DMF Service Node Appliance

This chapter describes configuring the managed services provided by the DANZ Monitoring Fabric (DMF) Service Node Appliance.

Overview

The DANZ Monitoring Fabric (DMF) Service Node has multiple interfaces connected to traffic for processing and analysis. Each interface can be programmed independently to provide any supported managed-service actions.

To create a managed service, identify a switch interface connected to the service node, specify the service action, and configure the service action options.

Configure a DMF policy to use the managed service by name. This action causes the Controller to forward traffic the policy selects to the service node. The processed traffic is returned to the monitoring fabric using the same interface and sent to the tools (delivery interfaces) defined in the DMF policy.

If the traffic volume the policy selects is too much for a single service node interface, define an LAG on the switch connected to the service node, then use the LAG interface when defining the managed service. All service node interfaces connected to the LAG are configured to perform the same action. The traffic the policy selects is automatically load-balanced among the LAG member interfaces and distributes the return traffic similarly.

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Administer Managed Services using the GUI

This release introduces a redesigned Managed Services dashboard, replacing the former interface.

To view, edit, or create DANZ Monitoring Fabric (DMF) managed services, select the Monitoring > Managed Services option.
Figure 1. Managed Services

This dashboard displays the Service Node appliance devices connected to the DMF Controller and the services configured on the Controller.

Overview and Summary

The Managed Services dashboard comprises the following tabs:

  • Devices (Default view)
  • Managed Services
  • Service Stats
  • Application Identification - EFT
  • GTP Correlation Profiles
  • IPFIX Templates

The following summary provides a high-level consolidation of the core modules used to manage and monitor network traffic. It outlines the logical progression from initial service configuration and action assignment to real-time performance analysis and data standardization. Understanding these integrated workflows enables more effective traffic processing, optimization, and troubleshooting, and supports consistent data reporting across the network infrastructure.

Managed Services and Actions

The Managed Services module serves as the core configuration hub for traffic processing, defining specific behaviors through the Actions menu, which includes specialized tools for:

  • Traffic Optimization: Slicing packets based on length or session data.
  • Performance Analysis: Configuring TCP Analysis and monitoring delivery metrics.
  • Packet Manipulation: Applying timestamps, replicating UDP traffic, and managing header stripping.
  • Rule-Based Processing: Implementing Post Service Match Rules, which become available after establishing a Header Strip action.

Performance Monitoring

The Service Stats tab transitions from configuration to active monitoring. It provides two primary methods for evaluating service health:

  • Quantitative Data: A detailed table displaying packet counts, byte counts, and bit rates (RX/TX/Applied).
  • Visual Trends: A real-time chart that updates every 10 seconds, allowing for the comparison of Applied, TX, and RX series across specific metrics.

Template Management

The IPFIX Templates section enables standardized data export. Defining specific Keys and Fields maintains consistent data structures for external reporting. The interface supports full lifecycle management of these templates, including creation, modification, and bulk deletion.

Operational Efficiency

Throughout these modules, consistent Table Actions streamline the administrative workflow:

  • The Duplicate and Edit functions reduce manual entry by allowing existing configurations to serve as templates.
  • Filtering and Multi-select capabilities enable the management of complex environments with multiple service nodes and interfaces.
  • The Export and Refresh tools ensure that data is always accessible and up to date for troubleshooting and documentation.

 

Devices

Navigate to Monitoring > Managed Services > Devices .

The Devices dashboard displays a table of devices including the Name, Description, MAC Address, IP Address, Connected, SKU, Serial Number, Zerotouch State, and Interface Count.

Use this dashboard to view and configure devices.

Figure 2. Managed Services - Devices Dashboard

Configure Devices

  • Add: Select + Add Device to open the creation menu. Enter the Device Name, Description, and MAC Address.
  • Edit: Select the box for a device and select Edit to modify its configuration. The menu displays the current device data. Update the necessary fields and select Save to apply changes.
  • Delete: Check one or more devices in the table and select Delete to remove them.
  • Export: Select Export to download the device data in CSV or JSON format to the local downloads folder.
  • Refresh: The system automatically refreshes data every 60 seconds. Hover over Refresh to view the time remaining until the next update. Select Refresh to update the data immediately.

Add Device

Select + Add Device to open the creation menu. Enter the Device Name, Description, and MAC Address.

Figure 3. Add Device
Figure 4. Add Device Parameters

Edit Device

Select the box for a device and select Edit to modify its configuration. The menu displays the current device data. Update the necessary fields and select Save to apply changes.

Figure 5. Edit Device Details

Delete Device(s)

Check one or more devices in the table and select Delete to remove them. Confirm the deletion.

Figure 6. Delete Devices

Refresh: By default, the system refreshes data every 60 seconds. Hovering over Refresh displays the time remaining until the next update. When required, click Refresh to update the data immediately.

Figure 7. Refresh

Devices Details

View Device Details

Select a device name in the table to access the device details view.

  • Default View: The system opens the Interfaces dashboard by default.
  • Device Switching: Use the device drop-down menu to switch between devices.
Figure 8. View Device Details

Interfaces

The Interfaces dashboard lists all interfaces associated with the selected device. The table includes the following columns:

  • Interface
  • Config Flags
  • State Flags
  • Advertised Features
  • Supported Features
  • Current Features
  • Fabric Connection
  • Interface Number
  • Hardware Address
Figure 9. Interface Dashboard

Interface Stats

Select Interface Stats to view interface statistics. The table displays the following columns:

  • Interface Name
  • RX Packet Count
  • RX Bytes
  • RX Packet Drop Count
  • RX Error Count
  • TX Packet Count
  • TX Bytes
  • TX Packet Drop Count
  • TX Error Count
Figure 10. Interface Stats Dashboard

Storage Health

Select Storage Health to view the device's storage status. This view displays health indicators for:

  • Status
  • Controllers
  • Virtual Drives

It also includes a detailed table of Physical Drives.

Figure 11. Storage Health Dashboard

Recording Tab

Select Recording to view storage recording details. This view includes tables for:

  • Packet Mount
  • Recording Threads
  • Index Mount
Figure 12. Recording Dashboard

 

Managed Services

The Managed Services dashboard displays a table of configured services and includes the following columns:

  • Name
  • Description
  • Actions
  • Installed
  • Service Interface
  • Service Node Interfaces
  • Policies

Use this dashboard to view and configure Managed Services.

Figure 13. Managed Services Dashboard
Figure 14. Managed Services Dashboard - Populated

Configure a Managed Service

Create - Select + Create Managed Service to open the creation menu. Enter the Managed Service Name, Description, and configure the interfaces. Configure either a Service Interface or Service Node Interfaces.

Figure 15. Create Managed Service

Configure Service Interface

Configure the Service Interface by selecting the Switch and its Interface.

Figure 16. Configure Service Interface

Configure Service Node Interface

Install a managed service directly on a switch-less Service Node (SN) by configuring the Service Node Interface. Select the Service Node and the specific Interface.

Configure multiple Service Node Interfaces for a single Managed Service to install the same service across multiple interfaces.

Figure 17. Configure Service Node Interface

Select Save to apply the configuration.

 

Configure Managed Service Actions

Configure actions using the Managed Services Details window. This drawer opens automatically after creating a Managed Service, or by selecting a Managed Service name from the table.

The UI supports the following actions:

  • Deduplication
  • App ID Filter
  • Filter

To configure an action, select + Add Action in Managed Services Details to open the setup menu.

Figure 18. Add Action

Aggregate GRETAP

Select Aggregate GRETAP from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port (Default: 4739)
  • Collector IP
  • MTU (Default: 1500)
  • Idle Timeout (Default: 5000 ms)
Figure 19. Configure Aggregate GRETAP

Aggregated sFlow

Select Aggregate sFlow from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port (Default: 4739)
  • Collector IP
  • MTU (Default: 1500)
  • Idle Timeout (Default: 5000 ms)
Figure 20. Configure Aggregated sFlow

App ID

Application Identification - Early Field Trial (EFT)

Select AppID from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port (Default: 4739)
  • Collector IP
  • MTU (Default: 1500)
Figure 21. Configure APP ID

 

App ID Filter Action

Application Identification Filter - Early Field Trial (EFT)

Select App ID Filter from the Action drop-down to open the configuration menu. Configure the following fields:

  • Filter
  • App Categories
  • App Names
Figure 22. Configure App ID Filter Action

Deduplication Action

Select Deduplication from the Action drop-down to open the configuration menu. Configure the following fields:

  • Packet Handling
  • Window Size
  • Anchor
  • Offset
Figure 23. Configure Deduplication Action

The DANZ Monitoring Fabric (DMF) Service Node enhances the efficiency of network monitoring tools by eliminating duplicate packets. Duplicate packets can be introduced into the out-of-band monitoring data stream by receiving the same flow from multiple TAP or SPAN ports spread across the production network. Deduplication eliminates these duplicate packets and enables more efficient use of passive monitoring tools.

The DMF Service Node provides four modes of deduplication for different types of duplicate packets.
  • Full packet deduplication: deduplicates incoming packets that are identical at the L3/L4 layers.
  • Payload routed packet deduplication: Routed Deduplication with L4 Payload and Salt. This skips TCP/UDP headers in hashing, allowing duplicate detection based on identical payloads even if header fields like timestamps differ.

  • Routed packet deduplication: as packets traverse an IP network, the MAC address changes from hop to hop. Routed packet deduplication enables users to match packet contents starting from the L3 header.
  • L4 Payload Start: NATed packet deduplication: to perform NATed deduplication, the service node compares packets in the configured window that are identical starting from the L4 payload. To use NATed packet deduplication, perform the following fields as required:
    • Anchor: Packet Start, L3 Header Start, L4 Header Start, or L4 Payload Start fields.
    • Offset: the number of bytes from the anchor where the deduplication check begins.
    • Window Size: The time window in which the service looks for duplicate packets is configurable. Select a value among these choices: 2ms (the default), 4ms, 6ms, and 8ms.

GUI Configuration

Choose the desired managed service from the Managed Service Dashboard and select + Add Action.

Figure 24. Add Action - Deduplication
Use the Configured Managed Service Action (name) and enter a sequence number and select Deduplication from the drop-down Action list.
Figure 25. Action - Deduplication
Select the following fields as required:
  • Anchor Offset - Packet Start, L3 Header Start, L4 Header Start, or L4 Payload Start fields.
  • Offset - Applies to Anchor Offset function and uses the number of bytes from the anchor where the deduplication check begins.
  • Full Packet - All bytes in packet.
  • Header Routed Packet - Header routed frame.
  • Payload Routed Packet - Payload routed frame.
  • Window Size - Applies to all Packet Handling functions. Configure the time window where the service looks for duplicate packets. Select a value from these choices: 2ms (the default), 4ms, 6ms, and 8ms.
Figure 26. Action: - Deduplication Parameters

After completing the necessary configuration, select Save followed by Done in the Managed Service Details window.

Routed Deduplication with L4 Payload and Salt

The DMF Controller supports a payload-routed-packet deduplication option. This feature allows service nodes to combine the L4 payload start anchor point with routed salt (L3 IP addresses, L4 source/destination ports, and other L3 header fields).

Anchoring the deduplication range at the L4 payload start ensures that frames with identical payload content are identified as duplicates, even when TCP headers—such as frequently updated timestamps—differ. This method effectively skips TCP/UDP headers and options during hash computation.

Functional Benefits

  • Optimized Bandwidth: The Service Node identifies and drops retransmitted packets containing identical data, preventing unnecessary traffic from reaching monitoring tools.
  • Precise Flow Identification: Using routed salt ensures the system maintains visibility into L3 and L4 flow identifiers while focusing the deduplication logic on the payload.
  • Reduced Processing Overhead: Monitoring tools receive only unique payload content, lowering the computational load on analytics engines.

Configuration and Functional Impact

Adding the payload-routed-packet option provides granular control over how the system processes retransmitted frames.

  • Deduplication Logic: The Service Node uses the same routed salt to maintain flow identification, but shifts the hash computation range to start after the transport-layer headers.
  • Data Integrity: DMF identifies frames as duplicates only when their payloads match within the same flow, ensuring that distinct data remains intact while redundant retransmissions are filtered.
  • Backward Compatibility: DMF maintains existing deduplication behavior under the name header-routed-packet. Automatic configuration migration ensures that current deployments maintain their existing behavior upon upgrade without manual intervention.

All dedup supporting Service Nodes support Routed Deduplication with L4 Payload and Salt.

Configuration

In the deduplication managed service configuration, the implementation replaces the single routed-packet option with two distinct settings for the region command. To access these options, first define a deduplication action using the [index] action dedup command within the config-managed-srv mode.

The region command defines the scope of the hash computation using the following four values:

  • full-packet: Performs complete packet deduplication starting from the beginning of the frame.

  • header-routed-packet: Enables L4 header-based routed deduplication using routed salt (L3 IP addresses and L4 ports).

  • payload-routed-packet: Enables L4 payload-based routed deduplication using routed salt, effectively skipping transport-layer headers to focus on payload content.

  • anchor-offset: Supports advanced custom configurations for specific byte ranges. This option facilitates L4 header and payload-based deduplication without incorporating salted fields.

Note: The existing show command structure supports this enhancement.

Filter Action

Select Filter from the Action drop-down to open the configuration menu. Configure a Default Action and optionally a Forwarding VLAN for forward actions.

  • The default action applies to all ACL rules upon installation but can be overridden for individual rules.
  • Select Add ACL to configure multiple ACL rules.
Figure 27. Configure Filter Action
Figure 28. Configure Filter Action with ACLs

Flow Latency and Drops

Select Flow Latency and Drops from the Action drop-down. The configuration menu has the following tabs:

  • Info
  • Tap Point Pair
  • Tap Point Multicast Groups

Info Tab

Select the Info tab to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • Collector IP
  • UDP Port
  • MTU
  • Delivery Requirement
  • Report Types
Figure 29. Configure Flow Latency and Drops

Tap Point Pair Tab

Select the Tap Point Pair tab to view the configuration table. The table displays the following columns:

  • Source Type
  • Source Name
  • Destination Type
  • Destination Name

 

Figure 30. Configure Tap Point Pair

Add Entry: Select Add to open the configuration menu.

Source Type: The Source Type drop-down includes the following options:

  • Filter Interface
  • Policy Name
  • Filter Interface Group

Name Selection: The Name drop-down options update dynamically based on the selected Source Type.

Figure 31. Configure Tap Point Pair Filter Interface

Tap Point Multicast Groups Tab

Select the Tap Point Multicast Groups tab to access the configuration.

  • Use the multi-select drop-down to integrate Multicast groups with Flow Latency and Drops actions.
Figure 32. Configure Tap Point Multicast Groups

GTP Correlation

Select GTP Correlation from the Action drop-down to open the configuration menu. Configure the following fields:

  • Idle Timeout
  • Sampling Rate
  • Correlation Profile
  • APN Group
  • Rewrite Option
  • Drop Control

 

Figure 33. Configuring GTP Correlation

Correlation Profile Selection

Select one of the following options for the Correlation Profile. The menu will update dynamically to display the corresponding drop-down field:

  • IMSI Group
  • IMEI Group
  • MSISDN Group

Header Strip

Select Header Strip from the Action drop-down to open the configuration menu. Configure the Anchor, Offset, and L2 Header options.

L2 Header Options

Choose one of the following configurations for the L2 Header:

  • Option 1: Use Existing L2 Header
    • Assumes an existing L2 header is present.
    • Retains the existing Source MAC, Destination MAC, and EtherType without modification.
  • Option 2: Inherit from Stripped L2 Header
    • Inherits Source MAC and Destination MAC from the stripped L2 header.
    • Select one of the following EtherType options:
      • Use original EtherType
      • Insert Inet EtherType
      • Use custom EtherType
  • Option 3: Add Custom L2 Header
    • Adds a completely custom L2 header.
    • Select one of the following EtherType options:
      • Insert Inet EtherType
      • Add custom EtherType
Figure 34. Configure Header Strip

Header Strip Actions

Decapsulation Actions

The Action drop-down includes the following specific header decapsulation types:

  • 16-Byte Header Decap
  • ERSPAN Header Decap
  • Geneve Header Decap
  • L3 MPLS Header Decap
  • LISP Header Decap
  • VNTag Header Decap
  • VXLAN Header Decap

Select any of these options to open the corresponding configuration menu. Use the menu to configure the Drop Decap setting.

This action removes specific headers from the traffic selected by the associated DANZ Monitoring Fabric (DMF) policy. Alternatively, define custom header stripping based on the starting position of the Layer-3 header, the Layer-4 header, the Layer-4 payload, or the first byte in the packet.

Use the following decap actions isolated from the header-strip configuration stanza:
  • decap-erspan: remove the Encapsulated Remote Switch Port Analyzer (ERSPAN) header.
  • decap-cisco-fabric-path: remove the Cisco FabricPath protocol header.
  • decap-l3-mpls: remove the Layer-3 Multi-protocol Label Switching (MPLS) header.
  • decap-lisp: remove the LISP header.
  • decap-vxlan [udp-port vxlan port]: remove the Virtual Extensible LAN (VXLAN) header.
  • decap-geneve: remove the Geneve header.
Note:For the Header Strip and Decap actions, apply post-service rules to select traffic after stripping the original headers.
To customize the header-strip action, use one of the following keywords to strip up to the specified location in each packet:
  • l3-header-start
  • l4-header-start
  • l4-payload-start
  • packet-start

Input a positive integer representing the offset from which the strip action begins. When omitting an offset, the header stripping starts from the first byte in the packet.

GUI Configuration

Under the Action drop-down, select the desired Header Strip action.

Figure 35. Managed Service Action - Header Strip

After assigning the required actions to the header stripping service, select Next or Post-Service Match.

The system displays the Post Service Match page, used in conjunction with the header strip service action.

 

Figure 36. Managed Service Action - Header Strip VXLAN Header Decap
Figure 37. Create Managed Service: Post Service Match for Header Strip Action

IPFIX

Select IPFIX from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Inactive Timeout
  • Active Timeout
  • Template Timeout
  • IPFIX Template
Figure 38. Configure IPFIX

Mask

Mask

Select Mask from the Action drop-down to open the configuration menu. Configure the following fields:

  • Match Pattern
  • Anchor
  • Offset
  • Match Characters

Match Characters Configuration

Enable Match Characters to display and configure the following additional fields:

  • Mask Start
  • Mask End
Figure 39. Configure Header Strip Actions

NetFlow

Select NetFlow from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Inactive Timeout
  • Active Timeout
  • Flows
  • Per-Interface Records
Figure 40. Configure NetFlow

Pattern Drop

Select Pattern Drop from the Action drop-down to open the configuration menu. Configure the following fields:

  • Pattern
  • Anchor
  • Offset
Figure 41. Configure Pattern Drop

Pattern Match

Select Pattern Match from the Action drop-down to open the configuration menu. Configure the following fields:

  • Pattern
  • Anchor
  • Offset
Figure 42. Configure Pattern Match

Record

Select Record from the Action drop-down to open the configuration menu.

Regex Session

Select Regex Session from the Action drop-down to open the configuration menu. Configure the following fields:

  • Anchor
  • Offset
  • Pattern
  • IP Protocol
  • Regex Session Table Size
  • TCP Idle Timeout
  • UDP Timeout
Figure 43. Configure Regex Session

SIP Mask

Select SIP Mask from the Action drop-down to open the configuration menu. Configure the following fields:

  • UDP Port
  • TCP Port
Figure 44. Configure SIP Mask

Sample

Select Sample from the Action drop-down to open the configuration menu. Configure the following fields:

  • Max Tokens
  • Tokens Per Refresh
Figure 45. Configure Sample

Session Slice

Select Session Slice from the Action drop-down to open the configuration menu. Configure the following fields:

  • Slice After (based on number of Packets)
  • Idle Timeout
Figure 46. Configure Session Slice

Slice

Select Slice from the Action drop-down to open the configuration menu. Configure the following fields:

  • Insert Original Packet length
  • Anchor
  • Offset
Figure 47. Configure Slice

Timestamp

Select Timestamp from the Action drop-down to open the configuration menu.

TCP Analysis

Select TCP Analysis from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Include Dapper Elements
  • Max Samples
Figure 48. Configure TCP Analysis

UDP Replication

Select UDP Replication from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • Input Packet Destination IP
  • Output Packet Destination IP

Adding Multiple Output IPs

To configure multiple Output Packet Destination IPs, select + Add IP.

After completing the necessary configuration, select Save.

The saved configuration can be found under Actions within the Managed Services Details.

Post Service Match

Post Service Match Rules

Prerequisite: Add a Header Strip action or one of the Header Strip Decap actions before configuring Post Service Match Rules.

Figure 49. Configure Post Service Match Rules

Add Rule Availability

After adding a Header Strip or Header Strip Decap action, the Add Rule option appears in two locations:

  • The left navigation panel.
  • The center of the empty state dashboard.
Figure 50. Configure Rule Availability

Configuring a Post Service Match Rule

Select Add Rule to open the Post Service Match Rule configuration dialog.

Figure 51. Configure Post Service Match Rule

Rule Listing

After successfully configuring the Post Service Match Rule, the rule appears in the table within the Managed Services Details.

Figure 52. Managed Services Details - Post Service Match Rule
Figure 53. Managed Services Details
Figure 54. Table Actions

Edit

Select a Managed Service row and then Edit to modify its configuration. The window automatically populates with the selected Managed Service's data. After making the necessary changes, select Save.

Figure 55. Edit Managed Service - Service Interface
Figure 56. Edit Managed Service - Service Node Interface

Monitor Service Stats

Select one or more Managed Service rows and select Monitor Service Stats to view service statistics and performance metrics in the Service Stats tab. This is crucial for troubleshooting and performance monitoring.

Figure 57. Monitor Service Stats
Figure 58. Monitor Managed Service

Duplicate

Select a Managed Service row and select Duplicate to create a new Managed Service with the same configuration as the selected one. The new service can then be modified. This is useful for quickly creating similar Managed Service configurations.

Figure 59. Duplicate Managed Service

Delete

Select one or more Managed Service rows and select Delete to remove the selected Managed Service(s).

Figure 60. Delete Managed Service

Export

Select Export to download the Managed Services data content in CSV or JSON format to the browser's download folder.

Refresh

By default, the system refreshes data every 60 seconds. Hover over Refresh to view the time remaining until the next update. When required, select Refresh to update the data immediately.

Managed Service Details

To view the details of a Managed Service, select the name of the desired service from the table. This opens the details drawer, which prominently displays the following key information:

  • Managed Service Name
  • Description
  • Service Interface / Service Node Interface

Modifying Configuration

Select Edit to open the configuration window and modify the selected Managed Service settings.

Monitoring Statistics

Select Monitor Service Stats to navigate directly to the statistics monitoring view for this specific Managed Service.

 

Actions Section

 

This section allows users to manage the actions associated with the Managed Service. Capabilities include:
  • Viewing action details
  • Expanding or collapsing details
  • Adding new actions
  • Editing existing actions
  • Deleting existing actions
Figure 61. Managed Service Details

 

Figure 62. Managed Service Details

 

Aggregate GRETAP

Select Aggregate GRETAP from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface - select from a list of available interfaces.
  • UDP Port - Default value of4739
  • Collector IP - Configure an IP address as the Collector IP.
  • MTU - Default value of 1500
  • Idle Timeout - Default value of5000 ms
Figure 63. Configure Aggregate GRETAP

Aggregated sFlow

Select Aggregate sFlow from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port (Default: 4739)
  • Collector IP
  • MTU (Default: 1500)
  • Idle Timeout (Default: 5000 ms)
Figure 64. Configure Aggregated sFlow

App ID

Application Identification - Early Field Trial (EFT)

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.
The DANZ Monitoring Fabric (DMF) Application Identification feature allows for the monitoring of applications identified with Deep Packet Inspection (DPI) into packet flows received via filter interfaces and generates IPFIX flow records. These IPFIX flow records are transmitted to a configured collector device via the L3 delivery interface. The feature provides a filtering function by forwarding or dropping packets from specific applications before sending the packet to the analysis tools.
Note: Application identification is supported on Service Nodes (DCA-DM-SC and DCA-DM-SC2) and Service Nodes (DCA-DM-SDL and DCA-DM-SEL).

Select App ID from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port (Default: 4739)
  • Collector IP
  • MTU (Default: 1500)
Figure 65. Configure APP ID

 

App ID Filter

Application Identification Filter - Early Field Trial (EFT)

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Select App ID Filter from the Action drop-down to open the configuration menu. Configure the following fields:

  • Filter
  • App Categories
  • App Names
Figure 66. Configure App ID Filter Action
Configuring App ID and AP ID Filter
App ID and App ID Filter are in the Managed Service workflow. Perform the following steps to complete the configuration.
  1. Navigate to the Monitoring > Managed Services page. Select the table action + icon to add a new managed service.
    Figure 67. Managed Services - App ID
  2. Configure the Name, Switch, and Interface inputs in the Info step.
    Figure 68. Info Step
  3. In the Actions step, select the + icon to add a new managed service action.
    Figure 69. Add App ID Action
  4. To Add the App ID Action, select App ID from the action selection input:
    Figure 70. Select App ID
  5. Fill in the Delivery Interface, Collector IP, UDP Port, and MTU inputs and select Append to include the action in the managed service:
    Figure 71. Delivery Interface
  6. To add the App ID Filter Action, select App ID Filter from the action selection input:
    Figure 72. Select App ID Filter
  7. Select the Filter input as Forward or Drop action:
    Figure 73. Select Filter Input
  8. Use the App Names section to add app names.
    1. Select a category from the App Categories list and select App Names from the list to include in the App ID Filter.
    2. Repeat the above step to add more app names as necessary.
    Figure 74. Associate App Names
  9. The selected App Names and App Categories are now listed. Use the x icon to remove any app names, if necessary:
    Figure 75. Application Names
  10. Select Save to add the action to the managed service and Save to save the managed service.
For existing managed services, add App ID or App ID Filter using the Edit workflow of a managed service.

Deduplication

The DANZ Monitoring Fabric (DMF) Service Node enhances the efficiency of network monitoring tools by eliminating duplicate packets. Duplicate packets can be introduced into the out-of-band monitoring data stream by receiving the same flow from multiple TAP or SPAN ports spread across the production network. Deduplication eliminates these duplicate packets and enables more efficient use of passive monitoring tools.

The DMF Service Node provides four modes of deduplication for different types of duplicate packets.
  • Full packet deduplication: deduplicates incoming packets that are identical at the L3/L4 layers.
  • Payload routed packet deduplication: Routed Deduplication with L4 Payload and Salt. This skips TCP/UDP headers in hashing, allowing duplicate detection based on identical payloads even if header fields like timestamps differ.

  • Routed packet deduplication: as packets traverse an IP network, the MAC address changes from hop to hop. Routed packet deduplication enables users to match packet contents starting from the L3 header.
  • L4 Payload Start: NATed packet deduplication: to perform NATed deduplication, the service node compares packets in the configured window that are identical starting from the L4 payload. To use NATed packet deduplication, perform the following fields as required:
    • Anchor: Packet Start, L3 Header Start, L4 Header Start, or L4 Payload Start fields.
    • Offset: the number of bytes from the anchor where the deduplication check begins.
    • Window Size: The time window in which the service looks for duplicate packets is configurable. Select a value among these choices: 2ms (the default), 4ms, 6ms, and 8ms.
GUI Configuration

Choose the desired managed service from the Managed Service Dashboard and select + Add Action.

Figure 76. Add Action - Deduplication
Use the Configured Managed Service Action (name) and enter a sequence number and select Deduplication from the drop-down Action list.
Figure 77. Action - Deduplication
Select the following fields as required:
  • Anchor Offset: Packet Start, L3 Header Start, L4 Header Start, or L4 Payload Start fields.
  • Offset: Applies to Anchor Offset function and is the number of bytes from the anchor where the deduplication check begins.
  • Full Packet: All bytes in packet.
  • Header Routed Packet: Header routed frame.
  • Payload Routed Packet: Payload routed frame.
  • Window Size: Applies to all Packet Handling functions. The time window in which the service looks for duplicate packets is configurable. Select a value among these choices: 2ms (the default), 4ms, 6ms, and 8ms.
Figure 78. Action: - Deduplication Parameters

After completing the necessary configuration, select Save followed by Done in the Managed Service Details window.

Filter Action

Select Filter from the Action drop-down to open the configuration menu. Configure a Default Action and optionally a Forwarding VLAN for forward actions.

  • The default action applies to all ACL rules upon installation but can be overridden for individual rules.
  • Select Add ACL to configure multiple ACL rules.
Figure 79. Configure Filter Action
Figure 80. Configure Filter Action with ACLs
  1. Enter a Sequence number.
  2. Select an IP protocol from the IP Protocol list.
  3. Select an action, Drop or Forward, from the Action list.
  4. Enter a forwarding VLAN number in the Push VLAN field.
  5. Enter a source IP address in the Source IP Address field.
  6. Enter a source IP mask in the Source IP Mask field.
  7. Add a source port number ora range of source ports using the Source Port menu.
  8. Enter a destination IP address in the Dest. IP Address field.
  9. Enter a destination IP mask in the Dest. IP Mask field.
  10. Add a source port number ora range of source ports using the Dest. Port menu.
  11. Click Save to save the configuration on the switch.

Flow Latency and Drops

Latency and drop information help determine if there is a loss in a particular flow and where the loss occurred. A Service Node action configured as a DANZ Monitoring Fabric (DMF) managed service has multiple separate taps or spans in the production network and can measure the latency of a flow traversing through any pair of these points. It can also detect packet drops between any two points in the network if the packet only appears on one point within a specified time frame, currently set to 200ms.

Latency and drop analysis require Precision Time Protocol (PTP) time-stamped packets. The DMF PTP timestamping feature applies these timestamps as packets enter the monitoring fabric.

The Service Node accumulates latency values by flow and sends IPFIX data records with each flow's 5-tuple and ingress and egress identifiers. It sends IPFIX data records to the Analytics Node after collecting a specified number of values for a flow or when a timeout occurs for the flow entry. The threshold count is 10,000 packets, and the flow timeout is 4 seconds.

Note: This feature is only supported in push-per-filter mode. Only basic statistics, such as min, max, and mean, are available. These statistics are the computed difference in timestamps, or latency, between two tap point pairs of packets within a flow.

Use the DMF Analytics Node to build custom dashboards to view and check the data.

Attention: The flow diff latency and drop analysis feature is switch dependent and requires PTP timestamping. It is supported on 7280R3 and 7800R3 switches.

Select Flow Latency and Drops from the Action drop-down. The configuration menu is divided into the following tabs:

  • Info
  • Tap Point Pair
  • Tap Point Multicast Groups

Info Tab

Select the Info tab to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • Collector IP
  • UDP Port
  • MTU
  • Delivery Requirement
  • Report Types
Figure 81. Configure Flow Latency and Drops

Tap Point Pair Tab

Select the Tap Point Pair tab to view the configuration table. The table displays the following columns:

  • Source Type
  • Source Name
  • Destination Type
  • Destination Name

 

Figure 82. Configure Tap Point Pair

Add Entry: Select Add to open the configuration menu.

Source Type: The Source Type drop-down includes the following options:

  • Filter Interface
  • Policy Name
  • Filter Interface Group

Name Selection: The Name drop-down options update dynamically based on the selected Source Type.

Figure 83. Configure Tap Point Pair Filter Interface

Tap Point Multicast Groups Tab

Select the Tap Point Multicast Groups tab to access the configuration.

  • Use the multi-select drop-down to integrate Multicast groups with Flow Latency and Drops actions.
Configuring Flow Latency and Drops

Configure Flow Diff Latency and Drop Analysis using the DANZ Monitoring Fabric (DMF) GUI.

Delivery Requirement & Report Types

The Flow Latency and Drops action within Managed Services includes two new configuration options:

Delivery Requirement

  • All Destinations (default): The system drops packets unless every destination tap point receives the packet.
  • Any Destination: The system drops packets only if no destination tap point receives the packet.
Figure 84. Delivery Requirement

Report Types

  • Latency Report: This toggle enables or disables latency reports (default: enabled).
  • Drop Report: This toggle enables or disables drop reports (default: enabled).

Both the action configuration form and the action summary view display these fields.

Figure 85. Report Types - Latency and Drop Report

Procedure Summary

To access the Flow Latency and Drops action, navigate to:

Monitoring > Managed Services > Services > [Service Name] > Add Action > Action (drop-down) > Flow Latency and Drops

Configure Action

  • Initiate Action: Select Add Action within the specific service configuration.
  • Select Action Type: Choose Flow Latency and Drops from the Action drop-down menu.

Configure Delivery Requirements

  • Select All Destinations (default) to ensure the system drops packets unless every destination tap point receives the packet.
  • Select Any Destination to ensure the system drops packets only if no destination tap point receives the packet.

Enable Reporting

  • Select Latency Report to enable or disable latency data collection.
  • Select Drop Report to enable or disable drop data collection.
Verify Settings
  • Review the configured fields in both the action configuration form and the action summary view to ensure accuracy.
Save Configuration
  • Select Save to save the Flow Latency and Drops managed service.
Multicast Group Management and Configuration

The following sections detail the procedures for creating, managing, and applying multicast groups within the monitoring environment.

