🔄 Symmetric Hashing in Cisco ACI: A Traffic
Balancing Philosophy
Imagine a highway with
multiple lanes, and cars (data packets) trying to reach their destination.
Normally, each car chooses a lane based on its starting point and destination.
But what if the return journey picks a different lane? That’s what happens with asymmetric
hashing — the forward and reverse paths of a data flow may travel
through different physical links.
In Cisco ACI, symmetric
hashing is like a rule that says: “If you go out through lane
3, you must come back through lane 3.” It ensures that both directions
of a traffic flow — from source to destination and back — follow the same
physical path within a port channel.
This matters a lot
when you're dealing with devices like firewalls, load balancers, or any system
that tracks sessions. If traffic enters through one link and exits through another, it can confuse these devices, leading to dropped packets or broken
connections.
Symmetric hashing is not supported on the following switches:
- Cisco Nexus 93128TX
- Cisco Nexus 9372PX
- Cisco Nexus 9372PX-E
- Cisco Nexus 9372TX
- Cisco Nexus 9372TX-E
- Cisco Nexus 9396PX
- Cisco Nexus 9396TX
🧠 Why Cisco ACI Made It Optional
Cisco ACI’s default
behavior is asymmetric — it spreads traffic across links based on a hash of
various packet fields (IP, MAC, ports). This works well for general load
balancing. But when precision and consistency are needed, ACI gives you
the option to enable symmetric hashing in the port-channel policy.
Once enabled, you can
choose the hashing algorithm — like using only IP addresses or including Layer
4 ports — to fine-tune how traffic is distributed.
✅ Use Cases That Benefit
- Firewall clusters that expect consistent
ingress/egress paths.
- Load balancers that rely on session stickiness.
- Troubleshooting scenarios where symmetric paths simplify
packet tracing.
No comments:
Post a Comment