Technology Overview

Revised: March 2014

This overview of AVC technology includes the following topics:

Overview

The Cisco Application Visibility and Control (AVC) solution leverages multiple technologies to recognize, analyze, and control over 1000 applications, including voice and video, email, file sharing, gaming, peer-to-peer (P2P), and cloud-based applications. AVC combines several Cisco IOS/IOS XE components, as well as communicating with external tools, to integrate the following functions into a powerful solution.

  • Application Recognition

Operating on Cisco IOS and Cisco IOS XE, NBAR2 utilizes innovative deep packet inspection (DPI) technology to identify a wide variety of applications within the network traffic flow, using L3 to L7 data.

NBAR2 can monitor over 1000 applications, and supports Protocol Pack updates for expanding application recognition, without requiring IOS upgrade or router reload.

  • Metrics Collection and Exporting

Metric providers, an embedded monitoring agent, and Flexible NetFlow combine to provide a wide variety of network metrics data. The monitoring agent collects:

TCP performance metrics such as bandwidth usage, response time, and latency.

RTP performance metrics such as packet loss and jitter.

Performance metrics can be measured at multiple points within the router.

Metrics are aggregated and exported in NetFlow v9 or IPFIX format to a management and reporting package. Metrics records are sent out directly from the data plane when possible, to maximize system performance. When more complex processing is required, such as when the router is maintaining a history of exported records, records may be exported by the route processor, which is slower than direct export from the data plane.

  • Management and Reporting Systems

Management and reporting systems, such as Cisco Prime Infrastructure or third-party tools, receive the network metrics data in Netflow v9 or IPFIX format, and provide a wide variety of system management and reporting functions. These functions include configuring metrics reporting, creating application and network performance reports, system provisioning, configuring alerts, and assisting in troubleshooting.

Using the Cisco Prime Infrastructure management console, an administrator can configure each router in the network remotely using a GUI.

  • Control

Administrators can use industry-leading Quality of Service (QoS) capabilities to control application prioritization, manage application bandwidth, and so on. Cisco QoS employs the same deep packet inspection (DPI) technology used by NBAR2, to enable Cisco routers to reprioritize critical applications and enforce application bandwidth use.

Figure 2-1 provides a high level overview the functions of the Cisco AVC solution.

Figure 2-1 Functional Overview of the Cisco AVC Solution

 

AVC Features and Capabilities

Table 2-1 describes individual Cisco AVC solution features and their availability on Cisco IOS and Cisco IOS XE platforms. For a release-by-release history of AVC features and enhancements, see Appendix B, “AVC Feature History” .

Table 2-1 AVC Features

l.

Feature
Description
Available on IOS Platforms1
Available on IOS XE Platforms2

General

Unified Solution

Cisco AVC combines application recognition, advanced metrics collection, sophisticated reporting, and network traffic control and optimization technologies into a unified solution.

Yes

Release 3.4S and later

IPv6 Support

Cisco AVC supports both IPv4 and IPv6.

Yes

Release 3.5S and later

Support on a wide range of Cisco routers operating with Cisco IOS and Cisco IOS XE

For details about supported platforms and feature activation, see:
AVC Supported Platforms
AVC Licensed Features

Yes

Yes

NBAR Interoperability with Cisco GET VPN

For information, see NBAR Interoperability with Cisco GET VPN.

Release 3.11S and later

AVC Interoperability with Cisco GET VPN

For information, see AVC Interoperability with Cisco GET VPN.

Release 3.12S and later


Application Recognition

Network Based Application Recognition 2 (NBAR2)

Provides application recognition. Uses an innovative deep packet inspection (DPI) technology to identify a wide variety of applications within the network traffic flow, using L3 to L7 data. NBAR2 can monitor over 1000 applications.

Yes

3.4S

Protocol Pack updates

Expands NBAR2 application recognition without requiring IOS upgrade or router reload.

Yes

3.4S


Metrics Collection

Accounting

  • Accounting of all metrics is performed by Flexible NetFlow (FNF) and the IPFIX exporter.
  • Multiple parallel monitors with overlapping data for the same traffic are permitted.
  • Flexible record keys provide different aggregation schemes for different traffic types.

