Alcatel-Lucent 7450 ESS, 7750 SR, and 7950 XRS Release 14.0.R1
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
Acronym Reference Guide R14.0.R1
7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Documentation and Product Support
7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Documentation and Product Support
Basic System Configuration Guide R14.0.R1
Getting Started
About This Guide
Audience
In This Chapter
Router System Configuration Process
CLI Usage
In This Chapter
CLI Structure
Navigating in the CLI
CLI Contexts
Basic CLI Commands
CLI Environment Commands
CLI Monitor Commands
Getting Help in the CLI
The CLI Command Prompt
Displaying Configuration Contexts
EXEC Files
CLI Script Control
Entering CLI Commands
Command Completion
Unordered and Unnamed Parameters
Editing Keystrokes
Absolute Paths
History
Entering Numerical Ranges
Pipe/Match
Pipe/Count
Redirection
VI Editor
Summary of vi Commands
Using the vi Commands
EX Commands
Configuration Rollback
Feature Behavior
Rollback and SNMP
Rescue Configuration
Operational Guidelines
Transactional Configuration
Basic Operation
Transactions and Rollback
Authorization
Basic CLI Command Reference
Command Hierarchies
Basic CLI Commands
Monitor Commands
Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Command Descriptions
Global Commands
CLI Environment Commands
Monitor CLI Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Show Commands
File System Management
In This Chapter
The File System
Compact Flash Devices
URLs
Wildcards
File Management Tasks
Modifying File Attributes
Creating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Displaying Directory and File Information
Repairing the File System
File Command Reference
Command Hierarchy
File Commands
Command Descriptions
File System Commands
File Commands
Boot Options
In This Chapter
System Initialization
Configuration and Image Loading
Persistence
Lawful Intercept
FIPS-140-2 Mode
Initial System Startup Process Flow
Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Parameters
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting BOF Parameters
Saving a Configuration to a Different Filename
Rebooting
BOF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
File Management Commands
BOF Processing Control
Console Port Configuration
Image and Configuration Management
Management Ethernet Configuration
DNS Configuration Commands
BOF Show Command Reference
Command Hierarchies
Command Descriptions
BOF Show Commands
System Management
In This Chapter
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Naming Objects
Common Language Location Identifier
DNS Security Extensions
System Time
Time Zones
Network Time Protocol (NTP)
SNTP Time Synchronization
CRON
High Availability
HA Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Service Redundancy
Accounting Configuration Redundancy
Nonstop Forwarding
Nonstop Routing (NSR)
CPM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
Synchronization and Redundancy
Active and Standby Designations
When the Active CPM Goes Offline
OOB Management Ethernet Port Redundancy
Persistence
Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
Network Synchronization
Central Synchronization Sub-System
7950 XRS-40 Extension Chassis Central Clocks
Synchronization Status Messages (SSM)
DS1 Signals
E1 Signals
SONET/SDH Signals
DS3/E3
Synchronous Ethernet
Clock Source Quality Level Definitions
IEEE 1588v2 PTP
PTP Clock Synchronization
Performance Considerations
Port-Based Timestamping of PTP Messages
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock for Frequency and Time
PTP Clock Redundancy
PTP Time for System Time and OAM Time
PTP within Routing Instances
System-Wide ATM Parameters
Link Layer Discovery Protocol (LLDP)
IP Hashing as an LSR
Ethernet Satellites
Software Repositories for Satellites
Satellite Configuration
Satellite Client Port Association
Software Repositories
Administrative Tasks
Configuring the Chassis Mode
Saving Configurations
Specifying Post-Boot Configuration Files
Network Timing
Power Supplies
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
System Configuration Process Overview
Configuration Notes
General
Configuring System Management with CLI
System Management
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Conditions
NTP
Broadcastclient
SNTP
CRON
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Mixed Mode
Enabling Mixed Mode on a 7450 System
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Administration (Admin) Commands
System Synchronization Commands
High Availability (Redundancy) Commands
LLDP System Commands
LLDP Ethernet Port Commands
System Command Reference
Generic Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Date and Time Commands
Network Time Protocol Commands
SNTP Commands
CRON Commands
Script Control Commands
System Time Commands
System Synchronization Configuration Commands
System Administration Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
Redundancy Commands
Peer Commands
Multi-Chassis Endpoint Commands
MC-LAG Commands
Multi-Chassis Ring Commands
LLDP System Commands
LLDP Ethernet Port Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Audience
In This Chapter
Router System Configuration Process
CLI Usage
In This Chapter
CLI Structure
Navigating in the CLI
CLI Contexts
Basic CLI Commands
CLI Environment Commands
CLI Monitor Commands
Getting Help in the CLI
The CLI Command Prompt
Displaying Configuration Contexts
EXEC Files
CLI Script Control
Entering CLI Commands
Command Completion
Unordered and Unnamed Parameters
Editing Keystrokes
Absolute Paths
History
Entering Numerical Ranges
Pipe/Match
Pipe/Count
Redirection
VI Editor
Summary of vi Commands
Using the vi Commands
EX Commands
Configuration Rollback
Feature Behavior
Rollback and SNMP
Rescue Configuration
Operational Guidelines
Transactional Configuration
Basic Operation
Transactions and Rollback
Authorization
Basic CLI Command Reference
Command Hierarchies
Basic CLI Commands
Monitor Commands
Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Command Descriptions
Global Commands
CLI Environment Commands
Monitor CLI Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Show Commands
File System Management
In This Chapter
The File System
Compact Flash Devices
URLs
Wildcards
File Management Tasks
Modifying File Attributes
Creating Directories
Copying Files
Moving Files
Deleting Files and Removing Directories
Displaying Directory and File Information
Repairing the File System
File Command Reference
Command Hierarchy
File Commands
Command Descriptions
File System Commands
File Commands
Boot Options
In This Chapter
System Initialization
Configuration and Image Loading
Persistence
Lawful Intercept
FIPS-140-2 Mode
Initial System Startup Process Flow
Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Parameters
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting BOF Parameters
Saving a Configuration to a Different Filename
Rebooting
BOF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
File Management Commands
BOF Processing Control
Console Port Configuration
Image and Configuration Management
Management Ethernet Configuration
DNS Configuration Commands
BOF Show Command Reference
Command Hierarchies
Command Descriptions
BOF Show Commands
System Management
In This Chapter
System Management Parameters
System Information
System Name
System Contact
System Location
System Coordinates
Naming Objects
Common Language Location Identifier
DNS Security Extensions
System Time
Time Zones
Network Time Protocol (NTP)
SNTP Time Synchronization
CRON
High Availability
HA Features
Redundancy
Software Redundancy
Configuration Redundancy
Component Redundancy
Service Redundancy
Accounting Configuration Redundancy
Nonstop Forwarding
Nonstop Routing (NSR)
CPM Switchover
Synchronization
Configuration and boot-env Synchronization
State Database Synchronization
Synchronization and Redundancy
Active and Standby Designations
When the Active CPM Goes Offline
OOB Management Ethernet Port Redundancy
Persistence
Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
Network Synchronization
Central Synchronization Sub-System
7950 XRS-40 Extension Chassis Central Clocks
Synchronization Status Messages (SSM)
DS1 Signals
E1 Signals
SONET/SDH Signals
DS3/E3
Synchronous Ethernet
Clock Source Quality Level Definitions
IEEE 1588v2 PTP
PTP Clock Synchronization
Performance Considerations
Port-Based Timestamping of PTP Messages
PTP Capabilities
PTP Ordinary Slave Clock For Frequency
PTP Ordinary Master Clock For Frequency
PTP Boundary Clock for Frequency and Time
PTP Clock Redundancy
PTP Time for System Time and OAM Time
PTP within Routing Instances
System-Wide ATM Parameters
Link Layer Discovery Protocol (LLDP)
IP Hashing as an LSR
Ethernet Satellites
Software Repositories for Satellites
Satellite Configuration
Satellite Client Port Association
Software Repositories
Administrative Tasks
Configuring the Chassis Mode
Saving Configurations
Specifying Post-Boot Configuration Files
Network Timing
Power Supplies
Automatic Synchronization
Boot-Env Option
Config Option
Manual Synchronization
Forcing a Switchover
System Configuration Process Overview
Configuration Notes
General
Configuring System Management with CLI
System Management
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Conditions
NTP
Broadcastclient
SNTP
CRON
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Mixed Mode
Enabling Mixed Mode on a 7450 System
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Administration (Admin) Commands
System Synchronization Commands
High Availability (Redundancy) Commands
LLDP System Commands
LLDP Ethernet Port Commands
System Command Reference
Generic Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Date and Time Commands
Network Time Protocol Commands
SNTP Commands
CRON Commands
Script Control Commands
System Time Commands
System Synchronization Configuration Commands
System Administration Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
Redundancy Commands
Peer Commands
Multi-Chassis Endpoint Commands
MC-LAG Commands
Multi-Chassis Ring Commands
LLDP System Commands
LLDP Ethernet Port Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer Documentation and Product Support
Gx AVPs Reference Guide R14.0.R1
Gx AVP
In This Section
AVPs
Reserved Keywords in the 7750 SR
Standard Diameter AVPs
Standard Diameter AVPs (format)
ALU-Specific AVPs
ALU-Specific VSAs (format)
Diameter-Based AVP Applicability
Gx AVP Applicability
ALU-Specific AVP Applicability
Result Codes (Result-Code AVP)
Rule Failure Codes (Rule-Failure-Code AVP)
Event Triggers (Event-Trigger AVP)
Termination Causes (Termination-Cause AVP)
Standards and Protocol Support
Customer Documentation and Product Support
Gx AVP
In This Section
AVPs
Reserved Keywords in the 7750 SR
Standard Diameter AVPs
Standard Diameter AVPs (format)
ALU-Specific AVPs
ALU-Specific VSAs (format)
Diameter-Based AVP Applicability
Gx AVP Applicability
ALU-Specific AVP Applicability
Result Codes (Result-Code AVP)
Rule Failure Codes (Rule-Failure-Code AVP)
Event Triggers (Event-Trigger AVP)
Termination Causes (Termination-Cause AVP)
Standards and Protocol Support
Customer Documentation and Product Support
Interface Configuration Guide R14.0.R1
Getting Started
About This Guide
Interface Configuration Process
Interfaces
In This Chapter
Configuration Overview
Chassis Slots and Cards
MCMs
MDAs
XMAs/C-XMAs
CMAs
Versatile Service Module (VSM)
Oversubscribed Ethernet MDAs
Rate Limiting
Packet Classification and Scheduling
Channelized MDA/CMA Support
Channelized DS-1/E-1 CMA
Channelized DS-3/E-3 CMA
Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
Channelized OC-12/STM-4 ASAP MDAs
Channelized DS-3/E-3 ASAP MDA (4-Port)
Channelized DS-3/E-3 ASAP MDA (12-Port)
Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
Network Interconnections
Digital Diagnostics Monitoring
Alcatel-Lucent SFPs and XFPs
Statistics Collection
Ports
Port Types
Port Features
Port State and Operational State
802.1x Network Access Control
802.1x Modes
802.1x Basics
802.1x Timers
802.1x Tunneling
802.1x Configuration and Limitations
SONET/SDH Port Attributes
SONET/SDH Path Attributes
Multilink Frame Relay
MLFR Bundle Data Plane
MLFR Bundle Link Integrity Protocol
FRF.12 End-to-End Fragmentation
SAP Fragment Interleaving Option
FRF.12 UNI/NNI Link Fragmentation
MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
Multilink Point-to-Point Protocol (MLPPP)
Protocol Field (PID)
B & E Bits
Sequence Number
Information Field
Padding
FCS
LCP
Link Fragmentation and Interleaving Support
Multi-Class MLPPP
QoS in MC-MLPPP
Cisco HDLC
SLARP
SONET/SDH Scrambling and C2-Byte
Timers
Automatic Protection Switching (APS)
Single Chassis and Multi-Chassis APS
APS Switching Modes
APS Channel and SONET Header K Bytes
Revertive Switching
Bidirectional 1+1 Switchover Operation Example
Annex B (1+1 Optimized) Operation
Protection of Upper Layer Protocols and Services
APS User-Initiated Requests
APS and SNMP
APS Applicability, Restrictions and Interactions
Sample APS Applications
Inverse Multiplexing Over ATM (IMA)
Inverse Multiplexing over ATM (IMA) Features
Ethernet Local Management Interface (E-LMI)
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Per Port Aggregate Egress Queue Statistics Monitoring
Port Cross-Connect (PXC)
PXC Terminology
Caveats
PXC - Physical Port in Cross-Connect (Loopback) Mode
Operational State
PXC Sub-Ports
PXC Sub-Port Operational State
Port Statistics
Statistics on Physical PXC Ports
LAG with PXC Ports – PXC LAG
Basic PXC Provisioning
QoS
Queue Allocation on PXC Sub-Ports
Pool Allocations on PXC Ports
QoS Summary
Mirroring and LI on PXC Ports
Multi-Chassis Redundancy
Health Monitoring on the PXC Sub-Ports
Configuration Example
LAG
LACP
LACP Multiplexing
Active-Standby LAG Operation
LAG on Access QoS Consideration
Adapt QoS Modes
Per-fp-ing-queuing
Per-fp-egr-queuing
Per-fp-sap-instance
LAG and ECMP Hashing
Per Flow Hashing
Changing Default Per Flow Hashing Inputs
Per Link Hashing
Weighted per-link-hash
Explicit Per Link Hash Using LAG Link Mapping Profiles
Consistent Per Service Hashing
ESM – LAG Hashing per Vport
Background
Hashing per Vport
Link Placement
Multicast Consideration
VPLS and Capture SAP Considerations
LSR Default Hash Routine— Label-Only Hash Option
LSR Label-IP Hash Option Enabled
LSR IP-Only Hash Option Enabled
LAG Hold Down Timers
BFD over LAG Links
Mixed Port-Speed LAG Support
LAG Upgrade
Multi-Chassis LAG
Overview
MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
DSLAM Dual Homing in Layer 2/3 TPSDA Model
G.8031 Protected Ethernet Tunnels
G.8032 Protected Ethernet Rings
Ethernet Port Monitoring
802.3ah OAM
OAM Events
Link Monitoring
Capability Advertising
Remote Loopback
802.3ah OAM PDU Tunneling for Epipe Service
802.3ah Grace Announcement
MTU Configuration Guidelines
Default MTU Values
Modifying MTU Defaults
Configuration Example
Deploying Preprovisioned Components
Configuring SFM5-12e Fabric Speed
fabric-speed-a
fabric-speed-b
Configuration Process Overview
Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring Cards, MCMs and MDAs
Configuring Cards and CMAs
Configuring Forwarding Plane Parameters
Configuring MDA Access and Network Pool Parameters
Configuring MDA Policies for Named Pools Mode
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Configuring APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Configuring Cpipe Port Parameters
Configuring a DS1 Port
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring a Channelized DS1 Card
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Service Management Tasks
Modifying or Deleting an MDA, MCM, CMA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Configuration Command Reference
Command Hierarchies
Card Commands
MCM Commands
MDA Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane (FP) Commands
Port Configuration Commands
Port XC Commands
Port APS Commands
Ethernet Commands
Interface Group Handler Commands
Multilink Bundle Commands
SONET-SDH Commands
TDM Commands
DS3 Commands
E1 Commands
E3 Commands
LAG Commands
Ethernet Tunnel Commands
Multi-Chassis Redundancy Commands
Configuration Command Descriptions
Generic Commands