Navigation Path

To access the Multicast Groups management page, navigate to:

Monitoring > Configuration > Multicast Groups

Figure 86. Multicast Group Dashboard

 

Creating a Multicast Group

Procedure

  1. Initiate Creation: Select Create Multicast Group.
  2. Configure Group Identifiers: Provide a unique name in the Name field.
  3. Assign Source Interfaces: Select one or more filter interfaces or filter interface groups in the Sources field.
  4. Assign Receiver Interfaces: Select one or more filter interfaces or filter interface groups in the Receivers field.
  5. Define Addresses: Add multicast IP addresses in the Group IPs field (optional).
  6. Save Configuration: Select Save to finalize the group.
Create Multicast Group
Figure 87. Create Multicast Group
Table 1. Action Descriptions
Action Description
Edit Select the pencil icon to modify group settings. The name remains fixed and cannot be changed.
Delete Select the trash icon to remove a single group. To remove multiple groups simultaneously, select the corresponding rows and select the Delete button.
Export Utilize the Export drop-down menu to extract table data.
Tap Point Multicast Groups in Managed Service Action

Integrate multicast groups into Flow Latency and Drops actions for specific service monitoring.

Procedure

Navigate to: Monitoring > Managed Services [Service] > Add Action > Action (drop-down) > Flow Latency and Drops

Configuration

  1. Within the Tap Point Multicast Groups, select one or more predefined multicast groups from the drop-down menu to apply to the action.
  2. Select Save to finalize the Tap Point Multicast Group.
    Figure 88. Tap Point Multicast Group

GTP Correlation

Select GTP Correlation from the Action drop-down to open the configuration menu. Configure the following fields:

  • Idle Timeout
  • Sampling Rate
  • Correlation Profile
  • APN Group
  • Rewrite Option
  • Drop Control

 

Figure 89. Managed Services - GTP Correlation

Correlation Profile Selection

Select one of the following options for the Correlation Profile. The menu updates dynamically to display the corresponding drop-down field:

  • IMSI Group
  • IMEI Group
  • MSISDN Group

See GTP Correlation Profiles for more information about configuring profiles.

Header Strip

Select Header Strip from the Action drop-down to open the configuration menu. Configure the Anchor, Offset, and L2 Header options.

L2 Header Options

Choose one of the following configurations for the L2 Header:

  • Option 1: Use Existing L2 Header
    • Assumes an existing L2 header is present.
    • Retains the existing Source MAC, Destination MAC, and EtherType without modification.
  • Option 2: Inherit from Stripped L2 Header
    • Inherits Source MAC and Destination MAC from the stripped L2 header.
    • Select one of the following EtherType options:
      • Use original EtherType
      • Insert Inet EtherType
      • Use custom EtherType
  • Option 3: Add Custom L2 Header
    • Adds a completely custom L2 header.
    • Select one of the following EtherType options:
      • Insert Inet EtherType
      • Add custom EtherType
Figure 90. Configure Header Strip

Header Strip Actions

Decapsulation Actions

The Action drop-down includes the following specific header decapsulation types:

  • 16-Byte Header Decap
  • ERSPAN Header Decap
  • Geneve Header Decap
  • L3 MPLS Header Decap
  • LISP Header Decap
  • VNTag Header Decap
  • VXLAN Header Decap

Select any of these options to open the corresponding configuration menu. Use the menu to configure the Drop Decap setting.

This action removes specific headers from the traffic selected by the associated DANZ Monitoring Fabric (DMF) policy. Alternatively, define custom header stripping based on the starting position of the Layer-3 header, the Layer-4 header, the Layer-4 payload, or the first byte in the packet.

Use the following decap actions isolated from the header-strip configuration stanza:
  • decap-erspan: remove the Encapsulated Remote Switch Port Analyzer (ERSPAN) header.
  • decap-cisco-fabric-path: remove the Cisco FabricPath protocol header.
  • decap-l3-mpls: remove the Layer-3 Multi-protocol Label Switching (MPLS) header.
  • decap-lisp: remove the LISP header.
  • decap-vxlan [udp-port vxlan port]: remove the Virtual Extensible LAN (VXLAN) header.
  • decap-geneve: remove the Geneve header.
Note:For the Header Strip and Decap actions, apply post-service rules to select traffic after stripping the original headers.
To customize the header-strip action, use one of the following keywords to strip up to the specified location in each packet:
  • l3-header-start
  • l4-header-start
  • l4-payload-start
  • packet-start

Input a positive integer representing the offset from which the strip action begins. When omitting an offset, the header stripping starts from the first byte in the packet.

GUI Configuration

Under the Action drop-down, select the desired Header Strip action.

Figure 91. Managed Service Action - Header Strip

After assigning the required actions to the header stripping service, select Next or Post-Service Match.

The system displays the Post Service Match page, used in conjunction with the header strip service action.

 

Figure 92. Managed Service Action - Header Strip VXLAN Header Decap

IPFIX

Select IPFIX from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Inactive Timeout
  • Active Timeout
  • Template Timeout
  • IPFIX Template
Figure 93. Configure IPFIX
IPFIX and Netflow Actions

IP Flow Information Export (IP FIX), also known as NetFlow v10, is an IETF standard defined in RFC 7011. The IPFIX generator (agent) gathers and transmits information about flows, sets of packets that contain all the keys specified by the IPFIX template. The generator observes the packets received in each flow and forwards the information to the IPFIX collector (server) in the form as a flowset.

Starting with the DANZ Monitoring Fabric (DMF)-7.1.0 release, NetFlow v9 (Cisco proprietary) and IPFIX/NetFlow v10 are both supported. Configuration of the IPFIX managed service is similar to configuration for earlier versions of NetFlow except for the UDP port definition. NetFlow v5 collectors typically listen over UDP port 2055, while IFPIX collectors listen over UDP port 4739.

NetFlow records are typically exported using User Datagram Protocol (UDP) and collected using a flow collector. For a NetFlow service, the service node takes incoming traffic and generates NetFlow records. The service node drops the original packets, and the generated flow records, containing metadata about each flow, are forwarded out of the service node interface.

IPFIX Templates

The IPFIX Templates dashboard provides a table view of all configured templates. The table includes the following columns:

  • Name
  • Template ID
  • Keys
  • Fields
Figure 94. IPFIX Templates Dashboard

The IPFIX template consists of the key element IDs representing IP flow, field element IDs representing actions the exporter has to perform over IP flows matching key element IDs, the template ID number for uniqueness, collector information, and eviction timers.

To define a template, configure keys of interest representing the IP flow and fields that identify the values measured by the exporter, the exporter information, and the eviction timers. To define the template, select the Monitoring > Managed Service > IPFIX Template option from the DANZ Monitoring Fabric (DMF) GUI or enter the ipfix-template template-name command in config mode, replacing template-name with a unique identifier for the template instance.

IPFIX Keys

Use an IPFIX key to specify the characteristics of the traffic to monitor, such as source and destination MAC or IP address, VLAN ID, Layer-4 port number, and QoS marking. The generator includes flows in a flow set having all the attributes specified by the keys in the template applied. The flowset is updated only for packets that have all the specified attributes. If a single key is missing, the packet is ignored.

To see a listing of the keys supported in the current release of the DANZ Monitoring Fabric (DMF) Service Node, select the Monitoring > Managed Service > IPFIX Template option from the DMF GUI or type help key in config-ipxif-template submode.

The following are the keys supported in the current release:
Table 2. Supported Keys
destination-ipv4-address ip-version
destination-ipv6-address policy-vlan-id
destination-mac-address records-per-dmf-interface
destination-transport-port source-ipv4-address
dot1q-priority source-ipv6-address
dot1q-vlan-id source-mac-address
ethernet-type source-transport-port
icmp-type-code-ipv4 tcp-source-port (introduced in DMF 8.8)
icmp-type-code-ipv6 tcp-destination-port (introduced in DMF 8.8)
ip-class-of-service udp-source-port (introduced in DMF 8.8)
ip-diff-serv-code-point udp-destination-port (introduced DMF 8.8)
ip-protocol-identifier vlan id
ip-ttl  
Note: The policy-vlan-id and records-per-dmf-interface keys are Arista Proprietary Flow elements. The policy-vlan-id key helps to query per-policy flow information at Arista Analytics-node (Collector) in push-per-policy deployment mode. The records-per-dmf-interface key helps to identify filter interfaces tapping the traffic. The following limitations apply at the time of IPFIX template creation:
  • The Controller will not allow the key combination of source-mac-address and records-per-dmf-interface in push-per-policy mode.
  • The Controller will not allow the key combinations of policy-vlan-id and records-per-dmf-interface in push-per-filter mode.
IPFIX Fields

A field defines each value updated for the packets the generator receives that match the specified keys. For example, include fields in the template to record the number of packets, the largest and smallest packet sizes, or the start and end times of the flows.

To see a listing of the fields supported in the current release of the DANZ Monitoring Fabric (DMF) Service Node, select the Monitoring > Managed Service > IPFIX Template option from the DMF GUI, or type help in config-ipxif-template submode. The following are the fields supported:

  • flow-end-milliseconds
  • flow-end-reason
  • flow-end-seconds
  • flow-start-milliseconds
  • flow-start-seconds
  • maximum-ip-total-length
  • maximum-layer2-total-length
  • maximum-ttl
  • minimum-ip-total-length
  • minimum-layer2-total-length
  • minimum-ttl
  • octet-delta-count
  • packet-delta-count
  • tcp-control-bits
Active and Inactive Timers

After the number of minutes specified by the active timer, the flow set is closed and forwarded to the IPFIX collector. The default active timer is one minute. During the number of seconds set by the inactive timer, if no packets that match the flow definition are received, the flow set is closed and forwarded without waiting for the active timer to expire. The default value for the inactive time is 15 seconds.

Example Flowset
The following is a Wireshark view of an IPFIX flowset.
Figure 95. Example IPFIX Flowset in Wireshark

The following is a running-config that shows the IPFIX template used to generate this flowset.

Example IPFIX Template
! ipfix-template
ipfix-template Perf-temp
template-id 22222
key destination-ipv4-address
key destination-transport-port
key dot1q-vlan-id
key source-ipv4-address
key source-transport-port
field flow-end-milliseconds
field flow-end-reason
field flow-start-milliseconds
field maximum-ttl
field minimum-ttl
field packet-delta-count
Define an IPFIX Template
To define an IPFIX template, perform the following steps:
  1. Select the Monitoring > Managed Services option.
  2. On the DMF Managed Services page, select IPFIX Templates.
    The system displays the IPFIX Templates section.
    Figure 96. IPFIX Templates
  3. To create a new template, select the provision (+) icon in the IPFIX Templates section.
    Figure 97. Create IPFIX Template
  4. To add an IPFIX key to the template, select Keys. The system displays the following dialog.
    Figure 98. Select IPFIX Keys
  5. Select the keys to add to the template.
  6. To add an IPFIX field to the template, select the Settings control in the Fields section. The system displays the following dialog:
    Figure 99. Select IPFIX Fields
  7. Select each field to add to the template.
  8. On the Create IPFIX Template page, select Save.
The new template is added to the IPFIX Templates table, with each key and field listed in the appropriate column. Use this customized template to apply when defining an IPFIX-managed service.
Define an IPFIX Service Action

Select IPFIX from the Action selection list on the Create Managed Service > Action page.

Figure 100. Selecting IPFIX Action in Create Managed Service
Enter the following required configuration details:
  • Assign a delivery interface.
  • Configure the collector IP address.
  • Identify the IPFIX template.
Select from the following optional parameters:
  • Inactive timeout - the interval of inactivity that marks a flow inactive.
  • Active timeout - length of time between each IPFIX flows for a specific flow.
  • Source IP - source address to use for the IPFIX flowsets.
  • UDP port - UDP port to use for sending IPFIX flowsets.
  • MTU - MTU to use for sending IPFIX flowsets.

After completing the configuration, select Next, and then select Save.

Mask

The Masking action can hide specific characters in a packet, such as a password or credit card number, based on offsets from different anchors and by matching characters using regular (regex) expressions. The Mask Service Action applies the specified mask to the matched packet region.

 

Select Mask from the Action drop-down to open the configuration menu. Configure the following fields:

  • Match Pattern
  • Anchor
  • Offset
  • Match Characters

Match Characters Configuration

Enable Match Characters to display and configure the following additional fields:

  • Mask Start
  • Mask End
Figure 101. Configure Packet Masking Options Actions

NetFlow

Select NetFlow from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Inactive Timeout
  • Active Timeout
  • Flows
  • Per-Interface Records
Figure 102. Configure NetFlow

Pattern Drop

Select Pattern Drop from the Action drop-down to open the configuration menu. Configure the following fields:

  • Pattern
  • Anchor
  • Offset
Figure 103. Configure Pattern Drop

The Pattern Drop Service Action drops matching traffic.

Pattern matching allows content-based filtering beyond Layer-2, Layer-3, or Layer-4 Headers. This functionality allows filtering on the following packet fields and values:
  • URLs and user agents in the HTTP header
  • Patterns in BitTorrent packets
  • Encapsulation headers for specific parameters, including GTP, VXLAN, and VN-Tag
  • Subscriber device IP (user-endpoint IP)

Pattern matching allows Session-aware Adaptive Packet Filtering (SAPF) to identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and separate control traffic from user data traffic.

Pattern matching is also helpful in enforcing IT policies, such as identifying hosts using unsupported operating systems or dropping unsupported traffic. For example, the Windows OS version can be identified and filtered based on the user-agent field in the HTTP header. The user-agent field may appear at variable offsets, so a regular expression search is used to identify the specified value wherever it occurs in the packet.

GUI Configuration
Figure 104. Create Managed Service: Pattern Drop Action

Pattern Match

Select Pattern Match from the Action drop-down to open the configuration menu. Configure the following fields:

  • Pattern
  • Anchor
  • Offset

The pattern-match service action matches and forwards matching traffic and is similar to the pattern-drop service action.

Pattern matching allows content-based filtering beyond Layer-2, Layer-3, or Layer-4 Headers. This functionality allows filtering on the following packet fields and values:
  • URLs and user agents in the HTTP header
  • patterns in BitTorrent packets
  • encapsulation headers for specific parameters including, GTP, VXLAN, and VN-Tag
  • subscriber device IP (user-endpoint IP)
  • Pattern matching allows Session Aware Adaptive Packet Filtering and can identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and can separate control traffic from user data traffic.

Pattern matching allows Session-aware Adaptive Packet Filtering (SAPF) to identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and separate control traffic from user data traffic.

Pattern matching is also helpful in enforcing IT policies, such as identifying hosts using unsupported operating systems or dropping unsupported traffic. For example, the Windows OS version can be identified and filtered based on the user-agent field in the HTTP header. The user-agent field may appear at variable offsets, so a regular expression search is used to identify the specified value wherever it occurs in the packet.

GUI Configuration
Figure 105. Configure Pattern Match

Packet Recording

This release adds a new managed service action, called Record, to the Service Node (SN). This action enables packet recording using an SN similar to a Recorder Node (RN) and supports basic packet recording and querying capabilities.

The SN accumulates packets, writes packet data to local storage disks, and indexes information based on configured fields. Various query types retrieve recorded packets, analyze traffic patterns, and investigate network issues.

The Controller includes the managed service action record to enable packet recording on an SN.

Core Recording Functionality
  • Capture and store packets to local disks.
  • Index configurable packet fields.
  • Query recorded packets.
  • Perform traffic analysis queries (HTTP, TCP flow health, conversations).
  • Monitor storage and query health.
Platform Compatibility

The DCA-DM-SNR660 SKU exclusively supports the record action, as this hardware includes the dedicated storage disks required for packet capture. Consequently, this feature is available on switchless physical units but remains unsupported on virtual SNs.

Table 3. Support Matrix
Deployment Type Support Status - Record Feature
Physical SN (Switchless) Supported
Virtual SN Not Supported
Important: Ensure the hardware is a physical SNR660 model; virtual instances lack the disk architecture to handle recording tasks.

Select Record from the Action drop-down to open the configuration menu.

Figure 106. Select Record
Configuring Packet Recording

 

Configure Recording Settings

The DMF GUI provides an interface to configure recording settings on SNs. Customize indexing fields when adding or editing an SN through the Managed Services dashboard.

Add Device with Recording Settings
  1. Navigate to Monitoring > Managed Services > Devices .
  2. Select Add Device to open the configuration panel.
  3. Fill in the required fields:
    • Device Name
    • Description (optional)

    • MAC Address
  4. Set Configure Recording Settings to On to define indexing for recorded packets (default: off).
  5. Select the desired Indexing fields from the drop-down menu.
  6. Commit the changes using Save.
Note:
  1. By default, the system pre-selects the following indexing fields: VLAN 1, IPv4 Src., IPv4 Dest., IPv6 Src., IPv6 Dest., IP Protocol, Port Src., and Port Dest.
  2. The Configure Recording Settings selection controls only the indexing configuration for packet recording; it does not enable or disable the recording action itself.
Figure 107. Add Device Recording Settings
Figure 108. Indexing Fields
Edit Recording Settings

To modify recording settings on an existing SN:

  1. Navigate to Monitoring > Managed Services > Devices .
  2. Highlight the device from the table and choose the Edit action.
  3. Enable Configure Recording Settings to enter the configuration mode.
  4. Modify the indexing fields as needed.
  5. Commit the changes using Save.
Figure 109. Edit Recording Settings
View Record Indexing

The Record Indexing column in the Devices table displays the enabled indexing fields for each device. Search and filter devices based on their specific indexing configuration.

Figure 110. View Record Indexing
Edit Configuration (Recording)

Access global recording configuration settings from the Managed Services dashboard ( Monitoring > Managed Services ) via Edit Configuration. These settings apply to both Recorder Nodes and SNs.

Figure 111. Query Service Nodes
Figure 112. Edit Configuration
View Query History

Select View Query History on the Managed Services dashboard ( Monitoring > Managed Services ) to navigate to the Query History dashboard. This area displays query records for both Recorder Nodes and SNs.

Figure 113. Query Service Nodes
Query Service Node

Select Query Service Nodes on the Managed Services dashboard ( Monitoring > Managed Services ) to open the Query Recording Devices window. Both Recorder Nodes and SNs are available in the Recording Devices drop-down. When selecting both types, the UI enables only the options supported by both device types.

Selecting an SN disables the following options:

  • Query Types: AppID, Replay
  • Flow Analysis: DNS, HTTP Request, Hosts, RTP Streams, SIP Correlate, SIP Health, TCP, UDP
  • Additional Parameters: Fail Fast, Dedup Time Window
Figure 114. Query Recording Devices
Device Details Recording Tab

A Recording tab is available in the device details dashboard (Monitoring > Managed Services > Devices > Device Name). This section displays the following recording-related information for the selected device:

  • Storage: Index Disk and Packet Disk utilization.
  • Recording Threads: CPU Core, Cached Files, Max Cached Files, and Tracked Files.
  • Packet Mount / Index Mount: Volume, mount point, file system, and health status.
Figure 115. Recording Tab

Service Action Invalid Alert: If issues occur with a record action on a Managed Service, a Service Action Invalid warning alert appears in the notification area (bell icon in the header).

Select the bell icon to view alert details.

 

Regex Session

Select Regex Session from the Action drop-down to open the configuration menu. Configure the following fields:

  • Anchor
  • Offset
  • Pattern
  • IP Protocol
  • Regex Session Table Size
  • TCP Idle Timeout
  • UDP Timeout
Figure 116. Configure Regex Session

SIP Mask

Select SIP Mask from the Action drop-down to open the configuration menu. Configure the following fields:

  • UDP Port
  • TCP Port
Figure 117. Configure SIP Mask

Sample

Select Sample from the Action drop-down to open the configuration menu. Configure the following fields:

  • Max Tokens
  • Tokens Per Refresh
Figure 118. Configure Sample

Session Slice

Session-slice keeps track of TCP and UDP sessions (distinguished by source and destination IP address and port) and counts the number of packets sent in each direction (client-to-server and vice versa). After recognizing the session, the action transmits a user-configured number of packets to the tool node.

For TCP packets, session-slice tracks the number of packets sent in each direction after establishing the TCP handshake. Slicing begins after the packet count in a direction has reached the configured threshold in both directions.

For UDP packets, slicing begins after reaching the configured threshold in either direction.

By default, session-slice will operate on both TCP and UDP sessions but is configurable to operate on only one or the other.

Note: The count of packets in one direction may exceed the user-configured threshold because fewer packets have arrived in the other direction. Counts in both directions must be greater than or equal to the threshold before dropping packets.

Refer to the DANZ Monitoring Fabric (DMF) Verified Scale Guide for session-slicing performance numbers.

Select Session Slice from the Action drop-down to open the configuration menu. Configure the following fields:

  • Slice After (based on number of Packets)
  • Idle Timeout
Figure 119. Configure Session Slice
Configure Session Slicing

 

Perform the following steps to configure session slicing.
  1. Navigate to Monitoring > Managed Services > Managed Services .
    Figure 120. Managed Services
  2. Select the + icon to create a new managed service.
    Figure 121. Create Managed Service
  3. Enter a Name for the managed service.
    Figure 122. Managed Service Name
  4. Select a Switch from the drop-down list.
    Figure 123. Manage Service Switch
     
  5. Select an Interface from the drop-down list.
    Figure 124. Managed Service Interface Added

    Click Save.

  6. Select the + icon to select a managed service action.
    Figure 125. Configure Managed Service Action List
  7. Choose Session Slice from the drop-down list. Adjust the Slice After and Idle Timeout parameters, as required.
     
    Figure 126. Configure Managed Service Action Session Slice
  8. Select Append and then Save to add the session slice managed service.

Slice

The Slice Service Action slices the given number of packets based on the specified starting point in the packet. Packet slicing reduces packet size to increase processing and monitoring throughput. Passive monitoring tools process fewer bits while maintaining each packet's vital, relevant portions. Packet slicing can significantly increase the capacity of forensic recording tools. Apply packet slicing by specifying the number of bytes to forward based on an offset from the following locations in the packet:
  • Packet start
  • L3 header start
  • L4 header start
  • L4 payload start
Note: The slicing service can currently only parse TCP/UDP/ICMP/ICMP6/GRE/SCTP/ESP protocols.

Select Slice from the Action drop-down to open the configuration menu. Configure the following fields:

  • Insert Original Packet length
  • Anchor
  • Offset
Figure 127. Configure Slice

This page allows inserting an additional header containing the original header length.

TCP Analysis (Dapper)

The Dapper action (derived from Brown University research) identifies TCP session issues by measuring specific connection attributes. This analysis determines whether performance degradation stems from the client, server, or network devices. All current Service Node platforms support the Dapper action.

Figure 128. Dapper Action

The action monitors TCP session packets, tracks extensive statistics, and periodically exports them via IPFIX records to a collector. For every session direction, the system generates:

  • One Start-Session record.
  • One or more Data records.
  • One End-Session record.

The collector evaluates these statistics, utilizing six distinct IPFIX templates to diagnose the root cause of network problems.

Start-Session Record

The system transmits the Start-Session record for each direction immediately after session establishment (upon Client ACK). This record captures the initial attributes negotiated during the handshake.

Table 4. Template 6668, IPv4 Start-Session
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 start_milliseconds dateTimeMilliseconds Session start time in milliseconds since epoch
6 218 tcp_syn_total_count unsigned64 Number of TCP packets with SYN flag sent (0 if we did not see initiation)
7 32774 window_size unsigned32 Initial window size in octets
8 32771 expected_flight_size unsigned32 Expected flight size in octets
9 32822 switch_mac macAddress Ethernet address of filter switch
10 32823 switch_port unsigned16 Port on filter switch
11 6 tcp_control_bits unsigned16 TCP flags set during initiation (SYN, SYN | ACK, unset if we did not see initiation)
Table 5. Template 6669, IPv6 Start-Session
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv6Address IPv6 source address
1 28 ipv6_dst ipv6Address IPv6 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 start_milliseconds dateTimeMilliseconds Session start time in milliseconds since epoch
6 218 tcp_syn_total_count unsigned64 Number of TCP packets with SYN flag sent (0 if we did not see initiation)
7 32774 window_size unsigned32 Initial window size in octets
8 32771 expected_flight_size unsigned32 Expected flight size in octets
9 32822 switch_mac macAddress Ethernet address of filter switch
10 32823 switch_port unsigned16 Port on filter switch
11 6 tcp_control_bits unsigned16 TCP flags set during initiation (SYN, SYN | ACK, unset if we did not see initiation)
Data Record

The system transmits Data records for each session direction at periodic intervals. It analyzes packet streams up to a configured limit to match data/acknowledgment pairs, recording delay and size metrics. Most statistics reflect averages derived from the sample period.

Note: The system reports fields marked with an asterisk (*) only when the dapper compatibility setting is false.
Table 6. Template 6666, IPv4 Data
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 32768 report_timer unsigned32 The number of samples in round-trip-time calculations (matching sync/ack pairs)
6 32828 reaction_time unsigned32 Average time between receiving an ACK and the next data packet
7 32770 flight_size unsigned32 Average flight size over samples in octets
8 32771 expected_flight_size unsigned32 Average expected flight size in octets
9 32829 round_trip_time unsigned32 Average round-trip-time between sync and matching ack in microseconds
10 32773 retransmissions unsigned32 Counter of retransmitted packets received during sample period
11 32774 window_size unsigned32 Average window size reported during sample period in octets
12 32775 ecn unsigned32 Counter of how many packets had ECN flag set during sample period
13* 2 packet_delta unsigned32 Number of packets received during sample period
14* 1 octet_delta unsigned64 Number of bytes received during sample period
15* 32830 first_rtt unsigned32 First round trip time in period in microseconds
16* 32831 min_rtt unsigned32 Minimum round trip time during period in microseconds
17* 32832 max_rtt unsigned32 Maximum round time trip during period in microseconds
17* 32833 rtt_standard_deviation unsigned32 The standard deviation of round trip time measurements during period
18* 32834 recovery_time unsigned32 Average time between an initial data packet and a retransmission
Table 7. Template 6667, IPv6 Data
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv4Address IPv4 source address
1 28 ipv6_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 32768 report_timer unsigned32 The number of samples in round-trip-time calculations (matching sync/ack pairs)
6 32828 reaction_time unsigned32 Average time between receiving an ACK and the next data packet
7 32770 flight_size unsigned32 Average flight size over samples in octets
8 32771 expected_flight_size unsigned32 Average expected flight size in octets
9 32829 round_trip_time unsigned32 Average round-trip-time between sync and matching ack in microseconds
10 32773 retransmissions unsigned32 Counter of retransmitted packets received during sample period
11 32774 window_size unsigned32 Average window size reported during sample period in octets
12 32775 ecn unsigned32 Counter of how many packets had ECN flag set during sample period
13* 2 packet_delta unsigned32 Number of packets received during sample period
14* 1 octet_delta unsigned64 Number of bytes received during sample period
15* 32830 first_rtt unsigned32 First round trip time in period in microseconds
16* 32831 min_rtt unsigned32 Minimum round trip time during period in microseconds
17* 32832 max_rtt unsigned32 Maximum round time trip during period in microseconds
17* 32833 rtt_standard_deviation unsigned32 The standard deviation of round trip time measurements during period
18* 32834 recovery_time unsigned32 Average time between an initial data packet and a retransmission
End-Session Record

Upon session completion (via FIN, RST, or inactivity timeout), the system transmits an End-Session record for each direction containing the termination reason. If statistics remain pending at the end of the session, the system generates a final Data record before the End-Session record

Table 8. Template 6670, IPv4 end-session:
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 end_milliseconds dateTimeMilliseconds Session end time in milliseconds since epoch
6 32822 switch_mac macAddress Ethernet address of filter switch
7 32823 switch_port unsigned16 Port on filter switch
8 6 tcp_control_bits unsigned16 TCP flags set during termination (FIN, RST, unset if session was timed out)
Table 9. Template 6671, IPv6 end-session
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv6Address IPv4 source address
1 28 ipv6_dst ipv6Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 end_milliseconds dateTimeMilliseconds Session end time in milliseconds since epoch
6 32822 switch_mac macAddress Ethernet address of filter switch
7 32823 switch_port unsigned16 Port on filter switch
8 6 tcp_control_bits unsigned16 TCP flags set during termination (FIN, RST, unset if session was timed out)

 

Select TCP Analysis from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • UDP Port
  • Collector IP
  • MTU
  • Include Dapper Elements
  • Max Samples
Figure 129. Configure TCP Analysis

Timestamp

Select Timestamp from the Action drop-down to open the configuration menu.

GUI Configuration
Figure 130. Create Managed Service: Timestamp Action

UDP Replication

The UDP-replication service action copies UDP messages, such as Syslog or NetFlow messages, and sends the copied packets to a new destination IP address.

Configure a rate limit when enabling UDP replication. When upgrading from a version of DANZ Monitoring Fabric (DMF) before release 6.3.1, the UDP-replication configuration is not applied until a rate limit is applied to the delivery interface.

The following example illustrates applying a rate limit to a delivery interface used for UDP replication:
CONTROLLER-1(config)# switch DMF-DELIVERY-SWITCH-1
                CONTROLLER-1(config-switch)# interface ethernet1
                CONTROLLER-1(config-switch-if)# role delivery interface-name udp-delivery-1
                CONTROLLER-1(config-switch-if)# rate-limit 256000
Note: No other service action can be applied after a UDP-replication service action.
GUI Configuration

Select UDP Replication from the Action drop-down to open the configuration menu. Configure the following fields:

  • Delivery Interface
  • Input Packet Destination IP
  • Output Packet Destination IP
Figure 131. Managed Services - UDP Replication

Use the UDP-replication service to copy UDP traffic, such as Syslog messages or NetFlow packets, and send the copied packets to a new destination IP address. This function sends traffic to more destination syslog servers or NetFlow collectors than would otherwise be allowed.

Add the IP address in the dialog that appears.

Adding Multiple Output IPs

Figure 132. Configure Output Packet Destination IP

For the header-strip service action only, configure the policy rules for matching traffic after applying the header-strip service action. After completing pages 1-4, select Append and enable the checkbox to apply the policy.

Select Save to save the managed service.

Monitoring Managed Services

To identify managed services bound to a service node interface and the health status of the respective interface, use the following commands:
controller-1# show managed-service-device SN-Name interfaces
controller-1# show managed-service-device SN-Name stats

For example, the following command shows the managed services handled by the Service Node Interface (SNI):


Note:The show managed-service-device SN-Name stats Managed-service-name command filters the statistics of a specific managed service.
The Load column shows no, low, moderate, high, and critical health indicators. These health indicators are represented by green, yellow, and red under DANZ Monitoring Fabric > Managed Services > Devices > Service Stats . They reflect the processor load on the service node interface at that instant but do not show the bandwidth of the respective data port (SNI) handling traffic, as shown in the following sample snapshot of the Service Stats output.
Figure 133. Service Node Interface Load Indicator
Multiple Services Per Service Node Interface
View the information in Monitoring > Managed Services > Devices > Service Stats .
Figure 134. Service Stats

Service Stats

The Service Stats dashboard provides performance visibility through two distinct views: Table View and Chart View.

Table View

The table displays detailed service statistics, automatically refreshing every minute. It supports exporting data in JSON or CSV format.

Columns displayed:

  • Service Node Name
  • Interface Name
  • Service Name
  • Action
  • Load
  • RX Packet Count / RX Byte Count / RX Bit Rate
  • TX Packet Count / TX Byte Count / TX Bit Rate
  • Applied Packets / Applied Bytes / Applied Bit Rate

Chart View

The chart view displays a time series chart for a single managed service. Data points on the chart are updated every 10 seconds to provide near real-time visualization of performance trends.

Figure 135. Service Stats

Filter

The Service Stats view includes filtering options to narrow down the displayed data. Filters are available for:

  • Managed Services
  • Service Nodes

Both filters support multi-select, allowing multiple options to be selected simultaneously. Filters can be cleared as needed to reset the view.

 

Figure 136. Service Stats Filters

Chart View

The chart visualizes data for a single managed service, updating every 10 seconds. It displays a time series line graph based on a selected metric, such as:

  • Packet Count
  • Byte Count
  • Bit Rate
Figure 137. Chart View

Chart Filter

Figure 138. Chart Filters

The chart includes a single filter for selecting a managed service. A service can be selected, or the filter cleared as needed.

Figure 139. Single Filters

Upon selecting a metric, the chart displays three distinct line series:

  • Applied
  • TX
  • RX

GTP Correlation Profiles

In mobile core environments (LTE/5G), traffic is encapsulated using the GPRS Tunneling Protocol (GTP), which separates signaling (GTP-C) from user data (GTP-U). GTP Correlation Profiles within the DANZ Monitoring Fabric (DMF) enable the Service Node to associate these two planes statefully.

By correlating the Tunnel Endpoint Identifier (TEID) from the user plane with the International Mobile Subscriber Identity (IMSI) from the control plane, the fabric provides subscriber-aware visibility.