Yes

3.4S

Media Monitoring

Media performance metrics are provided by Cisco Medianet technology. For more information, see:
http://www.cisco.com/web/solutions/trends/medianet/index.html

Yes

3.4S

Traffic Filtering

A policy-map defined in Cisco Common Classification Policy Language (C3PL) filters the traffic to be reported. Traffic filters operate separately from other types of policy-maps employed in the system.

Yes

3.4S

Interoperability with Cisco AppNav

Cisco AppNav is the Wide Area Application Services (WAAS) diversion mechanism. AVC provides statistics before and after the AppNav WAAS service controller (AppNav SC), as well as inspecting and reporting application information on optimized traffic. For more information about Cisco AppNav, see:
http://www.cisco.com/en/US/prod/collateral/contnetw/ps5680/ps6474/white_paper_c11-705318.html

3.4S

Packet Capture

Cisco Embedded Packet Capture (EPC) technology performs packet capture. For more information about Cisco EPC, see:
http://www.cisco.com/en/US/products/ps9913/products_ios_protocol_group_home.html

3.4S

Reporting on Individual Transactions

Flexible NetFlow (FNF) monitors can report on individual transactions within a flow. This enables greater resolution for traffic metrics. For more information, see:
Connection/Transaction Metrics

3.9S

QoS Metrics

Cisco AVC provides monitors to collect metrics related to Quality of Service (QoS) policy. Monitors can indicate:

  • Packets dropped on an interface, per QoS queue, due to a QoS policy that limits resources available to a specific type of traffic.
  • Class hierarchy (indicating traffic priority) of a reported flow, as determined by the QoS policy map.

For more information, see:
QoS Metrics: Cisco IOS XE Platforms

Yes

3.4S

Easy Performance Monitor Configuration

The Easy Performance Monitor (“Easy perf-mon” or “ezPM”) feature provides an “express” method of provisioning monitors. Easy perf-mon provides “profiles” that represent typical deployment scenarios. After a user selects a profile and specifies a small number of parameters, Easy perf-mon provides the remaining provisioning details. In its initial release, it provided one profile, based on the exporting model improvements of the same release. Subsequent releases provide additional options. For more information, see:
Easy Performance Monitor

15.4(1)T

3.10S

Customizing attribute values

See Customizing Attribute Values.

15.4(1)T

3.11S


Management and Reporting

Cisco Prime Infrastructure 2.0 or later

The Cisco Prime Infrastructure management and reporting system is an integral part of the Cisco AVC solution and provides extensive management and reporting features, including provisioning the system, storing exported data, and generating reports. For more information about Cisco Prime Infrastructure, see:

http://www.cisco.com/en/US/products/ps12239/index.html

Yes

3.4S

Management and reporting products available from Cisco certified partners.

For information, see the Cisco Developer Network Solutions Catalog:
http://marketplace.cisco.com/catalog

1. Select Technology .

2. In the Technologies list, select Application Visibility and Control .

3. Click Find Solution . A list of partner solutions appears. A Cisco Compatible logo indicates that the solution has passed compatibility tests with AVC.

Note Operation of Solutions Catalog page is subject to change.

Yes

Yes


Control

Cisco Quality of Service (QoS)

For information, see:
http://www.cisco.com/go/qos

Yes

Yes

1.Applicable prior to Cisco IOS release 15.4(1)T where not specified.

2.Applicable prior to Cisco IOS XE release 3.11S where not specified.

AVC Architecture

The following Cisco AVC components are described in this section:

Figure 2-2 describes the components in the Cisco AVC architecture.

Figure 2-2 AVC Architecture for Cisco IOS and Cisco IOS XE

 

NBAR2

Network Based Application Recognition 2 (NBAR2) provides native stateful deep packet inspection (DPI) capabilities. NBAR2 is the next generation of NBAR, enhancing the application recognition engine to support more than 1000 applications.


Note Full NBAR2 functionality requires an advanced license, providing full AVC functionality. See AVC Licensed Features.


