characteristics for egden-6506-d1. Table 239 Device Characteristics for egden-6506-d1 Hostname egden-6506-d1 Platform Catalyst 6500 MSFC Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.a51e to 0001.6415.a51f 3.2 6.1(3) 3 0001.63d4.597a to 0001.63d4.5989 3.0 6.1(3) 4 0005.7481.d3a8 to 0005.7481.d3d7 6.0 5.4(2) Mod --1 1 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD0549072V SAD0542009L SAL0601FZCB Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055000P3 3.0 Ok SAD0549061J 1.3 Ok 1.0 Ok Table 240 shows the device characteristics for egden-6506-d2. Table 240 Device Characteristics for egden-6506-d2 Hostname egden-6506-d2 Platform Catalyst 6500 MSFC Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 229 Supplementary Information Table 240 Device Characteristics for egden-6506-d2 (continued) Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC 4 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.6415.a7ba to 0001.6415.a7bb 3.2 6.1(3) 3 00d0.c0d6.ac04 to 00d0.c0d6.ac13 3.0 6.1(3) 4 0005.740f.2078 to 0005.740f.20a7 6.0 5.4(2) Mod --1 1 4 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD055006KF SAD054103ZM SAL0552FTEY Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD055004X7 3.0 Ok SAD054902U8 2.0 Ok 1.0 Ok Table 241 shows the device characteristics for egdal-7206-w1. Table 241 Device Characteristics for egdal-7206-w1 Hostname egdal-7206-w1 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot Slot 0: 1: 2: 4: 5: 6: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-A3-E3 PA-8E PA-4T+ Table 242 shows the device characteristics for egdal-7206-w2. Table 242 Device Characteristics for egdal-7206-w2 Hostname egdal-7206-w2 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot Slot Slot 0: 1: 2: 3: 4: 5: 6: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-MC-E3 PA-FE-TX PA-8E PA-8E1/120, PA-MC-8E1/120 Table 243 shows the device characteristics for egdal-7206-w3. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 230 Supplementary Information Table 243 Device Characteristics for egdal-7206-w3 Hostname egdal-7206-w3 Platform Cisco 7206VXR Memory 491520K Hardware Slot Slot Slot Slot Slot Slot 0: 1: 2: 3: 5: 6: C7200-IO-FE-MII/RJ45 PA-FE-TX PA-FE-TX PA-IMA-E1 PA-4E PA-MC-2E1-120 Table 244 shows the device characteristics for egdal-7507-w4. Table 244 Device Characteristics for egdal-7507-w4 Hostname egdal-7507-w4 Platform Cisco 7507 Memory 262144K Hardware Slot 0: VIP4-80 RM7000 controller PA 0: PA-A3-T3 PA 1: PA-MC-2T1 Slot 1: GEIP controller PA 0: PA-1GE Slot 2: RSP8 Slot 4: GEIP controller PA 1: PA-1GE Slot 5: VIP4-80 RM7000 controller PA 0: PA-FE-TX PA 1: PA-FE-TX Slot 6: VIP4-80 RM7000 controller PA 0: PA-A3-8E1IMA PA 1: PA-8E Table 245 shows the device characteristics for egdal-3640-v. Table 245 Device Characteristics for egdal-3640-v Hostname egdal-3640-v Platform Cisco 3640 Memory 122880K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 231 Supplementary Information Table 245 Hardware Device Characteristics for egdal-3640-v (continued) Slot 0: NM-2FE2W Slot 1: NM-2V WIC 0: VIC-2FXS Slot 2: PA-VXC-2TE1 WIC 0: VWIC-2MFT-T1-DI Slot 3: PA-VXC-2TE1 WIC 0: VWIC-2MFT-T1-DI Table 246 shows the device characteristics for egdal-3660-w5. Table 246 Device Characteristics for