Card Commands
Power Commands
Virtual Scheduler Commands
MCM Commands
MDA (XMA) Commands
MDA/Port QoS Commands
General Port Commands
Port XC Commands
APS Commands
Ethernet Port Commands
802.1x Port Commands
LLDP Port Commands
Network Port Commands
Interface Group Handler Commands
Multilink-Bundle Port Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
ATM Interface Commands
Frame Relay Commands
TDM Commands
LAG Commands
Eth Tunnel Commands
ETH-CFM Configuration Commands
Multi-Chassis Redundancy Commands
MC Endpoint Commands
MC LAG Commands
Multi-Chassis Ring Commands
Forwarding Plane Configuration Commands
Forwarding Plane Tools Commands
Show, Monitor, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Hardware Show Commands
PEQ Show Commands
APS Show Commands
Port Show Commands
Multilink Bundle Show Commands
LAG Show Commands
Monitor Commands
Clear Commands
Tools Commands
Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Interface Configuration Process
Interfaces
In This Chapter
Configuration Overview
Chassis Slots and Cards
MCMs
MDAs
XMAs/C-XMAs
CMAs
Versatile Service Module (VSM)
Oversubscribed Ethernet MDAs
Rate Limiting
Packet Classification and Scheduling
Channelized MDA/CMA Support
Channelized DS-1/E-1 CMA
Channelized DS-3/E-3 CMA
Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
Channelized OC-12/STM-4 ASAP MDAs
Channelized DS-3/E-3 ASAP MDA (4-Port)
Channelized DS-3/E-3 ASAP MDA (12-Port)
Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
Network Interconnections
Digital Diagnostics Monitoring
Alcatel-Lucent SFPs and XFPs
Statistics Collection
Ports
Port Types
Port Features
Port State and Operational State
802.1x Network Access Control
802.1x Modes
802.1x Basics
802.1x Timers
802.1x Tunneling
802.1x Configuration and Limitations
SONET/SDH Port Attributes
SONET/SDH Path Attributes
Multilink Frame Relay
MLFR Bundle Data Plane
MLFR Bundle Link Integrity Protocol
FRF.12 End-to-End Fragmentation
SAP Fragment Interleaving Option
FRF.12 UNI/NNI Link Fragmentation
MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
Multilink Point-to-Point Protocol (MLPPP)
Protocol Field (PID)
B & E Bits
Sequence Number
Information Field
Padding
FCS
LCP
Link Fragmentation and Interleaving Support
Multi-Class MLPPP
QoS in MC-MLPPP
Cisco HDLC
SLARP
SONET/SDH Scrambling and C2-Byte
Timers
Automatic Protection Switching (APS)
Single Chassis and Multi-Chassis APS
APS Switching Modes
APS Channel and SONET Header K Bytes
Revertive Switching
Bidirectional 1+1 Switchover Operation Example
Annex B (1+1 Optimized) Operation
Protection of Upper Layer Protocols and Services
APS User-Initiated Requests
APS and SNMP
APS Applicability, Restrictions and Interactions
Sample APS Applications
Inverse Multiplexing Over ATM (IMA)
Inverse Multiplexing over ATM (IMA) Features
Ethernet Local Management Interface (E-LMI)
Link Layer Discovery Protocol (LLDP)
LLDP Protocol Features
Per Port Aggregate Egress Queue Statistics Monitoring
Port Cross-Connect (PXC)
PXC Terminology
Caveats
PXC - Physical Port in Cross-Connect (Loopback) Mode
Operational State
PXC Sub-Ports
PXC Sub-Port Operational State
Port Statistics
Statistics on Physical PXC Ports
LAG with PXC Ports – PXC LAG
Basic PXC Provisioning
QoS
Queue Allocation on PXC Sub-Ports
Pool Allocations on PXC Ports
QoS Summary
Mirroring and LI on PXC Ports
Multi-Chassis Redundancy
Health Monitoring on the PXC Sub-Ports
Configuration Example
LAG
LACP
LACP Multiplexing
Active-Standby LAG Operation
LAG on Access QoS Consideration
Adapt QoS Modes
Per-fp-ing-queuing
Per-fp-egr-queuing
Per-fp-sap-instance
LAG and ECMP Hashing
Per Flow Hashing
Changing Default Per Flow Hashing Inputs
Per Link Hashing
Weighted per-link-hash
Explicit Per Link Hash Using LAG Link Mapping Profiles
Consistent Per Service Hashing
ESM – LAG Hashing per Vport
Background
Hashing per Vport
Link Placement
Multicast Consideration
VPLS and Capture SAP Considerations
LSR Default Hash Routine— Label-Only Hash Option
LSR Label-IP Hash Option Enabled
LSR IP-Only Hash Option Enabled
LAG Hold Down Timers
BFD over LAG Links
Mixed Port-Speed LAG Support
LAG Upgrade
Multi-Chassis LAG
Overview
MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
DSLAM Dual Homing in Layer 2/3 TPSDA Model
G.8031 Protected Ethernet Tunnels
G.8032 Protected Ethernet Rings
Ethernet Port Monitoring
802.3ah OAM
OAM Events
Link Monitoring
Capability Advertising
Remote Loopback
802.3ah OAM PDU Tunneling for Epipe Service
802.3ah Grace Announcement
MTU Configuration Guidelines
Default MTU Values
Modifying MTU Defaults
Configuration Example
Deploying Preprovisioned Components
Configuring SFM5-12e Fabric Speed
fabric-speed-a
fabric-speed-b
Configuration Process Overview
Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring Cards, MCMs and MDAs
Configuring Cards and CMAs
Configuring Forwarding Plane Parameters
Configuring MDA Access and Network Pool Parameters
Configuring MDA Policies for Named Pools Mode
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Configuring APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Configuring Cpipe Port Parameters
Configuring a DS1 Port
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring a Channelized DS1 Card
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Service Management Tasks
Modifying or Deleting an MDA, MCM, CMA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Configuration Command Reference
Command Hierarchies
Card Commands
MCM Commands
MDA Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane (FP) Commands
Port Configuration Commands
Port XC Commands
Port APS Commands
Ethernet Commands
Interface Group Handler Commands
Multilink Bundle Commands
SONET-SDH Commands
TDM Commands
DS3 Commands
E1 Commands
E3 Commands
LAG Commands
Ethernet Tunnel Commands
Multi-Chassis Redundancy Commands
Configuration Command Descriptions
Generic Commands
Card Commands
Power Commands
Virtual Scheduler Commands
MCM Commands
MDA (XMA) Commands
MDA/Port QoS Commands
General Port Commands
Port XC Commands
APS Commands
Ethernet Port Commands
802.1x Port Commands
LLDP Port Commands
Network Port Commands
Interface Group Handler Commands
Multilink-Bundle Port Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
ATM Interface Commands
Frame Relay Commands
TDM Commands
LAG Commands
Eth Tunnel Commands
ETH-CFM Configuration Commands
Multi-Chassis Redundancy Commands
MC Endpoint Commands
MC LAG Commands
Multi-Chassis Ring Commands
Forwarding Plane Configuration Commands
Forwarding Plane Tools Commands
Show, Monitor, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Hardware Show Commands
PEQ Show Commands
APS Show Commands
Port Show Commands
Multilink Bundle Show Commands
LAG Show Commands
Monitor Commands
Clear Commands
Tools Commands
Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
Layer 2 Services and EVPN Guide R14.0.R1
Getting Started
About This Guide
Audience
VLL Services
In This Chapter
ATM VLL (Apipe) Services
ATM VLL For End-to-End ATM Service
ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
Traffic Management Support
Ingress Network Classification
Ingress Queuing and Shaping on the IOM
Egress Queuing and Shaping on the IOM
Egress Shaping/Scheduling
Circuit Emulation Services (Cpipe)
Mobile Infrastructure
Circuit Emulation Modes
Circuit Emulation Parameters
Circuit Emulation Modes
Absolute Mode Option
Payload Size
Jitter Buffer
CES Circuit Operation
Services for Transporting CES Circuits
Network Synchronization Considerations
Cpipe Payload
Ethernet Pipe (Epipe) Services
Epipe Service Overview
Epipe Service Pseudowire VLAN Tag Processing
Epipe Up Operational State Configuration Option
Epipe with PBB
Epipe over L2TPv3
Ethernet Interworking VLL
VLL CAC
MC-Ring and VLL
Frame Relay VLL (Fpipe) Services
Frame Relay VLL
Frame Relay-to-ATM Interworking (FRF.5) VLL
Traffic Management Support
Frame Relay Traffic Management
Ingress SAP Classification and Marking
Egress Network EXP Marking
Ingress Network Classification
IP Interworking VLL (Ipipe) Services
Ipipe VLL
IP Interworking VLL Datapath
Extension to IP VLL for Discovery of Ethernet CE IP Address
VLL Ethernet SAP Procedures
VLL FR SAP Procedures
VLL ATM SAP Procedures
VLL PPP/IPCP and Cisco-HDLC SAP Procedures
IPv6 Support on IP Interworking VLL
IPv6 Datapath Operation
IPv6 Stack Capability Signaling
Services Configuration for MPLS-TP
MPLS-TP SDPs
VLL Spoke SDP Configuration
Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
Configuring MPLS-TP Lock Instruct and Loopback
MPLS-TP PW Lock Instruct and Loopback Overview
Lock PW End-Point Model
PW Redundancy and Lock Instruct and Loopback
Configuring a Test SAP for an MPLS-TP PW
Configuring an Administrative Lock
Configuring a Loopback
VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
VCCV BVD Support
VCCV BFD Encapsulation on a Pseudowire
BFD Session Operation
Configuring VCCV BFD
Pseudowire Switching
Pseudowire Switching with Protection
Pseudowire Switching Behavior
Static-to-Dynamic Pseudowire Switching
Ingress VLAN Swapping
Ingress VLAN Translation
Pseudowire Redundancy
Dynamic Multi-Segment Pseudowire Routing
Overview
Pseudowire Routing
Static Routing
Explicit Paths
Configuring VLLs using Dynamic MS-PWs
Active/Passive T-PE Selection
Automatic Endpoint Configuration
Selecting a Path for an MS-PW
Pseudowire Templates
Pseudowire Redundancy
VCCV OAM for Dynamic MS-PWs
VCCV-Ping on Dynamic MS-PWs
VCCV-Trace on Dynamic MS-PWs
Example Dynamic MS-PW Configuration
VLL Resilience with Two Destination PE Nodes
Master-Slave Operation
Interaction with SAP-Specific OAM
Local Rules at Slave VLL PE
Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
VLL Resilience for a Switched Pseudowire Path
Pseudowire SAPs
Epipe Using BGP-MH Site Support for Ethernet Tunnels
Operational Overview
Detailed Operation
Sample Operation of G.8031 BGP-MH
BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
BGP-MH Specifics for MH Site Support for Ethernet Tunnels
PW Redundancy for BGP MH Site Support for Ethernet Tunnels
T-LDP Status Notification Handling Rules of BGP-MH Epipes
Rules for Processing Endpoint SAP Active/Standby Status Bits
Rules for Processing, Merging Local, and Received Endpoint Operational Status
Operation for BGP MH Site Support for Ethernet Tunnels
Access Node Resilience Using MC-LAG and Pseudowire Redundancy
VLL Resilience for a Switched Pseudowire Path
Pseudowire Redundancy Service Models
Redundant VLL Service Model
T-LDP Status Notification Handling Rules
Processing Endpoint SAP Active/Standby Status Bits
Processing and Merging
High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
Primary Spoke-SDP Fallback to Secondary SAP
Reversion to Primary Spoke SDP Path
MC-APS and MC-LAG
Failure Scenarios
VLL Using G.8031 Protected Ethernet Tunnels
MPLS Entropy Label and Hash Label
BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
BGP VPWS Pseudowire Switching
Pseudowire Signaling
BGP VPWS Configuration Procedure
Use of Pseudowire Template for BGP VPWS
Use of Endpoint for BGP VPWS
VLL Service Considerations
SDPs
SDP Statistics for VPLS and VLL Services
SAP Encapsulations and Pseudowire Types
PWE3 N-to-1 Cell Mode
PWE3 AAL5 SDU Mode
QoS Policies
Filter Policies
MAC Resources
Configuring a VLL Service with CLI
Basic Configurations
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring Cpipe SAPs and Spoke SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Distributed Epipe SAPs
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke SDP Control Words
Same Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-Enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-Enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
VLL Service Configuration Command Reference
Command Hierarchies
Apipe Service Configuration Commands
Related Apipe Commands
Connection Profile Commands
Cpipe Service Configuration Commands
Epipe Service Configuration Commands
Epipe Global Commands
Epipe SAP Configuration Commands
Epipe Spoke SDP Configuration Commands
Template Commands
Fpipe Service Configuration Commands
Ipipe Service Configuration Commands
Command Descriptions
Generic Commands
Service Commands
VLL Global Commands
VLL SAP Commands
Circuit Emulation Commands
ETH-CFM Service Commands
Service Filter and QoS Policy Commands
VLL Frame Relay Commands
VLL SDP Commands
ATM Commands
OAM Commands
Cpipe Commands
VLL SAP Commands
CPipe SDP Commands
Epipe SAP Template Commands
VLL Show Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VLL Show Commands
VLL Clear Commands
VLL Debug Commands
VLL Tools Commands
Virtual Private LAN Service
In This Chapter
VPLS Service Overview
VPLS Packet Walkthrough
VPLS Features
VPLS Enhancements
VPLS over MPLS
VPLS Service Pseudowire VLAN Tag Processing
VPLS MAC Learning and Packet Forwarding
MAC Learning Protection
DEI in IEEE 802.1ad
VPLS Using G.8031 Protected Ethernet Tunnels
Pseudowire Control Word
Table Management
FIB Size
FIB Size Alarms
Local and Remote Aging Timers
Disable MAC Aging
Disable MAC Learning
Unknown MAC Discard
VPLS and Rate Limiting
MAC Move
Auto-Learn MAC Protect
Operation
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
VPLS and Spanning Tree Protocol
Spanning Tree Operating Modes
Multiple Spanning Tree
Redundancy Access to VPLS
MSTP for QinQ SAPs
Provider MSTP
MSTP General Principles
MSTP in the SR-Series Platform
Enhancements to the Spanning Tree Protocol
L2PT Termination
BPDU Translation
L2PT and BPDU Translation
Egress Multicast Groups
Egress Multicast Group Provisioning
Required Common SAP Parameters
SAP Egress QoS Policy
Efficient Multicast Egress SAP Chaining
Mirroring and Efficient Multicast Replication
IOM or XCM Chain Management
IOM Mode B Capability
VPLS Redundancy
Spoke SDP Redundancy for Metro Interconnection
Spoke SDP Based Redundant Access
Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
Fast Detection of Peer Failure using BFD
MC-EP Passive Mode
Support for Single Chassis Endpoint Mechanisms
MAC Flush Support in MC-EP
Block-on-Mesh-Failure Support in MC-EP Scenario
Support for Force Spoke SDP in MC-EP
Revertive Behavior for Primary Pseudowire(s) in a MC-EP
Using B-VPLS for Increased Scalability and Reduced Convergence Times
MAC Flush Additions for PBB VPLS
VPLS Access Redundancy
STP-Based Redundant Access to VPLS
Redundant Access to VPLS Without STP
Object Grouping and State Monitoring
VPLS Applicability — Block on VPLS a Failure
MAC Flush Message Processing
Dual Homing to a VPLS Service
MC-Ring and VPLS
ACL Next-Hop for VPLS
SDP Statistics for VPLS and VLL Services
BGP Auto-Discovery for LDP VPLS
BGP AD Overview
Information Model
FEC Element for T-LDP Signaling
BGP-AD and Target LDP (T-LDP) Interaction
SDP Usage
Automatic Creation of SDPs
Manually Provisioned SDP
Automatic Instantiation of Pseudowires (SDP Bindings)
Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
Resiliency Schemes
BGP VPLS
Pseudowire Signaling Details
Supported VPLS Features
VCCV BFD Support for VPLS Services
BGP Multi-Homing for VPLS
Information Model and Required Extensions to L2VPN NLRI
Supported Services and Multi-Homing Objects
Blackhole Avoidance
MAC Flush to the Core PEs
Indicating non-DF status towards the access PE or CE
BGP Multi-Homing for VPLS Inter-Domain Resiliency
Multicast-Aware VPLS
IGMP Snooping for VPLS
MLD Snooping for VPLS
PIM Snooping for VPLS
Plain PIM Snooping
PIM Proxy
MAC-Based IPv6 Multicast Forwarding
PIM and IGMP/MLD Snooping Interaction
Multi-Chassis Synchronization for Layer 2 Snooping States
IGMP Snooping Synchronization
MLD Snooping Synchronization
PIM Snooping for IPv4 Synchronization
VPLS Multicast-Aware High Availability Features
RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
MPLS Entropy Label and Hash Label
Routed VPLS and I-VPLS
IES or VPRN IP Interface Binding
Assigning a Service Name to a VPLS Service
Service Binding Requirements
Bound Service Name Assignment
Binding a Service Name to an IP Interface
Bound Service Deletion or Service Name Removal
IP Interface Attached VPLS Service Constraints
IP Interface and VPLS Operational State Coordination
IP Interface MTU and Fragmentation
Unicast IP Routing into a VPLS Service
ARP and VPLS FIB Interactions
Routed VPLS Specific ARP Cache Behavior