NBAR2 provides powerful capabilities, including:

  • Categorizing applications into meaningful terms, such as category, sub-category, application group, and so on. This categorization simplifies report aggregation and control configuration.
  • Field extraction of data such as HTTP URL, SIP domain, mail server, and so on. The extracted application information can be used for classification or can be exported by IPFIX to the collector for creating reports.
  • Customized definition of applications, based on ports, payload values, or URL/Host of HTTP traffic.
  • The set of attributes for each protocol can be customized.

Additional Application Protocol Definitions

With NBAR2 Protocol Packs, new and updated application signatures can be loaded into a router without upgrading the software image. Major protocol packs providing new and updated signatures are released periodically. Minor protocol packs are released between major releases; they provide updates and bug fixes. For information about protocol pack support, see: http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/prot_lib/config_library/nbar-prot-pack-library.html

In addition to the predefined application protocols, you can create customized application definitions based on ports, payload values, or URL/Host of the HTTP traffic. Protocol attributes, such as application categorization, sub-categorization, application group, and so on, can also be customized.

For more information, see: http://www.cisco.com/go/nbar

Metric Mediation Agent

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Added in release 15.4(1)T.

Prior to this release, on Cisco IOS platforms, Cisco AVC made use of the Measurement, Aggregation, and Correlation Engine (MACE). Beginning with the current release, MMA replaces MACE functionality. AVC continues to support MACE, but users are encouraged to migrate to MMA.

For links to information about MACE configuration, see Appendix C, “References”.

Added in release 3.8S.

The Metric Mediation Agent (MMA) manages, correlates, and aggregates metrics from different metric providers. It provides the following functions:

  • Controls traffic monitoring and filtering policy.
  • Correlates data from multiple metric providers (see Metric Providers) into the same record.
  • Aggregates metrics.
  • Supports history and alert functions. This requires sending the metrics records to the route processor (RP) before exporting them to the management and reporting tools.

Metric Providers

Metric providers collect and calculate metrics and provide them to the Metric Mediation Agent (MMA) for correlation. There are a variety of metric providers: some collect simple, stateless metrics per packet, while other more complex metric providers track states and collect metrics per flow, transforming the metrics at the time of export and making sophisticated calculations. These transformations may require punting of records to the route processor (RP) before the metrics are exported to the management and reporting system.

The MMA compiles multiple metric providers of different types into the same record (see Metric Mediation Agent).

Flexible NetFlow

Netflow/IPFIX is the industry standard for acquiring operational data from IP networks to enable network planning, monitoring traffic analysis, and IP accounting. Flexible NetFlow (FNF) enables customizing traffic analysis parameters according to specific requirements. The AVC solution is compatible with NetFlow v9 (RFC-3954) and IPFIX (RFC-5101).

For more information, see: http://www.cisco.com/go/fnf

QoS

Cisco Quality of Service (QoS) provides prioritization, shaping, or rate-limiting of traffic. QoS can place designated applications into specific QoS classes/queues. This enables:

  • Placing high priority, latency-sensitive traffic into a priority queue.
  • Guaranteeing a minimum bandwidth for an individual application or for a group of applications within a QoS traffic class.

Similarly, QoS can also be used for “policing” or managing non-enterprise, recreational applications such as YouTube and Facebook.

The Cisco AVC solution integrates QoS functionality with NBAR2. QoS can use application information provided by NBAR2 in managing network traffic. The QoS class-map statements enable matching to NBAR2-supported applications and L7 application fields (such as HTTP URL or Host), as well as to NBAR2 attributes. Class-map statements can coexist with all other traditional QoS match attributes, such as IP, subnet, and DSCP.

For more information, see: http://www.cisco.com/go/qos

Embedded Packet Capture

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Not available

Added in release 3.8S

Embedded Packet Capture (EPC) enables capturing the entire traffic for a given traffic class. The capture is limited only by available memory. The management and reporting system can read packets captured as a packet capture (pcap) file.

For more information, see: http://www.cisco.com/go/epc

Common Flow Table

The Common Flow Table (CFT) manages L4 connections and enables storing and retrieving states for each flow. Using a common flow table optimizes use of system memory and improves performance by storing and running data for each flow only once. The CFT standardizes flow management across the entire system.

Management and Reporting Systems

Cisco AVC operates with a variety of management and reporting systems.

