Browse Definitions :
Definition

IP SLA (Cisco)

What is Cisco IP SLA?

Internet protocol service level agreement (IP SLA) is a network performance monitoring (NPM) feature of the Cisco Internetwork Operating System (Cisco IOS) that enables an IT professional to collect information about network performance in real time.

Cisco IOS IP SLA provides a way to monitor network performance and report on it with the help of statistics. IP SLA generates and monitors traffic continuously across the network, which is why it's considered an active method of network monitoring.

A Cisco IOS IP SLA router can continuously collect data about various aspects of the network, including:

All of this information provides the network administrator with baseline information about network performance. It also enables them to verify the network's quality of service (QoS) levels and quickly identify the root of a problem if performance levels drop.

How Cisco IP SLA works

For the IP SLA feature to work, certain components must first be determined and configured:

  • Select the type of IP SLA operation to be configured: Internet Control Message Protocol (ICMP) jitter, HTTP GET request, Domain Name System (DNS) server request, voice over IP, etc.
  • Specify the IP SLA operation number, which is between 1 and 2147483647.
  • Configure the IP SLA schedule so the IP SLA router knows when to run and stop the IP SLA operation.

A Cisco IP SLA router can monitor a network and provide useful network statistics even if there is no router or device at the other end. However, adding a router or device -- which is known as an SLA Responder -- can facilitate more detailed information reporting about the network. The SLA Responder can be another Cisco device -- such as a router -- or a non-Cisco device such as a computer or a remote network application server.

Configuring an SLA Responder enables IP SLA to perform more complex operations, such as sending Real-Time Transport Protocol packets, setting up Transmission Control Protocol (TCP) connections or checking File Transfer Protocol (FTP) servers. If a certain IP SLA operation could benefit from an SLA Responder, configure it before the SLA operation begins.

An admin must configure the ICMP jitter operation to send an ICMP timestamp request. This Type 13 request goes to the configured destination host and retrieves an ICMP timestamp reply response from the destination.

The IP SLA Responder receives a packet and inserts timestamps of both its reception and transmission. These two timestamps enable the IP SLA packet to measure the packet round-trip time (RTT) from the source to the destination, as well as how long it takes the destination to process the packet. If the IP SLA's probe response time is longer than expected, it could be a sign that the receiving device has too high a load. Network engineers can investigate the issue to find the root cause and improve network performance.

Using IP SLA in conjunction with other features

Cisco IP SLA can be used in conjunction with other monitoring features, including Simple Network Management Protocol (SNMP ) and NetFlow, to determine the root cause of network issues. Using an SNMP agent to poll the IP SLA router helps to retrieve IP SLA reports and make them more readable and understandable for human users. Agents also make it easier to record, graph and view historical data about IP SLA results. Popular SNMP agents include Cacti, SolarWinds and PRTG.

When organizations integrate IP SLA with a network management system (NMS), they can capture visual alerts of threshold violations in real-time. IP SLA can also be integrated with static routes, predetermined pathways that data packets must travel to reach a destination network or host. IP SLA can also be combined with routing protocols like Open Shortest Path First (OSPF) or Enhanced Interior Gateway Routing Protocol (EIGRP).

https://cdn.ttgtmedia.com/rms/onlineimages/11_essential_network_management_tasks-f.png
Integrating Cisco IP SLA with a network management system enables organizations to capture visual alerts of threshold violations in real time.

What are the benefits of IP SLA?

IP SLA on Cisco IOS devices provides a useful way to monitor and ensure network performance. The feature also enables network engineers and administrators to investigate network issues and discover their root causes with the help of tangible statistics.

Engineers can use IP SLA to monitor traffic paths to a destination to confirm that a particular web server is accepting connections. Wide area networks (WANs) that connect multiple geographies and require monitoring from one central location can benefit from IP SLA.

IP SLA is also useful for policy-based routing, a technique for forwarding data packets based on certain policies or filters. The policies can be applied based on specific parameters such as packet size, source address, destination address or traffic type to improve the network's traffic-handling capabilities and its overall agility.

diagram of how a wide area network works
WANs can benefit from Cisco IP SLA.

What is IP SLA used for?

The IP SLA feature enables Cisco routers to simulate specific types of traffic, such as User Datagram Protocol (UDP) jitter, HTTP, TCP connect, ICMP echo, DNS, FTP and DHCP, and report statistics such as path jitter. This helps network engineers to analyze network performance and identify performance issues.

IP SLA can also measure application performance. Network engineers can use one of many available application configuration options such as TCP/UDP port numbers and TOS byte.

Other useful applications of Cisco IP SLA include:

  • Track reachability and decrement Hot Standby Router Protocol (HSRP)/ Virtual Router Redundancy Protocol (VRRP)priority values.
  • Measurement of network availability and reliability.
  • Generation of SNMP traps from various events, such as one-way packet loss, connection loss and timeout.
  • Design and optimization of network topologies.
image showing different layouts of network topologies.
Organizations can use Cisco IP SLA to help design and optimize network topologies.

Check out seven top open source network monitoring tools and read about 12 common network protocols and their functions. Learn about four network resiliency factors and what steps organizations can take to build redundancy into their networks. Computer networks come in all shapes and sizes. Explore the seven common types of networks, along with their pros and cons.

This was last updated in October 2023

Continue Reading About IP SLA (Cisco)

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close