The allow-ip-int-bind VPLS Flag
Routed VPLS SAPs Only Supported on Standard Ethernet Ports
Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
Network Ports Restricted to FP2-Based Systems or IOMs
LAG Port Membership Constraints
Routed VPLS Feature Restrictions
Routed I-VPLS Feature Restrictions
IES IP Interface VPLS Binding and Chassis Mode Interaction
VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
Route Leaking Between Routing Contexts
Ingress LAG and FP1 to Routed VPLS Discards
IPv4 and IPv6 Multicast Routing Support
BGP Auto Discovery (BGP-AD) for Routed VPLS Support
Routed VPLS Caveats
VPLS SAP Ingress IP Filter Override
IP Interface Defined Egress QoS Reclassification
Remarking for VPLS and Routed Packets
7450 Mixed Mode Chassis
IPv4 Multicast Routing
Routed VPLS Supported Routing Related Protocols
Spanning Tree and Split Horizon
VPLS Service Considerations
SAP Encapsulations
VLAN Processing
Ingress VLAN Swapping
Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
Configure the MVRP Infrastructure using an M-VPLS Context
Instantiate Related VLAN FIBs and Trunks in MVRP Scope
MVRP Activation of Service Connectivity
MVRP Control Plane
STP-MVRP Interaction
Interaction Between MVRP and Instantiated SAP Status
Using Temporary Flooding to Optimize Failover Times
VPLS E-Tree Services
VPLS E-Tree Services Overview
Leaf-ac and Root-ac SAPs
Leaf-ac and Root-ac SDP Binds
Root-leaf-tag SAPs
Root-leaf-tag SDP Binds
Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Configuring Egress Multicast Groups
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
STP SAP Operational States
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Applying an Egress Multicast Group to a VPLS Service SAP
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke SDP Specific STP Parameters
Spoke SDP STP Operational States
Configuring VPLS Spoke SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-Enabling a VPLS Service
VPLS Service Configuration Command Reference
Command Hierarchies
Global Commands
Oper Group Commands
SAP Commands
Template Commands
Mesh SDP Commands
Spoke SDP Commands
Provider Tunnel Commands
Egress Multicast Group Commands
Routed VPLS Commands
Multi-Chassis Redundancy Commands
Command Descriptions
Generic Commands
VPLS Service Commands
VPLS Interface Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
ETH-CFM Service Commands
VPLS SAP ATM Commands
VPLS Filter and QoS Policy Commands
VPLS Template Commands
Provider Tunnel Commands
VPLS SDP Commands
SAP Subscriber Management Commands
VPLS Multicast Commands
VPLS DHCP and Anti-Spoofing Commands
Egress Multicast Group Commands
BGP Auto-Discovery Commands
Redundancy Commands
VPLS Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Show Multi-Chassis Endpoint Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VPLS Show Commands
IGMP Snooping Show Commands
IGMP Commands
Show Multi-Chassis Endpoint Commands
VPLS Clear Commands
VPLS Debug Commands
IEEE 802.1ah Provider Backbone Bridging
In This Chapter
IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
PBB Features
Integrated PBB-VPLS Solution
PBB Technology
PBB Mapping to Existing VPLS Configurations
SAP and SDP Support
PBB B-VPLS
PBB I-VPLS
PBB Packet Walkthrough
PBB Control Planes
Shortest Path Bridging MAC Mode (SPBM)
Flooding and Learning Versus Link State
SPB for B-VPLS
Control B-VPLS and User B-VPLS
Shortest Path and Single Tree
Data Path and Forwarding
SPB Ethernet OAM
SPB Levels
SPBM to Non-SPBM Interworking
Static MACs and Static ISIDs
Epipe Static Configuration
I-VPLS Static Config
SPBM ISID Policies
ISID Policy Control
Static ISID Advertisement
I-VPLS for Unicast Service
Default Behaviors
Example Network Configuration
Sample Configuration for Dut-A
Show Commands Outputs
Debug Commands
Tools Commands
Clear Commands
IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
MMRP Support Over B-VPLS SAPs and SDPs
I-VPLS Changes and Related MMRP Behavior
Limiting the Number of MMRP Entries on a Per B-VPLS Basis
Optimization for Improved Convergence Time
Controlling MRP Scope using MRP Policies
PBB and BGP-AD
PBB ELINE Service
Non-Redundant PBB Epipe Spoke Termination
PBB Using G.8031-Protected Ethernet Tunnels
Solution Overview
Detailed Solution Description
Detailed PBB Emulated LAG Solution Description
Support Service and Solution Combinations
Periodic MAC Notification
MAC Flush
PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
Porting existing VPLS LDP MAC Flush in PBB VPLS
PBB Blackholing Issue
LDP MAC Flush Solution for PBB Blackholing
Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
Solution Description for I-VPLS Over Native PBB Core
Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
Dual-Homing into PBB Epipe - Local Switching Use Case
BGP Multi-homing for I-VPLS
Access Multi-Homing over MPLS for PBB Epipes
PBB and IGMP/MLD Snooping
PBB QoS
Transparency of Customer QoS Indication through PBB Backbone
Configuration Examples
Details Solution Description
Egress B-SAP per ISID Shaping
B-SAP Egress ISID Shaping Configuration
Provisioning Model
Egress Queue Scheduling
B-SAP per-ISID Shaping Configuration Example
PBB OAM
Mirroring
OAM Commands
CFM Support
Configuration Examples
PBB using G.8031 Protected Ethernet Tunnels
MC-LAG Multihoming for Native PBB
Access Multi-Homing over MPLS for PBB Epipes
PBB Configuration Command Reference
Command Hierarchies
Global Commands
SAP Commands
Mesh SDP Commands
Spoke SDP Commands
BGP-MH for I-VPLS Commands
Command Descriptions
VPLS Service Commands
PBB Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
PBB Show Commands
PBB Clear Commands
PBB Debug Commands
Ethernet Virtual Private Networks (EVPNs)
In This Chapter
Overview
EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
EVPN for MPLS Tunnels in ELAN Services
EVPN for MPLS Tunnels in ELINE Services
EVPN for PBB over MPLS Tunnels (PBB-EVPN)
VXLAN
VXLAN ECMP and LAG
VXLAN VPLS Tag Handling
VXLAN MTU Considerations
VXLAN QoS
Ingress
Egress
VXLAN Ping
IGMP-Snooping on VXLAN
BGP-EVPN Control Plane for VXLAN Overlay Tunnels
EVPN for VXLAN in VPLS Services
Resiliency and BGP Multi-Homing
Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
Use of the unknown-mac-route
EVPN for VXLAN in R-VPLS Services
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
DC GW integration with the Nuage Virtual Services Directory (VSD)
XMPP Interface on the DC GW
Overview of the Static-Dynamic VSD Integration Model
Step 1
Step 2
Step 3
Step 4
Step 5
VSD-Domains and Association to Static-Dynamic Services
VSD-Domain Type L2-DOMAIN
VSD-Domain Type L2-DOMAIN-IRB
VSD-Domain Type VRF-GRE
VSD-Domain Type VRF-VXLAN
Fully-Dynamic VSD Integration Model
Step 1
Step 2
Step 3
Step 4
Step 5
Python Script Implementation Details
Provisioning Filters using the VSD Fully Dynamic Model
BGP-EVPN Control Plane for MPLS Tunnels
EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
EVPN and VPLS Integration
Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
EVPN Multi-Homing in VPLS Services
EVPN All-Active Multi-Homing
All-Active Multi-Homing Service Model
ES Discovery and DF Election Procedures
Aliasing
Network Failures and Convergence for All-Active Multi-Homing
Logical Failures on Ethernet Segments and Black-Holes
Transient Issues Due to MAC Route Delays
EVPN Single-Active Multi-Homing
Single-Active Multi-Homing Service Model
ES and DF Election Procedures
Backup PE Function
Network Failures and Convergence for Single-Active Multi-Homing
Logical Failures on Ethernet Segments and Black-Holes
BGP-EVPN Control Plane for EVPN-VPWS
EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
Using A/S PW and MC-LAG with EVPN-VPWS Epipes
EVPN for MPLS Tunnels in Routed VPLS Services
P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
BGP-EVPN Control Plane for PBB-EVPN
EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
EVPN Route Type 4 - Ethernet Segment Route
PBB-EVPN for I-VPLS and PBB Epipe Services
Flood Containment for I-VPLS Services
PBB-EVPN and PBB-VPLS Integration
PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
System BMAC Assignment in PBB-EVPN
PBB-EVPN all-active multi-homing service model
Network failures and convergence for all-active multi-homing
PBB-EVPN Single-Active Multi-Homing Service Model
Network Failures and Convergence for Single-Active Multihoming
PBB-Epipes and EVPN Multi-Homing
PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
ARP/ND Snooping and Proxy Support
Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
Proxy-ND and the Router Flag in Neighbor Advertisement messages
Procedure to Add the R Flag to a Specified Entry
BGP-EVPN MAC-Mobility
BGP-EVPN MAC-Duplication
Conditional Static MAC and Protection
Auto-Learn MAC Protect and Restricting Protected Source MACs
Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
CFM Interaction with EVPN Services
DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
BGP and EVPN Route Selection for EVPN Routes
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
Interaction of PBB-EVPN with Existing VPLS Features
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
Routing Policies for BGP EVPN IP Prefixes
MPLS Entropy Label and Hash Label
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-active Multi-homing Example
EVPN Command Reference
Command Hierarchies
EVPN Configuration Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
EVPN Configuration Commands
Show Configuration Commands
Clear Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Audience
VLL Services
In This Chapter
ATM VLL (Apipe) Services
ATM VLL For End-to-End ATM Service
ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
Traffic Management Support
Ingress Network Classification
Ingress Queuing and Shaping on the IOM
Egress Queuing and Shaping on the IOM
Egress Shaping/Scheduling
Circuit Emulation Services (Cpipe)
Mobile Infrastructure
Circuit Emulation Modes
Circuit Emulation Parameters
Circuit Emulation Modes
Absolute Mode Option
Payload Size
Jitter Buffer
CES Circuit Operation
Services for Transporting CES Circuits
Network Synchronization Considerations
Cpipe Payload
Ethernet Pipe (Epipe) Services
Epipe Service Overview
Epipe Service Pseudowire VLAN Tag Processing
Epipe Up Operational State Configuration Option
Epipe with PBB
Epipe over L2TPv3
Ethernet Interworking VLL
VLL CAC
MC-Ring and VLL
Frame Relay VLL (Fpipe) Services
Frame Relay VLL
Frame Relay-to-ATM Interworking (FRF.5) VLL
Traffic Management Support
Frame Relay Traffic Management
Ingress SAP Classification and Marking
Egress Network EXP Marking
Ingress Network Classification
IP Interworking VLL (Ipipe) Services
Ipipe VLL
IP Interworking VLL Datapath
Extension to IP VLL for Discovery of Ethernet CE IP Address
VLL Ethernet SAP Procedures
VLL FR SAP Procedures
VLL ATM SAP Procedures
VLL PPP/IPCP and Cisco-HDLC SAP Procedures
IPv6 Support on IP Interworking VLL
IPv6 Datapath Operation
IPv6 Stack Capability Signaling
Services Configuration for MPLS-TP
MPLS-TP SDPs
VLL Spoke SDP Configuration
Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
Configuring MPLS-TP Lock Instruct and Loopback
MPLS-TP PW Lock Instruct and Loopback Overview
Lock PW End-Point Model
PW Redundancy and Lock Instruct and Loopback
Configuring a Test SAP for an MPLS-TP PW
Configuring an Administrative Lock
Configuring a Loopback
VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
VCCV BVD Support
VCCV BFD Encapsulation on a Pseudowire
BFD Session Operation
Configuring VCCV BFD
Pseudowire Switching
Pseudowire Switching with Protection
Pseudowire Switching Behavior
Static-to-Dynamic Pseudowire Switching
Ingress VLAN Swapping
Ingress VLAN Translation
Pseudowire Redundancy
Dynamic Multi-Segment Pseudowire Routing
Overview
Pseudowire Routing
Static Routing
Explicit Paths
Configuring VLLs using Dynamic MS-PWs
Active/Passive T-PE Selection
Automatic Endpoint Configuration
Selecting a Path for an MS-PW
Pseudowire Templates
Pseudowire Redundancy
VCCV OAM for Dynamic MS-PWs
VCCV-Ping on Dynamic MS-PWs
VCCV-Trace on Dynamic MS-PWs
Example Dynamic MS-PW Configuration
VLL Resilience with Two Destination PE Nodes
Master-Slave Operation
Interaction with SAP-Specific OAM
Local Rules at Slave VLL PE
Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
VLL Resilience for a Switched Pseudowire Path
Pseudowire SAPs
Epipe Using BGP-MH Site Support for Ethernet Tunnels
Operational Overview
Detailed Operation
Sample Operation of G.8031 BGP-MH
BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
BGP-MH Specifics for MH Site Support for Ethernet Tunnels
PW Redundancy for BGP MH Site Support for Ethernet Tunnels
T-LDP Status Notification Handling Rules of BGP-MH Epipes
Rules for Processing Endpoint SAP Active/Standby Status Bits
Rules for Processing, Merging Local, and Received Endpoint Operational Status
Operation for BGP MH Site Support for Ethernet Tunnels
Access Node Resilience Using MC-LAG and Pseudowire Redundancy
VLL Resilience for a Switched Pseudowire Path
Pseudowire Redundancy Service Models
Redundant VLL Service Model
T-LDP Status Notification Handling Rules
Processing Endpoint SAP Active/Standby Status Bits
Processing and Merging
High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
Primary Spoke-SDP Fallback to Secondary SAP
Reversion to Primary Spoke SDP Path
MC-APS and MC-LAG
Failure Scenarios
VLL Using G.8031 Protected Ethernet Tunnels
MPLS Entropy Label and Hash Label
BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
BGP VPWS Pseudowire Switching
Pseudowire Signaling
BGP VPWS Configuration Procedure
Use of Pseudowire Template for BGP VPWS
Use of Endpoint for BGP VPWS
VLL Service Considerations
SDPs
SDP Statistics for VPLS and VLL Services
SAP Encapsulations and Pseudowire Types
PWE3 N-to-1 Cell Mode
PWE3 AAL5 SDU Mode
QoS Policies
Filter Policies
MAC Resources
Configuring a VLL Service with CLI
Basic Configurations
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring Cpipe SAPs and Spoke SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Distributed Epipe SAPs
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke SDP Control Words
Same Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-Enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-Enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
VLL Service Configuration Command Reference
Command Hierarchies
Apipe Service Configuration Commands
Related Apipe Commands
Connection Profile Commands
Cpipe Service Configuration Commands
Epipe Service Configuration Commands
Epipe Global Commands
Epipe SAP Configuration Commands
Epipe Spoke SDP Configuration Commands
Template Commands
Fpipe Service Configuration Commands
Ipipe Service Configuration Commands
Command Descriptions
Generic Commands
Service Commands
VLL Global Commands
VLL SAP Commands
Circuit Emulation Commands
ETH-CFM Service Commands
Service Filter and QoS Policy Commands
VLL Frame Relay Commands
VLL SDP Commands
ATM Commands
OAM Commands
Cpipe Commands
VLL SAP Commands
CPipe SDP Commands
Epipe SAP Template Commands
VLL Show Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VLL Show Commands
VLL Clear Commands
VLL Debug Commands
VLL Tools Commands
Virtual Private LAN Service
In This Chapter
VPLS Service Overview
VPLS Packet Walkthrough
VPLS Features
VPLS Enhancements
VPLS over MPLS
VPLS Service Pseudowire VLAN Tag Processing
VPLS MAC Learning and Packet Forwarding
MAC Learning Protection
DEI in IEEE 802.1ad
VPLS Using G.8031 Protected Ethernet Tunnels
Pseudowire Control Word
Table Management
FIB Size
FIB Size Alarms
Local and Remote Aging Timers
Disable MAC Aging
Disable MAC Learning
Unknown MAC Discard
VPLS and Rate Limiting
MAC Move
Auto-Learn MAC Protect
Operation
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
VPLS and Spanning Tree Protocol
Spanning Tree Operating Modes
Multiple Spanning Tree
Redundancy Access to VPLS
MSTP for QinQ SAPs
Provider MSTP
MSTP General Principles
MSTP in the SR-Series Platform
Enhancements to the Spanning Tree Protocol
L2PT Termination
BPDU Translation
L2PT and BPDU Translation
Egress Multicast Groups
Egress Multicast Group Provisioning
Required Common SAP Parameters
SAP Egress QoS Policy
Efficient Multicast Egress SAP Chaining