egdal-3660-w5 Hostname egdal-3660-w5 Platform Cisco 3660 Memory 90112K Hardware Slot 0: C3600 Mother board 2FE(TX) PA, 2 ports Slot 2: NM-4E Table 247 shows the device characteristics for egdal-6506-c2. Table 247 Device Characteristics for egdal-6506-c2 Hostname egdal-6506-c2 Platform Catalyst 6500 Memory 227328K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-S2U-MSFC2 3 8 8 port 1000mb GBIC Enhanced QoS WS-X6408A-GBIC 4 48 SFM-capable 48-port 10/100 Mbps RJ45 WS-X6548-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.6fc0 to 0002.7e38.6fc1 3.2 6.1(3) 3 0003.32ba.5ea6 to 0003.32ba.5ead 1.3 5.4(2) 4 0001.63d4.be8a to 0001.63d4.beb9 4.0 6.3(1) Mod --1 1 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 Serial No. ----------SAD0601006K SAL05041YR9 SAD060304W4 Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Ok Serial Hw Status --------------- ------- ------SAD0552058W 3.0 Ok SAD055205YA 1.3 Ok Table 248 shows the device characteristics for egla-3640-vw. Table 248 Device Characteristics for egla-3640-vw Hostname egla-3640-vw Platform Cisco 3640 Memory 92160K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 232 Supplementary Information Table 248 Hardware Device Characteristics for egla-3640-vw (continued) Slot Slot Slot WIC WIC 0: 1: 2: 0: 1: NM-2CT1-CSU NM-1FE-TX NM-2V VIC-2FXS VIC-2FXS Slot 3: NM-2E2W Table 249 shows the device characteristics for egla-3550-a. Table 249 Device Characteristics for egla-3550-a Hostname egla-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Table 250 shows the device characteristics for egphx-7204-vw. Table 250 Device Characteristics for egphx-7204-vw Hostname egphx-7204-vw Platform Cisco 7204VXR Memory 229376K Hardware Slot 0: C7200-I/O-GE+E Slot 3: PA-VXC-2T1E1 Slot 4: PA-MC-2T1 Table 251 shows the device characteristics for egphx-3550-a. Table 251 Device Characteristics for egphx-3550-a Hostname egphx-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Table 252 shows the device characteristics for egcs-2651-vw. Table 252 Device Characteristics for egcs-2651-vw Hostname egcs-2651-vw Platform Cisco 2651 Memory 125952K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 233 Supplementary Information Table 252 Hardware Device Characteristics for egcs-2651-vw (continued) Slot 0: C2651 2FE Mainboard PA, 4 ports WIC 0: FT1 WIC 1: FT1 Slot 1: NM-2V VIC 0: VIC-2FXS VIC 1: VIC-2FXS Table 253 shows the device characteristics for egcs-2950-a. Table 253 Device Characteristics for egcs-2950-a Hostname egcs-2950-a Platform Catalyst 2950 Memory 20839K Hardware Fast Ethernet Gigabit Ethernet Table 254 shows the device characteristics for egsaf-2651-vw. Table 254 Device Characteristics for egsaf-2651-vw Hostname egsaf-2651-vw Platform Cisco 2651 Memory 125952K Hardware Slot 0: C2651 2FE Mainboard PA, 4 ports WIC 0: FT1 WIC 1: FT1 Slot 1: NM-2V VIC 0: VIC-2FXS VIC 1: VIC-2FXS Table 255 shows the device characteristics for egsaf-2950-a. Table 255 Device Characteristics for egsaf-2950-a Hostname egsaf-2950-a Platform Catalyst 2950 Memory 20839K Hardware Fast Ethernet Gigabit Ethernet Table 256 shows the device characteristics for egneo-2651-vw. Table 256 Hostname Device Characteristics for egneo-2651-vw egneo-2651-vw Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 234 