  • Cisco Prime Infrastructure Management and Reporting —For additional information, see Cisco Prime Infrastructure.
  • Third-Party Management and Reporting Solutions —Cisco certifies solutions for AVC through the Cisco Developer Network. For a list of certified third-party management solutions, see the Cisco Developer Network Solutions Catalog:

1. Navigate to http://marketplace.cisco.com/catalog

2. Select Technology .

3. In the Technologies list, select Application Visibility and Control .

4. Click Find Solution . A list of partner solutions appears. A Cisco Compatible logo indicates that the solution has passed compatibility tests with AVC.


Note Operation of the Solutions Catalog page is subject to change.


Cisco Prime Infrastructure

Cisco Prime Infrastructure provides infrastructure lifecycle management and end-to-end visibility of services and applications for improved troubleshooting. It combines the solution lifecycle from design phase to monitor and troubleshooting phase.

For configuration, Cisco Prime Infrastructure has a provisioning GUI and built-in templates for enabling AVC capabilities on network devices.

For monitoring, Cisco Prime Infrastructure leverages the rich information provided by the network infrastructure, such as routers, and provides network administrators with a single tool for monitoring both network and application performance.

Network administrators can use Cisco Prime Infrastructure to drill down from an enterprise-wide network view to an individual user at a site, to proactively monitor and troubleshoot network and application performance problems.

For more information, see: http://www.cisco.com/go/primeinfrastructure

Interoperability of AVC with other Services

Cisco AVC is interoperable with many router features and services. This section provides additional information about AVC integration with AppNav WAAS, NAT, and VRF.

Interoperability with AppNav WAAS

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Not available

Added in release 3.8S

Figure 2-3 shows a typical deployment scenario for Cisco AVC, demonstrating the integration with WAAS and the combination of optimized and pass-through traffic.

Figure 2-3 Typical AVC Deployment

 

Attachment to a WAAS-Enabled Interface

Cisco Wide Area Application Services (WAAS) provides WAN optimization and application acceleration. The Cisco AVC solution operates closely with Cisco WAAS, reporting performance on both optimized and unoptimized traffic.

Figure 2-4 shows two recommended locations for metric collection. The monitoring location on the WAN interface collects metrics for optimized and unoptimized traffic. The monitoring location on the unoptimized virtual interface collects metrics for unoptimized traffic.

Figure 2-4 Recommended WAAS Monitoring Points

 

Because optimized traffic may be exported twice (pre/post WAAS), a new segment field, servicesWaasSegment, is exported within the record in order to describe the type of traffic at the monitoring location. Table 2-2 describes the segment definitions.

Table 2-2 AppNav “servicesWaasSegment” Field Values

Value
Description

0

Unknown

1

Client unoptimized

2

Server optimized

4

Client optimized

8

Server unoptimized

16

Pass-through

For pass-through traffic (bypassing WAAS), the servicesWaasPassThroughReason field indicates the reason for pass-through. See the Cisco Application Visibility and Control Field Definition Guide for Third-Party Customers for a description of this field.

Application Recognition on Optimized Traffic

The interoperability of Cisco AVC and WAAS enables executing traffic policies and monitoring on optimized traffic, utilizing NBAR2 application recognition.


Note When using WAAS, application L7 fields are only supported on unoptimized traffic. URL records must be attached on the unoptimized AppNav virtual interface.


Reported Input/Output Interfaces

Table 2-3 describes the input/output interface field values used by AppNav when a monitor is attached to the WAN, LAN, or an AppNav virtual interface.

Table 2-3 AppNav Exported Interfaces

Interface
Direction
Input interface value
Output interface value

WAN

Ingress

WAN

LAN

WAN

Egress

LAN

WAN

Optimized VI

Ingress

Optimized VI

LAN

Optimized VI

Egress

WAN

Optimized VI

UnOptimized VI

Ingress

UnOptimized VI

LAN

UnOptimized VI

Egress

LAN

UnOptimized VI

LAN

Ingress

LAN

WAN

LAN

Egress

WAN

LAN

AppNav Interoperability with NAT and VRF

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Not available

Added in release 3.8S

When AppNav is enabled, it uses the virtual routing and forwarding (VRF) configuration of the LAN interface although it is installed on the WAN interface. AppNav uses the LAN VRF to divert traffic to WAAS, based on local addresses.