Mirroring and Efficient Multicast Replication
IOM or XCM Chain Management
IOM Mode B Capability
VPLS Redundancy
Spoke SDP Redundancy for Metro Interconnection
Spoke SDP Based Redundant Access
Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
Fast Detection of Peer Failure using BFD
MC-EP Passive Mode
Support for Single Chassis Endpoint Mechanisms
MAC Flush Support in MC-EP
Block-on-Mesh-Failure Support in MC-EP Scenario
Support for Force Spoke SDP in MC-EP
Revertive Behavior for Primary Pseudowire(s) in a MC-EP
Using B-VPLS for Increased Scalability and Reduced Convergence Times
MAC Flush Additions for PBB VPLS
VPLS Access Redundancy
STP-Based Redundant Access to VPLS
Redundant Access to VPLS Without STP
Object Grouping and State Monitoring
VPLS Applicability — Block on VPLS a Failure
MAC Flush Message Processing
Dual Homing to a VPLS Service
MC-Ring and VPLS
ACL Next-Hop for VPLS
SDP Statistics for VPLS and VLL Services
BGP Auto-Discovery for LDP VPLS
BGP AD Overview
Information Model
FEC Element for T-LDP Signaling
BGP-AD and Target LDP (T-LDP) Interaction
SDP Usage
Automatic Creation of SDPs
Manually Provisioned SDP
Automatic Instantiation of Pseudowires (SDP Bindings)
Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
Resiliency Schemes
BGP VPLS
Pseudowire Signaling Details
Supported VPLS Features
VCCV BFD Support for VPLS Services
BGP Multi-Homing for VPLS
Information Model and Required Extensions to L2VPN NLRI
Supported Services and Multi-Homing Objects
Blackhole Avoidance
MAC Flush to the Core PEs
Indicating non-DF status towards the access PE or CE
BGP Multi-Homing for VPLS Inter-Domain Resiliency
Multicast-Aware VPLS
IGMP Snooping for VPLS
MLD Snooping for VPLS
PIM Snooping for VPLS
Plain PIM Snooping
PIM Proxy
MAC-Based IPv6 Multicast Forwarding
PIM and IGMP/MLD Snooping Interaction
Multi-Chassis Synchronization for Layer 2 Snooping States
IGMP Snooping Synchronization
MLD Snooping Synchronization
PIM Snooping for IPv4 Synchronization
VPLS Multicast-Aware High Availability Features
RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
MPLS Entropy Label and Hash Label
Routed VPLS and I-VPLS
IES or VPRN IP Interface Binding
Assigning a Service Name to a VPLS Service
Service Binding Requirements
Bound Service Name Assignment
Binding a Service Name to an IP Interface
Bound Service Deletion or Service Name Removal
IP Interface Attached VPLS Service Constraints
IP Interface and VPLS Operational State Coordination
IP Interface MTU and Fragmentation
Unicast IP Routing into a VPLS Service
ARP and VPLS FIB Interactions
Routed VPLS Specific ARP Cache Behavior
The allow-ip-int-bind VPLS Flag
Routed VPLS SAPs Only Supported on Standard Ethernet Ports
Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
Network Ports Restricted to FP2-Based Systems or IOMs
LAG Port Membership Constraints
Routed VPLS Feature Restrictions
Routed I-VPLS Feature Restrictions
IES IP Interface VPLS Binding and Chassis Mode Interaction
VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
Route Leaking Between Routing Contexts
Ingress LAG and FP1 to Routed VPLS Discards
IPv4 and IPv6 Multicast Routing Support
BGP Auto Discovery (BGP-AD) for Routed VPLS Support
Routed VPLS Caveats
VPLS SAP Ingress IP Filter Override
IP Interface Defined Egress QoS Reclassification
Remarking for VPLS and Routed Packets
7450 Mixed Mode Chassis
IPv4 Multicast Routing
Routed VPLS Supported Routing Related Protocols
Spanning Tree and Split Horizon
VPLS Service Considerations
SAP Encapsulations
VLAN Processing
Ingress VLAN Swapping
Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
Configure the MVRP Infrastructure using an M-VPLS Context
Instantiate Related VLAN FIBs and Trunks in MVRP Scope
MVRP Activation of Service Connectivity
MVRP Control Plane
STP-MVRP Interaction
Interaction Between MVRP and Instantiated SAP Status
Using Temporary Flooding to Optimize Failover Times
VPLS E-Tree Services
VPLS E-Tree Services Overview
Leaf-ac and Root-ac SAPs
Leaf-ac and Root-ac SDP Binds
Root-leaf-tag SAPs
Root-leaf-tag SDP Binds
Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Configuring Egress Multicast Groups
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
STP SAP Operational States
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Applying an Egress Multicast Group to a VPLS Service SAP
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke SDP Specific STP Parameters
Spoke SDP STP Operational States
Configuring VPLS Spoke SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-Enabling a VPLS Service
VPLS Service Configuration Command Reference
Command Hierarchies
Global Commands
Oper Group Commands
SAP Commands
Template Commands
Mesh SDP Commands
Spoke SDP Commands
Provider Tunnel Commands
Egress Multicast Group Commands
Routed VPLS Commands
Multi-Chassis Redundancy Commands
Command Descriptions
Generic Commands
VPLS Service Commands
VPLS Interface Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
ETH-CFM Service Commands
VPLS SAP ATM Commands
VPLS Filter and QoS Policy Commands
VPLS Template Commands
Provider Tunnel Commands
VPLS SDP Commands
SAP Subscriber Management Commands
VPLS Multicast Commands
VPLS DHCP and Anti-Spoofing Commands
Egress Multicast Group Commands
BGP Auto-Discovery Commands
Redundancy Commands
VPLS Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Show Multi-Chassis Endpoint Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VPLS Show Commands
IGMP Snooping Show Commands
IGMP Commands
Show Multi-Chassis Endpoint Commands
VPLS Clear Commands
VPLS Debug Commands
IEEE 802.1ah Provider Backbone Bridging
In This Chapter
IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
PBB Features
Integrated PBB-VPLS Solution
PBB Technology
PBB Mapping to Existing VPLS Configurations
SAP and SDP Support
PBB B-VPLS
PBB I-VPLS
PBB Packet Walkthrough
PBB Control Planes
Shortest Path Bridging MAC Mode (SPBM)
Flooding and Learning Versus Link State
SPB for B-VPLS
Control B-VPLS and User B-VPLS
Shortest Path and Single Tree
Data Path and Forwarding
SPB Ethernet OAM
SPB Levels
SPBM to Non-SPBM Interworking
Static MACs and Static ISIDs
Epipe Static Configuration
I-VPLS Static Config
SPBM ISID Policies
ISID Policy Control
Static ISID Advertisement
I-VPLS for Unicast Service
Default Behaviors
Example Network Configuration
Sample Configuration for Dut-A
Show Commands Outputs
Debug Commands
Tools Commands
Clear Commands
IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
MMRP Support Over B-VPLS SAPs and SDPs
I-VPLS Changes and Related MMRP Behavior
Limiting the Number of MMRP Entries on a Per B-VPLS Basis
Optimization for Improved Convergence Time
Controlling MRP Scope using MRP Policies
PBB and BGP-AD
PBB ELINE Service
Non-Redundant PBB Epipe Spoke Termination
PBB Using G.8031-Protected Ethernet Tunnels
Solution Overview
Detailed Solution Description
Detailed PBB Emulated LAG Solution Description
Support Service and Solution Combinations
Periodic MAC Notification
MAC Flush
PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
Porting existing VPLS LDP MAC Flush in PBB VPLS
PBB Blackholing Issue
LDP MAC Flush Solution for PBB Blackholing
Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
Solution Description for I-VPLS Over Native PBB Core
Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
Dual-Homing into PBB Epipe - Local Switching Use Case
BGP Multi-homing for I-VPLS
Access Multi-Homing over MPLS for PBB Epipes
PBB and IGMP/MLD Snooping
PBB QoS
Transparency of Customer QoS Indication through PBB Backbone
Configuration Examples
Details Solution Description
Egress B-SAP per ISID Shaping
B-SAP Egress ISID Shaping Configuration
Provisioning Model
Egress Queue Scheduling
B-SAP per-ISID Shaping Configuration Example
PBB OAM
Mirroring
OAM Commands
CFM Support
Configuration Examples
PBB using G.8031 Protected Ethernet Tunnels
MC-LAG Multihoming for Native PBB
Access Multi-Homing over MPLS for PBB Epipes
PBB Configuration Command Reference
Command Hierarchies
Global Commands
SAP Commands
Mesh SDP Commands
Spoke SDP Commands
BGP-MH for I-VPLS Commands
Command Descriptions
VPLS Service Commands
PBB Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
PBB Show Commands
PBB Clear Commands
PBB Debug Commands
Ethernet Virtual Private Networks (EVPNs)
In This Chapter
Overview
EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
EVPN for MPLS Tunnels in ELAN Services
EVPN for MPLS Tunnels in ELINE Services
EVPN for PBB over MPLS Tunnels (PBB-EVPN)
VXLAN
VXLAN ECMP and LAG
VXLAN VPLS Tag Handling
VXLAN MTU Considerations
VXLAN QoS
Ingress
Egress
VXLAN Ping
IGMP-Snooping on VXLAN
BGP-EVPN Control Plane for VXLAN Overlay Tunnels
EVPN for VXLAN in VPLS Services
Resiliency and BGP Multi-Homing
Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
Use of the unknown-mac-route
EVPN for VXLAN in R-VPLS Services
EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
EVPN for VXLAN in EVPN Tunnel R-VPLS Services
DC GW integration with the Nuage Virtual Services Directory (VSD)
XMPP Interface on the DC GW
Overview of the Static-Dynamic VSD Integration Model
Step 1
Step 2
Step 3
Step 4
Step 5
VSD-Domains and Association to Static-Dynamic Services
VSD-Domain Type L2-DOMAIN
VSD-Domain Type L2-DOMAIN-IRB
VSD-Domain Type VRF-GRE
VSD-Domain Type VRF-VXLAN
Fully-Dynamic VSD Integration Model
Step 1
Step 2
Step 3
Step 4
Step 5
Python Script Implementation Details
Provisioning Filters using the VSD Fully Dynamic Model
BGP-EVPN Control Plane for MPLS Tunnels
EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
EVPN and VPLS Integration
Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
EVPN Multi-Homing in VPLS Services
EVPN All-Active Multi-Homing
All-Active Multi-Homing Service Model
ES Discovery and DF Election Procedures
Aliasing
Network Failures and Convergence for All-Active Multi-Homing
Logical Failures on Ethernet Segments and Black-Holes
Transient Issues Due to MAC Route Delays
EVPN Single-Active Multi-Homing
Single-Active Multi-Homing Service Model
ES and DF Election Procedures
Backup PE Function
Network Failures and Convergence for Single-Active Multi-Homing
Logical Failures on Ethernet Segments and Black-Holes
BGP-EVPN Control Plane for EVPN-VPWS
EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
Using A/S PW and MC-LAG with EVPN-VPWS Epipes
EVPN for MPLS Tunnels in Routed VPLS Services
P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
BGP-EVPN Control Plane for PBB-EVPN
EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
EVPN Route Type 4 - Ethernet Segment Route
PBB-EVPN for I-VPLS and PBB Epipe Services
Flood Containment for I-VPLS Services
PBB-EVPN and PBB-VPLS Integration
PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
System BMAC Assignment in PBB-EVPN
PBB-EVPN all-active multi-homing service model
Network failures and convergence for all-active multi-homing
PBB-EVPN Single-Active Multi-Homing Service Model
Network Failures and Convergence for Single-Active Multihoming
PBB-Epipes and EVPN Multi-Homing
PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
ARP/ND Snooping and Proxy Support
Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
Proxy-ND and the Router Flag in Neighbor Advertisement messages
Procedure to Add the R Flag to a Specified Entry
BGP-EVPN MAC-Mobility
BGP-EVPN MAC-Duplication
Conditional Static MAC and Protection
Auto-Learn MAC Protect and Restricting Protected Source MACs
Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
CFM Interaction with EVPN Services
DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
BGP and EVPN Route Selection for EVPN Routes
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
Interaction of PBB-EVPN with Existing VPLS Features
Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
Routing Policies for BGP EVPN IP Prefixes
MPLS Entropy Label and Hash Label
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-active Multi-homing Example
EVPN Command Reference
Command Hierarchies
EVPN Configuration Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
EVPN Configuration Commands
Show Configuration Commands
Clear Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer Documentation and Product Support
Layer 3 Services Guide R14.0.R1
Getting Started
About This Guide
Audience
Internet Enhanced Service
In This Chapter
IES Service Overview
IES Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP Interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
IES IP Interface Applicability
Subscriber Interfaces
IPv6 Enhanced Subscriber Management (ESM)
RADIUS Accounting
SAPs
Encapsulations
ATM SAP Encapsulations for IES
Pseudowire SAPs
Encapsulation
Pseudowire SAP Configuration
QoS for Pseudowire Ports and Pseudowire SAPs
Shaping and Bandwidth Control
Lag Considerations
Last Mile Packet Size Adjustment
Redundancy with Pseudowire SAPs
Operational Group Support for PW Ports
Routing Protocols
CPE Connectivity Check
QoS Policies
Filter Policies
MPLS Entropy Label and Hash Label
Spoke SDPs
SRRP
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPSec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
IES Services Command Reference
Command Hierarchies
IES Service Configuration Commands
Global Commands
Interface Commands
Routed VPLS Commands
Redundant Interface Commands
Interface SAP Commands
Interface SAP Tunnel Commands
VRRP Commands
Spoke SDP Commands
Subscriber Interface Commands
Group Interface SAP Commands
Threat Managment Service Interface Commands
Command Descriptions
Generic Commands
IES Global Commands
Redundant Interface Commands
IES Subscriber Interface Commands
IES Interface Commands
IES Interface DHCP Commands
PPPoE Commands
ETH-CFM Service Commands
IES Filter and QoS Policy Commands
ATM Commands
IES Interface VRRP Commands
IPSec Gateway Commands
Threat Management Service Interface Commands
IES Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Monitor Commands
Command Descriptions
IES Show Commands
IES Clear Commands
IES Debug Commands
IES Monitor Commands
Virtual Private Routed Network Service
In This Chapter
VPRN Service Overview
Routing Prerequisites
Core MP-BGP Support
Route Distinguishers
eiBGP Load Balancing
Route Reflector
CE to PE Route Exchange
Route Redistribution
CPE Connectivity Check
Constrained Route Distribution (RT Constraint)
Constrained VPN Route Distribution Based on Route Targets
Configuring the Route Target Address Family
Originating RT Constraint Routes
Receiving and Re-Advertising RT Constraint Routes
Using RT Constraint Routes
BGP Fast Reroute in a VPRN
BGP Fast Reroute in a VPRN Configuration
BGP Best-External in a VPRN Context
VPRN Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
VPRN IP Interface Applicability
Subscriber Interfaces
SAPs
Encapsulations
ATM SAP Encapsulations for VPRN Services
Pseudowire SAPs
QoS Policies
Filter Policies
DSCP Marking
Default DSCP Mapping Table
Configuration of TTL Propagation for VPRN Routes
CE to PE Routing Protocols
PE to PE Tunneling Mechanisms
Per VRF Route Limiting
Spoke SDPs
T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
Spoke SDP Redundancy into IES/VPRN
IP-VPNs
Using OSPF in IP-VPNs
IPCP Subnet Negotiation
Cflowd for IP-VPNs
Inter-AS VPRNs
Carrier Supporting Carrier (CsC)
Terminology
CSC Connectivity Models
CSC-PE Configuration and Operation
CSC Interface
QoS
MPLS
CSC VPRN Service Configuration
Traffic Leaking to GRT
Traffic Leaking from VPRN to GRT for IPv6
RIP Metric Propagation in VPRNs
NTP Within a VPRN Service
PTP Within a VPRN Service
VPN Route Label Allocation
Configuring the Service Label Mode
Restrictions and Usage Notes
VPRN Support for BGP Flowspec
MPLS Entropy Label and Hash Label
QoS on Ingress Bindings
Multicast in IP-VPN Applications
Use of Data MDTs
Multicast Protocols Supported in the Provider Network
MVPN Membership Auto-discovery using BGP
MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
PE-PE Transmission of C-Multicast Routing using BGP
VRF Route Import Extended Community
Provider Tunnel Support
Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
P2MP RSVP-TE I-PMSI and S-PMSI
P2MP LDP I-PMSI and S-PMSI
Wildcard (C-*, C-*) P2MP LSP S-PMSI
P2MP LSP S-PMSI
Dynamic Multicast Signaling over P2MP LDP in VRF