A GTP Correlation Profile defines how the Service Node processes and tracks mobile sessions:

  • Stateful Session Mapping - The Service Node monitors GTP-C "Create Session" requests to build a real-time mapping table of IMSI, MSISDN, and TEID.
  • Flow Pinning (Sticky Load Balancing) - Ensures that all GTP-C and GTP-U packets belonging to a specific subscriber session are forwarded to the same tool port or monitoring probe, maintaining session integrity for analytics.
  • Filtering and Whitelisting - Enables granular traffic steering based on subscriber identity, such as monitoring only "VIP" IMSIs or specific APNs.
  • Multi-Interface Support - Supports correlation across various 3GPP interfaces, including S11, S5/S8, and S1-U.
Figure 140. Configuring GTP Correlation Profiles

Adding Access Point Name (APN) Groups

Use the following steps to add APN Groups to the configuration:

  1. Click the + in the APN Groups section.
    Figure 141. Creating APN Group
  2. Enter a name for the APN Group. (Required)
  3. Click the + to configure an APN Group Rule.
    Figure 142. Configuring an APN Group Rule
  4. Select a Sequence number and an Operation as either Drop or Match.
  5. Enter a Value using 0 to 50 APN digits, letters, or periods. Optionally, preface the value with an asterisk (*) to match by wildcard.
  6. Click Append to add the APN Group Rule.
  7. Click Save to save the configuration.

Adding International Mobile Equipment Identity (IMEI) Groups

Use the following steps to add IMEI Groups to the configuration:

  1. Click the + in the IMEI Groups section.
    Figure 143. Create IMEI Group
  2. Enter a name for the IMEI Group. (Required)
  3. Click the + to configure an IMEI Group Rule.
    Figure 144. Adding an IMEI Group Rule
  4. Select a Sequence number and an Operation as either Drop or Match.
  5. Enter a Value using 14 digit IMEI or 0 to 13 digits followed by an asterisk (*) to match by wildcard.
  6. Click Append to add the IMEI Group Rule.
  7. Click Save to save the configuration.

Adding International Mobile Subscriber Identity (IMSI) Groups

Use the following steps to add IMSI Groups to the configuration:

  1. Click the + in the IMSI Groups section.
    Figure 145. Create an IMSI Group
  2. Enter a name for the IMSI Group. (Required)
  3. Click the + to configure an IMEI Group Rule.
    Figure 146. Creating an IMSI Group Rule
  4. Select a Sequence number and an Operation as either Drop or Match.
  5. Enter a Value using 15-16 digit IMSI number or 0 to 15 digits followed by an asterisk (*) to match by wildcard.
  6. Click Append to add the IMSI Group Rule.
  7. Click Save to save the configuration.

Adding Mobile Station International Subscriber Directory Number (MSISDN) Groups

Use the following steps to add MSISDN Groups to the configuration:

  1. Click the + in the MSISDN Groups section.
    Figure 147. Creating an MSISDN Group
  2. Enter a name for the MSISDN Group. (Required)
  3. Click the + to configure an MSISDN Group Rule.
    Figure 148. Adding an MSISDN Group Rule
  4. Select a Sequence number and an Operation as either Drop or Match.
  5. Enter a Value using 1-15 digit MSISDN number or 0 to 15 digits followed by an asterisk (*) to match by wildcard.
  6. Click Append to add the MSISDN Group Rule.
  7. Click Save to save the configuration.

IPFIX Templates

The IPFIX Templates dashboard provides a table view of all configured templates. The table includes the following columns:

  • Name
  • Template ID
  • Keys
  • Fields
Figure 149. IPFIX Templates Dashboard

Configure an IPFIX Template

To add an IPFIX Template, select Create IPFIX Template. This opens a menu containing fields for the template Name, Template ID, Keys, and Fields.

After completing the configuration, select Save to apply the changes.

Figure 150. Create IPFIX Template

Table Actions

Figure 151. Table Actions

The following operations are available for managing IPFIX Templates:

  • Edit: Selecting a row enables the Edit control, which opens the Edit IPFIX Template window. The window automatically populates with the selected template's data. After modifying the configuration, select Save.
  • Delete: Selecting one or more rows enables the Delete control. Selecting this button opens a confirmation window; select Yes to remove the chosen templates.
  • Export: Select Export to download the IPFIX Template data in CSV or JSON format.
  • Refresh: The system refreshes data every 60 seconds by default. Hover over Refresh to view the time remaining until the next update. To update the data immediately, select Refresh.
Figure 152. Edit IPFIX Template

Selecting a row enables the Edit control, which opens the Edit IPFIX Template window. After modifying the configuration, select Save.

Delete

Select a template from the dashboard list. Select Delete and confirm the deletion.

Figure 153. Delete Template from List
Figure 154. Delete IPFIX Templates

Refresh

Hover over Refresh to view the time remaining until the next update. To update the data immediately, select Refresh.

Figure 155. Refresh Data

 

Configuring the Arista Analytics Node

Arista Analytics Node capabilities are enhanced to handle NetFlow V5/V9 and IPFIX Packets. All these flow data are represented with the Netflow index.

Note: NetFlow flow record generation is enhanced for selecting VXLAN traffic. For VXLAN traffic, flow processing is based on inner headers, with the VNI as part of the key for flow lookup because IP addresses can overlap between VNIs.
Figure 156. NetFlow Managed Service

NetFlow records are exported using User Datagram Protocol (UDP) to one or more specified NetFlow collectors. Use the DMF Service Node to configure the NetFlow collector IP address and the destination UDP port. The default UDP port is 2055.

Note: No other service action, except the UDP replication service, can be applied after a NetFlow service action because part of the NetFlow action is to drop the packets.

From the Arista Analytics Node dashboard, apply filter rules to display specific flow information.

The following are the options available on this page:
  • Delivery interface: interface to use for delivering NetFlow records to collectors.
    Note: The next-hop address must be resolved for the service to be active.
  • Collector IP: identify the NetFlow collector IP address.
  • Inactive timeout: use the inactive-timeout command to configure the interval of inactivity before NetFlow times out. The default is 15 seconds.
  • Source IP: specify a source IP address to use as the source of the NetFlow packets.
  • Active timeout: use active timeout to configure a period that a NetFlow can be generated continuously before it is automatically terminated. The default is one minute.
  • UDP port: change the UDP port number used for the NetFlow packets. The default is 2055.
  • Flows: specify the maximum number of NetFlow packets allowed. The allowed range is 32768 to 1048576. The default is 262144.
  • Per-interface records: identify the filter interface where the NetFlow packets were originally received. This information can be used to identify the hop-by-hop path from the filter interface to the NetFlow collector.
  • MTU: change the Maximum Transmission Unit (MTU) used for NetFlow packets.
Figure 157. Create Managed Service: NetFlow Action

Sample Service Configuration

Use the following steps to add a Sample Service.
  1. Navigate to the Monitoring > Managed Services page.
    Figure 158. DMF Managed Services
  2. Under the Managed Services section, select the + icon to create a new managed service. Go to the Actions, and select the Sample option in the Action drop-down. Enter values for Max tokens and Tokens per refresh.
    Figure 159. Configure Managed Service Action
  3. Select Append and then Save.

Post Service Match Rule

Post Service Match

Post Service Match Rules

Prerequisite: Add a Header Strip action or one of the Header Strip Decap actions before configuring Post Service Match Rules.

Figure 160. Configure Post Service Match Rules

Add Rule Availability

After adding a Header Strip or Header Strip Decap action, the Add Rule option appears in two locations:

  • The left navigation panel.
  • The center of the empty state dashboard.
Figure 161. Configure Rule Availability

Configuring a Post Service Match Rule

Select Add Rule to open the Post Service Match Rule configuration dialog.

Figure 162. Configure Post Service Match Rule

Rule Listing

After successfully configuring the Post Service Match Rule, the rule appears in the table within the Managed Services Details.

Figure 163. Managed Services Details - Post Service Match Rule
Figure 164. Managed Services Details
Figure 165. Table Actions

Edit

Select a Managed Service row and then Edit to modify its configuration. The window will automatically populate with the selected Managed Service's data. After making the necessary changes, select Save.

Figure 166. Edit Managed Service - Service Interface
Figure 167. Edit Managed Service - Service Node Interface

Configure Filter Managed Service Action

The Filter Managed Service Action filters packets on the Service Node (SN) interface and supports optional VLAN tagging. Utilizing ACL rules, the system forwards or drops matched traffic. Traffic tagged with a VLAN exits the interface (Tx) after processing through the action chain. VLAN tagging specifically facilitates traffic steering in Switch-less SN deployments, where the forwarding plane relies on VLANs. This configuration produces no functional impact when the SN connects directly to a DMF switch within the fabric.

The feature is compatible with all platforms.

Configuration

Managed service configuration supports Service Nodes connected to a DMF switch or operating in switch-less mode. The configured interface type (installation point) determines how the service is programmed. Configure the Filter Managed Service Action feature using the CLI.A Summary section provides a consolidated reference of the Filter Managed Service Action specifications, configuration limits, and operational behaviors.

Navigate to Monitoring > Managed Services .

Figure 168. Managed Services

Select Managed Services, and then + Create Managed Service.

Figure 169. Create Managed Service

 

Configure a Service Interface

Configuring the Service Interface triggers a validation sequence. The system verifies that the SN connects to a DMF switch and that a policy utilizes the service. The Controller proceeds with installation on the SN only after passing these checks.

Navigate to Interfaces, and choose Service Interface to begin the setup.

Configuration Steps
  • Initialize: Provide a Name and an optional Description for the interface.
  • Map: Designate a Switch Name and Interface Name from the available drop-down menus.
  • Finalize: Select Save to commit the configuration.
Figure 170. Configure a Service Interface

Creating the Managed Service opens the Managed Service Details window, which displays the Service Interface.

Figure 171. Managed Service Details

Configure a Service Node Interface

Configuring the Service Node Interface designates the managed service for switch-less operation. This mode applies when the SN lacks a physical connection to a DMF switch or when the Controller is unable to discover the link. The Controller installs the managed service immediately upon valid configuration, without requiring policy association. However, any DMF policy configured with this service will fail due to the absence of a reachability path from the fabric.

Access Edit within the Managed Service Details window to modify existing interface settings.

Configuration Steps
  • Navigate: Go to Interfaces and choose Service Node Interfaces.
  • Populate: Link the Service Node and Interface fields from the available drop-down menus.
  • Manage Entries: Use + Add to include additional entries or the trash icon to remove them.
  • Finalize: Select Save to commit the configuration.
Figure 172. Configure a Service Node Interface

Creating the Service Node Interface(s) updates the Managed Service Details window to display the new entries.

Figure 173. Managed Service Details

Configure Filter Action: The Filter action functions at any position within the managed service action sequence. Configuring it as the initial action filters and tags traffic on the service node interface, passing only the filtered traffic to subsequent actions in the chain.

Access + Add Action within the Managed Service Details window to begin the configuration.

Configuration Steps
  • Initialize: Define the Managed Service Action by assigning a Sequence number.
  • Define Action: Designate Filter as the primary Action type.
  • Specify Parameters: Provide a Push VLAN if required, and set the forwarding behavior to Forward or Drop.
  • Establish Logic: Configuring Filter as the initial action in the sequence filters and tags traffic on the Service Node Interface, passing only the filtered traffic to subsequent actions.
  • Finalize: Select Save to commit the configuration.
Figure 174. Filter Action

 

ACL Rule Management

The system supports precise traffic filtering via ACL rules. Construct high-priority Drop rules to block specific patterns, such as UDP traffic from a designated subnet.

Configuration Steps
  • Initialize: Within the Configure Managed Service Action window, access + Add ACL.
  • Define Parameters: Enter the following networking details for the filter:
    • Source IP Address and Mask
    • Source Port
    • Destination IP Address and Mask
    • Destination Port
  • Manage Entries: Use + Add ACL to include additional rules or the trash icon to remove them.
  • Finalize: Select Save to commit the configuration.
Figure 175. Drop Rules

Wildcard Rules and Rule Expansion

Wildcard rules facilitate matching on any IP address or port number. The configuration uses 0.0.0.0 to match any IPv4 address and ::0 to match any IPv6 address. Additionally, the any keyword matches any IPv4 or IPv6 packet.

Omitting specific parameters triggers the following default behaviors:

  • Port Match: Omitting a port match defaults to the entire port range.
  • IP Field: Leaving the IP address field blank in the GUI implies a wildcard match.

 

Max Rule Limits

Each Filter managed service action supports a maximum of 2048 rules. The Controller calculates this total based on the expanded runtime rules rather than the initial configuration lines.

The system tracks IPv4 and IPv6 rules in separate tables, with each table supporting 1024 entries post-expansion.

  • Capacity Handling: Upon reaching table capacity, the system halts the installation of further expanded rules.
  • Overflow Behavior: The Controller skips any configured rule if the corresponding table (IPv4 or IPv6) is full.

Viewing Statistics

To view the Managed Services Service Stats select the desired link in the Managed Services dashboard.

Figure 176. Managed Service Name

Select Monitor Service Stats within the Managed Service Details window to view Service Stats.

Figure 177. Service Stats

Applied statistics vary based on the specific action type. For the Filter action, these metrics quantify the traffic matching the configured ACL rules:

  • Applied Packets: Total count of matched packets.
  • Applied Bytes: Total count of matched bytes.
  • Applied Bit Rate: Current data rate of matched traffic.

 

Summary

The following table provides a consolidated reference of the Filter Managed Service Action specifications, configuration limits, and operational behaviors.

Table 10. Filter Managed Service Action Specifications
Feature Specification
Primary Function Packet filtering via ACL rules with optional VLAN tagging.
GUI Capabilities Supports ACL rule creation and modification. Blank IP fields in the interface denote wildcard matches. Allows insertion of high-priority drop rules.
Deployment Modes Supported on both Switch-Connected and Switch-less Service Nodes.
Rule Capacity 2048 Total Rules (1024 IPv4 / 1024 IPv6) post-runtime expansion.
Matching Logic 5-tuple matching (Src/Dst IP, Src/Dst Port, Protocol). Supports Wildcards.
Runtime Expansion The Controller expands wildcard rules into specific IPv4/IPv6 and TCP/UDP entries.
VLAN Behavior VLAN tags persist on egress (Tx), facilitating traffic steering in switch-less deployments.

Configure a Backup Managed Service

Redundancy of Managed Services in the same DMF Policy

This method enables a second managed service to function as a backup within the same DANZ Monitoring Fabric (DMF) policy. The backup service activates only if the primary service becomes unavailable. It can reside on the same service node or core switch, or across different nodes and switches.

Note: Transitioning from active to backup managed service requires reprogramming switches and associated managed appliances. This reprogramming, done seamlessly, will result in a slight traffic loss.

To assign a managed service as a backup service in a DANZ Monitoring Fabric (DMF) policy, perform the following steps:

  1. Select Monitoring > Policies and select + Create Policy.
    Figure 178. Create Policy
  2. Configure the policy as required. From the Services section, select + Add Service(s).
    Figure 179. Add Services
    Figure 180. Add Services - No Existing Services
  3. Select the primary managed service from the Managed Service selection list followed by the backup service from the Backup Service.
    Figure 181. Managed Service with Backup Service
  4. Commit the backup service using Add [n] Service. The newly added service appears under Services.
    Figure 182. Backup Service
  5. Select Create Policy to finish the configuration.
Important: Before setting up the policy and backup service, ensure that all underlying interfaces and dependent service groups are active and defined. Otherwise, the system may generate warnings and alerts.

Administer Managed Services using the CLI

 

Changing the Service Node Default Configuration

Configuration settings are automatically downloaded to the service node from the DANZ Monitoring Fabric (DMF) Controller to eliminate the need for box-by-box configuration. However, the option exists to override the default configuration for a service node from the config-service-node submode for any service node.
Note: These options are available only from the CLI and are not included in the DMF GUI.
To change the CLI mode to config-service-node, enter the following command from config mode on the Active DMF controller:
controller-1(config)# service-node service_node_alias
controller-1(config-service-node)#

Replace service_node_alias with the alias to use for the service node. This alias is affiliated with the hardware MAC address of the service node using the mac command. The hardware MAC address configuration is mandatory for the service node to interact with the DMF Controller.

Use any of the following commands from the config-service-node submode to override the default configuration for the associated service node:
  • admin password: set the password to log in to the service node as an admin user.
  • banner: set the service node pre-login banner message.
  • description: set a brief description.
  • logging: enable service node logging to the Controller.
  • mac: configure a MAC address for the service node.
  • ntp: configure the service node to override default parameters.
  • snmp-server: configure an SNMP trap host to receive SNMP traps from the service node.

Define a Managed Service

Important: Managed Service action Keyword Requirement

Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service. This keyword is a mandatory token across all managed service submodes, providing a consistent way to define service behaviors. The availability of the action token within submodes allows for the direct addition or editing of actions without returning to the primary managed service configuration level. This streamlined command structure allows multiple actions—such as deduplication and IPFIX—to be defined or adjusted within a single configuration workflow. This applies to all Service Node platforms.

Managed Service Configuration

Service configuration via the CLI requires the [index] action [type] command syntax.

Example

The following demonstrates defining a deduplication action using index 1 and then moving directly into an IPFIX action configuration using index 2 without exiting the submode.

dmf-controller-1> en
dmf-controller-1# config
dmf-controller-1(config)# managed-service ms1
dmf-controller-1(config-managed-srv)# 1 action dedup
dmf-controller-1(config-managed-srv-dedup)# 2 action ipfix
dmf-controller-1(config-managed-srv-ipfix)#                                

Omitting the action keyword results in the following error:

Error: Command Not Found: Unexpected argument "dedup"; expected "action"

Configure a Service

To configure a service to direct traffic to a DMF service node, complete the following steps:

  1. Define an identifier for the managed service by entering the following command:
    dmf-controller-1(config)# managed-service DEDUPLICATE-1
    dmf-controller-1(config-managed-srv)#

    This step enters the config-managed-srv submode to configure a DMF-managed service.

  2. (Optional) Configure a description for the current managed service by entering the following command:
    dmf-controller-1(config-managed-srv)# description “managed service for policy DEDUPLICATE-1”
    The following are the commands available from this submode:
    • description: provide a service description
    • post-service-match: select traffic after applying the header strip service
    • Action sequence number in the range [1 - 20000]: identifier of service action
    • service-interface: associate an interface with the service
  3. Use a number in the range [1 - 20000] to identify a service action for a managed service.
    The following summarizes the available service actions. See the subsequent sections for details and examples for specific service actions.
    • dedup {anchor-offset | full-packet | routed-packet}
    • header-strip {l4-header-start | l4-payload-start | packet-start }[offset]
    • decap-cisco-fp {drop}
    • decap-erspan {drop}
    • decap-geneve {drop}
    • decap-l3-mpls {drop}
    • decap-lisp {drop}
    • decap-vxlan {drop}
    • mask {mask/pattern} [{packet-start | l3-header-start | l4-header-start | l4-payload-start} mask/offset] [mask/mask-start mask/mask-end]}
    • netflow Delivery_interface Name
    • ipfix Delivery_interface Name
    • udp-replicate Delivery_interface Name
    • tcp-analysis Delivery_interface Name
    Note: The IPFIX, NetFlow, and udp-replicate service actions enable a separate submode for defining one or more specific configurations. One of these services must be the last service applied to the traffic selected by the policy.
    • pattern-drop pattern [{l3-header-start | l4-header-start | packet-start }]
    • pattern-match pattern [{l3-header-start | l4-header-start | packet-start }] |
    • slice {packet-start | l3-header-start | l4-header-start | l4-payload-start} integer}
    • timestamp
    For example, the following command enables packet deduplication on the routed packet:
    dmf-controller-1(config-managed-srv)# 1 action dedup routed-packet
  4. Optionally, identify the start point for the mask, pattern-match, pattern-drop services, or slice services.
  5. Identify the service interface for the managed service by entering the following command:
    dmf-controller-1(config-managed-srv)# service-interface switch DMF-CORE-SWITCH-1 ethernet40
    Use a port channel instead of an interface to increase the bandwidth available to the managed service. The following example enables lag-interface1 for the service interface:
    dmf-controller-1(config-managed-srv)# service-interface switch DMF-CORE-SWITCH-1 lag1
    Note: When connecting a LAG interface to the DANZ Monitoring Fabric (DMF) Service Node appliance, member links should be of the same speed and can span across multiple service nodes. The maximum number of supported member links per LAG interface is 32, which varies based on the switch platform. Please refer to the hardware guide for the exact details of the supported configuration.
  6. Apply the managed service within a policy like any other service, as shown in the following examples for deduplication, NetFlow, pattern matching (forwarding), and packet slicing services.
Note: Multiple DMF policies can use the same managed service, for example, a packet slicing managed service.

Sharing Managed Services Across Policies

A DANZ Monitoring Fabric (DMF) Controller allows sharing of managed services utilizing L3 delivery interfaces (e.g., NetFlow, IPFIX, app ID, etc.) across multiple policies. Prior to the DMF 8.7.0 release, DMF did not support managed service sharing because the L3 delivery interface was an optional setting in a policy configuration. However, sharing is now supported because the managed service configuration must now specify the L3 delivery interface.

When multiple policies (overlapping or non-overlapping) share the same Managed Service, the system will ensure that post-service traffic from all these policies is forwarded to appropriate delivery interfaces using a dynamically created post-service policy.

This change applies to the following managed service actions using L3 deliveries on all platforms that support managed services:

  • Netflow
  • IPFIX
  • UDP Replicate
  • TCP Analysis
  • App ID
  • Flow Diff

Configuration

There are no new configurations in the Sharing Managed Services Across Policies feature, but several configuration validations surrounding the managed service configuration within a policy have changed:

  • Removed the validation that prevented adding an L3 header modifying managed service to multiple policies.
  • A validation was added to enforce the order of shared managed services.

When sharing multiple managed services with at least one action that requires an L3 delivery interface, the only valid case is where non-UDP replicate L3 services are followed by UDP replicate:

  • Invalid: any non UDP replicate → any non UDP replicate.
  • Invalid: UDP replicate → any non UDP replicate.
  • Invalid: UDP replicateUDP replicate.
  • Valid: any non UDP replicateUDP replicate.

There are two fundamental exceptions to the earlier examples:

  • The push-per-filter mode doesn’t allow multiple header modifying services in a policy.
  • Flow diff is only supported in push-per-filter mode and cannot be chained with UDP replicate.

The following is a sample configuration sharing a Netflow managed service across two policies.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Configure an L3 delivery interface:

dmf-controller> enable
dmf-controller# configure
dmf-controller(config)# switch sw1
dmf-controller(config-switch)# interface ethernet31
dmf-controller(config-switch-if)# role delivery interface-name l3-d1 ip-address 0.0.0.1 nexthop-ip 0.0.0.1 255.255.255.0 nexthop-arp-interval 5
dmf-controller(config-switch-if)# rate-limit 1000

Create two managed services, one that is non-shareable and one with netflow, which can be shared:

Non-shared Managed Service

dmf-controller> enable
dmf-controller# configure
dmf-controller(config)# managed-service ms-non-shareable
dmf-controller(config-managed-srv)# service-interface switch sw1 ethernet2
dmf-controller(config-managed-srv)# 1 action sample
dmf-controller(config-managed-srv-sample)# max-tokens 100
dmf-controller(config-managed-srv-sample)# tokens-per-refresh 10

Shared Managed Service

dmf-controller> enable
dmf-controller# configure
dmf-controller(config)# managed-service ms-netflow
dmf-controller(config-managed-srv)# service-interface switch sw1 ethernet1
dmf-controller(config-managed-srv)# 1 action netflow
dmf-controller(config-managed-srv-netflow)# collector 0.0.0.2 udp-port 2055 mtu 1500
dmf-controller(config-managed-srv-netflow)# l3-delivery-interface l3-d1

Configure two policies, where the first policy, p1, has both ms-non-shareable and ms-netflow in order, and the second policy, p2, only has ms-netflow:

Policy 1

dmf-controller> enable
dmf-controller# configure
dmf-controller(config)# managed-service policy p1
dmf-controller(config-policy)# action forward
dmf-controller(config-policy)# 1 match any
dmf-controller(config-policy)# filter-interface f1
dmf-controller(config-policy)# use-managed-service ms-non-shareable sequence 1
dmf-controller(config-policy)# use-managed-service ms-netflow sequence 2

Policy 2

dmf-controller> enable
dmf-controller# configure
dmf-controller(config)# managed-service policy p2
dmf-controller(config-policy)# action forward
dmf-controller(config-policy)# 1 match any
dmf-controller(config-policy)# filter-interface f2
dmf-controller(config-policy)# use-managed-service ms-netflow sequence 1

In push-per-policy mode, both p1 and p2 are expected to be installed to send traffic to the ms-netflow pre-service interface, and a dynamic post-service policy p1_p2__post_to_delivery__ is created to carry the traffic from the post-service interface of ms-netflow to l3-d1.

In push-per-filter mode, a post service policy is created regardless of whether a managed service is shared or not. The result is two post service policies, p1__post_to_delivery__ and p2__post_to_delivery__, which will carry traffic from their respective configured policies to the delivery interface via the configured services.

The following section shows the runtime state of these policies.

Show Commands

While no new show commands accompany the Sharing Managed Services Across Policies feature, use the following existing commands to verify the configuration.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Use the show running-config switch sw1 interface l3 interface command to view the configured L3 interface:

dmf-controller> show running-config switch sw1 interface ethernet31

! switch
switch sw1
  !
  interface ethernet31
    force-link-up
    rate-limit 1000
    role delivery interface-name l3-d1 ip-address 0.0.0.1 nexthop-ip 0.0.0.2 255.255.255.0 nexthop-arp-interval 5

Use the show running-config managed-service command to view the managed service running config:

dmf-controller> show running-config managed-service

! managed-service
managed-service ms-netflow
  service-interface switch sw1 ethernet1
  !
  1 action netflow
    collector 10.0.0.2 udp-port 2055 mtu 1500
    l3-delivery-interface l3-d1

managed-service ms-non-shareable
  service-interface switch sw1 ethernet2
  !
  1 action sample
    max-tokens 100
    tokens-per-refresh 10

Use the show running-config policy to view the policy running config:

dmf-controller> show running-config policy

! policy
policy p1
  action forward
  filter-interface f1
  use-managed-service ms-netflow sequence 2
  use-managed-service ms-non-shareable sequence 1
  1 match any

policy p2
  action forward
  filter-interface f2
  use-managed-service ms-netflow sequence 1
  1 match any

Use the show switch sw1 interface l3 interface command to view the runtime status of the interface:

dmf-controller> show switch sw1 interface ethernet31
# IF Name    MAC Address                Config State Adv. Features Curr Features Supported Features
-|----------|--------------------------|------|-----|-------------|-------------|------------------|
1 ethernet31 5c:16:c7:14:46:bb (Arista) up     up    10g           10g           10g

Use the show managed-service command to view the runtime status of the managed services:

dmf-controller># show managed-service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Managed-service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Name     Switch Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW
-|----------------|------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 ms-netflow       sw1    ethernet1        True      10Gbps              10Gbps             974bps                66bps
2 ms-non-shareable sw1    ethernet2        True      10Gbps              10Gbps             960bps                66bps
Push-per-policy Mode

The show policy command displays a brief version of runtime state of all policies, including those created dynamically:

dmf-controller> show policy
# Policy Name               Action  Runtime Status Type       Priority Overlap Priority Push VLAN Filter BW Delivery BW Post Match Filter Traffic Delivery Traffic Services         Installed Time          Installed Duration  Ptp Timestamping
-|-------------------------|-------|--------------|----------|--------|----------------|---------|---------|-----------|-------------------------|----------------|----------------|-----------------------|-------------------|----------------|
1 p1                        forward installed      Configured 100      0                1         10Gbps    10Gbps      -                         -                ms-non-shareable 2025-02-20 18:18:33 UTC 20 minutes, 46 secs False
2 p2                        forward installed      Configured 100      0                2         10Gbps    10Gbps      -                         -                                 2025-02-20 18:18:33 UTC 20 minutes, 46 secs False
3 p1_p2__post_to_delivery__ forward installed      Dynamic    100      0                3         10Gbps    10Gbps      -                         -                                 2025-02-20 18:18:33 UTC 20 minutes, 46 secs False

The show policy policy name command provides a more detailed view of a policy at runtime.

Since a new post-service policy is required for shared services in push-per-policy mode (in the push-per-filter mode, a post-service policy, shared or not, is always created), the configured policies are adjusted accordingly. So, p1 and p2 will neither have a ms-netflow service nor will l3-d1 be the delivery interface.

p1 carries traffic from f1 to ms-non-shareable and then delivers it to ms-netflow.

dmf-controller> show policy p1
Policy Name                            : p1
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 1
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN                              : 1
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : p1_p2__post_to_delivery__,
Component Policies                     : none
Runtime Service Names                  : ms-non-shareable
Installed Time                         : 2025-02-20 18:18:33 UTC
Installed Duration                     : 23 minutes, 18 secs
Timestamping enabled                   : False
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 f1     sw1    ethernet11 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1  -ethernet1-to-managed-service sw1    ethernet1 up    tx  2       140   0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name     Role         Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------|------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 ms-non-shareable pre-service  sw1    ethernet2 up    tx  0       0     0        -
2 ms-non-shareable post-service sw1    ethernet2 up    rx  2       140   0        -

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

p2 carries traffic from f2 to ms-netflow.

dmf-controller> show policy p2
Policy Name                            : p2
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 2
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : p1_p2__post_to_delivery__,
Component Policies                     : none
Installed Time                         : 2025-02-20 18:18:33 UTC
Installed Duration                     : 23 minutes, 21 secs
Timestamping enabled                   : False
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 f2     sw1    ethernet12 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet1-to-managed-service   sw1    ethernet1 up    tx  0       0     0        -

~ Service Interface(s) ~
None.

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

p1_p2__post_to_delivery__ receives traffic from ms-netflow, and then delivers it to l3-d1.

dmf-controller> show policy p1_p2__post_to_delivery__
Policy Name                            : p1_p2__post_to_delivery__
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 3
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : p1, p2,
Installed Time                         : 2025-02-20 18:18:33 UTC
Installed Duration                     : 23 minutes, 28 secs
Timestamping enabled                   : False
~ Match Rules ~
None.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet1-to-managed-service   sw1    ethernet1 up    rx  1       70    0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 l3-d1  sw1    ethernet31 up    tx  1       70    0        -

~ Service Interface(s) ~
None.

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

Another way of visualizing this runtime state is illustrated in the following diagram:

Figure 183. Example - Runtime State
Push-per-filter Mode

The show policy command displays a brief version of the runtime state of all policies, including any created dynamically:

dmf-controller> show policy
# Policy Name            Action  Runtime Status                    Type       Priority Overlap Priority Push VLAN Filter BW Delivery BW Post Match Filter Traffic Delivery Traffic Services   Installed Time          Installed Duration  Ptp Timestamping
-|----------------------|-------|---------------------------------|----------|--------|----------------|---------|---------|-----------|-------------------------|----------------|----------|-----------------------|-------------------|----------------|
1 p1                     forward installed                         Configured 100      0                0         10Gbps    10Gbps      -                         -                           2025-02-20 19:13:39 UTC 15 minutes, 29 secs False
2 p2                     forward installed                         Configured 100      0                0         10Gbps    10Gbps      -                         -                           2025-02-20 19:13:39 UTC 15 minutes, 29 secs False
3 p1__post_to_delivery__ forward installed                         Dynamic    100      0                0         10Gbps    10Gbps      -                         -                ms-netflow 2025-02-20 19:13:39 UTC 15 minutes, 29 secs                                            False
4 p2__post_to_delivery__ forward installed                         Dynamic    100      0                0         10Gbps    10Gbps      -                         -                           2025-02-20 19:13:39 UTC 15 minutes, 29 secs False

The show policy policy name command provides a more detailed view of a policy at runtime:

p1 carries traffic from f1 to ms-non-shareable service.

dmf-controller> show policy p1
Policy Name                            : p1
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 0
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : p1__post_to_delivery__,
Component Policies                     : none
Installed Time                         : 2025-02-20 19:13:39 UTC
Installed Duration                     : 17 minutes, 55 secs
Timestamping enabled                   : False
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 f1     sw1    ethernet11 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet2-to-managed-service   sw1    ethernet2 up    tx  0       0     0        -

~ Service Interface(s) ~
None.

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

p2 carries traffic from f1 to ms-netflow service.

dmf-controller> show policy p2
Policy Name                            : p2
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 0
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : p2__post_to_delivery__,
Component Policies                     : none
Installed Time                         : 2025-02-20 19:13:39 UTC
Installed Duration                     : 18 minutes, 44 secs
Timestamping enabled                   : False
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 f2     sw1    ethernet12 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet1-to-managed-service   sw1    ethernet1 up    tx  0       0     0        -

~ Service Interface(s) ~
None.

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

p1__post_to_delivery__ carries traffic from ms-non-shareable to ms-netflow and then to l3-d1.

dmf-controller> show policy p1__post_to_delivery__
Policy Name                            : p1__post_to_delivery__
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 1
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN                              : 0
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : p1,
Runtime Service Names                  : none
Timestamping enabled                   : False
~ Match Rules ~
None.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet2-to-managed-service   sw1    ethernet2 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 l3-d1  sw1    ethernet31 up    tx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name Role         Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------------|------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 ms-netflow   pre-service  sw1    ethernet1 up    tx  0       0     0        -
2 ms-netflow   post-service sw1    ethernet1 up    rx  0       0     0        -

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

p2__post_to_delivery__ carries traffic from ms-netflow to l3-d1.

dmf-controller> show policy p2__post_to_delivery__
Policy Name                            : p2__post_to_delivery__
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 0
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : p2,
Installed Time                         : 2025-02-20 19:13:39 UTC
Installed Duration                     : 22 minutes, 19 secs
Timestamping enabled                   : False
~ Match Rules ~
None.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF                             Switch IF Name   State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|----------------------------------|------|---------|-----|---|-------|-----|--------|--------|------------------|
1 sw1-ethernet1-to-managed-service   sw1    ethernet1 up    rx  0       0     0        -

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name    State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|----------|-----|---|-------|-----|--------|--------|------------------|
1 l3-d1  sw1    ethernet31 up    tx  0       0     0        -

~ Service Interface(s) ~
None.

