Technology Overview
This overview of AVC technology includes the following topics:
Overview
The Cisco Application Visibility and Control (AVC) solution leverages multiple technologies to recognize, analyze, and control over 1000 applications, including voice and video, email, file sharing, gaming, peer-to-peer (P2P), and cloud-based applications. AVC combines several Cisco IOS/IOS XE components, as well as communicating with external tools, to integrate the following functions into a powerful solution.
Operating on Cisco IOS and Cisco IOS XE, NBAR2 utilizes innovative deep packet inspection (DPI) technology to identify a wide variety of applications within the network traffic flow, using L3 to L7 data.
NBAR2 can monitor over 1000 applications, and supports Protocol Pack updates for expanding application recognition, without requiring IOS upgrade or router reload.
Metric providers, an embedded monitoring agent, and Flexible NetFlow combine to provide a wide variety of network metrics data. The monitoring agent collects:
– TCP performance metrics such as bandwidth usage, response time, and latency.
– RTP performance metrics such as packet loss and jitter.
Performance metrics can be measured at multiple points within the router.
Metrics are aggregated and exported in NetFlow v9 or IPFIX format to a management and reporting package. Metrics records are sent out directly from the data plane when possible, to maximize system performance. When more complex processing is required, such as when the router is maintaining a history of exported records, records may be exported by the route processor, which is slower than direct export from the data plane.
Management and reporting systems, such as Cisco Prime Infrastructure or third-party tools, receive the network metrics data in Netflow v9 or IPFIX format, and provide a wide variety of system management and reporting functions. These functions include configuring metrics reporting, creating application and network performance reports, system provisioning, configuring alerts, and assisting in troubleshooting.
Using the Cisco Prime Infrastructure management console, an administrator can configure each router in the network remotely using a GUI.
Administrators can use industry-leading Quality of Service (QoS) capabilities to control application prioritization, manage application bandwidth, and so on. Cisco QoS employs the same deep packet inspection (DPI) technology used by NBAR2, to enable Cisco routers to reprioritize critical applications and enforce application bandwidth use.
Figure 2-1 provides a high level overview the functions of the Cisco AVC solution.
Figure 2-1 Functional Overview of the Cisco AVC Solution
AVC Features and Capabilities
Table 2-1 describes individual Cisco AVC solution features and their availability on Cisco IOS and Cisco IOS XE platforms. For a release-by-release history of AVC features and enhancements, see Appendix B, “AVC Feature History” .
|
|
|
|
---|---|---|---|
General |
|||
Cisco AVC combines application recognition, advanced metrics collection, sophisticated reporting, and network traffic control and optimization technologies into a unified solution. |
|||
Support on a wide range of Cisco routers operating with Cisco IOS and Cisco IOS XE |
For details about supported platforms and feature activation, see: |
||
For information, see NBAR Interoperability with Cisco GET VPN. |
|||
For information, see AVC Interoperability with Cisco GET VPN. |
|||
Provides a mode with more limited application classification and reporting, for performance optimization. For information, see Adaptive AVC Reporting. |
|||
Application Recognition |
|||
Provides application recognition. Uses an innovative deep packet inspection (DPI) technology to identify a wide variety of applications within the network traffic flow, using L3 to L7 data. NBAR2 can monitor over 1000 applications. |
|||
Expands NBAR2 application recognition without requiring IOS upgrade or router reload. |
|||
Metrics Collection |
|||
Account-On-Resolution configures FNF to collect data in a temporary memory location until the record key fields are resolved. After resolution of the record key fields, FNF combines the temporary data collected with the standard FNF records. Account-on-resolution is useful when the field used as a key is not available at the time that FNF receives the first packet. |
|||
A policy-map defined in Cisco Common Classification Policy Language (C3PL) filters the traffic to be reported. Traffic filters operate separately from other types of policy-maps employed in the system. |
|||
Cisco AppNav is the Wide Area Application Services (WAAS) diversion mechanism. AVC provides statistics before and after the AppNav WAAS service controller (AppNav SC), as well as inspecting and reporting application information on optimized traffic. For more information about Cisco AppNav, see: |
