- Preface
- New and Changed Information
- Overview
- Configuring Classification
- Configuring Policy Maps
- Configuring Marking
- Configuring QoS on the System
- Configuring QoS on Interfaces
- Configuring QoS on VLANs
- Configuring Queuing and Flow Control
- Configuring Ingress Policing
- Configuring Egress Multicast Buffering
- Micro-Burst Monitoring
- Configuring Switch Latency Monitoring
- WRED Explicit Congestion Notification
- Configuring ACL Logging
- Configuring Buffer Utilization Histogram
- Configuring FEX-Based ACL Classification
- QoS Configuration Examples
- Index
Contents
- Configuring ACL Logging
- Information About ACL Logging
- IPv6 ACL Logging Overview
- Guidelines and Limitations for ACL Logging
- Configuring ACL Logging
- Verifying ACL Logging Configuration
- Configuration Examples for ACL Logging
Configuring ACL Logging
This chapter contains the following sections:
- Information About ACL Logging
- Guidelines and Limitations for ACL Logging
- Configuring ACL Logging
- Verifying ACL Logging Configuration
- Configuration Examples for ACL Logging
Information About ACL Logging
The ACL logging feature allows you to monitor ACL flows and to log dropped packets on an interface.
IPv6 ACL Logging Overview
When the ACL logging feature is configured, the system monitors ACL flows and logs dropped packets and statistics for each flow that matches the deny conditions of the ACL entry.
Statistics and dropped-packet logs are generated for each flow. A flow is defined by the source interface, protocol, source IP address, source port, destination IP address, and destination port values. The statistics maintained for a matching flow is the number of denies of the flow by the ACL entry during the specified time interval.
When a new flow is denied (that is a flow that is not already active in the system), the system generates an initial Syslog message with a hit count value of 1. Then each time the flow is denied, the system creates a flow entry and increments the hit count value.
When an existing flow is denied, the system generates a Syslog message at the end of each interval to report the hit count value for the flow in the current interval. After the Syslog message is generated, the hit count value for the flow is reset to zero for the next interval. If no hit is recorded during the interval, the flow is deleted and no Syslog message is generated.
Guidelines and Limitations for ACL Logging
ACL Logging has the following configuration guidelines and limitations:
The system logs packets that match deny ACE conditions only. Logging for permit ACE conditions is not supported.
The logging option may be applied to any ACL deny entry. To apply the logging option to implicitly denied traffic, you must configure the logging option for a specific deny-all ACL entry.
ACL logging applies to port ACLs (PACL) configured by the ipv6 port traffic-filter command and to routed ACLs (RACL) configured by the ipv6 traffic-filter commands only.
The total number of flows and deny-flows are limited to a user-defined maximum value to prevent DOS attacks. If this limit is reached, no new logs are created until an existing flow finishes.
The system uses a hash table to locate a flow so that a large number of flows can be supported without impacting CPU utilization. The system uses a timer queue to efficiently manage the aging of large number of flows.
The number of Syslog entries generated by the ACL logging process is limited by the configured logging level of the ACL logging process. If the amount of Syslog entries exceed this limit, the logging facility may drop some logging messages. Therefore, ACL logging should not be used as a billing tool or as an accurate source of the number of matches to an access list.
The hardware rate-limiter rate-limits traffic on a packet basis, but control plane policing (COPP) rate-limits traffic on a byte basis. If the packet size and the hardware rate-limiter both have high values, the COPP default value can be exceeded and the system drops the packet. To overcome this limitation you must increase the default CIR value (64000 bytes) to a higher value such as 2560000 bytes. When the default CIR is increased packet logging happens normally.
IPv6 logging is not supported on management or VTY (Terminal) ports
-
IPv6 logging is not supported on egress RACLs (due to ASIC limitations).
IPv6 logging is not supported on egress VACLs (due to ASIC limitations).
Configuring ACL Logging
To configure the ACL logging process, you first create the access list, then enable filtering of IPv6 traffic on an interface using the specified ACL, and finally configure the ACL logging process parameters.
Verifying ACL Logging Configuration
To display ACL logging configuration information, perform one of the following tasks:
| Command | Purpose |
|---|---|
|
show logging ip access-list status |
Displays the deny maximum flow count, the current effective log interval and the current effective threshold value. |
|
show logging ip access-list cache |
Displays information on the active logged flows, such as source IP and destination IP addresses, S-Port and D-Port information and so on. |
Configuration Examples for ACL Logging
This example shows how to configure the ACL logging process.
switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# ipv6 access-list logging-test switch(config-ipv6-acl)# deny ipv6 any 2001:DB8:1::1/64 log switch(config-ipv6-acl)# exit switch(config)# interface ethernet 1/1 switch(config-if)# ipv6 traffic-filter logging-test in switch(config-if)# exit switch(config)# logging ip access-list cache interval 400 switch(config)# logging ip access-list cache entries 100 switch(config)# logging ip access-list cache threshold 900 switch(config)# hardware rate-limiter access-list-log 200 switch(config)# acllog match-log-level 5 switch(config)# exit switch#
switch(config)# interface ethernet 8/11 switch(config-if)# ipv6 port traffic-filter v6log-pacl in switch(config-if)# switchport access vlan 4064 switch(config-if)# speed 1000 switch(config)# interface Vlan 4064 switch(config-if)# no shutdown switch(config-if)# no ip redirects switch(config-if)# ipv6 address 4064::1/64 Switch# show vlan filter vlan map v6-vaclmap: Configured on VLANs: 4064 Switch# show vlan access-map v6-vaclmap Vlan access-map v6-vaclmap match ipv6: v6-vacl action: drop statistics per-entry