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

Another way of visualizing this runtime state is illustrated in the following diagram:

Figure 184. Example - Runtime State

 

Troubleshooting

If any failures occur by the sharing of L3 managed services between policies, ensure the order of services shared by all policies is the same, i.e., the order of services matters and partially sharing the sequence is not allowed:

  • Policy p1 cannot have ms1ms2, while policy p2 already has ms2ms1.
  • Policy p1 cannot have ms1ms2, while policy p2 only has ms1.

Limitations

  • When creating a post-service policy, configured policies are modified at runtime. So, the runtime state of a configured policy will show the modified delivery interfaces and services. You must use configured and dynamic policies to visualize the complete path.
  • Not all managed service actions can be shared.
  • Shared managed services must be the last in the sequence, and in the same order for all policies using it. Partial sharing of a sub-sequence of services is not allowed. Policy p1 cannot have ms1ms2, while policy p2 only has ms1.

Application Identification

The DANZ Monitoring Fabric (DMF) Application Identification feature allows for the monitoring of applications identified with Deep Packet Inspection (DPI) into packet flows received via filter interfaces and generates IPFIX flow records. These IPFIX flow records are transmitted to a configured collector device via the L3 delivery interface. The feature provides a filtering function by forwarding or dropping packets from specific applications before sending the packet to the analysis tools.
Note: Application identification is supported on Service Nodes (DCA-DM-SC and DCA-DM-SC2) and Service Nodes (DCA-DM-SDL and DCA-DM-SEL).
Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Using the CLI to Configure app-id

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Perform the following steps to configure app-id:

  1. Create a managed service and enter the service interface.
  2. Choose the app-id managed service using the seq num app-id command.
    Note: The above command should enter the app-id submode, which supports two configuration parameters: collector and l3-delivery-interface. Both are required.
  3. To configure the IPFIX collector IP address, enter the following command: collector ip-address.
    The UDP port and MTU parameters are optional; the default values are 4739 and 1500, respectively.
  4. Enter the command: l3-delivery-interface delivery interface name to configure the delivery interface.
  5. Add this managed service to a policy. The policy will not have a physical delivery interface.
Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

The following shows an example of an app-id configuration that sends IPFIX application records to the Collector (analytics node) at IP address 192.168.1.1 over the configured delivery interface named app-to-analytics:

managed-service ms
service-interface switch core1 ethernet2
!
1 action app-id
collector 192.168.1.1
l3-delivery-interface app-to-analytics

After configuring the app-id, refer to the analytics node for application reports and visualizations. For instance, a flow is classified internally with the following tuple: ip, tcp, http, google, and google_maps. Consequently, the analytics node displays the most specific app ID for this flow as google_maps under appName.

On the Analytics Node, there are AppIDs 0-4 representing applications according to their numerical IDs. 0 is the most specific application identified in that flow, while 4 is the least. In the example above, ID 0 would be the numerical ID for google_maps, ID 1 google, ID 2 http, ID 3 tcp, and ID 4 IP address. Use the appName in place of these since these require an ID to name mapping to interpret.

Figure 185. AppIDs

Using the CLI to Configure app-id-filter

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Perform the following steps to configure app-id-filter:

  1. Create a managed service and enter the service interface.
  2. Choose the app-id managed service using the seq num app-id-filter command.
    Note: The above command should enter the app-id-filter submode, which supports three configuration parameters: app, app-category, and filter-mode. The category app is required, while app-category and filter-mode are optional. The option filter-mode has a default value of forward.
  3. Enter the command: app application name to configure the application name.
    Tip: Press the Tab key after entering the app keyword to see all possible application names. Type in a partial name and press the Tab to see all possible choices to auto-complete the name. The application name provided must match a name in this list of app names. A service node must be connected to the Controller for this list to appear. Any number of apps can be entered one at a time using the app application-name command. An example of a (partial) list of names:
    dmf-controller-1 (config-managed-srv-app-id-filter)# app ibm
    ibm     ibm_as_central   ibm_as_dtaq  ibm_as_netprt ibm_as_srvmap ibm_iseries ibm_tsm
    ibm_app ibm_as_database  ibm_as_file  ibm_as_rmtcmd ibm_db2       ibm_tealeaf
  4. Filter applications by category using the app-category category name command. Currently, the applications contained in these categories are not displayed.
    dmf-controller-1(config-managed-srv-app-id-filter)# app-category
    <Category>         <String> :  <String>
    aaa                Category selection
    adult_content      Category selection
    advertising        Category selection
    aetls              Category selection
    analytics          Category selection
    anonymizer         Category selection
    audio_chat         Category selection
    basic              Category selection
    blog               Category selection
    cdn                Category selection
    certif_auth        Category selection
    chat               Category selection
    classified_ads     Category selection
    cloud_services     Category selection
    crowdfunding       Category selection
    cryptocurrency     Category selection
    db                 Category selection
    dea_mail           Category selection
    ebook_reader       Category selection
    education          Category selection
    email              Category selection
    enterprise         Category selection
    file_mngt          Category selection
    file_transfer      Category selection
    forum              Category selection
    gaming             Category selection
    healthcare         Category selection
    im_mc              Category selection
    iot                Category selection
    map_service        Category selection
    mm_streaming       Category selection
    mobile             Category selection
    networking         Category selection
    news_portal        Category selection
    p2p                Category selection
    payment_service    Category selection
    remote_access      Category selection
    scada              Category selection
    social_network     Category selection
    speedtest          Category selection
    standardized       Category selection
    transportation     Category selection
    update             Category selection
    video_chat         Category selection
    voip               Category selection
    vpn_tun            Category selection
    web                Category selection
    web_ecom           Category selection
    web_search         Category selection
    web_sites          Category selection
    webmail            Category selection
  5. The filter-mode parameter supports two modes: forward and drop. Enter filter-mode forward to allow the packets to be forwarded based on the configured applications. Enter filter-mode drop to drop these packets.
    An example of an app-id-filter configuration that drops all Facebook and IBM Tealeaf packets:
    managed-service MS
    	service-interface switch CORE-SWITCH-1 ethernet2
    	!
    	1 action app-id-filter
    		app facebook
    		app ibm_tealeaf
    filter-mode drop
CAUTION: The app-id-filter configuration filters based on flows. For example, if a session is internally identified with the following tuple: ip, tcp, http, google, or google_maps, adding any of these parameters to the filter list permits or drops all the packets matching after determining classification (e.g., adding tcp to the filter list permits or blocks packets from the aforementioned 5-tuple flow as well as all other tcp flows). Use caution when filtering using the lower-layer protocols and apps. Also, when forwarding an application, packets will be dropped at the beginning of the session until the application is identified. When dropping, packets at the beginning of the session will be passed until the application is identified.

Using the CLI to Configure app-id and app-id-filter Combined

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

Follow the configuration steps described in the services earlier to configure app-id-filter and app-id together. However, in this case, app-id should use a higher seq num than app-id-filter. Thus, the traffic is processed through the app-id-filter policy first, then through app-id.

This behavior can be helpful to monitor certain types of traffic. The following example illustrates a combined app-id-filter and app-id configuration.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
! managed-service
managed-service MS1
service-interface switch CORE-SWITCH-1 ethernet2
!
!
1 action app-id-filter
app facebook
filter-mode forward
!
2 action app-id
collector 1.1.1.1
l3-delivery-interface L3-INTF-1
Note: The two drawbacks of this configuration are app-id dropping all traffic except facebook, and this type of service chaining can cause a performance hit and high memory utilization.

Dynamic Signature Updates (Beta Version)

Restriction: The Application Identification features described in the Managed Service section are Early Field Trial (EFT) and should not be used in production networks.

This beta feature allows the app-id and app-id-filter services to classify newly supported applications at runtime rather than waiting for an update in the next DANZ Monitoring Fabric (DMF) release. Perform such runtime service updates during a maintenance cycle. There can be issues with backward compatibility if attempting to revert to an older bundle. Adopt only supported versions. In the Controller’s CLI, perform the following recommended steps:

  1. Remove all policies containing app-id or app-id-filter. Remove the app-id and app-id-filter managed services from the policies using the command: no use-managed-service in policy config.
    Arista Networks recommends this step to avoid errors and service node reboots during the update process. A warning message is printed right before confirming a push. Proceeding without this step may work but is not recommended as there is a risk of service node reboots.
    Note: Arista Networks provides the specific update file in the command example below.
  2. To pull the signature file onto the Controller node, use the command:
    dmf-controller-1(config)# app-id pull-signature-file user@host:path to file.tar.gz
    Password:
    file.tar.gz							5.47MB 1.63MBps 00:03
  3. Fetch and validate the file using the command:
    dmf-controller-1(config)# app-id fetch-signature-file file://file.tar.gz
    Fetch successful.
    Checksum   : abcdefgh12345
    Fetch time : 2023-08-02 22:20:49.422000 UTC
    Filename   : file.tar.gz
  4. To view files currently saved on the Controller node after the fetch operation is successful, use the following command:
    dmf-controller-1(config)# app-id list-signature-files
    # Signature-file  	  Checksum 		  Fetch time
    -|-----------------|-----------------|------------------------------|
    1 file.tar.gz	  abcdefgh12345	  2023-08-02 22:20:49.422000 UTC
    Note: Only the files listed by this command can be pushed to service nodes.
  5. Push the file from the Controller to the service nodes using the following command:
    dmf-controller-1(config)# app-id push-signature-file file.tar.gz
    App ID update: WARNING: This push will affect all service nodes
    App ID update: Remove policies configured with app-id or app-id-filter before continuing to avoid errors
    App ID update: Signature file: file.tar.gz
    App ID update: Push app ID signatures to all Service Nodes? Update ("y" or "yes" to continue): yes
    Push successful.
    
    Checksum     : abcdefgh12345
    Fetch time   : 2023-08-02 22:20:49.422000 UTC
    Filename     : file.tar.gz
    Sn push time : 2023-08-02 22:21:49.422000 UTC
  6. Add the app-id and app-id-filter managed services back to the policies.
    As a result of adding app-id, service nodes can now identify and report new applications to the analytics node.
    After adding back app-id-filter, new application names should appear in the app-id-filter Controller app list. To test this, enter app-id-filter submode and press the Tab to see the full list of applications. New identified applications should appear in this list.
  7. To delete a signature file from the Controller, use the command below.
    Note: DMF only allows deleting a signature file that is not actively in use by any service node, which needs to keep a working file in case of issues—attempting to delete an active file causes the command to fail.
    dmf-controller-1(config)# app-id delete-signature-file file.tar.gz
    Delete successful for file: file.tar.gz
Useful Information
The fetch and delete operations are synced with standby controllers as follows:
  • fetch: after a successful fetch on the active Controller, it invokes the fetch RPC on the standby Controller by providing a signed HTTP URL as the source. This URL points to an internal REST API that provides the recently fetched signature file.
  • delete: the active Controller invokes the delete RPC call on the standby controllers.

The Controller stores the signature files in this location: /var/lib/capture/appidsignatureupdate.

On a service node, files are overwritten and always contain the complete set of applications.
Note: An analytics node cannot display these applications in the current version.
This step is only for informational purposes:
  • Verify the bundle version on the service node by entering the show service-node app-id-bundle-version command in the service node CLI, as shown below.
    Figure 186. Before Update
    Figure 187. After Update

Show Commands

Service Node
In the service node CLI, use the following show command:
show service-node app-id-bundle-version
This command shows the version of the bundle in use. An app-id or app-id-filter instance must be configured, or an error message is displayed.
dmf-servicenode-1# show app-id bundle-version
Name : bundle_version
Data : 1.680.0-22 (build date Sep 26 2023)
dmf-servicenode-1#
Controller

To obtain more information about the running version on a Service Node, or when the last push attempt was made and the outcome, use the following Controller CLI commands:

  • show app-id push-results optional SN name
  • show service-node SN name app-id
dmf-controller-1# show app-id push-results
# Name              IP Address     Current Version Current Push Time              Previous Version Previous Push Time             Last Attempt Version Last Attempt Time              Last Attempt Result Last Attempt Failure Reason

-|-----------------|--------------|---------------|------------------------------|----------------|------------------------------|--------------------|------------------------------|-------------------|---------------------------|

1 dmf-servicenode-1 10.240.180.124 1.660.2-33      2023-12-06 11:13:36.662000 PST 1.680.0-22       2023-09-29 16:21:11.034000 PDT 1.660.2-33           2023-12-06 11:13:34.085000 PST success
dmf-controller-1# show service-node dmf-servicenode-1 app-id
# Name              IP Address     Current Version Current Push Time              Previous Version Previous Push Time Last Attempt Version Last Attempt Time Last Attempt Result Last Attempt Failure Reason

-|-----------------|--------------|---------------|------------------------------|----------------|------------------|--------------------|-----------------|-------------------|---------------------------|

1 dmf-servicenode-1 10.240.180.124 1.680.0-22      2023-09-29 16:21:11.034000 PDT
The show app-id signature-files command displays the validated files that are available to push to Service Nodes.
dmf-controller-1# show app-id signature-files
# Signature-file    Checksum 	  Fetch time
-|-----------------|-----------------|------------------------------|
1 file1.tar.gz      abcdefgh12345     2023-08-02 22:20:49.422000 UTC
2 file2.tar.gz      ijklmnop67890     2023-08-03 07:10:22.123000 UTC
The show analytics app-info filter-interface-name command displays aggregated information over the last 5 minutes about the applications seen on a given filter interface, sorted by unique flow count. This command also has an optional size option to limit the number of results, default is all.
Note: This command only works in push-per-filter mode.
dmf-controller-1# show analytics app-info filter-interface f1 size 3
# App name Flow count
-|--------|----------|
1 app1     1000
2 app2     900
3 app3     800

Syslog Messages

Syslog messages for configuring the app-id and app-id-filter services appear in a service node’s syslog through journalctl.

A Service Node syslog registers events for the app-id add, modify, and delete actions.

These events contain the keywords dpi and dpi-filter, which correspond to app-id and app-id-filter.

For example:

Adding dpi for port, 
Modifying dpi for port, 
Deleting dpi for port,
Adding dpi filter for port, 
Modifying dpi filter for port, 
Deleting dpi filter for port, 
App appname does not exist - An invalid app name was entered.

The addition, modification, or deletion of app names in an app-id-filter managed-service in the Controller node’s CLI influences the policy refresh activity, and these events register in floodlight.log.

Scale

  • Max concurrent sessions are currently set to permit less than 200,000 active flows per core. Performance may drop the more concurrent flows there are. This value is a maximum value to prevent the service from overloading. Surpassing this threshold may cause some flows not to be processed, and the new flows will not be identified or filtered. Entries for inactive flows will time out after a few minutes for ongoing sessions and a few seconds after the session ends.
  • If there are many inactive sessions, DMF holds the flow contexts, reducing the number of available flows used for DPI. The timeouts are approximately 7 minutes for TCP sessions and 1 minute for UDP.
  • Heavy application traffic load degrades performance.

Troubleshooting

  • If IPFIX reports do not appear on an Analytics Node (AN) or Collector, ensure the UDP port is configured correctly and verify the AN receives traffic.
  • If the app-id-filter app list does not appear, ensure a Service Node (SN) is connected using the show service-node command on the Controller.
  • For app-id-filter, enter at least one valid application from the list that appears using <Tab>. If not, the policy will fail to install with an error message app-id-filter specified without at least one name TLV identifying application.
  • A flow may contain other IDs and protocols when using app-id-filter. For example, the specific application for a flow may be google_maps, but there may be protocols or broader applications under it, such as ssh, http, or google. Adding google_maps will filter this flow. However, adding ssh will also filter this flow. Therefore, adding any of these to the filter list will cause packets of this flow to be forwarded or dropped.
  • An IPFIX element, BSN type 14, that existed in DMF version 8.4 was removed in 8.6.
  • During a dynamic signature update, if a SN reboot occurs, it will likely boot up with the correct version. To avoid issues of traffic loss, perform the update during a maintenance window. Also, during an update, the SN will temporarily not send LLDP packets to the Controller and disconnect for a short while.
  • After a dynamic signature update, do not change configurations or push another signature file for several minutes. The update will take some time to process. If there are any VFT changes, it may lead to warning messages in floodlight, such as:
    Sync job 2853: still waiting after 50002 ms 
    Stuck switch update: R740-25G[00:00:e4:43:4b:bb:38:ca], duration=50002ms, stage=COMMIT

    These messages may also appear when configuring DPI on a large number of ports.

Limitations

  • When using a drop filter, a few packets may slip through the filter before determining an application ID for a flow, and when using a forward filter, a few packets may not be forwarded. Such a small amount is estimated to be between 1 and 6 packets at the beginning of a flow.
  • When using a drop filter, add the unknown app ID to the filter list to drop any unidentified traffic if these packets are unwanted.
  • The Controller must be connected to a Service Node for the app-id-filter app list to appear. If the list does not appear and the application names are unknown, use the app-id to send reports to the analytics node. Use the application names seen there to configure an app-id-filter. The name must match exactly.
  • Since app-category does not currently show the applications included in that category, do not use it when targeting specific apps. Categories like basic, which include all basic networking protocols like TCP and UDP, may affect all flows.
  • For app-id, a report is only generated for a fully classified flow after that flow has been fully classified. Therefore, the number of reported applications may not match the total number of flows. These reports are sent after enough applications are identified on the Service Node. If many applications are identified, DMF sends the reports quickly. However, DMF sends these reports every 10 seconds when identifying only a few applications.
  • DMF treats a bidirectional flow as part of the same n-tuple. As such, generated reports contain the client's source IP address and the server's destination IP address.
  • While configuring many ports with the app-id, there may occasionally be a few Rx drops on the 16 port machines at a high traffic rate in the first couple of seconds.
  • The feature uses a cache that maps dest ip and port to the application. Caching may vary the performance depending on the traffic profile.
  • The app-id and app-id-filter services are more resource-intensive than other services. Combining them in a service chain or configuring many instances of them may lead to degradation in performance.
  • At scale, such as configuring 16 ports on the R740 DCA-DM-SEL, app-id may take a few minutes to set up on all these ports, and this is also true when doing a dynamic signature update.
  • The show analytics app-info command only works in push-per-filter VLAN mode.
  • Mapping an interface-name with identified application IDs from source traffic received via the filter interface at Analytics Dashboard is allowed in Push-Per-Filter Mode only.

Deduplication Action

The DANZ Monitoring Fabric (DMF) Service Node enhances the efficiency of network monitoring tools by eliminating duplicate packets. Duplicate packets can be introduced into the out-of-band monitoring data stream by receiving the same flow from multiple TAP or SPAN ports spread across the production network. Deduplication eliminates these duplicate packets and enables more efficient use of passive monitoring tools.

The DMF Service Node provides four modes of deduplication for different types of duplicate packets.
  • Full packet deduplication: deduplicates incoming packets that are identical at the L3/L4 layers.
  • Payload routed packet deduplication: Routed Deduplication with L4 Payload and Salt. This skips TCP/UDP headers in hashing, allowing duplicate detection based on identical payloads even if header fields like timestamps differ.

  • Routed packet deduplication: as packets traverse an IP network, the MAC address changes from hop to hop. Routed packet deduplication enables users to match packet contents starting from the L3 header.
  • L4 Payload Start: NATed packet deduplication: to perform NATed deduplication, the service node compares packets in the configured window that are identical starting from the L4 payload. To use NATed packet deduplication, perform the following fields as required:
    • Anchor: Packet Start, L3 Header Start, L4 Header Start, or L4 Payload Start fields.
    • Offset: the number of bytes from the anchor where the deduplication check begins.
    • Window Size: The time window in which the service looks for duplicate packets is configurable. Select a value among these choices: 2ms (the default), 4ms, 6ms, and 8ms.