MVPN Sender-only/Receiver-only
S-PMSI Trigger Thresholds
Migration from Existing Rosen Implementation
MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
Multicast VPN Extranet
Multicast Extranet for Rosen MVPN for PIM SSM
Multicast Extranet for NG-MVPN for PIM SSM
Multicast Extranet with Per-group Mapping for PIM SSM
Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
Multicast Extranet with Per-group Mapping for PIM ASM
Non-Congruent Unicast and Multicast Topologies for Multicast VPN
Multicast Auto RP Discovery
IPv6 MVPN Support
Multicast Core Diversity for Rosen MDT_SAFI MVPNs
NG-MVPN Multicast Source Geo-Redundancy
Multicast Core Diversity for Rosen MDT SAFI MVPNs
Inter-AS MVPN
BGP Connector Attribute
PIM RPF Vector
Inter-AS MVPN Option B
Inter-AS MVPN Option C
VPRN Off-Ramp
DDoS Off-Ramping Through Flowspec
FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN Protocols - RIP
Configuring VPRN Protocols - OSPF
Configuring TMS Parameters
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Configuring IPSec Parameters
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
VPRN Service Configuration Commands
Command Hierarchies
VPRN Service Configuration Commands
L2TP Commands
DHCP Commands
GSMP Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
NTP Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface Spoke SDP Commands
Interface VRRP Commands
Interface SAP Commands
Interface SAP Tunnel Commands
Routed VPLS Commands
Oper Group Commands
Network Ingress Commands
BGP Configuration Commands
IS-IS Configuration Commands
OSPF Configuration Commands
PIM Configuration Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Configuration Commands
Threat Management Service Interface Commands
RADIUS Commands
Web Portal Protocol Configuration Commands
Command Descriptions
Generic Commands
Global Commands
IGMP Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router DHCP Configuration Commands
Log Commands
Multicast VPN Commands
Network Time Protocol Commands
Redundant Interface Commands
SDP Commands
Interface Commands
Interface DHCP Commands
Interface ICMP Commands
Interface ICMP Commands
Router Advertisement Commands
NAT Commands
Subscriber Interface Commands
PPPoE Commands
Interface ICMP Commands
Interface SAP Commands
Interface SAP ATM Commands
Interface Anti-Spoofing Commands
Interface SAP Filter and QoS Policy Commands
Routed VPLS Commands
ETH-CFM Service Commands
SAP Subscriber Management Commands
Interface VRRP Commands
PIM Commands
MSDP Configuration Commands
MLD Configuration Commands
Network Interface Commands
Network Ingress Commands
BGP Commands
IS-IS Commands
OSPF Commands
RIP Commands
IPSec Configuration Commands
Threat Management Service Interface Commands
RADIUS Proxy Commands
VPRN Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
VPRN Show Commands
VPRN Clear Commands
VPRN Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Audience
Internet Enhanced Service
In This Chapter
IES Service Overview
IES Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP Interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
IES IP Interface Applicability
Subscriber Interfaces
IPv6 Enhanced Subscriber Management (ESM)
RADIUS Accounting
SAPs
Encapsulations
ATM SAP Encapsulations for IES
Pseudowire SAPs
Encapsulation
Pseudowire SAP Configuration
QoS for Pseudowire Ports and Pseudowire SAPs
Shaping and Bandwidth Control
Lag Considerations
Last Mile Packet Size Adjustment
Redundancy with Pseudowire SAPs
Operational Group Support for PW Ports
Routing Protocols
CPE Connectivity Check
QoS Policies
Filter Policies
MPLS Entropy Label and Hash Label
Spoke SDPs
SRRP
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPSec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
IES Services Command Reference
Command Hierarchies
IES Service Configuration Commands
Global Commands
Interface Commands
Routed VPLS Commands
Redundant Interface Commands
Interface SAP Commands
Interface SAP Tunnel Commands
VRRP Commands
Spoke SDP Commands
Subscriber Interface Commands
Group Interface SAP Commands
Threat Managment Service Interface Commands
Command Descriptions
Generic Commands
IES Global Commands
Redundant Interface Commands
IES Subscriber Interface Commands
IES Interface Commands
IES Interface DHCP Commands
PPPoE Commands
ETH-CFM Service Commands
IES Filter and QoS Policy Commands
ATM Commands
IES Interface VRRP Commands
IPSec Gateway Commands
Threat Management Service Interface Commands
IES Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Monitor Commands
Command Descriptions
IES Show Commands
IES Clear Commands
IES Debug Commands
IES Monitor Commands
Virtual Private Routed Network Service
In This Chapter
VPRN Service Overview
Routing Prerequisites
Core MP-BGP Support
Route Distinguishers
eiBGP Load Balancing
Route Reflector
CE to PE Route Exchange
Route Redistribution
CPE Connectivity Check
Constrained Route Distribution (RT Constraint)
Constrained VPN Route Distribution Based on Route Targets
Configuring the Route Target Address Family
Originating RT Constraint Routes
Receiving and Re-Advertising RT Constraint Routes
Using RT Constraint Routes
BGP Fast Reroute in a VPRN
BGP Fast Reroute in a VPRN Configuration
BGP Best-External in a VPRN Context
VPRN Features
IP Interfaces
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Object Grouping and State Monitoring
VPRN IP Interface Applicability
Subscriber Interfaces
SAPs
Encapsulations
ATM SAP Encapsulations for VPRN Services
Pseudowire SAPs
QoS Policies
Filter Policies
DSCP Marking
Default DSCP Mapping Table
Configuration of TTL Propagation for VPRN Routes
CE to PE Routing Protocols
PE to PE Tunneling Mechanisms
Per VRF Route Limiting
Spoke SDPs
T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
Spoke SDP Redundancy into IES/VPRN
IP-VPNs
Using OSPF in IP-VPNs
IPCP Subnet Negotiation
Cflowd for IP-VPNs
Inter-AS VPRNs
Carrier Supporting Carrier (CsC)
Terminology
CSC Connectivity Models
CSC-PE Configuration and Operation
CSC Interface
QoS
MPLS
CSC VPRN Service Configuration
Traffic Leaking to GRT
Traffic Leaking from VPRN to GRT for IPv6
RIP Metric Propagation in VPRNs
NTP Within a VPRN Service
PTP Within a VPRN Service
VPN Route Label Allocation
Configuring the Service Label Mode
Restrictions and Usage Notes
VPRN Support for BGP Flowspec
MPLS Entropy Label and Hash Label
QoS on Ingress Bindings
Multicast in IP-VPN Applications
Use of Data MDTs
Multicast Protocols Supported in the Provider Network
MVPN Membership Auto-discovery using BGP
MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
PE-PE Transmission of C-Multicast Routing using BGP
VRF Route Import Extended Community
Provider Tunnel Support
Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
P2MP RSVP-TE I-PMSI and S-PMSI
P2MP LDP I-PMSI and S-PMSI
Wildcard (C-*, C-*) P2MP LSP S-PMSI
P2MP LSP S-PMSI
Dynamic Multicast Signaling over P2MP LDP in VRF
MVPN Sender-only/Receiver-only
S-PMSI Trigger Thresholds
Migration from Existing Rosen Implementation
MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
Multicast VPN Extranet
Multicast Extranet for Rosen MVPN for PIM SSM
Multicast Extranet for NG-MVPN for PIM SSM
Multicast Extranet with Per-group Mapping for PIM SSM
Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
Multicast Extranet with Per-group Mapping for PIM ASM
Non-Congruent Unicast and Multicast Topologies for Multicast VPN
Multicast Auto RP Discovery
IPv6 MVPN Support
Multicast Core Diversity for Rosen MDT_SAFI MVPNs
NG-MVPN Multicast Source Geo-Redundancy
Multicast Core Diversity for Rosen MDT SAFI MVPNs
Inter-AS MVPN
BGP Connector Attribute
PIM RPF Vector
Inter-AS MVPN Option B
Inter-AS MVPN Option C
VPRN Off-Ramp
DDoS Off-Ramping Through Flowspec
FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN Protocols - RIP
Configuring VPRN Protocols - OSPF
Configuring TMS Parameters
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Configuring IPSec Parameters
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
VPRN Service Configuration Commands
Command Hierarchies
VPRN Service Configuration Commands
L2TP Commands
DHCP Commands
GSMP Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
NTP Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface Spoke SDP Commands
Interface VRRP Commands
Interface SAP Commands
Interface SAP Tunnel Commands
Routed VPLS Commands
Oper Group Commands
Network Ingress Commands
BGP Configuration Commands
IS-IS Configuration Commands
OSPF Configuration Commands
PIM Configuration Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Configuration Commands
Threat Management Service Interface Commands
RADIUS Commands
Web Portal Protocol Configuration Commands
Command Descriptions
Generic Commands
Global Commands
IGMP Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router DHCP Configuration Commands
Log Commands
Multicast VPN Commands
Network Time Protocol Commands
Redundant Interface Commands
SDP Commands
Interface Commands
Interface DHCP Commands
Interface ICMP Commands
Interface ICMP Commands
Router Advertisement Commands
NAT Commands
Subscriber Interface Commands
PPPoE Commands
Interface ICMP Commands
Interface SAP Commands
Interface SAP ATM Commands
Interface Anti-Spoofing Commands
Interface SAP Filter and QoS Policy Commands
Routed VPLS Commands
ETH-CFM Service Commands
SAP Subscriber Management Commands
Interface VRRP Commands
PIM Commands
MSDP Configuration Commands
MLD Configuration Commands
Network Interface Commands
Network Ingress Commands
BGP Commands
IS-IS Commands
OSPF Commands
RIP Commands
IPSec Configuration Commands
Threat Management Service Interface Commands
RADIUS Proxy Commands
VPRN Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
VPRN Show Commands
VPRN Clear Commands
VPRN Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
MPLS Guide R14.0.R1
Getting Started
About This Guide
Alcatel-Lucent Router Configuration Process
MPLS and RSVP
In This Chapter
MPLS
MPLS Label Stack
Label Values
MPLS Entropy Label and Hash Label
Inserting and Processing the Entropy Label
Ingress LER
LSR
Egress LER
Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
Entropy Label on OAM Packets
Label Switching Routers
LSP Types
Bidirectional Forwarding Detection for MPLS LSPs
Bootstrapping the BFD Session
LSP BFD Configuration
Enabling and Implementing Limits for LSP BFD on a Node
BFD Configuration on RSVP-TE LSPs
MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
Manual Bypass LSP
PLR Bypass LSP Selection Rules
FRR Node-Protection (Facility)
Uniform FRR Failover Time
MPLS/RSVP on Broadcast Interface
Automatic Bandwidth Allocation for RSVP LSPs
Enabling and Disabling Auto-Bandwidth Allocation on an LSP
Autobandwidth on LSPs with Secondary or Secondary Standby Paths
Measurement of LSP Bandwidth
Passive Monitoring of LSP Bandwidth
Periodic Automatic Bandwidth Adjustment
Overflow-Triggered Auto-Bandwidth Adjustment
Manually-Triggered Auto-Bandwidth Adjustment
RSVP
Using RSVP for MPLS
RSVP Traffic Engineering Extensions for MPLS
Hello Protocol
MD5 Authentication of RSVP Interface
Configuring Authentication using Keychains
Reservation Styles
RSVP Message Pacing
RSVP Overhead Refresh Reduction
RSVP Graceful Restart Helper
Enhancements to RSVP control plane congestion control
RSVP LSP Statistics
P2MP RSVP-TE LSP Statistics
Configuring RSVP P2MP LSP Egress Statistics
Configuring RSVP P2MP LSP Ingress Statistics
Configuring Implicit Null
Using Unnumbered Point-to-Point Interface in RSVP
Operation of RSVP FRR Facility Backup over Unnumbered Interface
MPLS Transport Profile
MPLS-TP Model
MPLS-TP Provider Edge and Gateway
VLL Services
Spoke-SDP Termination
MPLS-TP LSR
Detailed Descriptions of MPLS-TP
MPLS-TP LSPs
MPLS-TP on Pseudowires
MPLS-TP Maintenance Identifiers
Generic Associated Channel
MPLS-TP Operations, Administration and Maintenance (OAM)
On-Demand Connectivity Verification (CV) using LSP-Ping
Proactive CC, CV and RDI
BFD-based RDI
PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
PW Control Channel Status Request Mechanism
Pseudowire Redundancy and Active / Standby Dual Homing
Lock Instruct and Loopback for MPLS-TP Pseudowires
MPLS-TP LSP Protection
Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
Alarm Indication Signal (AIS)
Configuring MPLS-TP
Configuration Overview
Node-Wide MPLS-TP Parameter Configuration
Node-Wide MPLS-TP Identifier Configuration
Static LSP and Pseudowire (VC) Label and Tunnel Ranges
Interface Configuration for MPLS-TP
LER Configuration for MPLS-TP
LSP and Path Configuration
Support for Downstream Mapping Information
Proactive CC/CV (using BFD) Configuration
Protection templates and Linear Protection Configuration
Intermediate LSR Configuration for MPLS-TP LSPs
MPLS-TP Show Commands
Static MPLS Labels
MPLS-TP Tunnel Configuration
MPLS-TP Path configuration
MPLS-TP Protection
MPLS TP Node Configuration
MPLS-TP Interfaces
MPLS-TP Debug Commands
Traffic Engineering
TE Metric (IS-IS and OSPF)
Admin Group Support on Facility Bypass Backup LSP
Procedures at Head-End Node
Procedures at PLR Node
Diff-Serv Traffic Engineering
Mapping of Traffic to a Diff-Serv LSP
Admission Control of Classes
Maximum Allocation Model
Russian Doll Model
RSVP Control Plane Extensions
IGP Extensions
Diff-Serv TE Configuration and Operation
RSVP Protocol Level
RSVP Interface Level
LSP and LSP Path Levels
Diff-Serv TE LSP Class Type Change under Failure
LSP Primary Path Retry Procedures
Bandwidth Sharing Across Class Types
Downgrading the CT of Bandwidth Sharing LSP Paths
Upgrading the CT of Bandwidth Sharing LSP Paths
Advanced MPLS/RSVP Features
Extending RSVP LSP to use Loopback Interfaces Other Than router-id
LSP Path Change
Manual LSP Path Switch
Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
Automatic Creation of RSVP-TE LSP Mesh
RSVP-TE LSP Shortcut for IGP Resolution
Using LSP Relative Metric with IGP Shortcut
ECMP Considerations
Handling of Control Packets
Forwarding Adjacency
LDP Forwarding over IGP Shortcut
Handling of Multicast Packets
Disabling TTL Propagation in an LSP Shortcut
RSVP-TE LSP Signaling using LSP Template
Shared Risk Link Groups
Enabling Disjoint Backup Paths
SRLG Penalty Weights for Detour and Bypass LSPs
Static Configurations of SRLG Memberships
TE Graceful Shutdown
Soft Preemption of Diff-Serv RSVP LSP
Least-Fill Bandwidth Rule in CSPF ECMP Selection
Inter-Area TE LSP (ERO Expansion Method)
Area Border Node FRR Protection for Inter-Area LSP
Rerouting of Inter-Area LSP
Behavior of MPLS Options in Inter-Area LSP
Inter-Area LSP support of OSPF Virtual Links
Area Border Node FRR Protection for Inter-Area LSP
Automatic Creation of a RSVP Mesh LSP
Feature Configuration
Feature Behavior
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding and Statistics
Timer-based Reversion for RSVP-TE LSPs
Automatic Creation of an RSVP One-Hop LSP
Feature Configuration
Feature Behavior
MPLS Entropy Label
Point-to-Multipoint (P2MP) RSVP LSP
Application in Video Broadcast
P2MP LSP Data Plane
Procedures at Ingress LER Node
Procedures at LSR Node
Procedures at Branch LSR Node
Procedures at Egress LER Node
Procedures at BUD LSR Node
Ingress Path Management for P2MP LSP Packets
Ingress P2MP Path Management on XCM/IOM-3/IMMs
Ingress P2MP Path Management on IOM-2
RSVP Control Plane in a P2MP LSP
Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
Procedures at Ingress LER Node
Procedures at Egress LER Node
Procedures with a Primary Tunnel Interface
Segment Routing With Traffic Engineering (SR-TE)
Configuring and Operating SR-TE
SR-TE LSP Configuration Overview
SR-TE LSP Instantiation
PCC-Initiated and PCC-Controlled LSP
PCC-Initiated and PCE-Computed/Controlled LSP
SR-TE LSP Path Computation
SR-TE LSP Protection
Data Path Support
SR-TE LSP Metric and MTU Settings
Hash Label Support
Static Route Resolution using SR-TE LSP
BGP Shortcut using SR-TE LSP
BGP Label Route Resolution using SR-TE LSP
Service Packet Forwarding using SR-TE LSP
MPLS Service Usage
Service Distribution Paths
MPLS/RSVP Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring RSVP Parameters
Configuring RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
MPLS/RSVP Configuration Command Reference