|||
Cisco Embedded Packet Capture (EPC) technology performs packet capture. For more information about Cisco EPC, see: |
|||
Flexible NetFlow (FNF) monitors can report on individual transactions within a flow. This enables greater resolution for traffic metrics. For more information, see: |
|||
Cisco AVC provides monitors to collect metrics related to Quality of Service (QoS) policy. Monitors can indicate:
For more information, see: |
|||
The Easy Performance Monitor (“Easy perf-mon” or “ezPM”) feature provides an “express” method of provisioning monitors. Easy perf-mon provides “profiles” that represent typical deployment or use-case scenarios. After a user selects a profile and specifies a small number of parameters, Easy perf-mon provides the remaining provisioning details. For more information, see: |
|||
Management and Reporting |
|||
The Cisco Prime Infrastructure management and reporting system is an integral part of the Cisco AVC solution and provides extensive management and reporting features, including provisioning the system, storing exported data, and generating reports. For more information about Cisco Prime Infrastructure, see: |
|||
Management and reporting products available from Cisco certified partners. |
For information, see the Cisco Developer Network Solutions Catalog: 2. In the Technologies list, select Application Visibility and Control . 3. Click Find Solution . A list of partner solutions appears. A Cisco Compatible logo indicates that the solution has passed compatibility tests with AVC. Note Operation of Solutions Catalog page is subject to change. |
||
Control |
|||
1.Applicable prior to Cisco IOS release 15.4(1)T where not specified. 2.Applicable prior to Cisco IOS XE release 3.11S where not specified. |
AVC Architecture
The following Cisco AVC components are described in this section:
- NBAR2
- Metric Mediation Agent
- Metric Providers
- Flexible NetFlow
- QoS
- Embedded Packet Capture
- Common Flow Table
- Management and Reporting Systems
Figure 2-2 describes the components in the Cisco AVC architecture.
Figure 2-2 AVC Architecture for Cisco IOS and Cisco IOS XE
NBAR2
Network Based Application Recognition 2 (NBAR2) provides native stateful deep packet inspection (DPI) capabilities. NBAR2 is the next generation of NBAR, enhancing the application recognition engine to support more than 1000 applications.
NoteNBAR2 functionality requires an advanced license. SeeAVC Licensed Features.
NBAR2 provides powerful capabilities, including:
- Categorizing applications into meaningful terms, such as category, sub-category, application group, and so on. This categorization simplifies report aggregation and control configuration.
- Field extraction of data such as HTTP URL, SIP domain, mail server, and so on. The extracted application information can be used for classification or can be exported by IPFIX to the collector for creating reports.
- Customized definition of applications, based on ports, payload values, or URL/Host of HTTP traffic.
- The set of attributes for each protocol can be customized.
Additional Application Protocol Definitions
With NBAR2 Protocol Packs, new and updated application signatures can be loaded into a router without upgrading the software image. Major protocol packs providing new and updated signatures are released periodically. Minor protocol packs are released between major releases; they provide updates and bug fixes. For information about protocol pack support, see: http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/prot_lib/config_library/nbar-prot-pack-library.html
In addition to the predefined application protocols, you can create customized application definitions based on ports, payload values, or URL/Host of the HTTP traffic. Protocol attributes, such as application categorization, sub-categorization, application group, and so on, can also be customized.
For more information, see: http://www.cisco.com/go/nbar
Metric Mediation Agent
|
|
---|---|
Prior to this release, on Cisco IOS platforms, Cisco AVC made use of the Measurement, Aggregation, and Correlation Engine (MACE). Beginning with the current release, MMA replaces MACE functionality. AVC continues to support MACE, but users are encouraged to migrate to MMA. For links to information about MACE configuration, see Appendix C, “References”. |
The Metric Mediation Agent (MMA) manages, correlates, and aggregates metrics from different metric providers. It provides the following functions:
- Controls traffic monitoring and filtering policy.
- Correlates data from multiple metric providers (see Metric Providers) into the same record.
- Aggregates metrics.
- Supports history and alert functions. This requires sending the metrics records to the route processor (RP) before exporting them to the management and reporting tools.
