Forwarding Architecture (CEF, CAM, SSO, etc) Flashcards
What is a CAM?
Content Addressable Memory - high speed memory where the MAC Address table is stored
Describe Process Switching
- uses the CPU
- aka Slow Path or Software Switching
- backup for CEF
Describe CEF
Cisco Express Forwarding
- default switching mechanism on all Cisco devices
What command can you use to verify CEF on a cisco device?
show ip cef {prefix | ip-address}
What are the two key hardware components used by CEF?
- Hardware CEF
- Application Specific Integrated Circuits (ASICs)
- Network Processing Units (NPUs)
What is TCAM?
Ternary Content Addressable Memory - an enhancement of CAM that allows for Layer 2 and 3 source and destination, protocol, QoS marking and other such identification
What are the two main components of Software CEF?
- FIB (Forwarding Information Base)
- Adjacency Table
What is the FIB?
Forwarding Information Base
- built directly from the Routing Table (RIB)
- contains next-hop address for each network destination
- used by CEF for destination prefix forwarding
What is the Adjacency Table?
- aka Adjacency Information Base (AIB)
- contains directly connected next-hop IP address and corresponding MAC Address
What is SSO (in forwarding terms)?
Stateful SwitchOver - a redundancy feature where two switches mirror each other’s configurations and the standby switch takes over if the primary switch fails
What is a SDM Template?
Switching Database Manager Template - used by switch stacks to store and modify TCAM tables
What is the command to configure an SDM template?
SW1(config)# sdm prefer {vlan | advanced}
What is PBR?
Policy-Based Routing - a routing feature that uses route-maps to route packets.
What are the basic steps to enable policy-based routing?
- create ACLs for the traffic you want to match
- create a route-map to match the ACLs and set next-hop
- apply the policy to an interface using the command “ip policy route-map ROUTE-MAP-NAME”
What makes policy-based routing so flexible?
The ability to match on traffic based on factors other than shortest path, particularly to be able to match on protocol.
What traffic will not be caught by policy-based routing (by default)?
Traffic generated by the device itself. This is because ACLs will not catch this traffic by nature of ACL behavior.
What commands are used to configure a route-map for a policy-based route?
R1(config)# route-map RMAP_NAME permit [seq-num]
R1(config-route-map)# match ip address ACL_NAME
R1(config-route-map)# set ip next-hop {ip-address}