Up to three tuples can be used per flow. Figure 2-5 shows an example. Using more than one tuple can be necessary because of different VRF configurations and/or NAT translation. The NBAR/FNF/AppNav features in the path interact together using the same flow.

Figure 2-5 AppNav Interaction in VRF/NAT Cases

 

NBAR Interoperability with Cisco GET VPN

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Not available

Added in release 3.11S

Background

Cisco Group Encrypted Transport VPN (GET VPN) is a tunnel-less VPN technology designed to provide the security of encrypted communication, with high media performance, such as lower audio/video latency, and advanced provisioning and management abilities. When using GET VPN, the router performs the encryption and decryption of the VPN traffic.

Encrypted Traffic and NBAR Functionality

Prior to IOS XE release 3.11S, for encrypted traffic, the NBAR component operated on the traffic in its encrypted form. As a result, NBAR was not able to provide deep packet inspection of GET VPN traffic.

Beginning with release 3.11S, NBAR operates on clear traffic (after decryption for ingress, before encryption for egress). This enables running output QoS on inspected applications. In this release, input QoS and reporting in this release continue to operate on encrypted traffic.

To revert to the NBAR functionality that existed prior to release 3.11S, use the following command:

ip nbar disable classification encrypted-app

Note Enabling NBAR to operate on encrypted traffic requires additional processing, which may impact overall performance.


Limitations

The following limitations apply to NBAR interoperability with GET VPN:

  • As in previous releases, QoS continues to operate on ingress traffic in its encrypted form, utilizing application identification information provided by the NBAR legacy component.
  • In this release, only the operation of NBAR and QoS output have changed. AVC visibility functionality is not supported for GET VPN encrypted traffic.

Related Topics

AVC Interoperability with Cisco GET VPN

 

Cisco IOS Platforms
Cisco IOS XE Platforms

Not available

Added in release 3.12S

Background

Cisco Group Encrypted Transport VPN (GET VPN) is a tunnel-less VPN technology designed to provide the security of encrypted communication, with high media performance, such as lower audio/video latency, and advanced provisioning and management abilities. When using GET VPN, the router performs the encryption and decryption of the VPN traffic.

Encrypted Traffic and AVC Functionality

Beginning with Cisco IOS XE 3.12S, when GET VPN is configured, AVC operates on clear text traffic (after decryption for ingress to the interface, before encryption for egress from the interface).

This clear text functionality applies to the following traffic types:

  • IPv4 unicast
  • IPv4 multicast
  • IPv6 unicast
  • IPv6 multicast

The feature does not apply to the following:

  • Virtual (tunnel) interfaces
  • Native FNF monitors attached to the same interface

FNF Native Monitors

FNF native monitors continue to operate in the same way as prior to release 3.12S, operating on traffic on the encrypted side.

Overriding AVC Operation on Clear Text

The default behavior when using GET VPN is for AVC to operate on clear text.

In special circumstances, it may be useful to disable the feature enabling AVC to operate on clear text. To revert to the AVC functionality that existed prior to release 3.12S, use the following command (in general configuration mode):

performance monitor observation-point encrypted-text

Example

To disable the feature on all policies attached to interfaces configured with GET VPN:

Device# configure t
Device(conf)# performance monitor observation-point encrypted-text
 

Limitations

The following limitations apply to AVC interoperability with GET VPN:

  • For performance monitors, FNF on the egress side operates on traffic before encryption. Consequently, the accounting includes egress traffic that might be dropped later by other features, such as QoS and ACL.
  • For performance monitors, FNF on the egress side operates before QoS. Consequently, QoS class hierarchy and QoS queue ID cannot be collected.
  • The following L2 fields cannot be matched or collected:

datalink destination-vlan-id

datalink mac source address output

  • When Perf-mon and native FNF are configured on an interface and operating in full GET VPN interoperability mode, native FNF monitors do not support account on resolution (AOR). Do not configure AOR on these monitors.
  • AVC cannot operate on both clear and encrypted traffic.
  • AVC interoperability with GET VPN is not supported on tunnel interfaces.

Related Topics