Command Hierarchies
MPLS Commands
MPLS-TP Commands
LSP Commands
lsp-bfd Commands
MPLS Path Commands
RSVP Commands
Command Descriptions
MPLS Commands
Generic Commands
MPLS Commands
Point-to-Multipoint MPLS (P2MP) Commands
RSVP Commands
Generic Commands
RSVP Commands
Interface Commands
MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Router Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show Router BFD session Commands
Show RSVP Commands
Tools Commands
Clear Commands
Debug Commands
GMPLS
In This Chapter
GMPLS
Example Applications
Use Case 1: Dynamic Connection Setup with Constraints
Use Case 2: Multi-Layer Resiliency
GMPLS UNI Architecture
Addressing and End-to-End gLSP Architecture
1830 PSS Identifiers
Recovery Reference Models
End to End Recovery (IP-layer)
End to End ECMP
End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
End to End Recovery (GMPLS Layer)
Unprotected gLSP
Full LSP Rerouting
1: N Protection
Optical Segment Recovery
Configuring GMPLS with CLI
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
GMPLS Configuration Command Reference
Command Hierarchies
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Command Descriptions
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Tools Commands
PCEP
In This Chapter
Introduction to the Path Computation Element Protocol (PCEP)
PCC and PCE Configuration
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed/Controlled LSPs
LSP Path Diversity and Bi-Directionality Constraints
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Command Descriptions
PCEP Commands
Label Distribution Protocol
In This Chapter
Label Distribution Protocol
LDP and MPLS
LDP Architecture
Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Other Reasons for Label Actions
Cleanup
Configuring Implicit Null Label
Global LDP Filters
Per LDP Peer FEC Import and Export Policies
Configuring Multiple LDP LSR ID
T-LDP hello reduction
Tracking a T-LDP Peer with BFD
Link LDP Hello Adjacency Tracking with BFD
LDP LSP Statistics
TTL Security for BGP and LDP
ECMP Support for LDP
Label Operations
Unnumbered Interface Support in LDP
Feature Configuration
Operation of LDP over an Unnumbered IP Interface
Link LDP
Targeted LDP
FEC Resolution
LDP over RSVP Tunnels
Signaling and Operation
LDP Label Distribution and FEC Resolution
Default FEC Resolution Procedure
FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
Rerouting Around Failures
LDP-over-RSVP Tunnel Protection
ABR Protection
LDP over RSVP Without Area Boundary
LDP over RSVP and ECMP
Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
Configuration and Operation
LDP ECMP Uniform Failover
LDP Fast-Reroute for IS-IS and OSPF Prefixes
LDP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
LDP FRR Procedures
ECMP Considerations
LDP FRR and LDP Shortcut
LDP FRR and LDP-over-RSVP
LDP FRR and RSVP Shortcut (IGP Shortcut)
IS-IS and OSPF Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
mLDP Fast Upstream Switchover
LDP FEC to BGP Label Route Stitching
Configuration
Detailed LDP FEC Resolution
Detailed BGP Labeled Route Resolution
Data Plane Forwarding
LDP-SR Stitching for IPv4 prefixes (IS-IS)
LDP-SR Stitching Configuration
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
Automatic Creation of a Targeted Hello Adjacency and LDP Session
Feature Configuration
Feature Behavior
Multicast P2MP LDP for GRT
LDP P2MP Support
LDP P2MP Configuration
LDP P2MP Protocol
Make Before Break (MBB)
ECMP Support
Multicast LDP Fast Upstream Switchover
Feature Configuration
Feature Behavior
Uniform Failover from Primary to Backup ILM
Multi-Area and Multi-Instance Extensions to LDP
LDP Shortcut for BGP Next-Hop Resolution
LDP Shortcut for IGP Routes
LDP Shortcut Configuration
IGP Route Resolution
LDP Shortcut Forwarding Plane
ECMP Considerations
Disabling TTL Propagation in an LSP Shortcut
LDP Graceful Handling of Resource Exhaustion
LDP Base Graceful Handling of Resources
LDP Enhanced Graceful Handling of Resources
LSR Overload Notification
LSR Overload Protection Capability
Procedures for LSR overload protection
User Guidelines and Troubleshooting Procedures
Common Procedures
Base Resource Handling Procedures
Enhanced Resource Handling Procedures
LDP IPv6 Control and Data Planes
LDP Operation in an IPv6 Network
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
Address and FEC Distribution
Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services and Lawful Intercept
Configuration at mirror source node
Configuration at mirror destination node
Static Route Resolution to a LDP IPv6 FEC
IGP Route Resolution to a LDP IPv6 FEC
OAM Support with LDP IPv6
LDP IPv6 Interoperability Considerations
Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
LDP Process Overview
LDP-IGP Synchronization
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Command Descriptions
Generic Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
TCP Session Parameters Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show LDP Commands
Clear Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer documentation and product support
Getting Started
About This Guide
Alcatel-Lucent Router Configuration Process
MPLS and RSVP
In This Chapter
MPLS
MPLS Label Stack
Label Values
MPLS Entropy Label and Hash Label
Inserting and Processing the Entropy Label
Ingress LER
LSR
Egress LER
Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
Entropy Label on OAM Packets
Label Switching Routers
LSP Types
Bidirectional Forwarding Detection for MPLS LSPs
Bootstrapping the BFD Session
LSP BFD Configuration
Enabling and Implementing Limits for LSP BFD on a Node
BFD Configuration on RSVP-TE LSPs
MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
Manual Bypass LSP
PLR Bypass LSP Selection Rules
FRR Node-Protection (Facility)
Uniform FRR Failover Time
MPLS/RSVP on Broadcast Interface
Automatic Bandwidth Allocation for RSVP LSPs
Enabling and Disabling Auto-Bandwidth Allocation on an LSP
Autobandwidth on LSPs with Secondary or Secondary Standby Paths
Measurement of LSP Bandwidth
Passive Monitoring of LSP Bandwidth
Periodic Automatic Bandwidth Adjustment
Overflow-Triggered Auto-Bandwidth Adjustment
Manually-Triggered Auto-Bandwidth Adjustment
RSVP
Using RSVP for MPLS
RSVP Traffic Engineering Extensions for MPLS
Hello Protocol
MD5 Authentication of RSVP Interface
Configuring Authentication using Keychains
Reservation Styles
RSVP Message Pacing
RSVP Overhead Refresh Reduction
RSVP Graceful Restart Helper
Enhancements to RSVP control plane congestion control
RSVP LSP Statistics
P2MP RSVP-TE LSP Statistics
Configuring RSVP P2MP LSP Egress Statistics
Configuring RSVP P2MP LSP Ingress Statistics
Configuring Implicit Null
Using Unnumbered Point-to-Point Interface in RSVP
Operation of RSVP FRR Facility Backup over Unnumbered Interface
MPLS Transport Profile
MPLS-TP Model
MPLS-TP Provider Edge and Gateway
VLL Services
Spoke-SDP Termination
MPLS-TP LSR
Detailed Descriptions of MPLS-TP
MPLS-TP LSPs
MPLS-TP on Pseudowires
MPLS-TP Maintenance Identifiers
Generic Associated Channel
MPLS-TP Operations, Administration and Maintenance (OAM)
On-Demand Connectivity Verification (CV) using LSP-Ping
Proactive CC, CV and RDI
BFD-based RDI
PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
PW Control Channel Status Request Mechanism
Pseudowire Redundancy and Active / Standby Dual Homing
Lock Instruct and Loopback for MPLS-TP Pseudowires
MPLS-TP LSP Protection
Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
Alarm Indication Signal (AIS)
Configuring MPLS-TP
Configuration Overview
Node-Wide MPLS-TP Parameter Configuration
Node-Wide MPLS-TP Identifier Configuration
Static LSP and Pseudowire (VC) Label and Tunnel Ranges
Interface Configuration for MPLS-TP
LER Configuration for MPLS-TP
LSP and Path Configuration
Support for Downstream Mapping Information
Proactive CC/CV (using BFD) Configuration
Protection templates and Linear Protection Configuration
Intermediate LSR Configuration for MPLS-TP LSPs
MPLS-TP Show Commands
Static MPLS Labels
MPLS-TP Tunnel Configuration
MPLS-TP Path configuration
MPLS-TP Protection
MPLS TP Node Configuration
MPLS-TP Interfaces
MPLS-TP Debug Commands
Traffic Engineering
TE Metric (IS-IS and OSPF)
Admin Group Support on Facility Bypass Backup LSP
Procedures at Head-End Node
Procedures at PLR Node
Diff-Serv Traffic Engineering
Mapping of Traffic to a Diff-Serv LSP
Admission Control of Classes
Maximum Allocation Model
Russian Doll Model
RSVP Control Plane Extensions
IGP Extensions
Diff-Serv TE Configuration and Operation
RSVP Protocol Level
RSVP Interface Level
LSP and LSP Path Levels
Diff-Serv TE LSP Class Type Change under Failure
LSP Primary Path Retry Procedures
Bandwidth Sharing Across Class Types
Downgrading the CT of Bandwidth Sharing LSP Paths
Upgrading the CT of Bandwidth Sharing LSP Paths
Advanced MPLS/RSVP Features
Extending RSVP LSP to use Loopback Interfaces Other Than router-id
LSP Path Change
Manual LSP Path Switch
Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
Automatic Creation of RSVP-TE LSP Mesh
RSVP-TE LSP Shortcut for IGP Resolution
Using LSP Relative Metric with IGP Shortcut
ECMP Considerations
Handling of Control Packets
Forwarding Adjacency
LDP Forwarding over IGP Shortcut
Handling of Multicast Packets
Disabling TTL Propagation in an LSP Shortcut
RSVP-TE LSP Signaling using LSP Template
Shared Risk Link Groups
Enabling Disjoint Backup Paths
SRLG Penalty Weights for Detour and Bypass LSPs
Static Configurations of SRLG Memberships
TE Graceful Shutdown
Soft Preemption of Diff-Serv RSVP LSP
Least-Fill Bandwidth Rule in CSPF ECMP Selection
Inter-Area TE LSP (ERO Expansion Method)
Area Border Node FRR Protection for Inter-Area LSP
Rerouting of Inter-Area LSP
Behavior of MPLS Options in Inter-Area LSP
Inter-Area LSP support of OSPF Virtual Links
Area Border Node FRR Protection for Inter-Area LSP
Automatic Creation of a RSVP Mesh LSP
Feature Configuration
Feature Behavior
Multi-Area and Multi-Instance Support
Mesh LSP Name Encoding and Statistics
Timer-based Reversion for RSVP-TE LSPs
Automatic Creation of an RSVP One-Hop LSP
Feature Configuration
Feature Behavior
MPLS Entropy Label
Point-to-Multipoint (P2MP) RSVP LSP
Application in Video Broadcast
P2MP LSP Data Plane
Procedures at Ingress LER Node
Procedures at LSR Node
Procedures at Branch LSR Node
Procedures at Egress LER Node
Procedures at BUD LSR Node
Ingress Path Management for P2MP LSP Packets
Ingress P2MP Path Management on XCM/IOM-3/IMMs
Ingress P2MP Path Management on IOM-2
RSVP Control Plane in a P2MP LSP
Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
Procedures at Ingress LER Node
Procedures at Egress LER Node
Procedures with a Primary Tunnel Interface
Segment Routing With Traffic Engineering (SR-TE)
Configuring and Operating SR-TE
SR-TE LSP Configuration Overview
SR-TE LSP Instantiation
PCC-Initiated and PCC-Controlled LSP
PCC-Initiated and PCE-Computed/Controlled LSP
SR-TE LSP Path Computation
SR-TE LSP Protection
Data Path Support
SR-TE LSP Metric and MTU Settings
Hash Label Support
Static Route Resolution using SR-TE LSP
BGP Shortcut using SR-TE LSP
BGP Label Route Resolution using SR-TE LSP
Service Packet Forwarding using SR-TE LSP
MPLS Service Usage
Service Distribution Paths
MPLS/RSVP Configuration Process Overview
Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring RSVP Parameters
Configuring RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
MPLS/RSVP Configuration Command Reference
Command Hierarchies
MPLS Commands
MPLS-TP Commands
LSP Commands
lsp-bfd Commands
MPLS Path Commands
RSVP Commands
Command Descriptions
MPLS Commands
Generic Commands
MPLS Commands
Point-to-Multipoint MPLS (P2MP) Commands
RSVP Commands
Generic Commands
RSVP Commands
Interface Commands
MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Router Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show Router BFD session Commands
Show RSVP Commands
Tools Commands
Clear Commands
Debug Commands
GMPLS
In This Chapter
GMPLS
Example Applications
Use Case 1: Dynamic Connection Setup with Constraints
Use Case 2: Multi-Layer Resiliency
GMPLS UNI Architecture
Addressing and End-to-End gLSP Architecture
1830 PSS Identifiers
Recovery Reference Models
End to End Recovery (IP-layer)
End to End ECMP
End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
End to End Recovery (GMPLS Layer)
Unprotected gLSP
Full LSP Rerouting
1: N Protection
Optical Segment Recovery
Configuring GMPLS with CLI
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
GMPLS Configuration Command Reference
Command Hierarchies
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Command Descriptions
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Tools Commands
PCEP
In This Chapter
Introduction to the Path Computation Element Protocol (PCEP)
PCC and PCE Configuration
Base Implementation of Path Computation Elements (PCE)
PCEP Session Establishment and Maintenance
PCEP Parameters
Stateful PCE
PCEP Extensions in Support of SR-TE LSPs
LSP Initiation
PCC-Initiated and PCE-Computed/Controlled LSPs
LSP Path Diversity and Bi-Directionality Constraints
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Command Descriptions
PCEP Commands
Label Distribution Protocol
In This Chapter
Label Distribution Protocol
LDP and MPLS
LDP Architecture
Subsystem Interrelationships
Memory Manager and LDP
Label Manager
LDP Configuration
Logger
Service Manager
Execution Flow
Initialization
Session Lifetime
Adjacency Establishment
Session Establishment
Label Exchange
Other Reasons for Label Actions
Cleanup
Configuring Implicit Null Label
Global LDP Filters
Per LDP Peer FEC Import and Export Policies
Configuring Multiple LDP LSR ID
T-LDP hello reduction
Tracking a T-LDP Peer with BFD
Link LDP Hello Adjacency Tracking with BFD
LDP LSP Statistics
TTL Security for BGP and LDP
ECMP Support for LDP
Label Operations
Unnumbered Interface Support in LDP
Feature Configuration
Operation of LDP over an Unnumbered IP Interface
Link LDP
Targeted LDP
FEC Resolution
LDP over RSVP Tunnels
Signaling and Operation
LDP Label Distribution and FEC Resolution
Default FEC Resolution Procedure
FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
Rerouting Around Failures
LDP-over-RSVP Tunnel Protection
ABR Protection
LDP over RSVP Without Area Boundary
LDP over RSVP and ECMP
Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
Configuration and Operation
LDP ECMP Uniform Failover
LDP Fast-Reroute for IS-IS and OSPF Prefixes
LDP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
LDP FRR Procedures
ECMP Considerations
LDP FRR and LDP Shortcut
LDP FRR and LDP-over-RSVP
LDP FRR and RSVP Shortcut (IGP Shortcut)
IS-IS and OSPF Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
mLDP Fast Upstream Switchover
LDP FEC to BGP Label Route Stitching
Configuration
Detailed LDP FEC Resolution
Detailed BGP Labeled Route Resolution
Data Plane Forwarding
LDP-SR Stitching for IPv4 prefixes (IS-IS)
LDP-SR Stitching Configuration
Stitching in the LDP-to-SR Direction
Stitching in the SR-to-LDP Direction
LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
Automatic Creation of a Targeted Hello Adjacency and LDP Session
Feature Configuration
Feature Behavior
Multicast P2MP LDP for GRT
LDP P2MP Support
LDP P2MP Configuration
LDP P2MP Protocol
Make Before Break (MBB)
ECMP Support
Multicast LDP Fast Upstream Switchover
Feature Configuration
Feature Behavior
Uniform Failover from Primary to Backup ILM
Multi-Area and Multi-Instance Extensions to LDP
LDP Shortcut for BGP Next-Hop Resolution
LDP Shortcut for IGP Routes
LDP Shortcut Configuration
IGP Route Resolution
LDP Shortcut Forwarding Plane
ECMP Considerations
Disabling TTL Propagation in an LSP Shortcut
LDP Graceful Handling of Resource Exhaustion
LDP Base Graceful Handling of Resources
LDP Enhanced Graceful Handling of Resources
LSR Overload Notification
LSR Overload Protection Capability
Procedures for LSR overload protection
User Guidelines and Troubleshooting Procedures
Common Procedures
Base Resource Handling Procedures
Enhanced Resource Handling Procedures
LDP IPv6 Control and Data Planes
LDP Operation in an IPv6 Network
Link LDP
Targeted LDP
FEC Resolution
LDP Session Capabilities