Metric Providers
Metric providers collect and calculate metrics and provide them to the Metric Mediation Agent (MMA) for correlation. There are a variety of metric providers: some collect simple, stateless metrics per packet, while other more complex metric providers track states and collect metrics per flow, transforming the metrics at the time of export and making sophisticated calculations. These transformations may require punting of records to the route processor (RP) before the metrics are exported to the management and reporting system.
The MMA compiles multiple metric providers of different types into the same record (see Metric Mediation Agent).
Flexible NetFlow
Netflow/IPFIX is the industry standard for acquiring operational data from IP networks to enable network planning, monitoring traffic analysis, and IP accounting. Flexible NetFlow (FNF) enables customizing traffic analysis parameters according to specific requirements. The AVC solution is compatible with NetFlow v9 (RFC-3954) and IPFIX (RFC-5101).
For more information, see: http://www.cisco.com/go/fnf
QoS
Cisco Quality of Service (QoS) provides prioritization, shaping, or rate-limiting of traffic. QoS can place designated applications into specific QoS classes/queues. This enables:
- Placing high priority, latency-sensitive traffic into a priority queue.
- Guaranteeing a minimum bandwidth for an individual application or for a group of applications within a QoS traffic class.
Similarly, QoS can also be used for “policing” or managing non-enterprise, recreational applications such as YouTube and Facebook.
The Cisco AVC solution integrates QoS functionality with NBAR2. QoS can use application information provided by NBAR2 in managing network traffic. The QoS class-map statements enable matching to NBAR2-supported applications and L7 application fields (such as HTTP URL or Host), as well as to NBAR2 attributes. Class-map statements can coexist with all other traditional QoS match attributes, such as IP, subnet, and DSCP.
Embedded Packet Capture
|
|
---|---|
Embedded Packet Capture (EPC) enables capturing the entire traffic for a given traffic class. The capture is limited only by available memory. The management and reporting system can read packets captured as a packet capture (pcap) file.
For more information, see: http://www.cisco.com/go/epc
Common Flow Table
The Common Flow Table (CFT) manages L4 connections and enables storing and retrieving states for each flow. Using a common flow table optimizes use of system memory and improves performance by storing and running data for each flow only once. The CFT standardizes flow management across the entire system.
Management and Reporting Systems
Cisco AVC operates with a variety of management and reporting systems.
- Cisco Prime Infrastructure Management and Reporting —For additional information, see Cisco Prime Infrastructure.
- Third-Party Management and Reporting Solutions —Cisco certifies solutions for AVC through the Cisco Developer Network. For a list of certified third-party management solutions, see the Cisco Developer Network Solutions Catalog:
1. Navigate to http://marketplace.cisco.com/catalog
3. In the Technologies list, select Application Visibility and Control .
4. Click Find Solution . A list of partner solutions appears. A Cisco Compatible logo indicates that the solution has passed compatibility tests with AVC.
Note Operation of the Solutions Catalog page is subject to change.
Cisco Prime Infrastructure
Cisco Prime Infrastructure provides infrastructure lifecycle management and end-to-end visibility of services and applications for improved troubleshooting. It combines the solution lifecycle from design phase to monitor and troubleshooting phase.
For configuration, Cisco Prime Infrastructure has a provisioning GUI and built-in templates for enabling AVC capabilities on network devices.
For monitoring, Cisco Prime Infrastructure leverages the rich information provided by the network infrastructure, such as routers, and provides network administrators with a single tool for monitoring both network and application performance.
Network administrators can use Cisco Prime Infrastructure to drill down from an enterprise-wide network view to an individual user at a site, to proactively monitor and troubleshoot network and application performance problems.
For more information, see: http://www.cisco.com/go/primeinfrastructure
Interoperability of AVC with other Services
Cisco AVC is interoperable with many router features and services. This section provides additional information about AVC integration with AppNav WAAS, NAT, and VRF.