Supplementary Information Table 256 Device Characteristics for egneo-2651-vw (continued) Platform Cisco 2651 Memory 125952K Hardware Slot 0: C2651 2FE Mainboard PA, 4 ports WIC 0: FT1 WIC 1: BRI U 2091 WAN Slot 1: NM-2V VIC 0: VIC-2FXS VIC 1: VIC-2FXS Table 257 shows the device characteristics for egneo-2950-a. Table 257 Device Characteristics for egneo-2950-a Hostname egneo-2950-a Platform Cisco 2950 Memory 20839K Hardware Fast Ethernet Gigabit Ethernet Table 258 shows the device characteristics for egaus-3550-a. Table 258 Device Characteristics for egaus-3550-a Hostname egaus-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Table 259 shows the device characteristics for egaus-2621-w1. Table 259 Device Characteristics for egaus-2621-w1 Hostname egaus-2621-w1 Platform Cisco 2621 Memory 49152K Hardware Slot 0: C2621 2FE Mainboard PA, 3 ports WIC 1: Serial 1T WAN Table 260 shows the device characteristics for eghou-3660-vw. Table 260 Device Characteristics for eghou-3660-vw Hostname eghou-3660-vw Platform Cisco 3660 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 235 Supplementary Information Table 260 Device Characteristics for eghou-3660-vw (continued) Memory 121856K Hardware Slot Slot WIC WIC 0: 1: 0: 1: C3600 Mother board 2FE(TX) PA, 2 ports NM-2V VIC-2FXS VIC-2FXS Slot 3: NM-1CE1B Slot 5: PA-VXC-2TE1 WIC 0: VWIC-2MFT-T1-DI Slot 6: NM-2CT1-CSU Table 261 shows the device characteristics for eghou-3550-a. Table 261 Device Characteristics for eghou-3550-a Hostname eghou-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Table 262 shows the device characteristics for egpit-3640-vw. Table 262 Device Characteristics for egpit-3640-vw Hostname egpit-3640-vw Platform Cisco 3640 Memory 124928K Hardware Slot 0: NM-2E2W WIC 0: FT1 WIC 1: FT1 Slot 1: NM-1FE-TX Slot 2: NM-2V WIC 0: VIC-2FXS Slot 3: PA-VXC-2TE1 WIC 0: VWIC-2MFT-T1-DI Table 263 shows the device characteristics for egpit-3550-a. Table 263 Device Characteristics for egpit-3550-a Hostname egpit-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 236 Supplementary Information Table 264 shows the device characteristics for egmia-6506-a1. Table 264 Device Characteristics for egmia-6506-a1 Hostname egmia-6506-a1 Platform Catalyst 6500 Memory 458752K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE 3 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0001.c9da.d814 to 0001.c9da.d815 3.2 6.1(3) 3 0005.740e.6af4 to 0005.740e.6b23 6.0 5.4(2) Mod --1 1 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD055101GV SAL0552FQYX Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Serial Hw Status --------------- ------- ------SAD055004EJ 3.0 Ok SAD0550079A 2.0 Ok 1.0 Ok Table 265 shows the device characteristics for egmia-6506-a2. Table 265 Device Characteristics for egmia-6506-a2 Hostname egmia-6506-a2 Platform Catalyst 6500 Memory 458752K Hardware Mod Ports Card Type Model --- ----- -------------------------------------- -----------------1 2 Catalyst 6000 supervisor 2 (Active) WS-X6K-SUP2-2GE 3 48 48 port 10/100 mb RJ45 WS-X6348-RJ-45 Mod MAC addresses Hw Fw --- ---------------------------------- ------ -----------1 0002.7e38.66b0 to 0002.7e38.66b1 3.2 6.1(3) 3 0005.7481.d648 to 0005.7481.d677 6.0 5.4(2) Mod --1 1 3 Sub-Module --------------------------Policy Feature Card 2 Cat6k MSFC 2 daughterboard Inline Power Module Model --------------WS-F6K-PFC2 WS-F6K-MSFC2 WS-F6K-PWR Serial No. ----------SAD054909R0 SAL0601FZDZ Sw -----------7.5(0.6)HUB1 7.5(0.6)HUB1 Status ------Ok Ok Serial Hw Status --------------- ------- ------SAD055004WE 3.0 Ok SAD055007CK 2.0 Ok 1.0 Ok Table 266 shows the device characteristics for egmia-7206-w1. Table 266 Device Characteristics for egmia-7206-w1 Hostname egmia-7206-w1 Platform Cisco 7206 Memory 245760K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 237 Supplementary Information Table 266 Hardware Device Characteristics for egmia-7206-w1 (continued) Slot Slot Slot Slot 1: 2: 4: 6: PA-FE-TX PA-FE-TX PA-8E PA-A3-T3 Table 267 shows the device characteristics for egmia-3640-vw2. Table 267 Device Characteristics for egmia-3640-vw2 Hostname egmia-3640-vw2 Platform Cisco 3640 Memory 57344K Hardware Slot 0: NM-2FE2W Slot 1: NM-2FE2W WIC 1: FT1 Slot 2: NM-2V WIC 0: VIC-2FXS Slot 3: PA-VXC-2TE1 WIC 0: VWIC-2MFT-T1-DI Table 268 shows the device characteristics for egny-3745-vw. Table 268 Device Characteristics for egny-3745-vw Hostname egny-3745-vw Platform Cisco 3745 Memory 118784K Hardware Slot WIC WIC WIC 0: 0: 1: 2: C3745 Mother board 2FE(TX) - 3W Port adapter, 2 ports FT1 FT1 BRI U 2091 WAN Slot 1: NM-2V WIC 0: VIC-2FXS WIC 1: VIC-2FXS Table 269 shows the device characteristics for egny-3550-a. Table 269 Device Characteristics for egny-3550-a Hostname egny-3550-a Platform Catalyst 3550 Memory 65526K Hardware Fast Ethernet Gigabit Ethernet Table 270 shows the device characteristics for egarl-3640-w1. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 238 Supplementary Information Table 270 Device Characteristics for egarl-3640-w1 Hostname egarl-3640-w1 Platform Cisco 3640 Memory 69632K Hardware Slot 0: AIM Carrier PA AIM 0: [NM-VPN/MP] Slot 1: NM-2FE2W WIC 0: FT1 Slot 2: NM-4E Table 271 shows the device characteristics for egboc-1760-w1. Table 271 Device Characteristics for egboc-1760-w1 Hostname egboc-1760-w1 Platform Cisco 1760 Memory 59427K Hardware Slot 0: C1760 1FE VE 4SLOT DV Mainboard PA, 3 ports WIC 0: WIC-2T Slot 3: MOD1700-VPN Table 272 shows the device characteristics for egsj-5505-sa1. Table 272 Device Characteristics for egsj-5505-sa1 Hostname egsj-5505-sa1 Platform Catalyst 5500 Memory 32768K Hardware Mod Port Model Serial # Versions --- ---- ---------- --------- -----------1 2 WS-X5550 027745488 Hw : 1.2 Fw : 5.1(1) Fw1: 5.2(1) Sw : 6.4(3) 2 24 WS-X5013 008673376 Hw : 1.3 Fw : 2.3(1) Sw : 6.4(3) 3 24 WS-X5224 011683516 Hw : 1.4 Fw : 3.1(1) Sw : 6.4(3) 5 9 WS-X5410 014966283 Hw : 1.0 Fw : 4.2(1) Fw1: 4.2(1) Sw : 5.1(1) Table 273 shows the device characteristics for egsj-5505-sa2. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 239 Supplementary Information Table 273 Device Characteristics for egsj-5505-sa2 Hostname egsj-5505-sa2 Platform Catalyst 5500 Memory 65536K Hardware Mod Port Model Serial # Versions --- ---- ---------- --------- ----------1 2 WS-X5530 013386213 Hw : 3.2 Fw : 3.1.2 Fw1: 4.4(1) Sw : 6.4(3) WS-F5531 013379831 Hw : 1.0 WS-U5534 027541666 Hw : 1.3 2 24 WS-X5234 017403319 Hw : 1.0 Fw : 4.5(2) Sw : 6.4(3) 5 9 WS-X5410 021601033 Hw : 1.1 Fw : 4.2(5) Fw1: 4.2(5) Sw : 6.3(2) Table 