CLI Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Controller-1(config)# show running-config managed-service MS-DEDUP-FULL-PACKET
! managed-service
managed-service MS-DEDUP-FULL-PACKET
description 'This is a service that does Full Packet Deduplication'
1 action dedup full-packet window 8
service-interface switch CORE-SWITCH-1 ethernet13/1
Controller-1(config)#
Controller-1(config)# show running-config managed-service MS-DEDUP-ROUTED-PACKET
! managed-service
managed-service MS-DEDUP-ROUTED-PACKET
description 'This is a service that does Routed Packet Deduplication'
1 action dedup routed-packet window 8
service-interface switch CORE-SWITCH-1 ethernet13/2
Controller-1(config)#
Controller-1(config)# show running-config managed-service MS-DEDUP-NATTED-PACKET
! managed-service
managed-service MS-DEDUP-NATTED-PACKET
description 'This is a service that does Natted Packet Deduplication'
1 action dedup anchor-offset l4-payload-start 0 window 8
service-interface switch CORE-SWITCH-1 ethernet13/3
Controller-1(config)#
Note: The existing command is augmented to show the deduplication percentage. The command syntax is show managed-service-device Service-Node-Name stats dedup-service-name dedup.
Controller-1(config)# show managed-service-device DMF-SN-R740-1 stats MS-DEDUP dedup
~~~~~~~~~~~~~~~~ Stats ~~~~~~~~~~~~~~~~
Interface Name : sni16
Function : dedup
Service Name : MS-DEDUP
Rx packets : 9924950
Rx bytes : 4216466684
Rx Bit Rate : 1.40Gbps
Applied packets : 9923032
Applied bytes : 4216337540
Applied Bit Rate : 1.40Gbps
Tx packets : 9796381
Tx bytes : 4207106113
Tx Bit Rate : 1.39Gbps
Deduped frame count : 126651
Deduped percent : 1.2763336851075358
Load : low
Controller-1(config)#

Routed Deduplication

The DMF Controller supports a payload-routed-packet deduplication option. This feature allows service nodes to combine the L4 payload start anchor point with routed salt (L3 IP addresses, L4 source/destination ports, and other L3 header fields).

Anchoring the deduplication range at the L4 payload start ensures that frames with identical payload content are identified as duplicates, even when TCP headers—such as frequently updated timestamps—differ. This method effectively skips TCP/UDP headers and options during hash computation.

Functional Benefits
  • Optimized Bandwidth: The Service Node identifies and drops retransmitted packets containing identical data, preventing unnecessary traffic from reaching monitoring tools.
  • Precise Flow Identification: Using routed salt ensures the system maintains visibility into L3 and L4 flow identifiers while focusing the deduplication logic on the payload.
  • Reduced Processing Overhead: Monitoring tools receive only unique payload content, lowering the computational load on analytics engines.
Configuration and Functional Impact

Adding the payload-routed-packet option provides granular control over how the system processes retransmitted frames.

  • Deduplication Logic: The Service Node uses the same routed salt to maintain flow identification, but shifts the hash computation range to start after the transport-layer headers.
  • Data Integrity: DMF identifies frames as duplicates only when their payloads match within the same flow, ensuring that distinct data remains intact while redundant retransmissions are filtered.
  • Backward Compatibility: DMF maintains existing deduplication behavior under the name header-routed-packet. Automatic configuration migration ensures that current deployments maintain their existing behavior upon upgrade without manual intervention.

All dedup supporting Service Nodes support Routed Deduplication with L4 Payload and Salt.

Configuration

In the deduplication managed service configuration, the implementation replaces the single routed-packet option with two distinct settings for the region command. To access these options, first define a deduplication action using the [index] action dedup command within the config-managed-srv mode.

The region command defines the scope of the hash computation using the following four values:

  • full-packet: Performs complete packet deduplication starting from the beginning of the frame.

  • header-routed-packet: Enables L4 header-based routed deduplication using routed salt (L3 IP addresses and L4 ports).

  • payload-routed-packet: Enables L4 payload-based routed deduplication using routed salt, effectively skipping transport-layer headers to focus on payload content.

  • anchor-offset: Supports advanced custom configurations for specific byte ranges. This option facilitates L4 header and payload-based deduplication without incorporating salted fields.

Routed Deduplication with L4 Payload and Salt

The DMF Controller supports a payload-routed-packet deduplication option. This feature allows service nodes to combine the L4 payload start anchor point with routed salt (L3 IP addresses, L4 source/destination ports, and other L3 header fields).

Anchoring the deduplication range at the L4 payload start ensures that frames with identical payload content are identified as duplicates, even when TCP headers—such as frequently updated timestamps—differ. This method effectively skips TCP/UDP headers and options during hash computation.

Functional Benefits
  • Optimized Bandwidth: The Service Node identifies and drops retransmitted packets containing identical data, preventing unnecessary traffic from reaching monitoring tools.
  • Precise Flow Identification: Using routed salt ensures the system maintains visibility into L3 and L4 flow identifiers while focusing the deduplication logic on the payload.
  • Reduced Processing Overhead: Monitoring tools receive only unique payload content, lowering the computational load on analytics engines.
Configuration and Functional Impact

Adding the payload-routed-packet option provides granular control over how the system processes retransmitted frames.

  • Deduplication Logic: The Service Node uses the same routed salt to maintain flow identification, but shifts the hash computation range to start after the transport-layer headers.
  • Data Integrity: DMF identifies frames as duplicates only when their payloads match within the same flow, ensuring that distinct data remains intact while redundant retransmissions are filtered.
  • Backward Compatibility: DMF maintains existing deduplication behavior under the name header-routed-packet. Automatic configuration migration ensures that current deployments maintain their existing behavior upon upgrade without manual intervention.

All dedup supporting Service Nodes support Routed Deduplication with L4 Payload and Salt.

Configuration

In the deduplication managed service configuration, the implementation replaces the single routed-packet option with two distinct settings for the region command. To access these options, first define a deduplication action using the [index] action dedup command within the config-managed-srv mode.

The region command defines the scope of the hash computation using the following four values:

  • full-packet: Performs complete packet deduplication starting from the beginning of the frame.

  • header-routed-packet: Enables L4 header-based routed deduplication using routed salt (L3 IP addresses and L4 ports).

  • payload-routed-packet: Enables L4 payload-based routed deduplication using routed salt, effectively skipping transport-layer headers to focus on payload content.

  • anchor-offset: Supports advanced custom configurations for specific byte ranges. This option facilitates L4 header and payload-based deduplication without incorporating salted fields.

Command Line Interface

The following example demonstrates entering the managed service mode and the deduplication action sub-mode to apply the desired region.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
dmf-controller-1(config)# managed-service managed_service_1
dmf-controller-1(config-managed-srv)# service-interface switch delivery1 ethernet1
dmf-controller-1(config-managed-srv)# 1 action dedup
dmf-controller-1(config-managed-srv-dedup)# region [header-routed-packet | payload-routed-packet]
Note: The existing show command structure supports this enhancement.

Flow Diff Latency and Drop Analysis

Latency and drop information help determine if there is a loss in a particular flow and where the loss occurred. A Service Node action configured as a DANZ Monitoring Fabric (DMF) managed service has multiple separate taps or spans in the production network and can measure the latency of a flow traversing through any pair of these points. It can also detect packet drops between any two points in the network if the packet only appears on one point within a specified time frame, currently set to 200ms.

Latency and drop analysis require Precision Time Protocol (PTP) time-stamped packets. The DMF PTP timestamping feature applies these timestamps as packets enter the monitoring fabric.

The Service Node accumulates latency values by flow and sends IPFIX data records with each flow's 5-tuple and ingress and egress identifiers. It sends IPFIX data records to the Analytics Node after collecting a specified number of values for a flow or when a timeout occurs for the flow entry. The threshold count is 10,000 packets, and the flow timeout is 4 seconds.

Note: This feature is only supported in push-per-filter mode. Only basic statistics, such as min, max, and mean, are available. These statistics are the computed difference in timestamps, or latency, between two tap point pairs of packets within a flow.

Use the DMF Analytics Node to build custom dashboards to view and check the data.

Attention: The flow diff latency and drop analysis feature is switch dependent and requires PTP timestamping. It is supported on 7280R3 and 7800R3 switches.

Configure Flow Diff Latency and Drop Analysis

Configure this feature through the Controller as a Service Node action in managed services using the managed service action flow-diff. Arista recommends using a dedicated flow-diff service policy for this feature to work effectively.

Flow-diff configuration configures multiple tap point pairs, or a multicast group with sources, receivers, and group IPs. DMF analyzes traffic flowing between these tap points for latency or drops. A tap point pair comprises a source and a destination tap point, identified by the filter interface or filter interface group. Whereas the multicast groups can be seen as a tap point triplet consisting of sources, receivers, and group IP.

Filter interfaces carrying both unicast and multicast traffic will need to be configured as part of tap-point-pair and tap-point-multicast-group in separate managed services.

Based on the configuration, configuring the Service Node with traffic metadata tells the Service Node where to look for tap point information, timestamps, and the IPFIX collector.

Configure appropriate DMF Policies to deliver traffic tapped from tap point pairs in the network to the configured Service Node interface for analysis.

Configuration Steps for flow-diff.

  1. Create a managed service and enter the service interface.
  2. Choose the flow-diff service action with the command: seq num flow-diff
    Note: The command will enter the flow-diff submode, which supports the following configuration parameters: collector, l3-delivery-interface, tap-point-pair, and tap-point-multicast-group. These are required parameters.
    Important: The configuration requires at least one tap-point-pair or tap-point-multicast-group.
  3. Configure the IPFIX collector IP address by entering the following command: collector ip-address (the UDP port and MTU parameters are optional; the default values are 4739 and 1500, respectively).
  4. Configure the delivery interface by entering the command l3-delivery-interface delivery interface name.
  5. Configure the points for flow-diff and drop analysis using tap-point-pair parameters as specified in the following section. Multiple options to identify the tap-point include filter-interface and filter-interface-group. This command requires a source and a destination tap point.
  6. Configure a multicast tap point using tap-point-multicast-group and provide an existing multicast group name.
  7. Optional parameters with their default configurations are:
    1. delivery-requirement: all-destinations
    2. report-type: latency and drop
    3. latency-table-size: large
    4. sample-count-threshold: 10000
    5. packet-timeout: 200ms
    6. flow-timeout: 4000ms
  8. For delivery-requirement, the all-destinations flag indicates that the packet must appear on every destination interface otherwise a drop report will occur. any-destination means it only needs to be seen at one interface in the destination interface group.
  9. The report-type value determines what types of reports are generated by the flow-diff action. While in the report-type submode set latency or drop. To unset, use no latency or no drop. By default both types are set.
  10. The latency-table-size value determines the memory footprint of flow-diff action on the Service Node. The Service Node manages this abstract concept entirely, allowing for functional evolution to meet architectural requirements.
  11. The sample-count-threshold value specifies the number of samples needed to generate a latency report. Every time a packet times out, it generates a sample for that flow. DMF generates a report if the flow reaches the sample threshold and resets the flow stats.
  12. The packet-timeout value is the time interval in which timestamps are collected for a packet. It must be larger than the time it takes the same packet to appear at all tap points. Every timeout generates a sample for the flow associated with the packet.
  13. As of DMF release 8.9, the flow-timeout value now reports the flow latency after the flow timeout value elapses. The system evicts the flow and generates a report. This change differs from earlier releases, which used the time after a flow stopped receiving packets and refreshed the timeout whenever the system received a new packet.
Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

The following example illustrates configuring flow-diff using the steps mentioned earlier:

dmf-controller-1(config)# managed-service managed_service_1
dmf-controller-1(config-managed-srv)# service-interface switch delivery1 ethernet1
dmf-controller-1(config-managed-srv)# 1 action flow-diff
dmf-controller-1(config-managed-srv-flow-diff)# collector 192.168.1.1
dmf-controller-1(config-managed-srv-flow-diff)# l3-delivery-interface l3-iface-1
dmf-controller-1(config-managed-srv-flow-diff)# tap-point-pair source filter-interface f1 destination filter-interface f2
dmf-controller-1(config-managed-srv-flow-diff)# tap-point-multicast-group mg1
dmf-controller-1(config-managed-srv-flow-diff)# latency-table-size [small|medium|large]
dmf-controller-1(config-managed-srv-flow-diff)# packet-timeout 200
dmf-controller-1(config-managed-srv-flow-diff)# flow-timeout 4000
dmf-controller-1(config-managed-srv-flow-diff)# sample-count-threshold 10000
dmf-controller-1(config-managed-srv-flow-diff)# delivery-requirement [all-destinations | any-destination]
dmf-controller-1(config-managed-srv-flow-diff)# report-types
dmf-controller-1(config-managed-srv-flow-diff-report)# drop | no drop
dmf-controller-1(config-managed-srv-flow-diff-report)# latency | no latency

Configuring Tap Points

Unicast Tap Points

Configure unicast tap points using tap-point-pair parameters in the flow-diff submode specifying two identifiers: filter interface name, and filter-interface-group.
dmf-controller-1(config-managed-srv-flow-diff)# tap-point-pair source <Tab>
filter-interface         filter-interface-group

The filter-interface-group option takes in any configured filter interface group used to represent a collection of tap points in push-per-filter mode. This is an optional command to use when a group of tap points exists, all expecting traffic from the same source or group of source tap points for ease of configuration. For example:

  1. Instead of having two separate tap-point-pairs to represent A → B, A → C, use a filter-interface-group G = [B, C], and only one tap-point-pair A → G.
    dmf-controller-1(config-managed-srv-flow-diff)# tap-point-pair source type A destination filter-interface-group G
  2. With a topology like A → C and B → C, configure a filter-interface-group G = [A, B], and tap-point-pair G → C.
    dmf-controller-1(config-managed-srv-flow-diff)# tap-point-pair source filter-interface-group G destination type C

Multicast Tap Points

Configure multicast tap points using tap-point-multicast-group parameters in the flow-diff submode specifying the multicast group names.

dmf-controller-1(config-managed-srv-flow-diff)# tap-point-multicast-group multicast group name

Multicast group is flattened by the group IPs and converted into tap point triplets of the form of sources, receivers, and group-ip. When a multicast group is used as a tap point, then the receiver group in the multicast group config only applies to packets destined for the group IP address. This allows the action to be configured for multiple multicast groups that have the same source, but different destinations.

Restrictions

There are some restrictions to keep in mind while configuring tap-point-pairs and tap-point-multicast-groups:

  • A source and destination must exist and cannot refer to the same tap point.
  • A multicast group must have sources, receivers, and group IPs configured, and the sources and receivers must not overlap.
  • The configured filter-interface-group must not partially overlap with other groups, including the multicast group sources and receivers used by the same flow-diff managed service and cannot have more than 128 members. The same applies to any multicast group being used by flow-diff.
  • When configuring multiple tap-point-pairs using filter-interface and filter-interface-group, or tap-point-mulitcast-group, if a filter interface is used individually, it can only be referenced in a filter-interface-group or multicast-group sources or receiver groups if these groups only consist of that one filter interface.
  • The configuration supports a maximum of 4094 unique tap point groups. This limit applies globally to the fabric and encompasses all flow-diff services. Tap point group uniqueness depends on the constituent filter interfaces. For example, an individual filter interface F1 and a filter interface group FG1 containing only that same interface F1 represent the same unique group. Similarly, a multicast group utilizing either the individual interface F1 or the single-interface group FG1 as a source or receiver refers to the same underlying interface group.

If an interface group has more than one LAG grouping where each LAG contains multiple ids, only one member id of each LAG is required. Subsequent ids of the LAG will not have latency computed if they are found.

The existence of the delivery-requirement flag changes the drop reporting for interface group pairs. When set to any-destination, the packet only needs to be seen on any one of the configured destination interfaces, when set to all-destinations, the packet must arrive on all matching destinations, otherwise the system generates a drop report for each interface where the packet was unseen.

Configuring Multicast Group

Multicast groups configuration requires filter interfaces as sources and receivers, and valid IPv4 addresses. There is no group size limit applied here, but the flow-diff service will fail if the sources and receivers have more than 128 filter interfaces.
dmf-controller-1(config)# multicast-group mg1
dmf-controller-1(config-multicast-group)# source filter-interface f1
dmf-controller-1(config-multicast-group)# source filter-interface-group fg1
dmf-controller-1(config-multicast-group)# receiver filter-interface f2
dmf-controller-1(config-multicast-group)# receiver filter-interface-group fg2
dmf-controller-1(config-multicast-group)# group-ip 224.0.0.1
dmf-controller-1(config-multicast-group)# group-ip 224.0.0.2

Configuring Policy

Configure the policies so that the same packet can be tapped from two independent points in the network and then sent to the Service Node.

After creating a policy, add the managed service with flow-diff action as shown in the following example:

dmf-controller-1 (config-policy)# use-managed-service service name sequence 1

There are several things to consider while configuring policies in push-per-filter mode:

  • Only one policy can contain the flow-diff service action.
  • A policy should have all filter-interfaces and filter-interface-groups configured as tap points in the flow-diff configuration. Any missing filter interfaces and groups in a policy may result in reporting drops as these packets do not forward from one end of the tap-point-pair to the Service Node. Similarly, for the tap-point-multicast-group, the configuration must include the filter interfaces and groups used as sources and receivers in the policy.
  • It’s also advisable not to add any filter interfaces (groups) that are not in the tap-point-pairs or tap-point-multicast-groups as their latency and drop analysis will not be done, causing unnecessary packets to be forwarded to the Service Node, which are then reported as unexpected.
  • Ensure accurate timestamping and avoid unexpected report types by correctly ordering the source and destination for tap point pairs. Tap point pairs are not bidirectional so to compute latencies for both directions add the reverse ordering of the tap point pair.
Policies must have PTP timestamping enabled. To do so, use the following command:
dmf-controller-1 (config-policy)# use-timestamping
Configuring PTP Timestamping

This feature depends on configuring PTP timestamping for the packet stream going through the tap points. Refer to the Resources section for more information on setting up PTP timestamping functionality. Arista strongly recommends using replace-src-mac for this feature until revised, as performance and Service Node compatibility may vary for add-header-after-l2.

Analytics Node

IPFIX reports received on the analytics node can be of one of the following types, indicated by the reportType field:

  • 0 is a valid latency report with the latency computed between the two tap point pairs.
  • 1 means it is a drop report, which means the packet didn’t arrive at its destination. If the egress identifier field is also 0, the packet was only received at one tap point. If the egress identifier contains a nonzero value, that means one or a few of the LAG groupings associated with a destination interface group did not receive any packets associated with an id in that LAG. The egress identifier field is filled with the id of one of the members in that LAG group.
  • 2 means unexpected, which can be caused by packets with identifiers not included in any tap point pairs or a misordering of timestamps where the destination comes before the source tap.
  • 3 means overflow, where this same packet appears at too many tap points. The system ignores packets that surpass the maximum tap points. Currently, this should not exceed 40, including the source tap point.
VXLAN

When using VXLAN, the headers of these packets must be decapsulated before they can be processed by flow-diff on the Service Node. The filter switch must perform the decapsulation. If encapsulated packets appear at one tap point and non-encapsulated packets at the other endpoint, the service requires both of these packets to be decapsulated. Arista recommends using the following process to ensure flow-diff works correctly.

  1. Configure the filter interface receiving the VXLAN encapsulated traffic to perform decapsulation.
  2. If the receiving VXLAN traffic appears with non-default port number 4789, configure the filter switch with a non-default port number as shown in the following example:
    filter-switch-1# configure
    filter-switch-1(config)# interface Vxlan 1
    filter-switch-1(config-if-Vx1)# vxlan udp-port customer port
    
    interface Vxlan1
       vxlan udp-port customer port

Show Commands

The following show commands provide helpful information.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
The show running-config managed-service managed service command helps verify whether the flow-diff configuration is complete.
dmf-controller-1(config)# show running-config managed-service ms1 
! managed-service
managed-service ms1
  service-interface switch DCS-7050CX3-32S ethernet2/4
  !
  1 action flow-diff
    collector 192.168.1.1
    l3-delivery-interface AN-Data
    tap-point-pair source filter-interface ingress destination filter-interface egress
    tap-point-multicast-group mg1
    delivery-requirement any-destination
    !
    report-types
      drop
      latency
The show managed-services managed service command provides status information about the service.
dmf-controller-1(config)# show managed-services flow-diff 
# Service Name Switch          Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW 
-|------------|---------------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 flow-diff    DCS-7050CX3-32S ethernet2/4      True      25Gbps              25Gbps             624Kbps               432Mbps
The show running-config policy policy command checks whether the policy flow-diff service exists, whether use-timestamping is enabled, and the use of the correct filter interfaces.
dmf-controller-1(config)# show running-config policy p1 
! policy
policy p1
  action forward
  filter-interface egress
  filter-interface ingress
  use-managed-service ms1 sequence 1
  use-timestamping
  1 match any

The show policy policy command provides detailed information about a policy and whether any errors are related to the flow-diff service. The Service Interfaces tab section shows the packets transmitted to the Service Node and IPFIX packets received from the Service Node.

dmf-controller-1 (config)# show policy flow-diff-1
Policy Name                            : flow-diff-1
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 1
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 4
# of services                          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN                              : 2
Post Match Filter Traffic              : 215Mbps
Total Delivery Rate                    : -
Total Pre Service Rate                 : 217Mbps
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : none
Runtime Service Names                  : flow-diff
Installed Time                         : 2023-11-16 18:15:27 PST
Installed Duration                     : 19 minutes, 45 secs
~ Match Rules ~
# Rule        
-|-----------|
1 1 match any
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch   IF Name    State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|------|--------|----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 BP1    7280SR3E Ethernet25 up    rx  24319476 27484991953 23313    215Mbps  2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF  Switch    IF Name    State Dir Packets Bytes  Pkt Rate Bit Rate Counter Reset Time             
-|-------|---------|----------|-----|---|-------|------|--------|--------|------------------------------|
1 AN-Data 7050SX3-1 ethernet41 up    tx  81      117222 0        -        2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name Role         Switch          IF Name     State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|------------|------------|---------------|-----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 flow-diff      pre-service  DCS-7050CX3-32S ethernet2/4 up    tx  23950846 27175761734 23418    217Mbps  2023-11-16 18:18:18.837000 PST
2 flow-diff      post-service DCS-7050CX3-32S ethernet2/4 up    rx  81       117546      0        -        2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Core Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Switch          IF Name    State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|---------------|----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 7050SX3-1       ethernet7  up    rx  23950773 27175675524 23415    217Mbps  2023-11-16 18:18:18.837000 PST
2 7050SX3-1       ethernet56 up    rx  81       117222      0        -        2023-11-16 18:18:18.837000 PST
3 7050SX3-1       ethernet56 up    tx  23950773 27175675524 23415    217Mbps  2023-11-16 18:18:18.837000 PST
4 7280SR3E        Ethernet7  up    tx  24319476 27484991953 23313    215Mbps  2023-11-16 18:18:18.837000 PST
5 DCS-7050CX3-32S ethernet28 up    tx  81       117546      0        -        2023-11-16 18:18:18.837000 PST
6 DCS-7050CX3-32S ethernet28 up    rx  23950846 27175761734 23418    217Mbps  2023-11-16 18:18:18.837000 PST
~ Failed Path(s) ~
None.

The show running-config multicast-group name displays the user-configured multicast groups.

dmf-controller-1(config)# show running-config multicast-group 

! multicast-group
multicast-group mg1
  group-ip 224.0.0.1
  group-ip 224.0.0.2
  receiver filter-interface f3
  receiver filter-interface f6
  source filter-interface f1
  source filter-interface f2

Syslog Messages

The Flow Diff Latency and Drop Analysis feature does not create Syslog messages.

Troubleshooting

DMF Controller

Policies dictate how and what packets are directed to the Service Node. Policies must be able to stream packets from two distinct tap points so that the same packet gets delivered to the Service Node for flow-diff and drop analysis.

Possible reasons for flow-diff and drop analysis not working are:

  • In push-per-filter mode, the policy bound to managed service with flow-diff action is missing filter interfaces or groups that constitute a tap-point-pair.

A policy programmed to use managed service with flow-diff action can fail for several reasons:

  • The L3 delivery interface or Collector configuration is missing.
  • The tap-point-pair configuration is incomplete:
    • The source or destination tap points are missing.
    • Using a policy-name identifier in push-per-filter mode.
  • The tap-point-multicast-group configuration is incomplete:
    • multicast group doesn’t exist.
    • sources, receivers, or group-ips are empty.
    • sources and receivers overlap.
    • source or receivers have more than 128 filter interfaces, including the interfaces comprising a filter interface group.
  • There are more than 4094 distinct tap point groups configured. These limits are global across all flow-diff managed services. For example, filter-interface f1 and filter-interface-group fg1 with only f1 in it is considered the same tap point group.
  • filter-interface-groups overlap with each other within the same managed service or have more than 128 group members.
  • filter-interface is being used individually as a tap point and as a part of some filter-interface-group or a multicast-group, where the group also includes other interfaces, thus resulting in partial overlap.
  • Partial overlap of interfaces in filter-interface-groups and multicast-groups within a flow-diff service.

Reasons for failure are available in the runtime state of the policy and viewed using the show policy policy name command.

A lack of computed latency reports can mean two things:

  • Not reaching the sample-count-threshold value. Either lower the sample-count-threshold value until reports are generated or increase the amount of unique packets per flow.
  • Flows not evicting. The time specified in flow-timeout may be too large and may need to be adjusted to a lower value. Flows will expire when reaching the flow-timeout value. After a flow expires, the system generates a report for that flow.
  • report-type config has neither latency nor drop option configured.
  • The delivery-requirement config can also impact the reports since it determines what’s considered a drop or not.
For packet-timeout, this value must be larger than the time expected to receive the same packet on every tap-point. For A->B, if it takes 20ms for the packet to appear at B, the packet-timeout must be larger than this time frame to collect timestamps for both these tap points and compute a latency in one sample.
Note: When using a rate limit, the packet-timeout value may need to be increased.

If all the reports are type 2 unexpected, ensure the taps are in the correct order as configured on the Controller. Also, check the topology is correct and that there are no unexpected taps. If there are only a few unexpected reports, it is most likely an issue with the switch ordering the timestamps. You can ignore these or add the reverse direction onto the topology to turn these into type 0 reports. If there are many drop reports, confirm that the same packet is received at all relevant taps within the packet-timeout window, which defaults to 200ms.

Limitations

  • This feature is only supported in push-per-filter mode. Any config in push-per-policy mode will not work as intended.
  • A maximum of 4094 distinct tap points are allowed.
  • Only 40 timestamped instances of a packet are allowed.
  • The filter-interface-group used as a tap point must not overlap with any other group within the same managed service and must not have more than 128 members.
  • The multicast-group used as a tap point must not have its sources and receivers overlap with any other group within that managed service and must not have more than 128 members each.
  • A filter interface cannot be used as a tap point and simultaneously as a part of a filter-interface-group or multicast-group source or receiver, unless the groups have this filter interface as the only member and no other interface.
  • There is no chaining if a packet flows through three or more tap points in an A->B->C->...->Z topology. The only computed latency reports is for tap-point-pairs A->B, A->C, …, and A->Z if these links are specified, but B->C, C->D, etc., will not be computed.
  • Service Node interfaces can have multiple lcores depending on the SKU. An lcore is a logical core which processes traffic on an interface. Hardware RSS firmware in some Service Node SKU currently cannot parse L2 header timestamps, so all packets are sent to the same lcore; however, RSS does distribute packets correctly to multiple lcores when using src-mac timestamping.
  • Each packet from the L3 header and onward gets hashed to a 64-bit value; if two packets hash to the same value, assume the underlying packets are the same.
  • Currently, on the flow-diff action in the Service Node, if packets are duplicated so that N copies of the same packet are received:
    • N-1 latencies are computed.
    • The ingress identifier is the earliest timestamp.
  • The system reports timestamps as unsigned 32-bit values, with the maximum timestamp being 2^32-1, corresponding to approximately 4.29 seconds.
  • Only min mean max latencies are currently reported.
  • If there are switch timestamping issues, then these statistics may have high outliers.
  • Synchronize the time between switches for this feature to work properly, or latency calculation may be inaccurate.
  • Packets are hashed from the L3 header onward, meaning if there is any corrupted data past the L3 header, it will lead to drop reports. The same packet must appear at two tap points to generate a computed latency report.
  • In A->B, if B packets appear before A, an unexpected type report is generated.
  • At whichever tap point the packet first appears with the earliest timestamp, it is considered the source.
  • While switching the latency configuration, the system may generate a couple of unexpected or drop reports at the beginning.
  • A LAG may affect RSS on the service node which may affect performance.
  • Users must have good knowledge of network topology when setting up tap points and configuring timeout or sample threshold values. Improper configuration may lead to drop or unexpected reports.
  • Occasionally switch timestamping causes the system to generate a few type 2 unexpected reports.
  • The system may generate drop reports from certain protocols, such as OSPF.
  • The amount of packets per second and packet size influences performance since packets are individually hashed. The amount of tap point pairs and interface groups also affects performance.

Header Strip Action

This action removes specific headers from the traffic selected by the associated DANZ Monitoring Fabric (DMF) policy. Alternatively, define custom header stripping based on the starting position of the Layer-3 header, the Layer-4 header, the Layer-4 payload, or the first byte in the packet.

Use the following decap actions isolated from the header-strip configuration stanza:
  • decap-erspan: remove the Encapsulated Remote Switch Port Analyzer (ERSPAN) header.
  • decap-cisco-fabric-path: remove the Cisco FabricPath protocol header.
  • decap-l3-mpls: remove the Layer-3 Multi-protocol Label Switching (MPLS) header.
  • decap-lisp: remove the LISP header.
  • decap-vxlan [udp-port vxlan port]: remove the Virtual Extensible LAN (VXLAN) header.
  • decap-geneve: remove the Geneve header.
Note:For the Header Strip and Decap actions, apply post-service rules to select traffic after stripping the original headers.
To customize the header-strip action, use one of the following keywords to strip up to the specified location in each packet:
  • l3-header-start
  • l4-header-start
  • l4-payload-start
  • packet-start

Input a positive integer representing the offset from which the strip action begins. When omitting an offset, the header stripping starts from the first byte in the packet.

CLI Configuration

The header-strip service action strips the header and replaces it in one of the following ways:

  • Add the original L2 src-mac, and dst-mac.
  • Add the original L2 src-mac, dst-mac, and ether-type.
  • Specify and add a custom src-mac, dst-mac, and ether-type.

The following are examples of custom header stripping:

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
This example strips the header and replaces it with the original L2 src-mac and dst-mac.
! managed-service
managed-service MS-HEADER-STRIP-1
1 action header-strip packet-start 20 add-original-l2-dstmac-srcmac
service-interface switch CORE-SWITCH-1 ethernet13/1
This example adds the original L2 src-mac, dst-mac, and ether-type.
! managed-service
managed-service MS-HEADER-STRIP-2
1 action header-strip packet-start 20 add-original-l2-dstmac-srcmac-ethertype
service-interface switch CORE-SWITCH-1 ethernet13/2
This example specifies the addition of a customized src-mac, dst-mac, and ether-type.
! managed-service
managed-service MS-HEADER-STRIP-3
1 action header-strip packet-start 20 add-custom-l2-header 00:11:01:02:03:04 00:12:01:02:03:04
0x800
service-interface switch CORE-SWITCH-1 ethernet13/3

Configuring the Post-service Match

The post-service match configuration option enables matching on inner packet fields after the DANZ Monitoring Fabric (DMF) Service Node performs header stripping. This option is applied on the post-service interface after the service node completes the strip service action. Feature benefits include the following:
  • The fabric can remain in L3/L4 mode. It is not necessary to change to offset match mode.
  • Easier configuration.
  • All match conditions are available for the inner packet.
  • The policy requires only one managed service to perform the strip service action.

With this feature enabled, DMF knows exactly where to apply the post-service match. The following example illustrates this configuration.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
! managed-service
managed-service MS-HEADER-STRIP-4
service-interface switch CORE-SWITCH-1 interface ethernet1
1 action decap-l3-mpls
!
post-service-match
1 action match ip src-ip 1.1.1.1
2 action match tcp dst-ip 2.2.2.0 255.255.255.0
! policy
policy POLICY-1
filter-interface TAP-1
delivery-interface TOOL-1
use-managed-service MS-HEADER-STRIP-4 sequence 1

IPFIX and Netflow Actions

IP Flow Information Export (IP FIX), also known as NetFlow v10, is an IETF standard defined in RFC 7011. The IPFIX generator (agent) gathers and transmits information about flows, which are sets of packets that contain all the keys specified by the IPFIX template. The generator observes the packets received in each flow and forwards the information to the IPFIX collector (server) in the form as a flowset.

Starting with the DANZ Monitoring Fabric (DMF)-7.1.0 release, NetFlow v9 (Cisco proprietary) and IPFIX/NetFlow v10 are both supported. Configuration of the IPFIX managed service is similar to configuration for earlier versions of NetFlow except for the UDP port definition. NetFlow v5 collectors typically listen over UDP port 2055, while IFPIX collectors listen over UDP port 4739.

NetFlow records are typically exported using User Datagram Protocol (UDP) and collected using a flow collector. For a NetFlow service, the service node takes incoming traffic and generates NetFlow records. The service node drops the original packets, and the generated flow records, containing metadata about each flow, are forwarded out of the service node interface.

Using the CLI to Define an IPFIX Template

  1. Create an IPFIX template.
    controller-1(config)# ipfix-template IPFIX-IP
    controller-1(config-ipfix-template)#

    This changes the CLI prompt to the config-ipfix-template submode.

  2. Define the keys to use for the current template, using the following command:

    [ no ] key { ethernet-type | source-mac-address | destination-mac-address | dot1q-vlan-id | dot1q-priority | ip-version | ip-protocol-identifier | ip-class-of-service | ip-diff-serv-code-point | ip-ttl | sourceipv4-address | destination-ipv4-address | icmp-type-code-ipv4 | source-ipv6-address | destination-ipv6-address | icmp-type-code-ipv6 | source-transport-port | destination-transport-port }

    The keys specify the attributes of the flows to be included in the flowset measurements.

  3. Define the fields to use for the current template, using the following command:
    [ no ] field { packet-delta-count | octet-delta-count | minimum-ip-total-length | maximum-ip- total-length | flow-start-seconds | flow-end-seconds | flow-end-reason | flow-start-milliseconds | flow-end-milliseconds | minimum-layer2-total-length | maximum-layer2-total- length | minimum-ttl | maximum-ttl }

    The fields specify the measurements to be included in the flowset.

  4. Use the existing IPFIX template commands in the config mode to use the keys introduced in DMF 8.8.0.
    • tcp-source-port
    • tcp-destination-port
    • udp-source-port
    • udp-destination-port
    controller-1(config)#
    controller-1(config)# ipfix-template tcp-traffic            
    controller-1(config-ipfix-template)# key tcp-destination-port
    controller-1(config-ipfix-template)# show this
    ! ipfix-template
    ipfix-template tcp-traffic
    key tcp-destination-port

    Use the same method for all keys added as part of this feature - tcp-destination-port, tcp-source-port, udp-destination-port, and udp-source-port.

Use the template when defining the IPFIX action.

Show Commands

The show commands specific to the new keys introduced in DMF 8.8.0 have not changed. If the new keys are used in any IPFIX template, they are displayed along with other keys.

View the keys used in a given IPFIX template using the following commands:
controller-1(config-ipfix-template)# show ipfix-template port-based-traffic
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Ipfix-templates ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Template Name      Keys                                                 Fields
-|------------------|----------------------------------------------------|------|
1 port-based-traffic ethernet-type, tcp-destination-port, tcp-source-port
controller-1(config-ipfix-template)# show running-config ipfix-template port-based-traffic

! ipfix-template
ipfix-template port-based-traffic
  key ethernet-type
  key tcp-destination-port
  key tcp-source-port

Using the CLI to Define an IPFIX Service Action

Define a managed service and define the IPFIX action.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
controller(config)# managed-service MS-IPFIX-SERVICE
controller(config-managed-srv)# 1 action ipfix TO-DELIVERY-INTERFACE
controller(config-managed-srv-ipfix)# collector 10.106.1.60
controller(config-managed-srv-ipfix)# template IPFIX-TEMPLATE

The active-timeout and inactive-timeout commands are optional

To view the running-config for a managed service using the IPFIX action, enter the following command:
controller1# show running-config managed-service MS-IPFIX-ACTIVE
! managed-service
managed-service MS-IPFIX-ACTIVE
service-interface switch CORE-SWITCH-1 ethernet13/1
!
1 action ipfix TO-DELIVERY-INTERFACE
collector 10.106.1.60
template IPFIX-TEMPLATE
To view the IPFIX templates, enter the following command:
config# show running-config ipfix-template
! ipfix-template
ipfix-template IPFIX-IP
template-id 1974
key destination-ipv4-address
key destination-ipv6-address
key ethernet-type
key source-ipv4-address
key source-ipv6-address
field flow-end-milliseconds
field flow-end-reason
field flow-start-milliseconds
field minimum-ttl
field tcp-control-bits
------------------------output truncated------------------------

Records Per Interface Netflow using DST-MAC Rewrite

Destination MAC rewrite for the records-per-interface NetFlow and IPFIX feature is the default setting and applies to switches running Extensible Operating System (EOS) and SWL and is supported on all platforms.

A configuration option exists for using src-mac when overwriting the dst-mac isn't preferred.

Configurations using the CLI
Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Global Configuration

The global configuration is a central place to choose which rewrite option to use for the records-per-interface. The following example illustrates using rewrite-src-mac or rewrite-dst-mac in conjunction with the filter-mac-rewrite command.
c1(config)# filter-mac-rewrite rewrite-src-mac
c1(config)# filter-mac-rewrite rewrite-dst-mac

Netflow Configuration

The following example illustrates a NetFlow configuration.
c1(config)# managed-service ms1
c1(config-managed-srv)# 1 action netflow
c1(config-managed-srv-netflow)# collector 213.1.1.20 udp-port 2055 mtu 1024 records-per-interface

IPFIX Configuration

The following example illustrates an IPFIX configuration.
c1(config)# ipfix-template i1
c1(config-ipfix-template)# field maximum-ttl 
c1(config-ipfix-template)# key records-per-dmf-interface
c1(config-ipfix-template)# template-id 300

c1(config)# managed-service ms1
c1(config-managed-srv)# 1 action ipfix
c1(config-managed-srv-ipfix)# template i1
Show Commands

NetFlow Show Commands

Use the show running-config managed-service command to view the NetFlow settings.
c1(config)# show running-config managed-service 
! managed-service
managed-service ms1
  !
  1 action netflow
    collector 213.1.1.20 udp-port 2055 mtu 1024 records-per-interface

IPFIX Show Commands

Use the show ipfix-template i1 command to view the IPFIX settings.
c1(config)# show ipfix-template i1
~~~~~~~~~~~~~~~~~~ Ipfix-templates  ~~~~~~~~~~~~~~~~~~
# Template Name Keys                      Fields      
-|-------------|-------------------------|-----------|
1 i1            records-per-dmf-interface maximum-ttl

c1(config)# show running-config managed-service 
! managed-service
managed-service ms1
  !
  1 action ipfix
    template i1
Limitations
  • The filter-mac-rewrite rewrite-src-mac command cannot be used on the filter interface that is part of the policy using timestamping replace-src-mac. However, the command works when using a timestamping add-header-after-l2 configuration.

Packet-masking Action

The packet-masking action can hide specific characters in a packet, such as a password or credit card number, based on offsets from different anchors and by matching characters using regular (regex) expressions.

The mask service action applies the specified mask to the matched packet region.

CLI Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Controller-1(config)# show running-config managed-service MS-PACKET-MASK
! managed-service
managed-service MS-PACKET-MASK
description "This service masks pattern matching an email address in payload with X"
1 action mask ([a-zA-Z0-9._-]+@[a-zA-Z0-9._-]+.[a-zA-Z0-9_-]+)
service-interface switch CORE-SWITCH-1 ethernet13/1

Pattern-match Action

The pattern-match service action matches and forwards matching traffic and is similar to the pattern-drop service action.

Pattern matching allows content-based filtering beyond Layer-2, Layer-3, or Layer-4 Headers. This functionality allows filtering on the following packet fields and values:
  • URLs and user agents in the HTTP header
  • patterns in BitTorrent packets
  • encapsulation headers for specific parameters including, GTP, VXLAN, and VN-Tag
  • subscriber device IP (user-endpoint IP)
  • Pattern matching allows Session Aware Adaptive Packet Filtering and can identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and can separate control traffic from user data traffic.

Pattern matching allows Session-aware Adaptive Packet Filtering (SAPF) to identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and separate control traffic from user data traffic.

Pattern matching is also helpful in enforcing IT policies, such as identifying hosts using unsupported operating systems or dropping unsupported traffic. For example, the Windows OS version can be identified and filtered based on the user-agent field in the HTTP header. The user-agent field may appear at variable offsets, so a regular expression search is used to identify the specified value wherever it occurs in the packet.

CLI Configuration

Use the pattern-match pattern keyword to enable the pattern-matching service action. Specify the pattern to match for packets to submit to the packet slicing operation.

The following example matches traffic with the string Windows NT 5.(0-1) anywhere in the packet and delivers the packets to the delivery interface TOOL-PORT-TO-WIRESHARK-1. This service is optional and is applied to TCP traffic to destination port 80.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
! managed-service
managed-service MS-PATTERN-MATCH
description 'regular expression filtering'
1 action pattern-match 'Windows\\sNT\\s5\\.[0-1]'
service-interface switch CORE-SWITCH-1 ethernet13/1
! policy
policy PATTERN-MATCH
action forward
delivery-interface TOOL-PORT-TO-WIRESHARK-1
description 'match regular expression pattern'
filter-interface TAP-INTF-FROM-PRODUCTION
priority 100
use-managed-service MS-PATTERN-MATCH sequence 1 optional
1 action match tcp dst-port 80

Pattern-drop Action

The pattern-drop service action drops matching traffic.

Pattern matching allows content-based filtering beyond Layer-2, Layer-3, or Layer-4 Headers. This functionality allows filtering on the following packet fields and values:
  • URLs and user agents in the HTTP header
  • patterns in BitTorrent packets
  • encapsulation headers for specific parameters, including GTP, VXLAN, and VN-Tag
  • subscriber device IP (user-endpoint IP)

Pattern matching allows Session-aware Adaptive Packet Filtering (SAPF) to identify HTTPS transactions on non-standard SSL ports. It can filter custom applications and separate control traffic from user data traffic.

Pattern matching is also helpful in enforcing IT policies, such as identifying hosts using unsupported operating systems or dropping unsupported traffic. For example, the Windows OS version can be identified and filtered based on the user-agent field in the HTTP header. The user-agent field may appear at variable offsets, so a regular expression search is used to identify the specified value wherever it occurs in the packet.

CLI Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Controller-1(config)# show running-config managed-service MS-PACKET-MASK
! managed-service
managed-service MS-PACKET-MASK
description "This service drops traffic that has an email address in its payload"
1 action pattern-drop ([a-zA-Z0-9._-]+@[a-zA-Z0-9._-]+.[a-zA-Z0-9_-]+)
service-interface switch CORE-SWITCH-1 ethernet13/1

Slice Action

The slice service action slices the given number of packets based on the specified starting point in the packet. Packet slicing reduces packet size to increase processing and monitoring throughput. Passive monitoring tools process fewer bits while maintaining each packet's vital, relevant portions. Packet slicing can significantly increase the capacity of forensic recording tools. Apply packet slicing by specifying the number of bytes to forward based on an offset from the following locations in the packet:
  • Packet start
  • L3 header start
  • L4 header start
  • L4 payload start
Note: The slicing service can currently only parse TCP/UDP/ICMP/ICMP6/GRE/SCTP/ESP protocols.

CLI Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Use the slice keyword to enable the packet slicing service action and insert an additional header containing the original header length, as shown in the following example:
! managed-service
managed-service my-service-name
1 action slice l3-header-start 20 insert-original-packet-length
service-interface switch DMF-CORE-SWITCH-1 ethernet20/1
The following example truncates the packet from the first byte of the Layer-4 payload, preserving just the original Ethernet header. The service is optional and is applied to all TCP traffic from port 80 with the destination IP address 10.2.19.119
! managed-service
managed-service MS-SLICE-1
description 'slicing service'
1 action slice l4-payload-start 1
service-interface switch DMF-CORE-SWITCH-1 ethernet40/1
! policy
policy slicing-policy
action forward
delivery-interface TOOL-PORT-TO-WIRESHARK-1
description 'remove payload'
filter-interface TAP-INTF-FROM-PRODUCTION
priority 100
use-managed-service MS-SLICE-1 sequence 1 optional
1 action match tcp dst-ip 10.2.19.119 255.255.255.255 src-port 80

Timestamp Action

The Timestamp Service Action identifies and timestamps every packet it receives with the time the service node receives the packet for matching traffic.

CLI Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
! managed-service
managed-service MS-TIMESTAMP-1
1 action timestamp
service-interface switch CORE-SWITCH-1 ethernet15/3

UDP-Replication Action

The UDP-replication service action copies UDP messages, such as Syslog or NetFlow messages, and sends the copied packets to a new destination IP address.

Configure a rate limit when enabling UDP replication. When upgrading from a version of DANZ Monitoring Fabric (DMF) before release 6.3.1, the UDP-replication configuration is not applied until a rate limit is applied to the delivery interface.

The following example illustrates applying a rate limit to a delivery interface used for UDP replication:
CONTROLLER-1(config)# switch DMF-DELIVERY-SWITCH-1
CONTROLLER-1(config-switch)# interface ethernet1
CONTROLLER-1(config-switch-if)# role delivery interface-name udp-delivery-1
CONTROLLER-1(config-switch-if)# rate-limit 256000
Note: No other service action can be applied after a UDP-replication service action.