- Interoperability with AppNav WAAS
- AppNav Interoperability with NAT and VRF
- NBAR Interoperability with Cisco GET VPN
- AVC Interoperability with Cisco GET VPN
Interoperability with AppNav WAAS
|
|
---|---|
Figure 2-3 shows a typical deployment scenario for Cisco AVC, demonstrating the integration with WAAS and the combination of optimized and pass-through traffic.
Figure 2-3 Typical AVC Deployment
Attachment to a WAAS-Enabled Interface
Cisco Wide Area Application Services (WAAS) provides WAN optimization and application acceleration. The Cisco AVC solution operates closely with Cisco WAAS, reporting performance on both optimized and unoptimized traffic.
Figure 2-4 shows two recommended locations for metric collection. The monitoring location on the WAN interface collects metrics for optimized and unoptimized traffic. The monitoring location on the unoptimized virtual interface collects metrics for unoptimized traffic.
Figure 2-4 Recommended WAAS Monitoring Points
Because optimized traffic may be exported twice (pre/post WAAS), a new segment field, servicesWaasSegment, is exported within the record in order to describe the type of traffic at the monitoring location. Table 2-2 describes the segment definitions.
Table 2-2 AppNav “servicesWaasSegment” Field Values
|
|
---|---|
For pass-through traffic (bypassing WAAS), the servicesWaasPassThroughReason field indicates the reason for pass-through. See the Cisco Application Visibility and Control Field Definition Guide for Third-Party Customers for a description of this field.
Application Recognition on Optimized Traffic
The interoperability of Cisco AVC and WAAS enables executing traffic policies and monitoring on optimized traffic, utilizing NBAR2 application recognition.
NoteWhen using WAAS, application L7 fields are only supported on unoptimized traffic. URL records must be attached on the unoptimized AppNav virtual interface.
Reported Input/Output Interfaces
Table 2-3 describes the input/output interface field values used by AppNav when a monitor is attached to the WAN, LAN, or an AppNav virtual interface.
Table 2-3 AppNav Exported Interfaces
|
|
|
|
---|---|---|---|
AppNav Interoperability with NAT and VRF
|
|
---|---|
When AppNav is enabled, it uses the virtual routing and forwarding (VRF) configuration of the LAN interface although it is installed on the WAN interface. AppNav uses the LAN VRF to divert traffic to WAAS, based on local addresses.
Up to three tuples can be used per flow. Figure 2-5 shows an example. Using more than one tuple can be necessary because of different VRF configurations and/or NAT translation. The NBAR/FNF/AppNav features in the path interact together using the same flow.
Figure 2-5 AppNav Interaction in VRF/NAT Cases
NBAR Interoperability with Cisco GET VPN
|
|
---|---|
Background
Cisco Group Encrypted Transport VPN (GET VPN) is a tunnel-less VPN technology designed to provide the security of encrypted communication, with high media performance, such as lower audio/video latency, and advanced provisioning and management abilities. When using GET VPN, the router performs the encryption and decryption of the VPN traffic.
Encrypted Traffic and NBAR Functionality
Prior to IOS XE release 3.11S, for encrypted traffic, the NBAR component operated on the traffic in its encrypted form. As a result, NBAR was not able to provide deep packet inspection of GET VPN traffic.
Beginning with release 3.11S, NBAR operates on clear traffic (after decryption for ingress, before encryption for egress). This enables running output QoS on inspected applications. In this release, input QoS and reporting in this release continue to operate on encrypted traffic.
To revert to the NBAR functionality that existed prior to release 3.11S, use the following command:
NoteEnabling NBAR to operate on encrypted traffic requires additional processing, which may impact overall performance.
Limitations
The following limitations apply to NBAR interoperability with GET VPN:
- As in previous releases, QoS continues to operate on ingress traffic in its encrypted form, utilizing application identification information provided by the NBAR legacy component.
- In this release, only the operation of NBAR and QoS output have changed. AVC visibility functionality is not supported for GET VPN encrypted traffic.
Related Topics
- For more information about Cisco GET VPN, see Group Encrypted Transport VPN .