274 shows the device characteristics for egsj-6506-sa3. Table 274 Device Characteristics for egsj-6506-sa3 Hostname egsj-6506-sa3 Platform Catalyst 6500 Memory 131072K Hardware Mod Port Model Serial # Versions --- ---- ------------------- ----------- ----------1 2 WS-X6K-SUP2-2GE SAD050608J5 Hw : 2.5 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(1) Sw1: 7.6(1) WS-X6K-SUP2-2GE SAD050608J5 Hw : 2.5 Sw : 2 48 WS-X6148-RJ-45 SAL06417EAQ Hw : 1.1 Fw : 5.4(2) Sw : 7.6(1) Table 275 shows the device characteristics for egsj-4003-b1a1. Table 275 Device Characteristics for egsj-4003-b1a1 Hostname egsj-4003-b1a1 Platform Catalyst 4000 Memory 65536K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 240 Supplementary Information Table 275 Hardware Device Characteristics for egsj-4003-b1a1 (continued) Mod Port Model Serial # Versions --- ---- ------------------ -------------------- ------------1 0 WS-X4012 JAB035002QN Hw : 2.0 Gsp: 7.6(1.0) Nmp: 7.6(1) 2 6 WS-X4306 JAE044301F0 Hw : 2.0 3 48 WS-X4148-RJ45V JAE060603CU Hw : 1.6 Table 276 shows the device characteristics for egsj-5505-b1a2. Table 276 Device Characteristics for egsj-5505-b1a2 Hostname egsj-5505-b1a2 Platform Catalyst 5500 Memory 65536K Hardware Mod Port Model Serial # Versions --- ---- ---------- --------- ----------1 2 WS-X5530 008949810 Hw : 1.8 Fw : 3.1.2 Fw1: 4.1(1) Sw : 6.4(3) WS-F5520 008923200 Hw : 1.1 WS-U5534 012143987 Hw : 1.0 2 24 WS-X5225R 013377174 Hw : 3.1 Fw : 4.3(1) Sw : 6.4(3) Table 277 shows the device characteristics for egsj-6506-b1a3. Table 277 Device Characteristics for egsj-6506-b1a3 Hostname egsj-6506-b1a3 Platform Catalyst 6500 Memory mmm Hardware Mod Port Model Serial # Versions --- ---- ------------------- ----------- -----------1 2 WS-X6K-SUP2-2GE SAD055101G4 Hw : 3.2 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(1) Sw1: 7.6(1) WS-X6K-SUP2-2GE SAD055101G4 Hw : 3.2 Sw : 2 48 WS-X6148-RJ-45 SAL06417E8Y Hw : 1.1 Fw : 5.4(2) Sw : 7.6(1) Table 278 shows the device characteristics for egsj-4006-b2a1. Table 278 Hostname Device Characteristics for egsj-4006-b2a1 egsj-4006-b2a1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 241 Supplementary Information Table 278 Device Characteristics for egsj-4006-b2a1 (continued) Platform Catalyst 4000 Memory 65536K Hardware Mod Port Model Serial # Versions --- ---- ------------------ -------------------- -----------1 2 WS-X4013 JAB054804FA Hw : 3.2 Gsp: 7.6(1.0) Nmp: 7.6(1) 2 34 WS-X4232 JAB034900XA Hw : 2.0 3 48 WS-X4148-RJ45V JAE060603CJ Hw : 1.6 5 1 WS-X4604-GWY JAB0446053F Hw : 1.8 Table 279 shows the device characteristics for egsj-6506-b2a2. Table 279 Device Characteristics for egsj-6506-b2a2 Hostname egsj-6506-b2a2 Platform Catalyst 6500 Memory 131072K Hardware Mod Port Model Serial # Versions --- ---- ------------------- ----------- -------------------------------------1 2 WS-X6K-SUP2-2GE SAD05380B2W Hw : 3.2 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(1) Sw1: 7.6(1) WS-X6K-SUP2-2GE SAD05380B2W Hw : 3.2 Sw : 2 48 WS-X6348-RJ-45 SAL0552FUJ0 Hw : 6.0 Fw : 5.4(2) Sw : 7.6(1) WS-F6K-VPWR Hw : 1.0 Sw : 1.0 Table 280 shows the device characteristics for egbos-6506-a1. Table 280 Device Characteristics for egbos-6506-a1 Hostname egbos-6506-a1 Platform Catalyst 6000 