CLI Configuration

Enter the 1 udp-replicate command and identify the configuration name (the submode changes to the config-managed-srv-udp-replicate submode) to view and configure a specific UDP-replication configuration.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
controller-1(config)# managed-service MS-UDP-REPLICATE-1
controller-1(config-managed-srv)# 1 action udp-replicate DELIVERY-INTF-TO-COLLECTOR
controller-1(config-managed-srv-udp-replicate)#
From this submode, define the destination address of the packets to copy and the destination address for sending the copied packets.
controller-1(config-managed-srv-udp-replicate)# in-dst-ip 10.1.1.1
controller-1(config-managed-srv-udp-replicate)# out-dst-ip 10.1.2.1

Sample Service

The Service Node forwards packets based on the max-tokens and tokens-per-refresh parameters using the DANZ Monitoring Fabric (DMF) Sample Service feature. The sample service uses one token to forward one packet.

After consuming all the initial tokens from the max-tokens bucket, the system drops subsequent packets until the max-tokens bucket refills using the tokens-per-refresh counter at a recurring predefined time interval of 10ms. Packet sizes do not affect this service.

Arista Networks recommends keeping the tokens-per-refresh value at or below max-tokens. For example, max-tokens = 1000 and tokens-per-refresh = 500.

Setting the max-tokens value to 1000 means that the initial number of tokens is 1000, and the maximum number of tokens stored at any time is 1000.

The max-tokens bucket will be zero when the Service Node has forwarded 1000 packets before the first 10 ms period ends, leading to a situation where the Service Node is no longer forwarding packets. After every 10ms time interval, if the tokens-per-refresh value is set to 500, the max-tokens bucket is refilled using the tokens-per-refresh configured value, 500 tokens in this case, to pass packets the service tries to use immediately.

Suppose the traffic rate is higher than the refresh amount added. In that case, available tokens will eventually drop back to 0, and every 10ms, only 500 packets will be forwarded, with subsequent packets being dropped.

If the traffic rate is lower than the refresh amount added, a surplus of tokens will result in all packets passing. Since the system only consumes some of the tokens before the next refresh interval, available tokens will accumulate until they reach the max-tokens value of 1000. After 1000, the system does not store any surplus tokens above the max-tokens value.

To estimate the maximum possible packets passed per second (pps), use the calculation (1000ms/10ms) * tokens-per-refresh and assume the max-tokens value is larger than tokens-per-refresh. For example, if the tokens-per-refresh value is 5000, then 500000 pps are passed.

The Sample Service feature can be used as a standalone Managed Service or chained with other Managed Services.

Use Cases and Compatibility

  • Applies to Service Nodes
  • Limit traffic to tools that cannot handle a large amount of traffic.
  • Use the Sample Service before another managed service to decrease the load on that service.
  • The Sample Service is applicable when needing only a portion of the total packets without specifically choosing which packets to forward.

Sample Service Configuration

  1. Create a managed service and enter the service interface.
  2. Choose the sample managed service with the seq num sample command.
    1. There are two required configuration values: max-tokens and tokens-per-refresh. There are no default values, and the service requires both values.
    2. The max-tokens value is the maximum size of tokens in the token bucket. The service will start with the number of tokens specified when first configured. Each packet passed consumes one token. If no tokens remain, packet forwarding stops. Configure the max-tokens value from a range of 1 to the maximum uint64 (unsigned integer) value of 9,223,372,036,854,775,807.
    3. DMF refreshes the token bucket every 10 ms. The tokens-per-refresh value is the number of tokens added to the token bucket on each refresh. Each packet passed consumes one token, and when the number of tokens drops to zero, the system drops all subsequent packets until the next refresh. The number of tokens in the bucket cannot exceed the value of max-tokens. Configure the tokens-per-refresh value from a range of 1 to the maximum uint64 (unsigned integer) value of 9,223,372,036,854,775,807.
    The following example illustrates a typical Sample Service configuration:
    Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
    dmf-controller-1(config-managed-srv-sample)# show this
    ! managed-service
    managed-service MS
    !
    3 action sample
    max-tokens 50000
    tokens-per-refresh 20000
  3. Add the managed service to the policy.

Show Commands

Use the show running-config managed-service sample_service_name command to view pertinent details. In this example, the sample_service_name is techpubs.

DMF-SCALE-R450> show running-config managed-service techpubs

! managed-service
managed-service techpubs
  !
  1 action sample
    max-tokens 1000
    tokens-per-refresh 500
DMF-SCALE-R450>

Troubleshooting Sample Service

Troubleshooting

  • If the number of packets forwarded by the Service Node interfaces is few, the max-tokens and tokens-per-refresh values likely need to be higher.
  • If fewer packets than the tokens-per-refresh value forward, ensure the max-tokens value is larger than the tokens-per-refresh value. The system discards any surplus refresh tokens above the max-tokens value.
  • When all traffic forwards, the initial max-tokens value is too large, or the tokens refreshed by tokens-per-refresh are higher than the packet rate.
  • When experiencing packet drops after the first 10ms post commencement of traffic, it may be due to a low tokens-per-refresh value. For example, calculate the minimum value of max-tokens and tokens-per-refresh that would lead to forwarding all packets.

Calculation Example

Traffic Rate : 400 Mbps
Packet Size - 64 bytes
400 Mbps = 400000000 bps
400000000 bps = 50000000 Bps
50000000 Bps = 595238 pps (Includes 20 bytes of inter packet gap in addition to the 64 bytes)
1000 ms = 595238 pps
1 ms = 595.238 pps
10 ms = 5952 pps
max-tokens : 5952 (the minimum value)
tokens-per-refresh : 5952 ( the minimum value)

Limitations

  • In the current implementation, the Service Sample action is bursty. The token consumption rate is not configured to withhold tokens over time, so a large burst of incoming packets can immediately consume all the tokens in the bucket. There is currently no way to select what traffic is forwarded or dropped; it only depends on when the packets arrive concerning the refresh interval.
  • Setting the max-tokens and tokens-per-refresh values too high will forward all packets. The maximum value is 9,223,372,036,854,775,807, but Arista Networks recommends staying within the maximum values stated under the description section.

Sharing L3 Delivery Interfaces Across Services

Overview

A DMF Controller will allow multiple managed services to share a delivery interface with an IP address, commonly called an L3 delivery interface. These interfaces redirect the packets processed by managed services to the required tool nodes for further analysis. Sharing an L3 delivery interface is useful when applying different actions to a packet that otherwise cannot be chained together in one managed service when sending it to the same destination.

Currently, only a few managed service actions require L3 delivery interfaces. Since these actions must be the terminating action in a given service action chain, DMF allows different services to use the same L3 delivery interface.

This feature applies to all platforms that support managed services with L3 delivery interfaces and the following managed service actions using L3 deliveries:

  • Netflow
  • IPFIX
  • UDP Replicate
  • TCP Analysis
  • App ID
  • Flow Diff
Note: DMF 8.8 supports multiple L3 delivery interfaces on the same subnet and gateway. Refer to the show running-config command example in the Show Commands section.

Configuration

Log into the DMF Controller, select a switch, and create an L3 delivery interface.

dmf-controller-1> enable
dmf-controller-1# configure
dmf-controller-1(config)# switch switch1
dmf-controller-1(config-switch)# interface ethernet31
dmf-controller-1(config-switch-if)# role delivery interface-name l3-d1 ip-address 0.0.0.1 nexthop-ip 0.0.0.1 255.255.255.0 nexthop-arp-interval 5
dmf-controller-1(config-switch-if)# rate-limit 1000
Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Create two or more managed services with the actions described previously as the last entry in the sequence. Use the l3-d1 interface created earlier as the l3-delivery-interface for these services. The configuration commands needed may be different for each action. For example, using a managed service with netflow action and another with the udp-replicate action as shown in the following command sequences:

dmf-controller-1> enable
dmf-controller-1# configure
dmf-controller-1(config)# managed-service ms1
dmf-controller-1(config-managed-srv)# service-interface switch switch1 ethernet1
dmf-controller-1(config-managed-srv)# 1 action netflow
dmf-controller-1(config-managed-srv-netflow)# collector 0.0.0.2 udp-port 2055 mtu 1500
dmf-controller-1(config-managed-srv-netflow)# l3-delivery-interface l3-d1

Show Commands

Use the show running-config switch switch1 interface l3 interface command to view the configured L3 interface:

dmf-controller-1> show running-config switch switch1 interface ethernet31

! switch
switch switch1
  !
  interface ethernet31
    force-link-up
    rate-limit 1000
    role delivery interface-name l3-d1 ip-address 0.0.0.1 nexthop-ip 0.0.0.2 255.255.255.0 nexthop-arp-interval 5
Use the show running-config command to view L3 interfaces using the same gateway:
dmf-controller-1>(config-switch-if)# show running-config switch                    
! switch
switch core1
mac 52:54:00:b7:c5:c4
admin hashed-password $6$92Yy8I4C$dWgXuHgY3qD9PNmvFHQoCQ0VlLhTR43Hr5jEAoO7nA.6di3NoIgmegdGAQe3bJ4h55KQ6yDGzFIXgQER0yxuQ1
!
interface ethernet10
role delivery interface-name TOOL1 ip-address 192.168.0.10 nexthop-ip 192.168.0.100 255.255.255.0
!
interface ethernet11
role delivery interface-name TOOL2 ip-address 192.168.0.11 nexthop-ip 192.168.0.100 255.255.255.0
!
interface ethernet20
role delivery interface-name TOOL3 ip-address 192.168.0.20 nexthop-ip 192.168.0.100 255.255.255.0

Use the show running-config managed-service command to view the managed service running config:

dmf-controller-1> show running-config managed-service

! managed-service
managed-service ms1
  service-interface switch switch1 ethernet1
  !
  1 action netflow
    collector 0.0.0.2 udp-port 2055 mtu 1500
    l3-delivery-interface l3-d1

managed-service ms2
  service-interface switch switch1 ethernet2
  !
  1 action udp-replicate l3-d1
    in-dst-ip 1.1.1.1
    out-dst-ip 2.2.2.2
    Out-dst-ip 1.1.1.1

Use the show switch switch1 interface l3 interface command to view the runtime status of the interface:

dmf-controller-1> show switch switch1 interface ethernet31
# IF Name    MAC Address                Config State Adv. Features Curr Features Supported Features
-|----------|--------------------------|------|-----|-------------|-------------|------------------|
1 ethernet31 5c:16:c7:14:46:bb (Arista) up     up    10g           10g           10g

Use the show managed-service command to view the runtime status of the managed services:

dmf-controller-1> show managed-service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Managed-service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Name Switch Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW
-|------------|------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 ms1          switch1  ethernet2        True      10Gbps              10Gbps             1.02Kbps              99bps
2 ms2          switch1  ethernet1        True      10Gbps              10Gbps             1.02Kbps              99bps

Redundancy of Managed Services Using Two DMF Policies

In this method, users can employ a second policy with a second managed service to provide redundancy. The idea here is to duplicate the policies but assign a lower policy priority to the second DANZ Monitoring Fabric (DMF) policy. In this case, the backup policy (and, by extension, the backup service) will always be active but only receive relevant traffic once the primary policy goes down. This method provides true redundancy at the policy, service-node, and core switch levels but uses additional network and node resources.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Example
! managed-service
managed-service MS-SLICE-1
1 action slice l3-header-start 20
service-interface switch CORE-SWITCH-1 lag1
!
managed-service MS-SLICE-2
1 action slice l3-header-start 20
service-interface switch CORE-SWITCH-1 lag2
! policy
policy ACTIVE-POLICY
priority 101
action forward
delivery-interface TOOL-PORT-1
filter-interface TAP-PORT-1
use-managed-service MS-SLICE-1 sequence 1
1 match ip
!
policy BACKUP-POLICY
priority 100
action forward
delivery-interface TOOL-PORT-1
filter-interface TAP-PORT-1
use-managed-service MS-SLICE-2 sequence 1
1 match ip

Cloud Services Filtering

The DANZ Monitoring Fabric (DMF) supports traffic filtering to specific services hosted in the public cloud and redirecting filtered traffic to customer tools. DMF achieves this functionality by reading the source and destination IP addresses of specific flows, identifying the Autonomous System number they belong to, tagging the flows with their respective AS numbers, and redirecting them to customer tools for consumption.

The following is the list of services supported:

  • amazon: traffic with src/dst IP belonging to Amazon
  • ebay: traffic with src/dst IP belonging to eBay
  • facebook: traffic with src/dst IP belonging to Facebook
  • google: traffic with src/dst IP belonging to Google
  • microsoft: traffic with src/dst IP belonging to Microsoft
  • netflix: traffic with src/dst IP belonging to Netflix
  • office365: traffic for Microsoft Office365
  • sharepoint: traffic for Microsoft Sharepoint
  • skype: traffic for Microsoft Skype
  • twitter: traffic with src/dst IP belonging to Twitter
  • default: traffic not matching other rules in this service. Supported types are match or drop.

The option drop instructs the DMF Service Node to drop packets matching the configured application.

The option match instructs the DMF Service Node to deliver packets to the delivery interfaces connected to the customer tool.

A default drop action is auto-applied as the last rule, except when configuring the last rule as match default. It instructs the DMF Service Node to drop packets when either of the following conditions occurs:
  • The stream's source IP address or destination IP address doesn't belong to any AS number.
  • The stream's source IP address or destination IP address is affiliated with an AS number but has no specific action set.

Cloud Services Filtering Configuration

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Managed Service Configuration
Controller(config)# managed-service name
Controller(config-managed-srv)#
Service Action Configuration
Controller(config-managed-srv)# 1 action app-filter
Controller(config-managed-srv-appfilter)#
Filter Rules Configuration
Controller(config-managed-srv-appfilter)# 1 drop sharepoint
Controller(config-managed-srv-appfilter)# 2 match google
Controller(config-managed-srv-appfilter)# show this
! managed-service
managed-service sf3
service-interface switch CORE-SWITCH-1 ethernet13/1
!
1 service-app-filter
1 drop sharepoint
2 match google
A policy having a managed service with app-filter as the managed service, but with no matches specified will fail to install. The example below shows a policy incomplete-policy having failed due to the absence of a Match/Drop rule in the managed service incomplete-managed-service.
Controller(config)# show running-config managed-service incomplete-managed-service
! managed-service
managed-service incomplete-managed-service
1 action app-filter
Controller(config)# show running-config policy R730-sf3
! policy
policy incomplete-policy
action forward
delivery-interface TOOL-PORT-1
filter-interface TAP-PORT-1
use-managed-service incomplete-managed-service sequence 1
1 match any
Controller(config-managed-srv-appfilter)# show policy incomplete-policy
Policy Name : incomplete-policy
Config Status : active - forward
Runtime Status : one or more required service down
Detailed Status : one or more required service down - installed to
forward
Priority : 100
Overlap Priority : 0

TCP Analysis (Dapper)

The Dapper action (derived from Brown University research) identifies TCP session issues by measuring specific connection attributes. This analysis determines whether performance degradation stems from the client, server, or network devices. All current Service Node platforms support the Dapper action.

Figure 188. Dapper Action

The action monitors TCP session packets, tracks extensive statistics, and periodically exports them via IPFIX records to a collector. For every session direction, the system generates:

  • One Start-Session record.
  • One or more Data records.
  • One End-Session record.

The collector evaluates these statistics, utilizing six distinct IPFIX templates to diagnose the root cause of network problems.

Start-Session Record

The system transmits the Start-Session record for each direction immediately after session establishment (upon Client ACK). This record captures the initial attributes negotiated during the handshake.

Table 11. Template 6668, IPv4 Start-Session
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 start_milliseconds dateTimeMilliseconds Session start time in milliseconds since epoch
6 218 tcp_syn_total_count unsigned64 Number of TCP packets with SYN flag sent (0 if we did not see initiation)
7 32774 window_size unsigned32 Initial window size in octets
8 32771 expected_flight_size unsigned32 Expected flight size in octets
9 32822 switch_mac macAddress Ethernet address of filter switch
10 32823 switch_port unsigned16 Port on filter switch
11 6 tcp_control_bits unsigned16 TCP flags set during initiation (SYN, SYN | ACK, unset if we did not see initiation)
Table 12. Template 6669, IPv6 Start-Session
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv6Address IPv6 source address
1 28 ipv6_dst ipv6Address IPv6 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 start_milliseconds dateTimeMilliseconds Session start time in milliseconds since epoch
6 218 tcp_syn_total_count unsigned64 Number of TCP packets with SYN flag sent (0 if we did not see initiation)
7 32774 window_size unsigned32 Initial window size in octets
8 32771 expected_flight_size unsigned32 Expected flight size in octets
9 32822 switch_mac macAddress Ethernet address of filter switch
10 32823 switch_port unsigned16 Port on filter switch
11 6 tcp_control_bits unsigned16 TCP flags set during initiation (SYN, SYN | ACK, unset if we did not see initiation)

Data Record

The system transmits Data records for each session direction at periodic intervals. It analyzes packet streams up to a configured limit to match data/acknowledgment pairs, recording delay and size metrics. Most statistics reflect averages derived from the sample period.

Note: The system reports fields marked with an asterisk (*) only when the dapper compatibility setting is false.
Table 13. Template 6666, IPv4 Data
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 32768 report_timer unsigned32 The number of samples in round-trip-time calculations (matching sync/ack pairs)
6 32828 reaction_time unsigned32 Average time between receiving an ACK and the next data packet
7 32770 flight_size unsigned32 Average flight size over samples in octets
8 32771 expected_flight_size unsigned32 Average expected flight size in octets
9 32829 round_trip_time unsigned32 Average round-trip-time between sync and matching ack in microseconds
10 32773 retransmissions unsigned32 Counter of retransmitted packets received during sample period
11 32774 window_size unsigned32 Average window size reported during sample period in octets
12 32775 ecn unsigned32 Counter of how many packets had ECN flag set during sample period
13* 2 packet_delta unsigned32 Number of packets received during sample period
14* 1 octet_delta unsigned64 Number of bytes received during sample period
15* 32830 first_rtt unsigned32 First round trip time in period in microseconds
16* 32831 min_rtt unsigned32 Minimum round trip time during period in microseconds
17* 32832 max_rtt unsigned32 Maximum round time trip during period in microseconds
17* 32833 rtt_standard_deviation unsigned32 The standard deviation of round trip time measurements during period
18* 32834 recovery_time unsigned32 Average time between an initial data packet and a retransmission
Table 14. Template 6667, IPv6 Data
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv4Address IPv4 source address
1 28 ipv6_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 32768 report_timer unsigned32 The number of samples in round-trip-time calculations (matching sync/ack pairs)
6 32828 reaction_time unsigned32 Average time between receiving an ACK and the next data packet
7 32770 flight_size unsigned32 Average flight size over samples in octets
8 32771 expected_flight_size unsigned32 Average expected flight size in octets
9 32829 round_trip_time unsigned32 Average round-trip-time between sync and matching ack in microseconds
10 32773 retransmissions unsigned32 Counter of retransmitted packets received during sample period
11 32774 window_size unsigned32 Average window size reported during sample period in octets
12 32775 ecn unsigned32 Counter of how many packets had ECN flag set during sample period
13* 2 packet_delta unsigned32 Number of packets received during sample period
14* 1 octet_delta unsigned64 Number of bytes received during sample period
15* 32830 first_rtt unsigned32 First round trip time in period in microseconds
16* 32831 min_rtt unsigned32 Minimum round trip time during period in microseconds
17* 32832 max_rtt unsigned32 Maximum round time trip during period in microseconds
17* 32833 rtt_standard_deviation unsigned32 The standard deviation of round trip time measurements during period
18* 32834 recovery_time unsigned32 Average time between an initial data packet and a retransmission

End-Session Record

Upon session completion (via FIN, RST, or inactivity timeout), the system transmits an End-Session record for each direction containing the termination reason. If statistics remain pending at the end of the session, the system generates a final Data record before the End-Session record

Table 15. Template 6670, IPv4 end-session:
Offset ID Dapper Field Type Description
0 8 ipv4_src ipv4Address IPv4 source address
1 12 ipv4_dst ipv4Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 end_milliseconds dateTimeMilliseconds Session end time in milliseconds since epoch
6 32822 switch_mac macAddress Ethernet address of filter switch
7 32823 switch_port unsigned16 Port on filter switch
8 6 tcp_control_bits unsigned16 TCP flags set during termination (FIN, RST, unset if session was timed out)
Table 16. Template 6671, IPv6 end-session
Offset ID Dapper Field Type Description
0 27 ipv6_src ipv6Address IPv4 source address
1 28 ipv6_dst ipv6Address IPv4 destination address
2 7 tcp_src unsigned16 TCP source address
3 11 tcp_dst unsigned16 TCP destination address
4 239 biflow_direction unsigned8 Direction of session (0=unknown, 1=initiator, 2=reverseInitiator)
5 152 end_milliseconds dateTimeMilliseconds Session end time in milliseconds since epoch
6 32822 switch_mac macAddress Ethernet address of filter switch
7 32823 switch_port unsigned16 Port on filter switch
8 6 tcp_control_bits unsigned16 TCP flags set during termination (FIN, RST, unset if session was timed out)

 

TCP Analysis CLI Configuration

Configure the TCP Analysis feature via the Controller using the managed services framework.

Configuration Steps for TCP Analysis

  1. Define Managed Service: Create a managed service and enter the service interface configuration mode.
  2. Select Action: Enable the TCP analysis function using the command seq num tcp-analysis. This command enters the tcp-analysis submode.
  3. Configure Collector (Required): Define the IPFIX collector destination.
    1. Enter the command: collector ip-address
    2. The UDP port defaults to 4739 and the MTU to 1500, if not specified.
  4. Configure Delivery Interface (Required): Specify the logical interface for exporting records.
    1. Enter the command: l3-delivery-interface delivery interface name
  5. Configure Sampling (Optional): Set the maximum packet processing limit between data reports.
    1. Enter the command: max-samples-per-report value
    2. Default: 128 packets.
  6. Configure Reporting Scope (Optional): Restrict statistics to the original Dapper research set.
    1. Enter the command: include-dapper-elements
    2. Behavior: Enabling this command limits the output to standard Dapper statistics. Omitting it enables the Service Node to report additional extended statistics.
  7. Apply Policy: Associate the managed service with a policy.
    1. The policy itself does not require a physical delivery interface.

 

The following example configures a TCP Analysis action to export IPFIX records to a DMF Analytics Node (Collector IP 192.168.1.1) via the tcp-analysis-to-analytics interface.

managed-service MS
service-interface switch CORE-SWITCH-1 ethernet2
!
1 action tcp-analysis
collector 192.168.1.1
l3-delivery-interface tcp-analysis-to-analytics            

Switch Configuration

The tcp-analysis action requires the presence of tap points within the fabric.

Important: Configure tap points to deliver exactly one copy of every packet for each TCP session to the action. If utilizing multiple tap points, restrict the configuration to capture in a single direction to prevent packet duplication.

 

TCP Analysis Show Commands

The following show commands provide helpful information.

Use the show running-config managed-service managed service command to verify the completeness of the tcp-analysis configuration.

dmf-controller-1(config)# show running-config managed-service ms1 
! managed-service
managed-service ms1
  service-interface switch DCS-7050CX3-32S ethernet2/4
  !
  1 action tcp-analysis
    collector 192.168.1.1
    l3-delivery-interface AN-Data

Use the show managed-services managed service command to display operational status and information for the specified service.

dmf-controller-1(config)# show managed-services tcp-analysis
# Service Name Switch          Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW 
-|------------|---------------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 tcp-analysis          DCS-7050CX3-32S ethernet2/4      True      25Gbps              25Gbps             624Kbps               432Mbps

Use the show running-config policy policy command to verify that the tcp-analysis service is correctly associated with the specified policy.

dmf-controller-1(config)# show running-config policy p1 
! policy
policy p1
  action forward
  filter-interface ingress
  use-managed-service ms1 sequence 1
  1 match any

Use the show policy policy command to display detailed policy information and identify errors related to the tcp-analysis service.

The Service Interfaces column provides the following traffic statistics:

  • Tx: Packets transmitted to the Service Node for analysis.
  • Rx: IPFIX packets received from the Service Node.
dmf-controller-1 (config)# show policy tcp-analysis-1
Policy Name                            : tcp-analysis-1
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 1
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 4
# of services                          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN                              : 2
Post Match Filter Traffic              : 215Mbps
Total Delivery Rate                    : -
Total Pre Service Rate                 : 217Mbps
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : none
Runtime Service Names                  : tcp-analysis
Installed Time                         : 2023-11-16 18:15:27 PST
Installed Duration                     : 19 minutes, 45 secs
~ Match Rules ~
# Rule        
-|-----------|
1 1 match any
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch   IF Name    State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|------|--------|----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 BP1    7280SR3E Ethernet25 up    rx  24319476 27484991953 23313    215Mbps  2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF  Switch    IF Name    State Dir Packets Bytes  Pkt Rate Bit Rate Counter Reset Time             
-|-------|---------|----------|-----|---|-------|------|--------|--------|------------------------------|
1 AN-Data 7050SX3-1 ethernet41 up    tx  81      117222 0        -        2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name Role         Switch          IF Name     State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|------------|------------|---------------|-----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 tcp-analysis      pre-service  DCS-7050CX3-32S ethernet2/4 up    tx  23950846 27175761734 23418    217Mbps  2023-11-16 18:18:18.837000 PST
2 tcp-analysis      post-service DCS-7050CX3-32S ethernet2/4 up    rx  81       117546      0        -        2023-11-16 18:18:18.837000 PST
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Core Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Switch          IF Name    State Dir Packets  Bytes       Pkt Rate Bit Rate Counter Reset Time             
-|---------------|----------|-----|---|--------|-----------|--------|--------|------------------------------|
1 7050SX3-1       ethernet7  up    rx  23950773 27175675524 23415    217Mbps  2023-11-16 18:18:18.837000 PST
2 7050SX3-1       ethernet56 up    rx  81       117222      0        -        2023-11-16 18:18:18.837000 PST
3 7050SX3-1       ethernet56 up    tx  23950773 27175675524 23415    217Mbps  2023-11-16 18:18:18.837000 PST
4 7280SR3E        Ethernet7  up    tx  24319476 27484991953 23313    215Mbps  2023-11-16 18:18:18.837000 PST
5 DCS-7050CX3-32S ethernet28 up    tx  81       117546      0        -        2023-11-16 18:18:18.837000 PST
6 DCS-7050CX3-32S ethernet28 up    rx  23950846 27175761734 23418    217Mbps  2023-11-16 18:18:18.837000 PST
~ Failed Path(s) ~
None.

 

Packet Recording via the Service Node

This release adds a new managed service action, called Record, to the Service Node (SN). This action enables packet recording using an SN similar to a Recorder Node (RN) and supports basic packet recording and querying capabilities.

The SN accumulates packets, writes packet data to local storage disks, and indexes information based on configured fields. Various query types retrieve recorded packets, analyze traffic patterns, and investigate network issues.

The Controller includes the managed service action record to enable packet recording on an SN.

Core Recording Functionality
  • Capture and store packets to local disks.
  • Index configurable packet fields.
  • Query recorded packets.
  • Perform traffic analysis queries (HTTP, TCP flow health, conversations).
  • Monitor storage and query health.

Platform Compatibility

The DCA-DM-SNR660 SKU exclusively supports the record action, as this hardware includes the dedicated storage disks required for packet capture. Consequently, this feature is available on switchless physical units but remains unsupported on virtual SNs.

Table 17. Support Matrix
Deployment Type Support Status - Record Feature
Physical SN (Switchless) Supported
Virtual SN Not Supported
Important: Ensure the hardware is a physical SNR660 model; virtual instances lack the disk architecture to handle recording tasks.

Using the CLI to Configure Packet Recording

Managed Service and Policy Configuration

Configure packet recording through the Controller as an SN action in managed services. The managed service action record applies only to SNs that support recording. The action requires no additional configuration values. Use the show service-node SN-NAME property command to verify the recording capability of an SN.

The record action must occupy the last position in a managed service sequence. While multiple services can include a record action, configure only one record action per SN to prevent system performance impact.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
dmf-controller-1(config)# managed-service ms1
dmf-controller-1(config-managed-srv)# service-interface switch sw1 ethernet1
dmf-controller-1(config-managed-srv)# action 1 record

Policy configuration with a record managed service requires adherence to these constraints:

  • Traffic terminates at the SN; therefore, do not configure a delivery interface—policies with both a delivery interface and a record service fail.

  • Policies must exclude all other managed services. The system throws a validation exception if other services exist.

  • The record managed service must remain non-optional.

  • Multiple policies can share the record managed service.

Indexing

The indexing config mode defines the packet header fields that an SN indexes for recorded traffic. Indexed fields allow specific criteria for filtering packets during queries. For example, indexing the IP protocol enables queries for all TCP packets recorded within a specific time range. Indexing facilitates faster queries based on packet attributes.

The available indexing fields are the following:

  • mac-src: Index the source MAC of recorded frames

  • mac-dst: Index the destination MAC of recorded frames

  • ipv4-src: Index IPv4 source address

  • ipv4-dst: Index IPv4 destination address

  • ipv6-src: Index IPv6 source address

  • ipv6-dst: Index IPv6 destination address

  • ip-proto: Index IP protocol

  • port-src: Index source port

  • port-dst: Index destination port

  • vlan-1: Index outer VLAN ID

  • vlan-2: Index inner/middle VLAN ID

  • vlan-3: Index innermost VLAN ID

  • mpls: Index MPLS label

  • community-id: Index the community ID

  • mw-device-id: Index MetaWatch device ID if MetaWatch trailer is present

  • mw-port-id: Index MetaWatch port ID if MetaWatch trailer is present

By default, the system enables the following fields: vlan-1, ipv4-src, ipv4-dst, ipv6-src, ipv6-dst, ip-proto, port-src, port-dst.

Note: While the indexing configuration applies to all SNs, only SNs that support recording use these settings. Configuring indexing on an SN without recording support results in no functional impact.

Enter the following commands to configure indexing:

dmf-controller-1(config)# service-node sn1
dmf-controller-1(config-service-node)# recording
dmf-controller-1(config-service-node-recording)# indexing
dmf-controller-1(config-service-node-recording-indexing)# field-name

Disable indexing for a specific field using the no prefix.

dmf-controller-1(config-service-node-recording-indexing)# no field-name
Global Query Settings

Global query settings apply fabric-wide to all recording devices.

Max Result Size

Set the maximum size of query results using the max-result-size parameter. This parameter specifies the maximum query result size in bytes. A value of zero indicates "unlimited," allowing the result to occupy all available storage space for query results. The default value is 268435456 bytes (256 MB).

dmf-controller-1(config)# recorder-node query max-result-size 268435456
sFlow Configuration

The following command enables sFlow®* for the recorder across the fabric:

dmf-controller-1(config)# recorder-node sflow
RBAC Permissions (Optional)

Role-Based Access Control (RBAC) permissions enable group access for running export and analysis queries on a specific SN. The following commands grant these permissions to a group other than ADMIN or SYSTEM:

dmf-controller-1(config)# group group-name
dmf-controller-1(config-group)# entity entity-name
dmf-controller-1(config-group-entity)# associate recorder-node sn1
dmf-controller-1(config-group-entity)# permissions export
dmf-controller-1(config-group-entity)# permissions use
Show Commands

Use the show service-node [all | name] property command to determine which SNs support recording. Verify this support before configuring managed services. Configuring a managed service with a record action on an unsupported SN generates a fabric warning and causes the policy to fail for that service.

dmf-controller-1> show service-node sn1 property
Service Node : sn1
Dzgre        : unsupported
Recording    : supported

Use the show service-node name table contents record command to verify that the SN successfully programs the record gentable. The SN will not record packets if the record gentable is missing.

dmf-controller-1> show service-node sn1 table contents record
~~~~~~~~~~~~~~~~~~~~ Records  ~~~~~~~~~~~~~~~~~~~~
Device name          Record Entry key Entry value
--------------------|------|---------|-----------|
sn1                    0      Port(1)
Managed Service

The show service-node name interface stats command provides details about service interface health by displaying drops or errors. These drops and errors occur before packets reach the recording service.

dmf-controller-1# c1(config)# show service-node sn1 interface stats
Service node Name Rx Pkts Rx Bytes Rx Drop Rx Errors Tx Pkts Tx Bytes Tx Drop Tx Errors
------------|----|-------|--------|-------|---------|-------|--------|-------|---------|
sn1          sni1 78      16242    0       0         565     66285    0       0
sn1          sni2 79      16316    0       0         565     66051    0       0

For action-specific statistics, the show managed-service-device sn-name stats command displays rx, tx, and applied packet/byte counters for the service using recording. For the record action, applied counters describe packets written to disk. A discrepancy between the rx and applied counters indicates a potential issue with disk IO, such as packets failing to write to disk.

Note: Since record is a terminating action, tx counters are expected to be 0.
dmf-controller-1> show managed-service-device sn1 stats 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Stats ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Interface Name Service Name  Action Load Rx packets Rx bytes    Rx Bit Rate Applied packets Applied bytes Applied Bit Rate Tx packets Tx bytes Tx Bit Rate 
-|--------------|-------------|------|----|----------|-----------|-----------|---------------|-------------|----------------|----------|--------|-----------|
1 sni1           ms1           record low  46021696   11782283982 102Kbps     46021696        11782283982   102Kbps          0          0        -

The show policy policy command provides detailed information about a policy and identifies any errors related to the record service. The Service Interfaces section displays packets transmitted to the SN and IPFIX packets received from the SN. These stats appear under the pre-service role; packets do not egress from the SN post-service.

Note: Policies using the recording service do not display a delivery interface.
dmf-controller-1> show policy policy1
Policy Name                            : policy1
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - Installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 0
# of switches with service interfaces  : 1
# of filter interfaces                 : 1
# of delivery interfaces               : 0
# of core interfaces                   : 0
# of services                          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN                              : 2
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : none
Runtime Service Names                  : ms1
Installed Time                         : 2025-10-29 17:20:38 UTC
Installed Duration                     : 11 hours, 8 minutes
Timestamping enabled                   : False
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s)  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch                      IF Name      State Dir Packets Bytes    Pkt Rate Bit Rate Counter Reset Time
-|------|---------------------------|------------|-----|---|-------|--------|--------|--------|------------------------------|
1 F1     dmf-r267-tb2-7280dr3am-54-1 Ethernet25/1 up    rx  60000   30720000 0        -        2025-10-29 15:55:36.435000 UTC

~ Delivery Interface(s) ~
None.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name Role         Switch                      IF Name     State Dir Packets Bytes    Pkt Rate Bit Rate Counter Reset Time
-|------------|------------|---------------------------|-----------|-----|---|-------|--------|--------|--------|------------------------------|
1 ms1          pre-service  dmf-r267-tb2-7280dr3am-54-1 Ethernet4/1 up    tx  60000   30720000 0        -        2025-10-29 15:55:36.435000 UTC
2 ms1          post-service dmf-r267-tb2-7280dr3am-54-1 Ethernet4/1 up    rx  0       0        0        -        2025-10-29 15:55:36.435000 UTC

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

If the managed service is down, the show fabric warnings service-action-invalid command provides troubleshooting details.

dmf-controller-1> show fabric warnings service-action-invalid
~~~~~~~~~~~~~~~~~~~~~~~~~ Service with an invalid action  ~~~~~~~~~~~~~~~~~~~~~~~~~~
# Name    Warning
-|-------|-------------------------------------------------------------------------|
1 record2 Managed service record2 has invalid action record; Recording action is not supported on service node
Recording Health

The following commands display recording health stats for an SN.

