cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
653
Views
5
Helpful
2
Replies

PFR automatic learning list Inactive ?

Junior Mateus
Level 1
Level 1

Hello Everybody ,

i have one MC/BR and one BR :

Border           Status   UP/DOWN             AuthFail  Version

3.3.3.3          ACTIVE   UP       00:11:12          0  3.0

10.30.21.1       ACTIVE   UP       00:11:10          0  3.0

MY  Goal is the learn some classify traffic automatically and then apply policy for this traffic-class

Configuration ACL

ip access-list extended Defined_PFR_Appl

permit tcp any any eq www

permit tcp any any eq 443

permit tcp any any eq smtp

ip access-list extended icmp

permit icmp any any

Configuration Automatic learning list

RT-EDGE-INTERNET2#sh pfr master

OER state: ENABLED and ACTIVE

  Conn Status: SUCCESS, PORT: 3949

  Version: 3.0

Number of Border routers: 2

  Number of Exits: 4

  Number of monitored prefixes: 412 (max 5000)

  Max prefixes: total 5000 learn 2500

  Prefix count: total 412, learn 412, cfg 0

  PBR Requirements met

  Nbar Status: Inactive

Border           Status   UP/DOWN             AuthFail  Version

3.3.3.3          ACTIVE   UP       00:16:05          0  3.0

10.30.21.1       ACTIVE   UP       00:16:03          0  3.0

Global Settings:

  max-range-utilization percent 20 recv 0

  mode route metric bgp local-pref 5000

  mode route metric static tag 5000

  trace probe delay 1000

  logging

  exit holddown time 60 secs, time remaining 0

Default Policy Settings:

  backoff 300 3000 300

  delay relative 50

  holddown 300

  periodic 0

  probe frequency 56

  number of jitter probe packets 100

  mode route observe

  mode monitor both

  mode select-exit good

  loss relative 10

  jitter threshold 20

  mos threshold 3.60 percent 30

  unreachable relative 50

  resolve delay priority 11 variance 20

  resolve range priority 12 variance 0

  resolve utilization priority 13 variance 20

Learn Settings:

  current state : STARTED

  time remaining in current state : 99 seconds

  throughput

  no delay

  no inside bgp

  monitor-period 1

  periodic-interval 0

  aggregation-type prefix-length 24

  prefixes 100 appls 100

  expire after time 720

  Learn-List seq 5 refname PBR_APPL

    Configuration:

     Traffic-Class Access-list: Defined_PFR_Appl

     Aggregation-type: prefix-length 24

     Learn type: delay

     Session count: 50 Max count: 90

     Status: INACTIVE

    Stats:

     Traffic-Class Count: 0

  Learn-List seq 6 refname icmp

    Configuration:

     Traffic-Class Access-list: icmp

     Aggregation-type: prefix-length 24

     Learn type: throughput

     Session count: 1000 Max count: 1000

     Status: INACTIVE

    Stats:

     Traffic-Class Count: 0

Configuration Enabling PFR-MAP for this leanring list

pfr-map Test_MAP 10

match pfr learn list PBR_APPL

pfr-map Test_MAP 11

match pfr learn list icmp

So i really don ´t understand, why i can´t match any access-list on the learn list ?

here is the output of ip cache flow

RT-EDGE-INTERNET2#sh ip cache flow

IP packet size distribution (4005785 total packets):

   1-32   64   96  128  160  192  224  256  288  320  352  384  416  448  480

   .005 .531 .059 .066 .027 .022 .062 .019 .007 .051 .006 .003 .001 .004 .001

    512  544  576 1024 1536 2048 2560 3072 3584 4096 4608

   .002 .005 .000 .009 .110 .000 .000 .000 .000 .000 .000

IP Flow Switching Cache, 278544 bytes

  268 active, 3828 inactive, 957020 added

  21121500 ager polls, 0 flow alloc failures

  Active flows timeout in 1 minutes

  Inactive flows timeout in 15 seconds

IP Sub Flow Cache, 66824 bytes

  438 active, 1610 inactive, 1123853 added, 957020 added to flow

  0 alloc failures, 0 force free

  2 chunks, 6 chunks added

  last clearing of statistics never

Protocol         Total    Flows   Packets Bytes  Packets Active(Sec) Idle(Sec)

--------         Flows     /Sec     /Flow  /Pkt     /Sec     /Flow     /Flow

TCP-Telnet         337      0.0        61    41      0.1      21.1      10.4

TCP-FTP              1      0.0         1    40      0.0       0.0      15.9

TCP-WWW           5239      0.0         6   759      0.1       5.8      17.3

TCP-SMTP             4      0.0         1    49      0.0       0.0      15.4

TCP-X               91      0.0         1    40      0.0       0.2      19.4

TCP-BGP            722      0.0         1    49      0.0       2.9      15.4

TCP-other       356939      1.9         4   392      8.3       3.1      14.6

UDP-DNS         109259      0.5         2    66      1.2       5.3      15.3

UDP-NTP           1323      0.0         2    78      0.0       4.3      15.5

UDP-TFTP            91      0.0         1    57      0.0       0.0      15.5

UDP-other       362001      1.9         1   185      3.6       2.4      15.4

ICMP            102757      0.5         4   151      2.2       2.6      15.4

GRE              15822      0.0        60   163      5.1      26.6      15.3

IP-other           690      0.0       120   146      0.4     308.1       7.7

Total:          955276      5.1         4   253     21.5       3.7      15.1

And here is the output of learning list

RT-EDGE-INTERNET2#sh pfr master learn li

RT-EDGE-INTERNET2#sh pfr master learn list

Learn-List seq 5 refname PBR_APPL

   Configuration:

    Traffic-Class Access-list: Defined_PFR_Appl

    Aggregation-type: prefix-length 24

    Learn type: delay

    Session count: 50 Max count: 90

    Status: INACTIVE

   Stats:

    Traffic-Class Count: 0

Learn-List seq 6 refname icmp

   Configuration:

    Traffic-Class Access-list: icmp

    Aggregation-type: prefix-length 24

    Learn type: throughput

    Session count: 1000 Max count: 1000

    Status: INACTIVE

   Stats:

    Traffic-Class Count: 0

1 Accepted Solution

Accepted Solutions

sathvik k v
Level 3
Level 3

Hi Junior,

Have you applied the pfr-map under pfr master using policy-rules Test_MAP ?

Regards,

Sathvik

View solution in original post

2 Replies 2

sathvik k v
Level 3
Level 3

Hi Junior,

Have you applied the pfr-map under pfr master using policy-rules Test_MAP ?

Regards,

Sathvik

yes you was right  SathVik, now i have apply the pfr-map to the Gobal Policy, it working fine thanks for help

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card