Memory 131072K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 242 Supplementary Information Table 280 Hardware Device Characteristics for egbos-6506-a1 (continued) Mod Port Model Serial # Versions --- ---- ------------------- ----------- ----------1 2 WS-X6K-SUP2-2GE SAD05520191 Hw : 3.2 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(1) Sw1: 7.6(1) WS-X6K-SUP2-2GE SAD05520191 Hw : 3.2 Sw : 3 48 WS-X6348-RJ-45 SAL0601FZB5 Hw : 6.0 Fw : 5.4(2) Sw : 7.6(1) WS-F6K-VPWR Hw : 1.0 Sw : 1.0 Table 281 shows the device characteristics for egbos-4006-a2. Table 281 Device Characteristics for egbos-4006-a2 Hostname egbos-4006-a2 Platform Catalyst 4000 Memory 131072K Hardware Mod Port Model Serial # Versions --- ---- ------------------ -------------------- -----------1 2 WS-X4013 00000000000 Hw : 0.0 Gsp: 7.6(1.0) Nmp: 7.6(1) 3 48 WS-X4148-RJ45V JAE060603CE Hw : 1.6 5 34 WS-X4232 JAB024100BQ Hw : 1.0 Table 282 shows the device characteristics for egbos-4006-a3. Table 282 Device Characteristics for egbos-4006-a3 Hostname egbos-4006-a3 Platform Catalyst 4000 Memory 65536K Hardware Mod Port Model Serial # Versions --- ---- ------------------ -------------------- --------------------------------1 2 WS-X4013 JAB0522081G Hw : 1.5 Gsp: 7.6(1.0) Nmp: 7.6(1) 2 48 WS-X4148-RJ JAB04470736 Hw : 0.1 3 48 WS-X4148-RJ45V JAE0606032W Hw : 1.6 4 1 WS-X4604-GWY JAB04460554 Hw : 1.8 Table 283 shows the device characteristics for egwas-6505-c2-sup2. Table 283 Device Characteristics for egwas-6505-c2-sup2 Hostname egwas-6505-c2-sup2 Platform Catalyst 6500 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 243 Supplementary Information Table 283 Device Characteristics for egwas-6505-c2-sup2 (continued) Memory 262144K Hardware Mod Port Model Serial # Versions --- ---- ------------------- ----------- -------------------------------------1 2 WS-X6K-S2U-MSFC2 SAD055106C1 Hw : 3.2 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(1) Sw1: 7.6(1) WS-X6K-S2U-MSFC2 SAD055106C1 Hw : 3.2 Sw : 2 16 WS-X6516-GBIC SAD054606WD Hw : 3.0 Fw : 6.1(3) Sw : 7.6(1) 3 8 WS-X6608-T1 SAD064201DW Hw : 1.3 Fw : 5.4(2) Sw : 7.6(1) HP1: D00403010034; DSP1: D005L031 (3.6.14) HP2: D00403010034; DSP2: D005L031 (3.6.14) HP3: D004I3A0; DSP3: D005H300 (3.6.12) HP4: D004I3A0; DSP4: D005H300 (3.6.12) HP5: D004I3A0; DSP5: D005H300 (3.6.12) HP6: D004I3A0; DSP6: D005H300 (3.6.12) HP7: D004I3A0; DSP7: D005H300 (3.6.12) HP8: M0010004; DSP8: M002E031 (3.3.2) 4 24 WS-X6624-FXS SAD064100PG Hw : 3.2 Fw : 5.4(2) Sw : 7.6(1) HP : A00203010027; DSP : A003L031 (3.6.14) 5 48 WS-X6348-RJ-45 SAL06282SVW Hw : 6.1 Fw : 5.4(2) Sw : 7.6(1) WS-F6K-VPWR Hw : 1.0 Sw : 1.0 6 48 WS-X6548-RJ-45 SAD060304JX Hw : 4.0 Fw : 6.3(1) Sw : 7.6(1) 15 1 WS-F6K-MSFC2 SAD05510786 Hw : 2.0 Fw : 12.1(13)E9 Sw : 12.1(13)E9 Table 284 shows the device characteristics for egwas-6505-c2-msfc2. Table 284 Device Characteristics for egwas-6505-c2-msfc2 Hostname egwas-6505-c2-msfc2 Platform Catalyst 6500 Memory 458752K Hardware 19 Virtual Ethernet/IEEE 802.3 interfaces Table 285 shows the device characteristics for egden-6506-a1. Table 285 Hostname Device Characteristics for egden-6506-a1 egden-6506-a1 Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 244 Supplementary Information Table 285 Device