Mount Health

The show service-node name recording mount-health command displays the status of the file system mount points.

dmf-controller-1> show service-node sn1 recording mount-health
Collection Time : 2025-10-30 04:40:38 UTC

~~~~~~~~~~~~~~~~~~ Index Mount(s)  ~~~~~~~~~~~~~~~~~~
Volume    Mount Point File System Mount Point Health
---------|-----------|-----------|------------------|
/dev/sdb1 /idx        xfs         healthy

~~~~~~~~~~~~~~~~~~ Packet Mount(s) ~~~~~~~~~~~~~~~~~~
Volume    Mount Point File System Mount Point Health
---------|-----------|-----------|------------------|
/dev/sda1 /pkt        xfs         healthy
Query Service Health

The show service-node name recording query-health command verifies the status of the core query service (Stenographer). This output tracks file initialization and caching metrics across recording instances.

dmf-controller-1> show service-node sn1 recording query-health
~~~~~~~~ Stenographer Application ~~~~~~~~
Collection Time  : 2025-10-30 04:45:41 UTC
Initialized      : True
Tracked Files    : 1315
Cached Files     : 2630
Max Cached Files : 750000

~~~~~~~~~~ Stenographer Recording Instance ~~~~~~~~~~
Instance Tracked Files Cached Files Max Cached Files
--------|-------------|------------|----------------|
4        325           650          187500
8        340           680          187500
9        325           650          187500
10       325           650          187500
Storage Health

The show service-node name recording storage-health command provides a detailed breakdown of disk utilization for both packet data and indexing metadata.

dmf-controller-1> show service-node sn1 recording storage-health
Collection Time           : 2025-10-30 04:46:40 UTC
Index Utilization         : 0%
Index Free                : 1.73TB
Index Total               : 1.74TB
Backup Index Utilization  : 0%
Backup Index Free         : 0B
Backup Index Total        : 0B
Packet Utilization        : 0%
Packet Free               : 28.9TB
Packet Total              : 29.1TB
Backup Packet Utilization : 0%
Backup Packet Free        : 0B
Backup Packet Total       : 0B
Queries

SNs support several query types for retrieving and analyzing recorded data. While the UI supports all query types, the CLI supports only a subset.

Supported Query Types
  • window: Displays the time range of available recorded packets.

  • size: Reports the number of packets and total data size matching a filter.

  • packet-data: Generates a PCAP file of the filtered traffic.

  • packet-object: Generates a TGZ archive of the filtered traffic.

  • analysis-http-tree: Analyzes HTTP traffic in a tree structure.

  • analysis-http-srv-tree: Analyzes HTTP server traffic in a tree structure.

  • analysis-http-stat: Provides HTTP traffic statistics.

  • analysis-conv-ipv4: Analyzes IPv4 conversations.

  • analysis-conv-ipv6: Analyzes IPv6 conversations.

  • analysis-tcp-flow-health: Analyzes the health of TCP flows.

Note: The CLI supports only window, size, packet-data, and packet-object. The UI supports all listed types.
Query Parameters

The following parameters are relevant for SN queries:

  • stenographer-query: The filter string used to select specific packets.

  • limit-packets: Restricts the result to a maximum number of packets.

  • limit-bytes: Restricts the result to a maximum data size in bytes.

  • timeout-ms: (UI only) Sets a time limit for the query execution.

  • coalesce: (UI only) Combines results into a single file.

Note: The following query parameters are accepted but silently ignored for SN queries: dedup-time-window, dedup-enabled, and fail-fast.
Window Query

Use the query recorder-node name window command to see the data availability range.

dmf-controller-1> query recorder-node sn1 window
~~~~~~~~~~~~~ Window Query Results  ~~~~~~~~~~~~~
Oldest Packet Available : 2025-10-27 16:32:31 UTC
Newest Packet Available : 2025-10-31 08:27:23 UTC
Size Query

Use the query recorder-node name size filter "string" command to check data volume.

dmf-controller-1> query recorder-node sn1 size filter "before 5s ago"
~ Size Query Results  ~
# Packets : 14766093281
Size      : 5.80TB
Packet-Data and Packet-Object Queries

Use the query recorder-node name packet-data filter "string" or query recorder-node name packet-object filter "string" commands to generate download URLs for traffic files.

dmf-controller-1> query recorder-node sn1 packet-data filter "before 5s ago"
~~~~~~~~~~~~~~~~~~~~~~~~~~~ Packet Data Query Results  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coalesced URL     : /pcap/__packet_recorder__/coalesced-dmf-2025-10-31-19-11-59-78f69b5f.pcap
Individual URL(s) : /pcap/__packet_recorder__/sn1-2025-10-31-19-11-39-679a8cac.pcap

 