- AVC Interoperability with Cisco GET VPN
AVC Interoperability with Cisco GET VPN
|
|
---|---|
Background
Cisco Group Encrypted Transport VPN (GET VPN) is a tunnel-less VPN technology designed to provide the security of encrypted communication, with high media performance, such as lower audio/video latency, and advanced provisioning and management abilities. When using GET VPN, the router performs the encryption and decryption of the VPN traffic.
Encrypted Traffic and AVC Functionality
Beginning with Cisco IOS XE 3.12S, when GET VPN is configured, AVC operates on clear text traffic (after decryption for ingress to the interface, before encryption for egress from the interface).
This clear text functionality applies to the following traffic types:
The feature does not apply to the following:
FNF native monitors continue to operate in the same way as prior to release 3.12S, operating on traffic on the encrypted side.
Overriding AVC Operation on Clear Text
The default behavior when using GET VPN is for AVC to operate on clear text.
In special circumstances, it may be useful to disable the feature enabling AVC to operate on clear text. To revert to the AVC functionality that existed prior to release 3.12S, use the following command (in general configuration mode):
To disable the feature on all policies attached to interfaces configured with GET VPN:
Limitations
The following limitations apply to AVC interoperability with GET VPN:
- For performance monitors, FNF on the egress side operates on traffic before encryption. Consequently, the accounting includes egress traffic that might be dropped later by other features, such as QoS and ACL.
- For performance monitors, FNF on the egress side operates before QoS. Consequently, QoS class hierarchy and QoS queue ID cannot be collected.
- The following L2 fields cannot be matched or collected:
– datalink destination-vlan-id
– datalink mac source address output
- When Perf-mon and native FNF are configured on an interface and operating in full GET VPN interoperability mode, native FNF monitors do not support account on resolution (AOR). Do not configure AOR on these monitors.
- AVC cannot operate on both clear and encrypted traffic.
- AVC interoperability with GET VPN is not supported on tunnel interfaces.
Related Topics
- For more information about Cisco GET VPN, see Group Encrypted Transport VPN .
- NBAR Interoperability with Cisco GET VPN
Adaptive AVC Reporting
|
|
---|---|
The Cisco AVC solution can operate in different modes—“working points”—to adapt to various deployments and use cases. This feature, known as Adaptive AVC Reporting, provides options to operate in a more powerful “fine grain” mode, with more extensive, granular application reporting, or in a “coarse grain” mode with application-level statistics reporting in place of detailed flow-level metrics.
NotePrior to Cisco IOS 15.4(3)T and IOS XE 3.13S, AVC operated only in the fine grain mode.
Selecting the AVC mode to use depends on use case objectives. Easy Performance Monitor (ezPM) provides an “express” method for configuring AVC in one of these modes. (See Easy Performance Monitor.)
- Fine-grain mode: The ezPM “Application Experience” profile provides extensive, fine-grain reporting, including flow-level performance monitoring metrics. (See Application Experience Profile.)
- Coarse-grain mode: The ezPM “Application Statistics” profile provides a simpler level of AVC functionality, especially suitable to the common use cases of capacity planning and troubleshooting network congestion. This mode reports top application usage and the bandwidth utilized by each application. (See Application Statistics Profile.)
Comparison of Fine-Grain and Coarse-Grain AVC Functionality
Table 2-4 compares fine-grain and coarse-grain AVC functionality.
Table 2-4 Comparison: Fine-Grain and Coarse-Grain Functionality
Combining Fine and Coarse-Grain Working Points
Some use cases may require a combination of fine and coarse-grain working points. For example, it may be necessary to configure coarse-grain monitoring for all interface traffic, with fine-grain monitoring for a small subset of the traffic.
To achieve this, it is possible to define multiple contexts operating in parallel: one for a coarse-grain working point and another for fine-grain.
NoteIt is not possible to combine two fine-grain contexts on the same interface.
As an example use case, it may be necessary to define a configuration that:
- Provides coarse-grain monitoring for all traffic on an interface.
- Reports performance metrics for specific critical applications. This would require defining fine-grain monitoring for that application traffic.
For an examples of configuring two contexts on a single interface, one for fine-grain reporting and another for coarse-grain, see Easy Perf-Mon Configuration Example 4: Two Contexts Configured on a Single Interface.