Characteristics for egden-6506-a1 (continued) Platform Catalyst 6500 Memory 131072K Hardware Mod Port Model Serial # Versions --- ---- ------------------- ----------- ------------1 2 WS-X6K-SUP2-2GE SAD055003N7 Hw : 3.2 Fw : 6.1(4) Fw1: 6.1(3) Sw : 7.6(0.57) Sw1: 7.6(0.56) WS-X6K-SUP2-2GE SAD055003N7 Hw : 3.2 Sw : 4 48 WS-X6348-RJ-45 SAL0601FY3B Hw : 6.0 Fw : 5.4(2) Sw : 7.6(0.56) WS-F6K-VPWR Hw : 1.0 Sw : 1.0 Table 286 shows the device characteristics for egden-4003-a2. Table 286 Device Characteristics for egden-4003-a2 Hostname egden-4003-a2 Platform Catalyst 4000 Memory 65536K Hardware Mod Port Model Serial # Versions --- ---- ------------------ -------------------- ------------1 0 WS-X4012 JAB034400RY Hw : 2.0 Gsp: 7.6(0.57) Nmp: 7.6(0.57) 2 48 WS-X4148-RJ JAB03510044 Hw : 2.3 3 34 WS-X4232 JAB0343040N Hw : 2.0 Table 287 shows the device characteristics for egden-4506-a3. Table 287 Device Characteristics for egden-4506-a3 Hostname egden-4506-a3 Platform Catalyst 4500 Memory 262144K Hardware 48 FastEthernet/IEEE 802.3 interfaces 3 Gigabit Ethernet/IEEE 802.3 interfaces Table 288 shows the device characteristics for egaus-2621-w1. Table 288 Device Characteristics for egaus-2621-w1 Hostname egaus-2621-w1 Platform Cisco 2621 Memory 49152K Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 245 Supplementary Information Table 288 Device Characteristics for egaus-2621-w1 (continued) Hardware Slot 0: C2621 2FE Mainboard Port adapter, 3 ports WIC 1: Serial 1T WAN daughter card Table 289 shows the device characteristics for egaus-3550-a. Table 289 Device Characteristics for egaus-3550-a Hostname egaus-3550-a Platform Catalyst 3550 Memory 65526K Hardware 12 Gigabit Ethernet/IEEE 802.3 interfaces Table 290 shows the device characteristics for egarl-3640-w1. Table 290 Device Characteristics for egarl-3640-w1 Hostname egarl-3640-w1 Platform Cisco 3640 Memory 69632K Hardware Slot 0: AIMCarrier Port adapter Slot 1: NM-2FE2W Port adapter, 3 ports Slot 2: Ethernet Port adapter, 4 ports Table 291 shows the device characteristics for egboc-1760-w1. Table 291 Device Characteristics for egboc-1760-w1 Hostname egboc-1760-w1 Platform Cisco 1760 Memory 60124K Hardware Slot 0: C1760 1FE VE 4SLOT DV Mainboard Port adapter, 3 ports WIC 0: WIC-2T Serial 2T (12in1) Slot 3: MOD1700-VPN Virtual Private Network (VPN) Module Port adapter, 1 port See Also For additional information, refer to the following Cisco documents: Resource or Publication Title Location Cisco IOS Release 12.3 Configuration Guides and http://www.cisco.com/univercd/cc/td/doc/product Command References /software/ios123/123cgcr/index.htm Release Notes for Cisco IOS Release 12.3 http://www.cisco.com/univercd/cc/td/doc/product /software/ios123/123relnt/index.htm Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 246 Supplementary Information CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ Breakthrough, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0301R) Copyright © 2003, Cisco Systems, Inc. All rights reserved. Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 247 Supplementary Information Cisco IOS Profiled Release 12.2(16b)M, 12.1(13)E9, 12.2(15)T5, and Catalyst OS 7.6(1) System Testing for Global Enterprise Customers 248
© Copyright 2025 Paperzz