dmf-controller-1> query recorder-node sn1 packet-object filter "before 5s ago"
~~~~~~~~~~~~~~~~~~~~~~~~~~~ Packet Object Query Results ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Coalesced URL     : /pcap/__packet_recorder__/coalesced-dmf-2025-10-31-19-17-23-471a96d2.tgz
Individual URL(s) : /pcap/__packet_recorder__/sn1-2025-10-31-19-17-23-45f9decd.tgz
Managing Queries
Abort Query

Use the abort recorder-node name filter "string" command to cancel ongoing queries. SNs currently support cancellation by the filter string rather than by query ID.

dmf-controller-1> abort recorder-node sn1 filter "before 5s ago"
Abort any request with the specified filter? This cannot be undone. enter "yes" (or "y") to continue: y
None.
Query Cancellation Verification

Executing the abort recorder-node name filter command terminates any ongoing queries matching the specified filter. For example, a packet-object query running in a separate terminal displays a cancellation error when aborted:

dmf-controller-1> query recorder-node sn1 packet-object filter "before 5s ago"
Error: cancelled: Query cancelled
None.
Allowed Queries

Use the show recorder-node allowed-queries command to verify which queries a specific user group can execute based on RBAC permissions.

dmf-controller-1> show recorder-node allowed-queries
#  Recording Device     Allowed Query Type
--|--------------------|------------------------|
1  sn1                  abort
2  sn1                  analysis-conv-ipv4
3  sn1                  analysis-conv-ipv6
4  sn1                  analysis-http-srv-tree
5  sn1                  analysis-http-stat
6  sn1                  analysis-http-tree
7  sn1                  analysis-tcp-flow-health
8  sn1                  packet-data
9  sn1                  packet-object
10 sn1                  size
11 sn1                  window
12 sn2                  abort
13 sn2                  analysis-conv-ipv4
14 sn2                  analysis-conv-ipv6
15 ...

Use the show recorder-node query-history command to audit previously executed queries, including the Query string, Type, Start time, and Duration.

dmf-controller-1> show recorder-node query-history
#   Recording Device     Query                                                      Type          Start                   Duration
---|--------------------|----------------------------------------------------------|-------------|-----------------------|--------|
1   dmf-rack267-tb2-sn-1 after 1m ago                                               packet-data   2025-10-29 10:01:24 UTC 5258
2   dmf-rack267-tb2-sn-1 after 2025-10-29T10:00:24Z                                 packet-data   2025-10-29 10:01:24 UTC 5258
3   dmf-rack267-tb2-sn-1 after 1m ago                                               packet-data   2025-10-29 10:02:16 UTC 5201
4   dmf-rack267-tb2-sn-1 after 2025-10-29T10:01:16Z                                 packet-data   2025-10-29 10:02:16 UTC 5201
5   dmf-rack267-tb2-sn-1 after 1m ago                                               size          2025-10-29 10:03:35 UTC 5220
6   dmf-rack267-tb2-sn-1 after 2025-10-29T10:02:35Z                                 size          2025-10-29 10:03:35 UTC 5220
7   dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:05:46 UTC 5219
8   dmf-rack267-tb2-sn-1 before 2025-10-29T10:04:46Z                                size          2025-10-29 10:05:46 UTC 5219
9   dmf-rack267-tb2-sn-1 before 2025-10-29T10:09:02Z                                size          2025-10-29 10:10:02 UTC 5196
10  dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:10:02 UTC 5196
11  dmf-rack267-tb2-sn-1 before 2025-10-29T10:09:25Z                                size          2025-10-29 10:10:25 UTC 5212
12  dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:10:25 UTC 5212
13  dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:10:44 UTC 5194
14  dmf-rack267-tb2-sn-1 before 2025-10-29T10:09:44Z                                size          2025-10-29 10:10:44 UTC 5194
15  dmf-rack267-tb2-sn-1 before 2025-10-29T10:17:33Z                                size          2025-10-29 10:18:33 UTC 5208
16  dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:18:33 UTC 5208
17  dmf-rack267-tb2-sn-1 before 1m ago                                              size          2025-10-29 10:20:19 UTC 5214
18  dmf-rack267-tb2-sn-1 before 2025-10-29T10:19:19Z                                size          2025-10-29 10:20:19 UTC 5214
19  dmf-rack267-tb2-sn-1 before 2025-10-29T10:16:51Z                                packet-data   2025-10-29 10:26:51 UTC 5547
20  dmf-rack267-tb2-sn-1 before 10m ago                                             packet-data   2025-10-29 10:26:51 UTC 5547
21  dmf-rack267-tb2-sn-1 before 10m ago                                             packet-data   2025-10-29 10:55:36 UTC 5554

 

Quick Verification Commands
  • Confirm Recording Support: Use the show service-node property command to ensure the SN hardware supports recording.
  • Verify Table Programming: Use the show service-node table contents record command to confirm the recording gentable is active.
  • Audit Disk Writes: Use the show managed-service-device stats command to compare Rx packets against Applied packets, ensuring data is successfully written to disk.

 

Troubleshooting

The following steps facilitate troubleshooting when the record action is configured on a Service Node but is not performing as expected:

  • Use the show service-node name property command to check if the Service Node supports recording.
  • Check for any managed service action related warnings using the show fabric warnings service-action-invalid command.
  • Use the show managed-service name command to verify if the service is installed.
  • Use the show service-node name interface stats command to show the Rx/Tx stats including drops and errors.
  • Verify policy status, as a policy using the record managed service can fail if a delivery interface is added to the configuration, or if the record service is inactive due to the reasons mentioned above.
  • Use the show policy name command to verify if the traffic is being sent to the service interface. This command does not confirm if the Service Node is actually recording the packets to the disk, but the output provides an indication that the policy configuration is working as expected and the issue is likely on the Service Node.
  • If the Controller side config appears correct, verify if the Service Node is informed of recording being enabled. This verification is performed by checking if the record gentable is successfully programmed on the Service Node. Use the show service-node name table contents record command to verify the table.
  • If there is any discrepancy between the interface stats and the data recorded on the SN, use the following command to check the Service Node disk and recording engine health.
    dmf-controller-1> show service-node name recording [mount-health | query-health | storage-health]

    If a query fails to run, verify the necessary permissions by checking allowed queries with the show recorder-node allowed-queries command.

Use the show debug debug-counters name description command to view SN debug counters pertaining to writing packets to disk.

The following example shows the record debug counters which appear under normal operating conditions.
dmf-controller-1> show debug debug-counters dmf-rack267-tb2-sn-1 description | grep record
#   Service node ID      Counter Name                            Description                                 Value
---|--------------------|---------------------------------------|-------------------------------------------|---------|
238 dmf-rack267-tb2-sn-1 record.lcore10.close_complete           close_complete                              13
239 dmf-rack267-tb2-sn-1 record.lcore10.file_rotate              file rotate                                 13
240 dmf-rack267-tb2-sn-1 record.lcore10.in_flight_write_complete in_flight_write_complete                    13
241 dmf-rack267-tb2-sn-1 record.lcore10.ioring_close_wakeup      ioring_close_wakeup                         13
242 dmf-rack267-tb2-sn-1 record.lcore10.ioring_rename_wakeup     ioring_rename_wakeup                        13
243 dmf-rack267-tb2-sn-1 record.lcore10.ioring_write_wakeup      ioring_write_wakeup                         13
244 dmf-rack267-tb2-sn-1 record.lcore10.rename_complete          rename to active file completed             13
245 dmf-rack267-tb2-sn-1 record.lcore10.uring_cq_pop             uring_cq_pop                                39
246 dmf-rack267-tb2-sn-1 record.lcore10.write_active             write active block                          13
247 dmf-rack267-tb2-sn-1 record.lcore10.write_total              count of in-flight writes                   13
248 dmf-rack267-tb2-sn-1 record.lcore4.close_complete            close_complete                              13
249 dmf-rack267-tb2-sn-1 record.lcore4.file_rotate               file rotate                                 13
250 dmf-rack267-tb2-sn-1 record.lcore4.in_flight_write_complete  in_flight_write_complete                    13
251 dmf-rack267-tb2-sn-1 record.lcore4.ioring_close_wakeup       ioring_close_wakeup                         13
252 dmf-rack267-tb2-sn-1 record.lcore4.ioring_rename_wakeup      ioring_rename_wakeup                        13
253 dmf-rack267-tb2-sn-1 record.lcore4.ioring_write_wakeup       ioring_write_wakeup                         13
254 dmf-rack267-tb2-sn-1 record.lcore4.rename_complete           rename to active file completed             13
255 dmf-rack267-tb2-sn-1 record.lcore4.uring_cq_pop              uring_cq_pop                                39
256 dmf-rack267-tb2-sn-1 record.lcore4.write_active              write active block                          13
257 dmf-rack267-tb2-sn-1 record.lcore4.write_total               count of in-flight writes                   13
258 dmf-rack267-tb2-sn-1 record.lcore8.close_complete            close_complete                              13
259 dmf-rack267-tb2-sn-1 record.lcore8.file_rotate               file rotate                                 13
260 dmf-rack267-tb2-sn-1 record.lcore8.in_flight_write_complete  in_flight_write_complete                    13
261 dmf-rack267-tb2-sn-1 record.lcore8.ioring_close_wakeup       ioring_close_wakeup                         13
262 dmf-rack267-tb2-sn-1 record.lcore8.ioring_rename_wakeup      ioring_rename_wakeup                        13
263 dmf-rack267-tb2-sn-1 record.lcore8.ioring_write_wakeup       ioring_write_wakeup                         13
264 dmf-rack267-tb2-sn-1 record.lcore8.rename_complete           rename to active file completed             13
265 dmf-rack267-tb2-sn-1 record.lcore8.uring_cq_pop              uring_cq_pop                                39
266 dmf-rack267-tb2-sn-1 record.lcore8.write_active              write active block                          13
267 dmf-rack267-tb2-sn-1 record.lcore8.write_total               count of in-flight writes                   13
268 dmf-rack267-tb2-sn-1 record.lcore9.close_complete            close_complete                              13
269 dmf-rack267-tb2-sn-1 record.lcore9.file_rotate               file rotate                                 13
270 dmf-rack267-tb2-sn-1 record.lcore9.in_flight_write_complete  in_flight_write_complete                    13
271 dmf-rack267-tb2-sn-1 record.lcore9.ioring_close_wakeup       ioring_close_wakeup                         13
272 dmf-rack267-tb2-sn-1 record.lcore9.ioring_rename_wakeup      ioring_rename_wakeup                        13
273 dmf-rack267-tb2-sn-1 record.lcore9.ioring_write_wakeup       ioring_write_wakeup                         13
274 dmf-rack267-tb2-sn-1 record.lcore9.rename_complete           rename to active file completed             13
275 dmf-rack267-tb2-sn-1 record.lcore9.uring_cq_pop              uring_cq_pop                                39
276 dmf-rack267-tb2-sn-1 record.lcore9.write_active              write active block                          13
277 dmf-rack267-tb2-sn-1 record.lcore9.write_total               count of in-flight writes                   13

Additional record debug counters that indicate potential issues include:

  • missing_tmc : missing traffic metadata config
  • no_timestamp : no timestamp in traffic metadata
  • in_flight_empty : unable to allocate write-block
  • write_error : write error
  • packets_lost : number of packets which write failed
  • active_null : number of packets lost due to insufficient blocks/buffers
  • post_error : failure when posting request
  • cqe_op_unknown : uring cqe op unknown
  • completion_user_data : uring completion user_data value out of bounds
  • record_file_exhaustion : unable to allocate files entry
  • open_fail : unable to open/create record file
  • chown_fail : unable to chown record file

Limitations

  • The Service Node will not provide memory and cpu stats for recording-specific applications, as the device can support other features while recording, so resource usage is not exclusive to packet recording.
  • In this release, the Service Node supports only a subset of the queries available on a Recorder Node. The Service Node does not support the following queries:
    • sip-conversations
    • tcp-conversations
    • udp-conversations
    • analysis-dns-tree
    • http-request
    • host
    • rtp-stream
    • http-statistics
    • event
  • The Service Node also excludes support for the following operations:
    • Erasing packets from a SN (delete recorder-node name ...).
    • Replay packets (replay recorder-node name ...).
    • Ongoing queries (show recorder-node queries).
    • Query cancellation is only doable using filter, and not by id. In other words, abort recorder-node name id ... is not supported.
  • Service Nodes do not support the packet storage management options available for Recorder Nodes. Instead, the Service Node uses a fixed storage management policy. After the packet or index disk reaches 95% capacity, the system automatically deletes the oldest stored packets. The device will delete the minimum amount of packets required to fall below this threshold. In Recorder Node terms, the Service Node uses a max-disk-utilization of 95 and a disk-full-policy of rolling-fifo.
The Recorder Node dashboard on the Analytics Node does not include the Service Nodes under disk utilization chart Recorder Node Disk, or under Recorder Node Statuses. Currently, it only displays the service interface and policy stats.

Session Slicing for TCP and UDP Sessions

Session-slice keeps track of TCP and UDP sessions (distinguished by source and destination IP address and port) and counts the number of packets sent in each direction (client-to-server and vice versa). After recognizing the session, the action transmits a user-configured number of packets to the tool node.

For TCP packets, session-slice tracks the number of packets sent in each direction after establishing the TCP handshake. Slicing begins after the packet count in a direction has reached the configured threshold in both directions.

For UDP packets, slicing begins after reaching the configured threshold in either direction.

By default, session-slice will operate on both TCP and UDP sessions but is configurable to operate on only one or the other.

Note: The count of packets in one direction may exceed the user-configured threshold because fewer packets have arrived in the other direction. Counts in both directions must be greater than or equal to the threshold before dropping packets.

Refer to the DANZ Monitoring Fabric (DMF) Verified Scale Guide for session-slicing performance numbers.

Configure session-slice in managed services through the Controller as a Service Node action.

Configure Session Slicing

Configure session-slice in managed services through the Controller as a Service Node action.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Configuration Steps

  1. Create a managed service and enter the service interface.
  2. Choose the session-slice service action with the command: seq num session-slice
    Note: The seq num session-slice command opens the session-slice submode, which supports two configuration parameters: slice-after and idle-timeout.
  3. Use slice-after to configure the packet threshold, after which the Service Node will stop forwarding packets to tool nodes.
  4. Use idle-timeout to configure the timeout in milliseconds before an idle connection is removed from the cache. idle-timeout is an optional command with a default value of 60000 ms.
    dmf-controller-1(config)# managed-service managed_service_1
    dmf-controller-1(config-managed-srv)# 1 action session-slice
    dmf-controller-1(config-managed-srv-ssn-slice)# slice-after 1000
    dmf-controller-1(config-managed-srv-ssn-slice)# idle-timeout 60000
Show Commands

The following show commands provide helpful information.

The show running-config managed-service managed service command helps verify whether the session-slice configuration is complete.
dmf-controller-1(config)# show running-config managed-service managed_service_1 
                    
! managed-service
managed-service managed_service_1
!
1 action session-slice
slice-after 1000
idle-timeout 60000
The show managed-services managed service command provides status information about the service.
dmf-controller-1(config)# show managed-services managed_service_1
# Service Name      Switch          Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW 
-|-----------------|---------------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 managed_service_1 DCS-7050CX3-32S ethernet2/4      True      25Gbps              25Gbps             624Kbps               432Mbps                            
                        

Regex-Session Action

Description

The regex-session action enables matching of Regular Expression patterns against packet content. When a packet matches the specified pattern, its session is tracked based on configured timeouts and other parameters including, anchor, offset, and ip-proto.

Table 18. Configuration Parameters
Parameter Description Optional
pattern Regular expression to match against packet content. No
anchor Anchor where to start regex matching. The default is packet-start. Yes
offset Offset from anchor where to start regex matching. The default is 0. Yes
tcp-idle-timeout The number of milliseconds a TCP connection may be idle before it is removed from the session cache. The default is 60000 milliseconds. Yes
udp-idle-timeout The number of milliseconds a UDP connection may be idle before it is removed from the session cache. The default is 60000 milliseconds. Yes
ip-proto Protocol to track. 6=TCP or 17=UDP. If not specified, both protocols are tracked. Yes

Configuration

Command Line Interface

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

Configure the regex-session action under the managed-service submode. To configure regex-session parameters, enter the regex-session submode and configure the parameters in the regex-session submode.

Configuration Notes:

  • Configuring an anchor requires specifying an offset value.

  • The pattern must be a valid Java regular expression.

  • DMF only supports TCP and UDP protocols for tracking.

dmf-controller-1(config)# managed-service Test
dmf-controller-1(config-managed-srv)# 1 action regex-session
dmf-controller-1(config-managed-srv-regex-session)# pattern [a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}

Configure optional parameters.

dmf-controller-1(config-managed-srv-regex-session)# ip-proto
 <Ip-proto> Protocol to track. 6=TCP or 17=UDP. If not specified, both protocols are tracked.
dmf-controller-1(config-managed-srv-regex-session)# ip-proto 6
dmf-controller-1(config-managed-srv-regex-session)# anchor l3-header-start l4-payload-start ; >
l4-header-start packet-start | <cr>
dmf-controller-1(config-managed-srv-regex-session)# anchor l3-header-start
 Offset from configured anchor
dmf-controller-1(config-managed-srv-regex-session)# anchor l3-header-start 10
dmf-controller-1(config-managed-srv-regex-session)# tcp-idle-timeout 50000
dmf-controller-1(config-managed-srv-regex-session)# udp-idle-timeout 65000

Show Commands

The show commands specific to regex-session have not changed from standard managed service commands. If a managed service includes regex-session actions, the output displays those actions and their parameters along with the other configured actions.

dmf-controller-1(config-managed-srv)# show running-config managed-service Test
! managed-service
managed-service Test
 !
 1 regex-session
 anchor l3-header-start 10
 ip-proto 6
 pattern [a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}
 tcp-idle-timeout 50000
 udp-idle-timeout 65000

 

Filter Managed Service Action

The Filter Managed Service Action filters packets on the Service Node (SN) interface and supports optional VLAN tagging. Utilizing ACL rules, the system forwards or drops matched traffic. Traffic tagged with a VLAN exits the interface (Tx) after processing through the action chain. VLAN tagging specifically facilitates traffic steering in Switch-less SN deployments, where the forwarding plane relies on VLANs. This configuration produces no functional impact when the SN connects directly to a DMF switch within the fabric.

The feature is compatible with all platforms.

Configuration

Managed service configuration supports Service Nodes connected to a DMF switch or operating in switch-less mode. The configured interface type (installation point) determines how the service is programmed. Configure the Filter Managed Service Action feature using the GUI or CLI. A Summary section provides a consolidated reference of the Filter Managed Service Action specifications, configuration limits, and operational behaviors.

Using the CLI to Configure Filter Managed Service Action

Configure a managed service using the following command.

dmf-controller-1>
dmf-controller-1> en
dmf-controller-1# config
dmf-controller-1(config)# managed-service ms1

Configure a Service Interface

Configuring the Service Interface triggers a validation sequence. The system verifies that the SN connects to a DMF switch and that a policy utilizes the service. The Controller proceeds with installation on the SN only after passing these checks.

dmf-controller-1(config-managed-srv)# service-interface switch core1 ethernet

Configure a Service Node Interface

Configuring the Service Node Interface designates the managed service for switch-less operation. This mode applies when the SN lacks a physical connection to a DMF switch or when the Controller is unable to discover the link. The Controller installs the managed service immediately upon valid configuration, without requiring policy association. However, any DMF policy configured with this service will fail due to the absence of a reachability path from the fabric.

dmf-controller-1(config-managed-srv)# service-node-interface service-node sn1 sni1
dmf-controller-1(config-managed-srv)# service-node-interface service-node sn1 sni2

Configure Filter Action

The Filter action functions at any position within the managed service action sequence. Configuring it as the initial action filters and tags traffic on the service node interface, passing only the filtered traffic to subsequent actions in the chain.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
dmf-controller-1(config-managed-srv)# 1 action filter

 

Default Actions and Overrides

The Filter configuration supports defining a default action and an optional forwarding VLAN. The system applies this default behavior to every ACL rule upon installation, though individual rules can override it.

In the following example, the configuration tags matching packets with VLAN 100 and forwards them to the service node interface Tx (post-processing).

dmf-controller-1(config-managed-srv-filter)# default action forward push-vlan 100

 

ACL Rule Structure

ACL definitions begin with a sequence number that determines the packet matching order (lowest to highest). The logic supports 5-tuple matching based on:

  • Source/Destination IP
  • Source/Destination Port
  • Protocol Number

 

Rule Configuration Examples
  1. Action Override (Drop) Specific ACL rules can override the global default action. The following command drops TCP traffic from Source IP 1.1.1.1 to Destination IP 2.2.2.2, provided the packet does not match a lower-sequence rule.
    dmf-controller-1(config-managed-srv-filter)# 10 drop src-ip 1.1.1.1 dst-ip 2.2.2.2 ip-proto 6
  2. Subnet Matching Source and Destination IP fields support subnet masks to match specific host ranges.
    dmf-controller-1(config-managed-srv-filter)# 9 src-ip 192.168.1.1 255.255.255.0 src-port 22
  3. 3. Port Ranges The configuration accepts individual ports or port ranges. The following rule matches TCP traffic from the specified Source IP/Port to any destination port within the range 1–100.
    dmf-controller-1(config-managed-srv-filter)# 8 src-ip 192.168.1.1 src-port 100 range-dst-port 1 100 ip-proto 6

 

Runtime Expansion Logic

The Controller expands missing matches at runtime to generate complete rules. A complete rule strictly requires Source/Destination IP, Source/Destination Port, and Protocol Number.

  • IP Expansion: If the configuration lacks a specific IP match, the Controller generates ACL rules for both IPv4 and IPv6 using the corresponding wildcard values.
  • Protocol Expansion: If the protocol remains undefined, the Controller expands the entry into separate ACL rules for TCP and UDP traffic.
Expansion Example: Configuring a single rule, such as 11 drop any, triggers the Controller to generate four distinct rules to cover all IP versions and protocols:
11 drop src-ip 0.0.0.0 dst-ip 0.0.0.0 range-src-port 1 65535 range-dst-port 1 65535 ip-proto 6 
12 drop src-ip 0.0.0.0 dst-ip 0.0.0.0 range-src-port 1 65535 range-dst-port 1 65535 ip-proto 17 
13 drop src-ip ::0 dst-ip ::0 range-src-port 1 65535 range-dst-port 1 65535 ip-proto 6 
14 drop src-ip ::0 dst-ip ::0 range-src-port 1 65535 range-dst-port 1 65535 ip-proto 17

 

Max Rule Limits

Each Filter managed service action supports a maximum of 2048 rules. The Controller calculates this total based on the expanded runtime rules rather than the initial configuration lines.

The system tracks IPv4 and IPv6 rules in separate tables, with each table supporting 1024 entries post-expansion.

  • Capacity Handling: Upon reaching table capacity, the system halts the installation of further expanded rules.
  • Overflow Behavior: The Controller skips any configured rule if the corresponding table (IPv4 or IPv6) is full.

 

Show Commands

Use the show running-config managed-service Service name command to display the complete configuration for a managed service.

The following example illustrates a managed service (ms1) configured with a Filter function on a switch-less Service Node (sn1). The deployment targets interfaces sni1 and sni2, implementing two forward rules and one drop rule.

dmf-controller-1# show running-config managed-service ms1

! managed-service
managed-service ms1
  service-node-interface service-node sn1 sni1
  service-node-interface service-node sn1 sni2
  !
  1 action filter
    default action forward push-vlan 100
    8 src-ip 192.168.1.1 src-port 100 range-dst-port 1 100 ip-proto 6
    9 src-ip 192.168.1.1 255.255.255.0
    11 drop any
  !
  2 action dedup
    region full-packet
    window-duration 2

 

Use the show managed-service Service name command to verify that the system successfully installed the managed service on the Service Node.

For switch-less Service Node deployments, the output omits the switch name and interface details.

dmf-controller-1# show managed-service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Managed-service ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Name Switch Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW
-|------------|------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 ms1                                  True      2Gbps               2Gbps              792bps                2.19Kbps

 

Use the show managed-service-device Service node name command to verify the actions installed on Service Node interfaces. The output displays the service name for each interface and provides statistics for each configured action within the managed service.

dmf-controller-1# show managed-service-device sn1
~~~~~~~~~~~~~ Device ~~~~~~~~~~~~~
Service Node Name : sn1
Service Node IP   : 10.243.254.159

~~~~~~~~~~~~~~~~~~~~~~~~~ Interfaces ~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Node Interface Switch Switch Interface Service Name
-|------------|---------|------|----------------|------------|
1 sn1          sni1                              ms1
2 sn1          sni2                              ms1

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Stats ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Node Interface Name Function Service Name Rx packets Rx bytes Rx Bit Rate Applied packets Applied bytes Applied Bit Rate Tx packets Tx bytes Tx Bit Rate
-|------------|--------------|--------|------------|----------|--------|-----------|---------------|-------------|----------------|----------|--------|-----------|
1 sn1          sni1           filter   ms1          303        18180    319bps      303             18180         319bps           0          0        -
2 sn1          sni2           filter   ms1          304        18250    319bps      304             18250         319bps           0          0        -

 

Applied statistics vary based on the specific action type. For the Filter action, these metrics quantify the traffic matching the configured ACL rules:

  • Applied packets: Total count of matched packets.
  • Applied bytes: Total count of matched bytes.
  • Applied rate: Current data rate of matched traffic.

Troubleshooting

  • Verify Managed Service Installation: Execute the show managed-service command to confirm successful installation. Absence from the output indicates configuration processing failures or runtime errors.
  • Verify Action Sequence: Execute the show managed-service-device command to confirm the action sequence installation on all service node interfaces. Consult the Service Node and Controller logs for detailed information on specific installation failure.
  • Verify Packet Flow and Logic: Analyze Rx/Tx statistics using show managed-service-device Service node name stats and show service-node Service node name interface stats to validate traffic processing. For example, comparable Tx and Rx counts on an interface configured with a drop filter action indicate that the ACL rules are not matching packets.
Resources

Switch-less Service Node TOI for deploying managed services on a Service Node not connected to a switch in DMF fabric.

VN-TAG Decapsulation

VN-TAG Decapsulation (decap) provides native support for removing the VN-TAG header within the DMF platform. Execution occurs directly on the DMF Service Node to process traffic frames. The Controller schema and standard CLI workflow facilitate comprehensive control-plane support. All DMF Service Nodes support this feature.

Configuration

Configure the feature using the decap-vntag action within a managed service, which enables the Service Node to identify the VN-TAG (by inspecting up to seven VLAN tags) and remove the header before forwarding the resulting frame.

Show Commands

The show running-config managed-service command outputs the configuration of the decap-vntag action for a given managed-service.

dmf-controller-1# show running-config managed-service

! managed-service
managed-service vntag-s1
  !
  1 action decap-vntag
    drop

The show running-config policy policy-name command displays the policy configuration, including the decap-vntag managed service.

dmf-controller-1# show running-config policy drop-decap-vntag

! policy
policy drop-decap-vntag
  action forward
  delivery-interface delivery1
  filter-interface filter1
  start on-date-time 2025-09-19T08:49:06.138000+00:00
  use-managed-service vntag-s1 sequence 1 optional
  1 match any

Controller Schema Additions

The decap action feature adds a new entry for the decap-vntag action to the managed-service-action type.

typedef managed-service-action {
    description "Defines the actions supported by a managed service";
    type enumeration {
        ...
        ...
        enum decap-vntag {
            description "Remove VNTag header";
        }
        ...
        ...
    }
}

The option decap-vntag is a supported managed-service action.

module dmf {
    container applications {
        container dmf {
            list managed-service {
                list action {
                    ...
                    ...
                    container decap-vntag {
                        presence "name=decap-vntag";
                        uses dmf-types:managed-service-decap-common;
                    }
                    ...
                    ...
                }
            }
        }
    }
}

CLI Configuration Workflow

Configure a managed-service with the decap-vntag action in the config mode. Use the optional drop parameter to discard any incoming packets that do not contain a VN-TAG.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
dmf-controller-1# en
dmf-controller-1# config
dmf-controller-1(config)# managed-service vntag-s1
dmf-controller-1(config-managed-srv)# 1 action decap-vntag
dmf-controller-1(config-managed-srv-decap-vntag)# drop

dmf-controller-1(config-managed-srv-decap-vntag)# show this

! managed-service
managed-service vntag-s1
  !
  1 action decap-vntag
    drop

Create a policy with a filter-interface, delivery-interface, and action. Add a decap-vntag managed-service in the policy using following commands:

dmf-controller-1# en
dmf-controller-1# config
dmf-controller-1(config)# policy drop-decap-vntag
dmf-controller-1(config-policy)# use-managed-service vntag-s1 sequence 1

dmf-controller-1(config-policy)# show this

! policy
policy drop-decap-vntag
  action forward
  delivery-interface delivery1
  filter-interface filter1
  start on-date-time 2025-09-19T08:49:06.138000+00:00
  use-managed-service vntag-s1 sequence 1
  1 match any

Implementation

Service Node decap action Implementation

The Service Node actively decapsulates VN-TAG frames by examining up to seven VLAN tags to locate the VN-TAG header precisely. After locating the VN-TAG, the Service Node removes the single header and forwards the clean frame. The action's statistics track the entire process:

  • rx-frame/rx-byte: Counts frames received by the action.
  • applied-frame/applied-count: Identifies frames that contain a VN-TAG.
  • tx-frame/tx-bytes: Tracks the final count of frames forwarded after decapsulation.
Note: Disable symmetric hashing for LAG configurations. The system treats VN-tagged packets as Layer 2 traffic and uses Layer 2 headers to distribute them among LAG member interfaces.

Configuring the Arista Analytics Node

Arista Analytics Node capabilities are enhanced to handle NetFlow V5/V9 and IPFIX Packets. All these flow data are represented with the Netflow index.

Note: NetFlow flow record generation is enhanced for selecting VXLAN traffic. For VXLAN traffic, flow processing is based on inner headers, with the VNI as part of the key for flow lookup because IP addresses can overlap between VNIs.
Figure 189. NetFlow Managed Service
NetFlow records are exported using User Datagram Protocol (UDP) to one or more specified NetFlow collectors. Use the DMF Service Node to configure the NetFlow collector IP address and the destination UDP port. The default UDP port is 2055.
Note: No other service action, except the UDP replication service, can be applied after a NetFlow service action because part of the NetFlow action is to drop the packets.
Use the show managed-services command to display the ARP resolution status.
Note: The DANZ Monitoring Fabric (DMF) Controller resolves ARP messages for each NetFlow collector IP address on the delivery interface that matches the defined subnet. The subnets defined on the delivery interfaces cannot overlap and must be unique for each delivery interface.

Enter the 1 netflow command and identify the configuration name and the submode changes to the config-managed-srv-netflow mode for viewing and configuring a specific NetFlow configuration.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.

The DMF Service Node replicates NetFlow packets received without changing the source IP address. Packets that do not match the specified destination IP address and packets that are not IPv4 or UDP are passed through. To configure a NetFlow-managed service, perform the following steps:

  1. Configure the IP address on the delivery interface.
    This IP address is the next-hop IP address from the DANZ Monitoring Fabric towards the NetFlow collector.
    CONTROLLER-1(config)# switch DMF-DELIVERY-SWITCH-1
    CONTROLLER-1(config-switch)# interface ethernet1
    CONTROLLER-1(config-switch-if)# role delivery interface-name NETFLOW-DELIVERY-PORT ip-address 172.43.75.1 nexthop-ip 172.43.75.2 255.255.255.252
  2. Configure the rate-limit for the NetFlow delivery interface.
    CONTROLLER-1(config)# switch DMF-DELIVERY-SWITCH-1
    CONTROLLER-1(config-switch)# interface ethernet1
    CONTROLLER-1(config-switch-if)# role delivery interface-name NETFLOW-DELIVERY-PORT ip-address 172.43.75.1 nexthop-ip 172.43.75.2 255.255.255.252
    CONTROLLER-1(config-switch-if)# rate-limit 256000
    Note: The rate limit must be configured when enabling Netflow. When upgrading from a version of DMF before release 6.3.1, the Netflow configuration is not applied until a rate limit is applied to the delivery interface.
  3. Configure the NetFlow managed service using the 1 netflow command followed by an identifier for the specific NetFlow configuration.
    CONTROLLER-1(config)# managed-service MS-NETFLOW-SERVICE CONTROLLER-1
    (config-managed-srv)# 1 action netflow NETFLOW-DELIVERY-PORT CONTROLLER-1
    (config-managed-srv-netflow)#
    The following commands are available in this submode:
    • active-timeout: configure the maximum length of time the NetFlow is transmitted before it is ended (in minutes).
    • collector: configure the collector IP address, and change the UDP port number or the MTU.
    • inactive-timeout: configure the length of time that the NetFlow is inactive before it is ended (in seconds).
    • max-flows: configure the maximum number of flows managed.

    An option exists to limit the number of flows or change the inactivity timeout using the max-flows or active timeout, or inactive timeout commands.

  4. Configure the NetFlow collector IP address using the following command:
    collector ip4-address[udp-port integer][mtu integer][records-per-interface]
    

    The IP address, in IPV4 dotted-decimal notation, is required. The MTU and UDP port are required when changing these parameters from the defaults. Enable the records-per-interface option to allow identification of the filter interfaces from which the Netflow originated. Configure the Arista Analytics Node to display this information, as described in the DMF User Guide.

    The following example illustrates changing the Netflow UDPF port to 9991.
    collector 10.181.19.31 udp-port 9991
    Note: The IP address must be in the same subnet as the configured next hop and unique. It cannot be the same as the Controller, service node, or any monitoring fabric switch IP address.
  5. Configure the DMF policy with the forward action and add the managed service to the policy.
    Note: A DMF policy does not require any configuration related to a delivery interface for NetFlow policies because the DMF Controller automatically assigns the delivery interface.
    The example below shows the configuration required to implement two NetFlow service instances (MS-NETFLOW-1 and MS-NETFLOW-1).
    ! switch
    switch DMF-DELIVERY-SWITCH-1
    !
    interface ethernet1
    role delivery interface-name NETFLOW-DELIVERY-PORT-1 ip-address 10.3.1.1
    nexthop-ip 10.3.1.2 255.255.255.0
    interface ethernet2
    role delivery interface-name NETFLOW-DELIVERY-PORT-2 ip-address 10.3.2.1
    nexthop-ip 10.3.2.2 255.255.255.0
    ! managed-service
    managed-service MS-NETFLOW-1
    service-interface switch DMF-CORE-SWITCH-1 interface ethernet11/1
    !
    1 action netflow NETFLOW-DELIVERY-PORT-1
    collector-ip 10.106.1.60 udp-port 2055 mtu 1024
    managed-service MS-NETFLOW-2
    service-interface switch DMF-CORE-SWITCH-2 interface ethernet12/1
    !
    1 action netflow NETFLOW-DELIVERY-PORT-1
    collector-ip 10.106.2.60 udp-port 2055 mtu 1024
    ! policy
    policy GENERATE-NETFLOW-1
    action forward
    filter-interface TAP-INTF-DC1-1
    filter-interface TAP-INTF-DC1-2
    use-managed-service MS-NETFLOW-1 sequence 1
    1 match any
    policy GENERATE-NETFLOW-2
    action forward
    filter-interface TAP-INTF-DC2-1
    filter-interface TAP-INTF-DC2-2
    use-managed-service MS-NETFLOW-2 sequence 1
    1 match any

Multiple Services Per Service Node Interface

The service-node capability is augmented to support more than one service action per service-node interface. Though this feature is economical regarding per-interface cost, it could cause packet drops in high-volume traffic environments. Arista Networks recommends using this feature judiciously.

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
Example
controller-1# show running-config managed-service Test
! managed-service
managed-service Test
service-interface switch CORE-SWITCH-1 ethernet13/1
1 action dedup full-packet window 2
2 action mask BIGSWITCH
3 action slice l4-payload-start 0
!
4 action netflow an-collector
collector 10.106.6.15 udp-port 2055 mtu 1500
This feature replaces the service-action command with sequential numbers. The allowed range of sequence numbers is 1 -20000. In the above example, the sequence numbering impacts the order in which the managed services influence the traffic.
Note: After upgrading to DANZ Monitoring Fabric (DMF) release 8.1.0 and later, the service-action CLI is automatically replaced with sequence number(s).
Specific managed service statistics can be viewed via the following CLI command:
Note: The following limitations apply to this mode of configuration:
  • The NetFlow/IPFIX-action configuration should not be followed by the timestamp service action.
  • Ensure the UDP-replication action configuration is the last service in the sequence.
  • The header-stripping service with post-service-match rule configured should not be followed by the NetFlow, IPFIX, udp-replication, timestamp and TCP-analysis services.
  • When configuring a header strip and slice action, the header strip action must precede the slice action.

Using SNMP to Monitor DPDK Service Node Interfaces

Directly fetch the counters and status of the service node interfaces handling traffic (DPDK interfaces). The following are the supported OIDs.
interfaces MIB: ❵.1.3.6.1.2.1.2❵
ifMIBObjects MIB: ❵.1.3.6.1.2.1.31.1❵
Note: A three-digit number between 101 and 116 identifies SNI DPDK (traffic) interfaces.
In the following example, interface sni5 (105) handles data traffic. To fetch the packet count, use the following command:
snmpget -v2c -c public 10.106.6.5 .1.3.6.1.2.1.31.1.1.1.6.105
IF-MIB::ifHCInOctets.105 = Counter64: 10008
To fetch the counters for packets exiting the service node interface, enter the following command:
snmpget -v2c -c public 10.106.6.5 .1.3.6.1.2.1.31.1.1.1.10.105
IF-MIB::ifHCOutOctets.105 = Counter64: 42721
To fetch Link Up and Down status, enter the following command:
[root@TestTool anet]# snmpwalk -v2c -c onlonl 10.106.6.6 .1.3.6.1.2.1.2.2.1.8.109
IF-MIB::ifOperStatus.109 = INTEGER: down(2)
[root@TestTool anet]# snmpwalk -v2c -c onlonl 10.106.6.6 .1.3.6.1.2.1.2.2.1.8.105
IF-MIB::ifOperStatus.105 = INTEGER: up(1)

Service Node Management Migration L3ZTN

After the first boot (initial configuration) is completed, in the case of Layer-3 topology mode an administrator can move a Service Node (SN) from an old DANZ Monitoring Fabric (DMF) Controller to a new one via the CLI.

Note:For appliances to connect to the Controller in Layer-3 Zero Touch Network (L3ZTN) mode, you must configure the Controller's deployment mode as pre-configure.

 

To migrate a Service Node's management to a new Controller, follow the steps outlined below:

  1. Remove the Service Node from the old Controller using the following command:
    controller-1(config)# no service-node service-node-1
  2. Connect the data NICs' sni interfaces to the new core fabric switch ports.
  3. SSH to the Service Node and configure the new Controller's IP address using the zerotouch l3ztn controller-ip command:
    service-node-1(config)# zerotouch l3ztn controller-ip 10.2.0.151
  4. Get the management MAC address (of interface bond0) of the Service Node using the following command:
    service-node-1(config)# show local-node interfaces 
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interfaces  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Interface Master Hardware address         Permanent hardware address Operstate Carrier Bond mode     Bond role 
    ---------|------|------------------------|--------------------------|---------|-------|-------------|---------|
    bond0            78:ac:44:94:2b:b6 (Dell)                            up        up      active-backup
  5. Add the Service Node and its bond0 interface's MAC address (obtained in the step above) to the new Controller:
    controller-2(config)# service-node service-node-1
    controller-2(config-service-node)# mac 78:ac:44:94:2b:b6
  6. After associating the Service Node with the new Controller, reboot the Service Node.
  7. Once the Service Node is back online, the Controller should receive a ZTN request. If the Service Node's image differs from the Service Node image file on the new Controller, the mismatch triggers the Service Node to perform an auto-upgrade of the image and to reboot twice.
    controller-2# show zerotouch request
    41  78:ac:44:94:2b:b6 (Dell)    10.240.156.10 get-manifest    2024-06-12 23:14:42.284000 UTC ok    The request has succeeded
    56  24:6e:96:78:58:b4 (Dell)    10.240.156.91 get-manifest    2024-06-12 23:13:38.633000 UTC ok    The request has succeeded
  8. Then the Service Node should appear as a member of the new DMF fabric, which you can verify by using the following command:
    controller-2# show service-node service-node-1 details

Redundancy of Managed Services in Same DMF Policy

In this method, users can use a second managed service as a backup service in the same DANZ Monitoring Fabric (DMF) policy. The backup service is activated only when the primary service becomes unavailable. The backup service can be on the same service node or core switch or a different service node and core switch.
Note: Transitioning from active to backup managed service requires reprogramming switches and associated managed appliances. This reprogramming, done seamlessly, will result in a slight traffic loss.

Using the CLI to Configure a Backup Managed Service

Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
To implement backup-managed services, perform the following steps:
  1. Identify the first managed service.
    managed-service MS-SLICE-1
    1 action slice l3-header-start 20
    service-interface switch CORE-SWITCH-1 lag1
  2. Identify the second managed service.
    managed-service MS-SLICE-2
    1 action slice l3-header-start 20
    service-interface switch CORE-SWITCH-1 lag2
  3. Configure the policy referring to the backup managed service.
    policy SLICE-PACKETS
    action forward
    delivery-interface TOOL-PORT-1
    filter-interface TAP-PORT-1
    use-managed-service MS-SLICE-1 sequence 1 backup-managed-service MS-SLICE-2
    1 match ip

Packet Slicing on the 7280 Switch

This feature removes unwanted or unneeded bytes from a packet at a configurable byte position (offset). This approach is beneficial when the data of interest is situated within the headers or early in the packet payload. This action reduces the volume of the monitoring stream, particularly in cases where payload data is not necessary.

Another use case for packet slicing (slice action) can be removing payload data to ensure compliance with the captured traffic.

Within the DANZ Monitoring Fabric (DMF) fabric, two types of slice-managed services (packet slicing service) now exist. These types are distinguished based on whether installing the service on a service node or on an interface of a supported switch. The scope of this document is limited to the slice-managed service configured on a switch. The managed service interface is the switch interface used to configure this service.

All DMF 8.4 and above compatible 7280 switches support this feature. Use the show switch all property command to check which switch in DMF fabric supports this feature. The feature is supported if the Min Truncate Offset and Max Truncate Offset properties have a non-zero value.

# show switch all property
# Switch Min Truncate Offset  ...  Max Truncate Offset
-|------|-------------------| ... |---------------------------------
1 7280   100                  ...  9236
2 core1                       ... 
Note: The CLI output example above is truncated for illustrative purposes. The actual output will differ.

Using the CLI to Configure Packet Slicing - 7280 Switch

Configure a slice-managed service on a switch using the following steps.
Important: Beginning with DMF version 8.9, the action keyword is required to add or modify actions within a managed service.
  1. Create a managed service using the managed-service service name command.
  2. Add slice action with packet-start anchor and an offset value between the supported range as reported by the show switch all property command.
  3. Configure the service interface under the config-managed-srv submode using the service-interface switch switch-name interface-name command as shown in the following example.
    > enable
    # config
    (config)# managed-service slice-action-7280-J2-J2C
    (config-managed-srv)# 1 action slice packet-start 101
    (config-managed-srv)# service-interface switch 7280-J2-J2C Ethernet10/1

This feature requires the service interface to be in MAC loopback mode.

  1. To set the service interface in MAC loopback mode, navigate to the config-switch-if submode and configure using the loopback-mode mac command, as shown in the following example.
    (config)# switch 7280-J2-J2C
    (config-switch)# interface Ethernet10/1
    (config-switch-if)# loopback-mode mac

Once a managed service for slice action exists, any policy can use it.

  1. Enter the config-policy submode, and chain the managed service using the use-managed-service service same sequence sequence command.
    (config)# policy timestamping-policy
    (config-policy)# use-managed-service slice-action-7280-J2-J2C sequence 1

Key points to consider while configuring the slice action on a supported switch:

  1. Only the packet-start anchor is supported.
  2. Ensure the offset is within the Min/Max truncate size bounds reported by the show switch all property command. If the configured value is beyond the bound, then DMF chooses the closest value of the range.

    For example, if a user configures the offset as 64, and the min truncate offset reported by switch properties is 100, then the offset used is 100. If the configured offset is 10,000 and the max truncate offset reported by the switch properties is 9236, then the offset used is 9236.

  3. A configured offset for slice-managed service includes FCS when programmed on a switch interface, which means an offset of 100 will result in a packet size of 96 bytes (accounting for 4-byte FCS).
  4. Configuring an offset below 17 is not allowed.
  5. The same service interface cannot chain multiple managed services.
  6. The insert-original-packet-length option is not applicable for switch-based slice-managed service.

CLI Show Commands

Use the show policy policy name command to see the runtime state of a policy using the slice-managed service. The command shows the service interface information and stats.

Controller# show policy packet-slicing-policy
Policy Name            : packet-slicing-policy
Config Status          : active - forward
Runtime Status         : installed
Detailed Status        : installed - installed to forward
Priority               : 100
Overlap Priority       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 1
# of filter interfaces : 1
# of delivery interfaces               : 1
# of core interfaces   : 0
# of services          : 1
# of pre service interfaces            : 1
# of post service interfaces           : 1
Push VLAN              : 1
Post Match Filter Traffic              : -
Total Delivery Rate    : -
Total Pre Service Rate : -
Total Post Service Rate: -
Overlapping Policies   : none
Component Policies     : none
Runtime Service Names  : packet-slicing-7280
Installed Time         : 2023-08-09 19:00:40 UTC
Installed Duration     : 1 hour, 17 minutes
~ Match Rules ~
# Rule
-|-----------|
1 1 match any

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name     State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|-----------|-----|---|-------|-----|--------|--------|------------------------------|
1 f1     7280   Ethernet2/1 up    rx  0       0     0        -        2023-08-09 19:00:40.305000 UTC

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name     State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|------|------|-----------|-----|---|-------|-----|--------|--------|------------------------------|
1 d1     7280   Ethernet3/1 up    tx  0       0     0        -        2023-08-09 19:00:40.306000 UTC

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service name        Role Switch IF Name      State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time
-|-------------------|----|------|------------|-----|---|-------|-----|--------|--------|------------------------------|
1 packet-slicing-7280 pre  7280   Ethernet10/1 up    tx  0       0     0        -        2023-08-09 19:00:40.305000 UTC
2 packet-slicing-7280 post 7280   Ethernet10/1 up    rx  0       0     0        -        2023-08-09 19:00:40.306000 UTC

~ Core Interface(s) ~
None.

~ Failed Path(s) ~
None.

Use the show managed-services command to view the status of all the managed services, including the packet-slicing managed service on a switch.

Controller# show managed-services
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Managed-services ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Name        Switch Switch Interface Installed Max Post-Service BW Max Pre-Service BW Total Post-Service BW Total Pre-Service BW
-|-------------------|------|----------------|---------|-------------------|------------------|---------------------|--------------------|
1 packet-slicing-7280 7280   Ethernet10/1     True      400Gbps             400Gbps            80bps 80bps

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Actions of Service Names ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Service Name        Sequence Service Action Slice Anchor Insert original packet length Slice Offset
-|-------------------|--------|--------------|------------|-----------------------------|------------|
1 packet-slicing-7280 1        slice          packet-start False         101

            

Using the GUI to Configure Packet Slicing - 7820 Switch

Perform the following steps to configure or edit a managed service.

Managed Service Configuration

  1. To configure or edit a managed service, navigate to the DMF Managed Services page from the Monitoring menu and select Managed Services.
    Figure 190. DANZ Monitoring Fabric (DMF) Managed Services
    Figure 191. DMF Managed Services Add Managed Service
  2. Configure a managed service interface on a switch that supports packet slicing. Make sure to deselect the Show Managed Device Switches Only checkbox.
    Figure 192. Create Managed Service
  3. Configure a new managed service action using Add Managed service action. The action chain supports only one action when configuring packet slicing on a switch.
    Figure 193. Add Managed service action
  4. Use Action > Slice with Anchor > Packet Start to configure the packet slicing managed service on a switch.
    Figure 194. Configure Managed Service Action
  5. Select Append to continue. The slice action appears on the Managed Services page.
    Figure 195. Slice Action Added

Interface Loopback Configuration

The managed service interface used for slice action must be in MAC loopback mode.

  1. Configure the loopback mode in the Fabric > Interfaces page by selecting the configuration icon of the interface.
    Figure 196. Interfaces
    Note: The image above has been edited for documentation purposes. The actual output will differ.
  2. Enable the toggle for MAC Loopback Mode (set the toggle to Yes).
    Figure 197. Edit Interface
  3. After all configuration changes are done Save the changes.

Policy Configuration

  1. Create a new policy from the DMF Policies page.
    Figure 198. DMF Policies Page
  2. Add the previously configured packet slicing managed service.
    Figure 199. Create Policy
  3. Select Add Service under the + Add Service(s) option shown above.
    Figure 200. Add Service

     

    Figure 201. Service Type - Service - Slice Action
  4. Select Add 1 Service and the slice-managed service (packet-slicing-policy) appears in the Create Policy page.
    Figure 202. Manage Service Added
  5. Select Create Policy and the new policy appears in DMF Policies.
    Figure 203. DMF Policy Configured
    Note: The images above have been edited for documentation purposes. The actual outputs may differ.

Troubleshooting Packet Slicing

The show switch all property command provides upper and lower bounds of packet slicing action’s offset. If bounds are present, the feature is supported; otherwise, the switch does not support the packet slicing feature.

The show fabric errors managed-service-error command provides information when DANZ Monitoring Fabric (DMF) fails to install a configured packet slicing managed service on a switch.

The following are some of the failure cases:
  1. The managed service interface is down.
  2. More than one action is configured on a managed service interface of the switch.
  3. The managed service interface on a switch is neither a physical interface nor a LAG port.
  4. A non-slice managed service is configured on a managed service interface of a switch.
  5. The switch does not support packet slicing managed service, and its interface is configured with slice action.
  6. Slice action configured on a switch interface is not using a packet-start anchor.
  7. The managed service interface is not in MAC loopback mode.

Use the following commands to troubleshoot packet-slicing issues.

Controller# show fabric errors managed-service-error
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Managed Service related error  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Error     Service Name
-|---------------------------------------------------------------------------------------------------------------------------------------------|-------------------|
1 Pre-service interface 7280-Ethernet10/1-to-managed-service on switch 7280 is inactive; Service interface Ethernet10/1 on switch 7280 is down  packet-slicing-7280
2 Post-service interface 7280-Ethernet10/1-to-managed-service on switch 7280 is inactive; Service interface Ethernet10/1 on switch 7280 is down packet-slicing-7280

The show switch switch name interface interface name dmf-stats command provides Rx and Tx rate information for the managed service interface.

Controller# show switch 7280 interface Ethernet10/1 dmf-stats
# Switch DPID Name         State Rx Rate Pkt Rate Peak Rate Peak Pkt Rate TX Rate Pkt Rate Peak Rate Peak Pkt Rate Pkt Drop Rate
-|-----------|------------|-----|-------|--------|---------|-------------|-------|--------|---------|-------------|-------------|
1 7280        Ethernet10/1 down  -       0        128bps    0 -       0        128bps    0 0

The show switch switch name interface interface name stats command provides Rx and Tx counter information for the managed service interface.

Controller# show switch 7280 interface Ethernet10/1 stats
# Name         Rx Pkts Rx Bytes Rx Drop Tx Pkts Tx Bytes Tx Drop
-|------------|-------|--------|-------|-------|--------|-------|
1 Ethernet10/1 22      843477   0       5140    845937   0

Packet Slicing Considerations

  1. Managed service action chaining is not supported when using a switch interface as a managed service interface.
  2. When configured for a supported switch, the managed service interface for slice action can only be a physical interface or a LAG.
  3. When using packet slicing managed service, packets ingressing on the managed service interface are not counted in the ingress interface counters, affecting the output of the show switch switch name interface interface name stats and show switch switch name interface interface name dmf-stats commands. This issue does not impact byte counters; all byte counters will show the original packet size, not the truncated size.
  4. A Dynamic Overlap policy causes all DMF-8.7.0 compatible 7820 switches to append an additional Vlan Tag Post Slice Service action. The default behavior of a fabric deployed in Push-per-Policy mode handles Single Vlan Strip at the delivery interface, removing the additional VLAN tag and leaving the original policy VLAN tag intact. In a non-default fabric deployment (Push-per-filter), to deliver the original packet to the tool node after a slice action, enable strip-two-vlan on the delivery interface.

VXLAN Stripping on the 7280R3 Switch

Virtual Extensible LAN Header Stripping

Virtual Extensible LAN (VXLAN) Header Stripping supports the delivery of decapsulated packets to tools and devices in a DANZ Monitoring Fabric (DMF) fabric. This feature removes the VXLAN header, previously established in a tunnel for reaching the TAP Aggregation switch or inherent to the tapped traffic within the DMF. Within the fabric, DMF supports the installation of the strip VXLAN service on a filter interface or a filter-and-delivery interface of a supported switch.

Platform Compatibility

For DMF deployments, the target platform is DCS-7280R3.

Use the show switch all property command to verify which switch in the DMF fabric supports this feature.

The feature is supported if the Strip Header Supported property has the value BSN_STRIP_HEADER_CAPS_VXLAN.
Note: The following example is displayed differently for documentation purposes than what appears when using the CLI.
# show switch all property
#                                    : 1
Switch                               : lyd599
Max Phys Port                        : 1000000
Min Lag Port                         : 1000001
Max Lag Port                         : 1000256
Min Tunnel Port                      : 15000001
Max Tunnel Port                      : 15001024
Max Lag Comps                        : 64
Tunnel Supported                     : BSN_TUNNEL_L2GRE
UDF Supported                        : BSN_UDF_6X2_BYTES
Enhanced Hash Supported              : BSN_ENHANCED_HASH_L2GRE,BSN_ENHANCED_HASH_L3,BSN_ENHANCED_HASH_L2,
                                       BSN_ENHANCED_HASH_MPLS,BSN_ENHANCED_HASH_SYMMETRIC
Strip Header Supported               : BSN_STRIP_HEADER_CAPS_VXLAN
Min Rate Limit                       : 1Mbps
Max Multicast Replication Groups     : 0
Max Multicast Replication Entries    : 0
PTP Timestamp Supported Capabilities : ptp-timestamp-cap-replace-smac, ptp-timestamp-cap-header-64bit,
                                       ptp-timestamp-cap-header-48bit, ptp-timestamp-cap-flow-based,
                                       ptp-timestamp-cap-add-header-after-l2
Min Truncate Offset                  : 100
Max Truncate Offset                  : 9236

Using the CLI to Configure VXLAN Header Stripping

Configuration

Use the following steps to configure strip-vxlan on a switch:

  1. Set the optional field strip-vxlan-udp-port at switch configuration, and the default udp-port for strip-vxlan is 4789.
  2. Enable or disable strip-vxlan on a filter or both-filter-and-delivery interface using the role both-filter-and-delivery interface-name filter-interface strip-vxlan command.
    > enable
    # config
    (config)# switch switch-name
    (config-switch)# strip-vxlan-udp-port udp-port-number                            
    (config-switch)# interface interface-name
    (config-switch-if)# role both-filter-and-delivery interface-name filter-interface strip-vxlan
    (config-switch-if)# role both-filter-and-delivery interface-name filter-interface no-strip-vxlan
    (config)# show running-config
  3. After enabling a filter interface with strip-vxlan, any policy can use it. From the config-policy submode, add the filter-interface to the policy:
    (config)# policy p1
    (config-policy)# filter-interface filter-interface

Proceed to Show Commands.

Show Commands

Use the show policy policy name command to see the runtime state of a policy using a filter interface with strip-vxlan configured. It will also show the service interface information and stats.
# show policy strip-vxlan 
Policy Name                            : strip-vxlan
Config Status                          : active - forward
Runtime Status                         : installed
Detailed Status                        : installed - installed to forward
Priority                               : 100
Overlap Priority                       : 0
# of switches with filter interfaces   : 1
# of switches with delivery interfaces : 1
# of switches with service interfaces  : 0
# of filter interfaces                 : 1
# of delivery interfaces               : 1
# of core interfaces                   : 0
# of services                          : 0
# of pre service interfaces            : 0
# of post service interfaces           : 0
Push VLAN                              : 1
Post Match Filter Traffic              : -
Total Delivery Rate                    : -
Total Pre Service Rate                 : -
Total Post Service Rate                : -
Overlapping Policies                   : none
Component Policies                     : none
Installed Time                         : 2024-05-02 19:54:27 UTC
Installed Duration                     : 1 minute, 18 secs
Timestamping enabled                   : False
~ Match Rules ~
# Rule        
-|-----------|
1 1 match any
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Filter Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name     State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time             
-|------|------|-----------|-----|---|-------|-----|--------|--------|------------------------------|
1 f1     lyd598 Ethernet1/1 up    rx  0       0     0        -        2024-05-02 19:54:27.141000 UTC
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Delivery Interface(s) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# DMF IF Switch IF Name     State Dir Packets Bytes Pkt Rate Bit Rate Counter Reset Time             
-|------|------|-----------|-----|---|-------|-----|--------|--------|------------------------------|
1 d1     lyd598 Ethernet2/1 up    tx  0       0     0        -        2024-05-02 19:54:27.141000 UTC
~ Service Interface(s) ~
None.
~ Core Interface(s) ~
None.
~ Failed Path(s) ~
None.

Using the GUI to Configure VXLAN Header Stripping

Filter Interface Configuration

To configure or edit a filter interface, proceed to Interfaces from the Monitoring menu and select Interfaces > Filter Interfaces .

Figure 204. Filter Interfaces
Figure 205. DMF Interfaces

Configure a filter interface on a switch that supports strip-vxlan.

Figure 206. Configure Filter Interface

Enable or Disable Strip VXLAN.

Figure 207. Enable Strip VXLAN
Figure 208. DMF Interfaces Updated

Policy Configuration

Create a new policy using DMF Policies and add the filter interface with strip VXLAN enabled.

Figure 209. Create Policy
Figure 210. Strip VXLAN Header

Select Add port(s) under the Traffic Sources option and add the Filter Interface.

Figure 211. Selected Traffic Sources

Add another delivery interface and create the policy.

Figure 212. Policy Created

Syslog Messages

There are no syslog messages associated with this feature.

Troubleshooting

The show switch all property command provides the Strip Header Supported property of the switch. If the value BSN_STRIP_HEADER_CAPS_VXLAN is present, the feature is supported; otherwise, the switch does not support this feature.

The show fabric warnings feature-unsupported-on-device command provides information when DMF fails to enable strip-vxlan on an unsupported switch.

The show switch switch-name table strip-vxlan-header command provides the gentable details.

The following are examples of several failure cases:

  1. The filter interface is down.
  2. The interface with strip-vxlan is neither a filter interface nor a filter-and-delivery interface.
  3. The switch does not support strip-vxlan.
  4. Tunneling / UDF is enabled simultaneously with strip-vxlan.
  5. Unsupported pipeline mode with strip-vxlan enabled (strip-vxlan requires a specific pipeline mode strip-vxlan-match-push-vlan).

Limitations

  • When configured for a supported switch, the filter interface for decap-vxlan action can only be a physical interface or a LAG.
  • It is not possible to enable strip-vxlan simultaneously with tunneling / UDF.
  • When enabling strip-vxlan on one or more switch interfaces on the same switch, other filter interfaces on the same switch cannot be matched on the VXLAN header.
*sFlow® is a registered trademark of Inmon Corp.