LDP Adjacency Capabilities
Address and FEC Distribution
Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
IGP and Static Route Synchronization with LDP
BFD Operation
Services Using SDP with an LDP IPv6 FEC
Mirror Services and Lawful Intercept
Configuration at mirror source node
Configuration at mirror destination node
Static Route Resolution to a LDP IPv6 FEC
IGP Route Resolution to a LDP IPv6 FEC
OAM Support with LDP IPv6
LDP IPv6 Interoperability Considerations
Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
LDP Process Overview
LDP-IGP Synchronization
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Command Descriptions
Generic Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
TCP Session Parameters Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show LDP Commands
Clear Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer documentation and product support
Multicast Routing Protocols Guide R14.0.R1
Getting Started
About This Guide
Multicast Configuration Process
Introduction to Multicast
In This Chapter
Multicast Overview
Multicast Models
Any-Source Multicast (ASM)
Source Specific Multicast (SSM)
Multicast in IP-VPN Networks
IGMP
In This Chapter
IGMP Overview
IGMP Versions and Interoperability Requirements
IGMP Version Transition
Source-Specific Multicast Groups
Query Messages
Configuring IGMP with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling IGMP
IGMP Configuration Command Reference
Command Hierarchies
IGMP Configuration Commands
Command Descriptions
Router IGMP Commands
Generic Commands
Generic Commands
Generic Commands
Generic Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MLD
In This Chapter
MLD Overview
MLDv1
MLDv2
Configuring MLD with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling MLD
MLD Configuration Command Reference
Command Hierarchies
MLD Configuration Commands
Command Descriptions
MLD Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Clear Commands
Command Descriptions
Clear Commands
PIM
In This Chapter
PIM Overview
PIM-SM Functions
Phase One
Phase Two
Phase Three
Encapsulating Data Packets in the Register Tunnel
PIM Bootstrap Router Mechanism
PIM-SM Routing Policies
Reverse Path Forwarding Checks
Anycast RP for PIM-SM
Implementation
Distributing PIM Joins over Multiple ECMP Paths
PIM Interface on IES Subscriber Group Interfaces
Multicast Only Fast Reroute (MoFRR)
IPv6 PIM models
PIM SSM
PIM ASM
Embedded RP
Configuring PIM with CLI
PIM Configuration Overview
Basic PIM Configuration
Configuring PIM Parameters
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Disabling PIM
PIM Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Router PIM Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MSDP
In This Chapter
Multicast Source Discovery Protocol
Anycast RP for MSDP
MSDP Procedure
MSDP Peering Scenarios
MSDP Peer Groups
MSDP Mesh Groups
MSDP Routing Policies
Auto-RP (discovery mode only) in Multicast VPN
Multicast in Virtual Private Networks
Draft Rosen
Configuring MSDP with CLI
Basic MSDP Configuration
Configuring MSDP Parameters
Disabling MSDP
MSDP Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
MSDP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MLDP
In This Chapter
Dynamic Multicast Signaling over P2MP in GRT Instance
Multicast Extensions to BGP
In This Chapter
Multicast Extensions to BGP
MBGP Multicast Topology Support
Recursive Lookup for BGP Next Hops
MCAC
In This Chapter
MCAC Overview
MCAC Bundle Policy Overview
MCAC Algorithm
Interface-level MCAC details
MCAC-interface-policy-level MCAC details
Bundle-level MCAC details
MCAC on Link Aggregation Group Interfaces
Configuring MCAC with CLI
Basic MCAC Configuration
Configuring MCAC Parameters
MCAC Configuration Command Reference
Command Hierarchies
MCAC Configuration Commands
MCAC Policy Commands
Command Descriptions
MCAC Configuration Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Show MCAC Commands
Troubleshooting Tools
In This Chapter
Mtrace
Finding the Last Hop Router
Directing the Response
Mstat
Mrinfo
Troubleshooting Configuration Command Reference
Command Hierarchies
Operational Commands
Command Descriptions
Operational Commands
Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer documentation and product support
Getting Started
About This Guide
Multicast Configuration Process
Introduction to Multicast
In This Chapter
Multicast Overview
Multicast Models
Any-Source Multicast (ASM)
Source Specific Multicast (SSM)
Multicast in IP-VPN Networks
IGMP
In This Chapter
IGMP Overview
IGMP Versions and Interoperability Requirements
IGMP Version Transition
Source-Specific Multicast Groups
Query Messages
Configuring IGMP with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling IGMP
IGMP Configuration Command Reference
Command Hierarchies
IGMP Configuration Commands
Command Descriptions
Router IGMP Commands
Generic Commands
Generic Commands
Generic Commands
Generic Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MLD
In This Chapter
MLD Overview
MLDv1
MLDv2
Configuring MLD with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling MLD
MLD Configuration Command Reference
Command Hierarchies
MLD Configuration Commands
Command Descriptions
MLD Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Clear Commands
Command Descriptions
Clear Commands
PIM
In This Chapter
PIM Overview
PIM-SM Functions
Phase One
Phase Two
Phase Three
Encapsulating Data Packets in the Register Tunnel
PIM Bootstrap Router Mechanism
PIM-SM Routing Policies
Reverse Path Forwarding Checks
Anycast RP for PIM-SM
Implementation
Distributing PIM Joins over Multiple ECMP Paths
PIM Interface on IES Subscriber Group Interfaces
Multicast Only Fast Reroute (MoFRR)
IPv6 PIM models
PIM SSM
PIM ASM
Embedded RP
Configuring PIM with CLI
PIM Configuration Overview
Basic PIM Configuration
Configuring PIM Parameters
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Disabling PIM
PIM Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Router PIM Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MSDP
In This Chapter
Multicast Source Discovery Protocol
Anycast RP for MSDP
MSDP Procedure
MSDP Peering Scenarios
MSDP Peer Groups
MSDP Mesh Groups
MSDP Routing Policies
Auto-RP (discovery mode only) in Multicast VPN
Multicast in Virtual Private Networks
Draft Rosen
Configuring MSDP with CLI
Basic MSDP Configuration
Configuring MSDP Parameters
Disabling MSDP
MSDP Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
MSDP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
MLDP
In This Chapter
Dynamic Multicast Signaling over P2MP in GRT Instance
Multicast Extensions to BGP
In This Chapter
Multicast Extensions to BGP
MBGP Multicast Topology Support
Recursive Lookup for BGP Next Hops
MCAC
In This Chapter
MCAC Overview
MCAC Bundle Policy Overview
MCAC Algorithm
Interface-level MCAC details
MCAC-interface-policy-level MCAC details
Bundle-level MCAC details
MCAC on Link Aggregation Group Interfaces
Configuring MCAC with CLI
Basic MCAC Configuration
Configuring MCAC Parameters
MCAC Configuration Command Reference
Command Hierarchies
MCAC Configuration Commands
MCAC Policy Commands
Command Descriptions
MCAC Configuration Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Show MCAC Commands
Troubleshooting Tools
In This Chapter
Mtrace
Finding the Last Hop Router
Directing the Response
Mstat
Mrinfo
Troubleshooting Configuration Command Reference
Command Hierarchies
Operational Commands
Command Descriptions
Operational Commands
Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer documentation and product support
Multiservice Integrated Service Adapter Guide R14.0.R1
Getting Started
About This Guide
Audience
ISA Hardware
In This Section
MS-ISA2 Overview
MS-ISA Overview
MS-ISM Overview
Application Assurance Hardware Features
AA System Support
Host IOM Support for AA on ISAs
Application Assurance
In This Section
Application Assurance (AA) Overview
Application Assurance: Inline Policy Enforcement
AA Integration in Subscriber Edge Gateways
Fixed Residential Broadband Services
Dual-Stack Lite – DS-Lite
6to4 /6RD
Wireless LAN Gateway Broadband Services
Application-Aware Business VPN Services
SeGW Firewall Service
Application Assurance System Architecture
AA ISA Resource Configuration
AA ISA Groups
AA ISA Groups
AA Group Partitions
Bypass Modes
Redundancy
No AA ISA Group Redundancy
Failure to Fabric
N+1 AA ISA Card Warm Redundancy
ISA Load Balancing
Asymmetry Removal
Asymmetry Removal Overview
Failure Modes
AARP Peered Node/Instance Configuration
Multi-Chassis Control Link (MC-CTL)
Multi-Chassis Datapath Shunts
ISA Overload Detection
AA Packet Processing
Divert of Traffic and Subscribers
Services and AA Subscribers
Spoke SDPs
Transit AA Subs
AA Subscriber Application Service Definition
Application Identification
Application Assurance Identification Components
Protocol Signatures
Custom Protocols
Protocol Shutdown
Supported Protocol Signatures
Application Groups
Charging Groups
Applications
Application Filters
HTTP
AA IP Prefix Lists
Statistics and Accounting
Per-AA-Subscriber Special Study
System Aspects
Application Assurance XML Volume Statistics and Accounting
AA Partition Traffic Type Statistics
Configurable AA-Subscriber Statistics Collection
AA-Performance Record for ISA Load
AA Partition Traffic Type Statistics
AA Partition Admit–Deny Statistics
RADIUS Accounting AA Records
AA GX Based Usage Monitoring
Supported AVPs
Cflowd AA Records
Application QoS Policy (AQP)
AQP Match Criteria
AQP Actions
Application Assurance Policers
Time of Day Policing Adjustments
Application Assurance HTTP Redirect
ICAP - Large Scale Category based URL Filtering
Local URL-List Filtering
HTTP Header Enrichment
HTTP In Browser Notification
Application Assurance Firewall
SeGW Firewall Protection
Service Monitoring and Debugging
CPU Utilization
CLI Batch: Begin, Commit and Abort Commands
Configuring Application Assurance with CLI
Provisioning AA ISA MDA
Configuring an AA ISA Group
Configuring Watermark Parameters
Configuring a Group Policy
Beginning and Committing a Policy Configuration
Aborting a Policy Configuration
Configuring an IP Prefix List
Configuring AA Session Filters
Configuring an Application Group
Configuring an Application
Configuring an Application Filter
Configuring an Application Profile
Configuring Suppressible App-Profile with SRRP
Configuring Application Service Options
Configuring a Policer
Configuring an Application QoS Policy
Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
Configuring an HTTP Error Redirect
Configuring HTTP Header Enrichment
Configuring an HTTP Redirect Policy
Configuring a Captive Redirect HTTP Redirect Policy
Captive-Redirect and HTTPS Flows Redirection
Configuring ICAP URL Filtering
Configuring Local URL-List Filtering
Configuring HTTP Notification
Configuring AA Volume Accounting and Statistics
Configuring Cflowd Collector
Configuring AA Volume, TCP and RTP Performance Reporting
Application Assurance Command Reference
Application Assurance Command Reference
Hardware Commands
Admin Commands
ISA Commands
Application Assurance Commands
AA Commands
AA Group Commands
Persistence Commands
Command Descriptions
Generic Commands
Hardware Commands
Admin Commands
Application Assurance Commands
Group Commands
Transit Subscriber Commands
Policer Commands
Policy Commands
Statistics Commands
Policy Commands
System Persistence Commands
ISA Commands
Application Assurance Group Commands
Show, Tools, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Debug Commands
IP Tunnels
In This Section
IP Tunnels Overview
Tunnel ISAs
Public Tunnel SAPs
Private Tunnel SAPs
IP Interface Configuration
GRE and IP-IP Tunnel Configuration
IP Fragmentation and Reassembly for IP Tunnels
Operational Conditions
QoS Interactions
OAM Interactions
Redundancy
Statistics Collection
Security
GRE Tunnel Multicast Support
IPv6 over IPv4 GRE Tunnel
IKEv2
IKEv2 Traffic Selector and TS-List
SHA2 Support
IPSec Client Lockout
X.509v3 Certificate Overview
SROS X.509v3 Certificate Support
Local Storage
CA-Profile
CA Chain Computation
Certificate Enrollment
Certificate Revocation Check
Certificate/CRL Expiration Warning
Certificate/CRL/Key Cache
Auto CRL Update
Using Certificates For IPSec Tunnel Authentication
Trust-Anchor-Profile
Cert-Profile
Cert-Profile/trust-anchor-profile versus cert/trust-anchor
Certificate Management Protocol Version 2 (CMPv2)
OCSP
Video Wholesale Example
Multi-Chassis IPSec Redundancy Overview
Architecture
MC-IPSec Mastership Protocol (MIMP)
MIMP Protocol States
Election Logic
Protection Status
Other Details
Routing
Routing in Public Service
Routing in Private Services
Other Details About Shunting
MC-IPSec Aware VRRP
Synchronization
Automatic CHILD_SA Rekey
Responder Only
IPSec Deployment Requirements
IKEv2 Remote-Access Tunnel
IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
IKEv2 Remote-Access Tunnel – EAP Authentication
IKEv2 Remote-Access Tunnel – Authentication without RADIUS
IKEv2 Remote-Access Tunnel – Address Assignment
DHCPv4 Address Assignment
DHCPv6 Address Assignment
DHCPv4/v6 Usage Notes
IPv6 IPSec Support
IPv6 as Payload
IPv6 as Payload: Static LAN-to-LAN Tunnel
IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
IPv6 as Payload: Remote-Access Tunnel
IPv6 as Encapsulation
Configuring IPSec with CLI
Provisioning a Tunnel ISA
Configuring a Tunnel Group
Configuring Router Interfaces for IPSec
Configuring IPSec Parameters
Configuring IPSec in Services
Configuring X.509v3 Certificate Parameters
Configuring MC-IPSec
Configuring MIMP
Configuring Multi-Chassis Synchronization
Configuring Routing for MC-IPSec
Configuring and Using CMPv2
Configuring OCSP
Configuring IKEv2 Remote-Access Tunnel
Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
IP Tunnel Command Reference
Command Hierarchies
Configuration Commands
Hardware Commands
ISA Commands
IPSec Commands
Service Configuration Commands
IES Commands
VPRN Commands
IPSec Mastership Election Commands
Related Commands
CMPv2 Commands
Auto-Update Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
Command Descriptions
Generic Commands
Hardware Commands
ISA Commands
Certificate Profile Commands
Internet Key Exchange (IKE) Commands
IPSec Configuration Commands
Interface SAP Tunnel Commands
IPSec Gateway Commands
IPSec Mastership Election Commands
IPSec RADIUS Commands
CMPv2 Commands
Auto-Update Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Video Services
In This Section
Video Services
Video Groups
Video SAP
Video Interface
Multicast Information Policies
Duplicate Stream Protection
Duplicate Stream Selection
Stream Identification
Initial Sequence Identification
Packet Selection
Clock Recovery
Playout
Loss of Transport
Video Quality Monitoring
VoIP/Video/Teleconferencing Performance Measurements
Mean Opinion Score (MOS) Performance Measurements Solution Architecture
Retransmission and Fast Channel Change
RET and FCC Overview
Retransmission
Fast Channel Change (FCC)
Retransmission Client
Retransmission Server
Fast Channel Change Server
Logging and Accounting for RET and FCC
RET and FCC Server Concurrency
Prerequisites and Restrictions
Multi-Service ISA Support in the IOM-3 for Video Services
Prioritization Mechanism for RET vs. FCC
RET Features
Statistics ALU SQM MIB Additions
RET Server Multicast Tuning Parameters
FCC Features
FCC Hybrid Mode Support
Ad Insertion
Local/Zoned Ad Insertion
Transport Stream Ad Splicing
Ad Zones
Local/Zoned ADI Prerequisites and Restrictions
Configuring Video Service Components with CLI
Video Services Overview
Configuring an ISA-MS Module
Configuring a Video Group
Configuring a Video SAP and Video Interface in a Service
Basic Multicast Information Policy Configuration
Sample Configurations
Configuring RET/FCC Video Components with CLI
Configuring RET/FCC Video Features in the CLI
Configuring the RET Client
Configuring the RET Server
Configuring the FCC Server
Logging and Accounting Collection for Video Statistics
Configuring ADI Components with CLI
Configuring ADI in CLI
Configuring the RET Client
Configuring a Video Group
Configuring NTP
Configuring Channel Parameters
Configuring Service Entities
Video Services Command Reference
IP-TV Command Hierarchies
Hardware Commands
Video Group Commands
Video Policy Video Commands
Bundle and Channel Commands
Service Video Interface Commands
VPLS Commands
IES Commands
VPRN Commands
Command Descriptions
Generic Commands
Hardware Commands
LNS Group Commands
Video Group Commands
Multicast Info Policy Commands
Video Policy Commands
Bundle and Channel Commands
Service Video Interface Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Network Address Translation
In This Chapter
Terminology
Network Address Translation (NAT) Overview
Principles of NAT
Application Compatibility
Large Scale NAT
Port Range Blocks
Reserved Ports and Priority Sessions
Preventing Port Block Starvation
Dynamic Port Block Starvation in LSN
Dynamic Port Block Reservation
Timeouts
Watermarks
L2-Aware NAT
One-to-One (1:1) NAT
Static 1:1 NAT
Protocol Agnostic Behavior
Modification of Parameters in Static 1:1 NAT
Load Distribution over ISAs in Static 1:1 NAT
NAT-Policy Selection
Mapping Timeout
Logging
Restrictions
ICMP
Deterministic NAT
Overview
Supported Deterministic NAT Flavors
Number of Subscribers per Outside IP and per Pool
Referencing a Pool
Outside Pool Configuration
Mapping Rules and the map Command in Deterministic LSN44
Hashing Considerations in Deterministic LSN44
Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
Sharing of Deterministic NAT Pools
Simultaneous support of dynamic and deterministic NAT
Selecting Traffic for NAT
Inverse Mappings
MIB approach
Off-line Approach to Obtain Deterministic Mappings
Logging
Deterministic DS-Lite
Hashing Considerations in DS-Lite
Order of Configuration Steps in Deterministic DS-Lite
Destination Based NAT (DNAT)
Combination of SNAPT and DNAT
Forwarding Model in DNAT
DNAT Traffic Selection via NAT Classifier
Configuring DNAT
DNAT Traffic Selection and Destination IP Address Configuration
Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
NAT – Multiple NAT Policies per Inside Routing Context
Restrictions
Multiple NAT Policies Per Inside Routing Context
Routing Approach for NAT Diversion
Filter-Based Approach
Multiple NAT Policies with DS-Lite and NAT64
Default NAT Policy
Scaling Considerations
Multiple NAT Policies and SPF Configuration Considerations
Multiple NAT Policies and Forwarding Considerations
Logging
L2-Aware NAT Destination-Based Multiple NAT Policies
Logging
RADIUS Logging and Nat-Policy Change via CoA
Delay Between the NAT Resource Allocation and Logging During CoA
Static Port Forwards
UPnP
Port Control Protocol (PCP)
Universal Plug and Play Internet Gateway Device Service
Configuring UPnP IGD Service
NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
PPTP Protocol
Supported Control Messages
GRE Tunnel
PPTP ALG Operation
Multiple Sessions Initiated From the Same PPTP Client Node
Selection of Call IDs in NAT
NAT Logging
Syslog/SNMP/Local-File Logging
Filtering LSN Events to System Memory
NAT Logging to a Local File
SNMP Trap Logging
NAT Syslog
LSN RADIUS Logging
RADIUS Logging and L2-Aware NAT
LSN and L2-Aware NAT Flow Logging
Large Scale NAT44 Flow Logging Configuration Example
DS-Lite and NAT64 Fragmentation
Overview
IPv6 Fragmentation in DS-Lite
NAT64
Enhanced Statistics in NAT — Histogram
Configuration
NAT Stateless Dual-Homing
Configuration Considerations
Troubleshooting Commands
NAT ISA (Intra-Chassis) Redundancy
Active-Active ISA Redundancy Model
Start-up Conditions
Recovery
Adding Additional ISAs in the ISA Group
ISA Feature Interactions
MS-ISA Use with Service Mirrors
LNS, Application Assurance and NAT
Subscriber Aware Large Scale NAT44
Configuring NAT
ISA Redundancy
NAT Layer 2-Aware Configurations
Large Scale NAT Configuration
NAT Configuration Examples
Network Address Translation Command Reference
Command Hierarchies
ISA Configuration Commands
NAT Service Configuration Commands
IPFIX Commands
UPnP Commands
ISA RADIUS Policy Commands
VPRN Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT Router Configuration Commands
NAT DNAT Commands
NAT Admin Configuration Commands
TCP MSS Adjustment Commands
Tools Commands
Show Commands
Clear Commands
Tools Commands
Filter Commands
Command Descriptions
Generic Commands
ISA Configuration Commands
NAT Configuration Commands
NAT Service Configuration Commands
IPFlow Information Export Protocol Commands
AAA Policy Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT DNAT Commands
NAT Show Commands
NAT Clear Commands
NAT Tools Commands
NAT Filter Commands
TCP MSS Adjustment
In This Section
Overview
TCP MSS Adjustment for ESM Hosts
TCP MSS Adjustment for NAT Services
TCC MSS Adjustment Commands
Command Hierarchy
TCC MSS Adjustment Command Descriptions
L2TP Network Server
In This Chapter
Subscriber agg-rate-limit on LNS
LNS Reassembly
Overview
Reassembly Function
Load Sharing Between the ISAs
Inter-chassis ISA Redundancy
MLPPPoE, MLPPP(oE)oA with LFI on LNS
Terminology
LNS MLPPPoX
MLPPP Encapsulation
MLPPPoX Negotiation
Enabling MLPPPoX
Link Fragmentation and Interleaving (LFI)
MLPPPoX Fragmentation, MRRU and MRU Considerations
LFI Functionality Implemented in LNS
Last Mile QoS Awareness in the LNS
BBB-ISA Processing
LNS-LAC Link
AN-RG Link
Home Link
Optimum Fragment Size Calculation by LNS
Encapsulation Based Fragment Size
Fragment size Based on the Max Transmission Delay
Selection of the Optimum Fragment Length
Upstream Traffic Considerations
Multiple Links MLPPPoX With No Interleaving
MLPPPoX Session Support
Session Load Balancing Across Multiple BB-ISAs
BB-ISA Hashing Considerations
Last Mile Rate and Encapsulation Parameters
Link Failure Detection
CoA Support
Accounting
Filters and Mirroring
PTA Considerations
QoS Considerations
Dual-Pass
Traffic Prioritization in LFI
Shaping Based on the Last Mile Wire Rates
Downstream Bandwidth Management on Egress Port
Sub/Sla-Profile Considerations
Example of MLPPPoX Session Setup Flow
Other Considerations
Configuration Notes
L2TP Network Server Command Reference
Command Hierarchies
ISA Commands
MLPPP on LNS Commands
Command Descriptions
Generic Commands
LNS Commands
Network Address Translation (NAT) Commands
MLPPP on LNS Commands
Threat Management Service
In This Section
TMS Service Introduction
Configuration Guidelines and Example
TMS Image Location
Configuration Example For TMS Interfaces on the SR OS
Dynamic Control of IP Filter Entries
Threat Management Service Command Reference
Command Hierarchies
Card Commands
MDA Commands
TMS Commands
Policy Commands
Command Descriptions
Generic Commands
Card Commands
MDA Commands
Threat Management Service Interface Commands
Policy Commands
TMS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
TMS-Related Show Commands
Clear Commands
Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Audience
ISA Hardware
In This Section
MS-ISA2 Overview
MS-ISA Overview
MS-ISM Overview
Application Assurance Hardware Features
AA System Support
Host IOM Support for AA on ISAs
Application Assurance
In This Section
Application Assurance (AA) Overview
Application Assurance: Inline Policy Enforcement
AA Integration in Subscriber Edge Gateways
Fixed Residential Broadband Services
Dual-Stack Lite – DS-Lite
6to4 /6RD
Wireless LAN Gateway Broadband Services
Application-Aware Business VPN Services
SeGW Firewall Service
Application Assurance System Architecture
AA ISA Resource Configuration
AA ISA Groups
AA ISA Groups
AA Group Partitions
Bypass Modes
Redundancy
No AA ISA Group Redundancy
Failure to Fabric
N+1 AA ISA Card Warm Redundancy
ISA Load Balancing
Asymmetry Removal
Asymmetry Removal Overview
Failure Modes
AARP Peered Node/Instance Configuration
Multi-Chassis Control Link (MC-CTL)
Multi-Chassis Datapath Shunts
ISA Overload Detection
AA Packet Processing
Divert of Traffic and Subscribers
Services and AA Subscribers
Spoke SDPs
Transit AA Subs
AA Subscriber Application Service Definition
Application Identification
Application Assurance Identification Components
Protocol Signatures
Custom Protocols
Protocol Shutdown
Supported Protocol Signatures
Application Groups
Charging Groups
Applications
Application Filters
HTTP
AA IP Prefix Lists
Statistics and Accounting
Per-AA-Subscriber Special Study
System Aspects
Application Assurance XML Volume Statistics and Accounting
AA Partition Traffic Type Statistics
Configurable AA-Subscriber Statistics Collection
AA-Performance Record for ISA Load
AA Partition Traffic Type Statistics
AA Partition Admit–Deny Statistics
RADIUS Accounting AA Records
AA GX Based Usage Monitoring
Supported AVPs
Cflowd AA Records
Application QoS Policy (AQP)
AQP Match Criteria
AQP Actions
Application Assurance Policers
Time of Day Policing Adjustments
Application Assurance HTTP Redirect
ICAP - Large Scale Category based URL Filtering
Local URL-List Filtering
HTTP Header Enrichment
HTTP In Browser Notification
Application Assurance Firewall
SeGW Firewall Protection
Service Monitoring and Debugging
CPU Utilization
CLI Batch: Begin, Commit and Abort Commands
Configuring Application Assurance with CLI
Provisioning AA ISA MDA
Configuring an AA ISA Group
Configuring Watermark Parameters
Configuring a Group Policy
Beginning and Committing a Policy Configuration
Aborting a Policy Configuration
Configuring an IP Prefix List
Configuring AA Session Filters
Configuring an Application Group
Configuring an Application
Configuring an Application Filter
Configuring an Application Profile
Configuring Suppressible App-Profile with SRRP
Configuring Application Service Options
Configuring a Policer
Configuring an Application QoS Policy
Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
Configuring an HTTP Error Redirect
Configuring HTTP Header Enrichment
Configuring an HTTP Redirect Policy
Configuring a Captive Redirect HTTP Redirect Policy
Captive-Redirect and HTTPS Flows Redirection
Configuring ICAP URL Filtering
Configuring Local URL-List Filtering
Configuring HTTP Notification
Configuring AA Volume Accounting and Statistics
Configuring Cflowd Collector
Configuring AA Volume, TCP and RTP Performance Reporting
Application Assurance Command Reference
Application Assurance Command Reference
Hardware Commands
Admin Commands
ISA Commands
Application Assurance Commands
AA Commands
AA Group Commands
Persistence Commands
Command Descriptions
Generic Commands
Hardware Commands
Admin Commands
Application Assurance Commands
Group Commands
Transit Subscriber Commands
Policer Commands
Policy Commands
Statistics Commands
Policy Commands
System Persistence Commands
ISA Commands
Application Assurance Group Commands
Show, Tools, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Debug Commands
IP Tunnels
In This Section
IP Tunnels Overview
Tunnel ISAs
Public Tunnel SAPs
Private Tunnel SAPs
IP Interface Configuration
GRE and IP-IP Tunnel Configuration
IP Fragmentation and Reassembly for IP Tunnels
Operational Conditions
QoS Interactions
OAM Interactions
Redundancy
Statistics Collection
Security
GRE Tunnel Multicast Support
IPv6 over IPv4 GRE Tunnel
IKEv2
IKEv2 Traffic Selector and TS-List
SHA2 Support
IPSec Client Lockout
X.509v3 Certificate Overview
SROS X.509v3 Certificate Support
Local Storage
CA-Profile
CA Chain Computation
Certificate Enrollment
Certificate Revocation Check
Certificate/CRL Expiration Warning
Certificate/CRL/Key Cache
Auto CRL Update
Using Certificates For IPSec Tunnel Authentication
Trust-Anchor-Profile
Cert-Profile
Cert-Profile/trust-anchor-profile versus cert/trust-anchor
Certificate Management Protocol Version 2 (CMPv2)
OCSP
Video Wholesale Example
Multi-Chassis IPSec Redundancy Overview
Architecture
MC-IPSec Mastership Protocol (MIMP)
MIMP Protocol States
Election Logic
Protection Status
Other Details
Routing
Routing in Public Service
Routing in Private Services
Other Details About Shunting
MC-IPSec Aware VRRP
Synchronization
Automatic CHILD_SA Rekey
Responder Only
IPSec Deployment Requirements
IKEv2 Remote-Access Tunnel
IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
IKEv2 Remote-Access Tunnel – EAP Authentication
IKEv2 Remote-Access Tunnel – Authentication without RADIUS
IKEv2 Remote-Access Tunnel – Address Assignment
DHCPv4 Address Assignment
DHCPv6 Address Assignment
DHCPv4/v6 Usage Notes
IPv6 IPSec Support
IPv6 as Payload
IPv6 as Payload: Static LAN-to-LAN Tunnel
IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
IPv6 as Payload: Remote-Access Tunnel
IPv6 as Encapsulation
Configuring IPSec with CLI
Provisioning a Tunnel ISA
Configuring a Tunnel Group
Configuring Router Interfaces for IPSec
Configuring IPSec Parameters
Configuring IPSec in Services
Configuring X.509v3 Certificate Parameters
Configuring MC-IPSec
Configuring MIMP
Configuring Multi-Chassis Synchronization
Configuring Routing for MC-IPSec
Configuring and Using CMPv2
Configuring OCSP
Configuring IKEv2 Remote-Access Tunnel
Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
IP Tunnel Command Reference
Command Hierarchies
Configuration Commands
Hardware Commands
ISA Commands
IPSec Commands
Service Configuration Commands
IES Commands
VPRN Commands
IPSec Mastership Election Commands
Related Commands
CMPv2 Commands
Auto-Update Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
Command Descriptions
Generic Commands
Hardware Commands
ISA Commands
Certificate Profile Commands
Internet Key Exchange (IKE) Commands
IPSec Configuration Commands
Interface SAP Tunnel Commands
IPSec Gateway Commands
IPSec Mastership Election Commands
IPSec RADIUS Commands
CMPv2 Commands
Auto-Update Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Video Services
In This Section
Video Services
Video Groups
Video SAP
Video Interface
Multicast Information Policies
Duplicate Stream Protection
Duplicate Stream Selection
Stream Identification
Initial Sequence Identification
Packet Selection
Clock Recovery
Playout
Loss of Transport
Video Quality Monitoring
VoIP/Video/Teleconferencing Performance Measurements
Mean Opinion Score (MOS) Performance Measurements Solution Architecture
Retransmission and Fast Channel Change
RET and FCC Overview
Retransmission
Fast Channel Change (FCC)
Retransmission Client
Retransmission Server
Fast Channel Change Server
Logging and Accounting for RET and FCC
RET and FCC Server Concurrency
Prerequisites and Restrictions
Multi-Service ISA Support in the IOM-3 for Video Services
Prioritization Mechanism for RET vs. FCC
RET Features
Statistics ALU SQM MIB Additions
RET Server Multicast Tuning Parameters
FCC Features
FCC Hybrid Mode Support
Ad Insertion
Local/Zoned Ad Insertion
Transport Stream Ad Splicing
Ad Zones
Local/Zoned ADI Prerequisites and Restrictions
Configuring Video Service Components with CLI
Video Services Overview
Configuring an ISA-MS Module
Configuring a Video Group
Configuring a Video SAP and Video Interface in a Service
Basic Multicast Information Policy Configuration
Sample Configurations
Configuring RET/FCC Video Components with CLI
Configuring RET/FCC Video Features in the CLI
Configuring the RET Client
Configuring the RET Server
Configuring the FCC Server
Logging and Accounting Collection for Video Statistics
Configuring ADI Components with CLI
Configuring ADI in CLI
Configuring the RET Client
Configuring a Video Group
Configuring NTP
Configuring Channel Parameters
Configuring Service Entities
Video Services Command Reference
IP-TV Command Hierarchies
Hardware Commands
Video Group Commands
Video Policy Video Commands
Bundle and Channel Commands
Service Video Interface Commands
VPLS Commands
IES Commands
VPRN Commands
Command Descriptions
Generic Commands
Hardware Commands
LNS Group Commands
Video Group Commands
Multicast Info Policy Commands
Video Policy Commands
Bundle and Channel Commands
Service Video Interface Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Network Address Translation
In This Chapter
Terminology
Network Address Translation (NAT) Overview
Principles of NAT
Application Compatibility
Large Scale NAT
Port Range Blocks
Reserved Ports and Priority Sessions
Preventing Port Block Starvation
Dynamic Port Block Starvation in LSN
Dynamic Port Block Reservation
Timeouts
Watermarks
L2-Aware NAT
One-to-One (1:1) NAT
Static 1:1 NAT
Protocol Agnostic Behavior
Modification of Parameters in Static 1:1 NAT
Load Distribution over ISAs in Static 1:1 NAT
NAT-Policy Selection
Mapping Timeout
Logging
Restrictions
ICMP
Deterministic NAT
Overview
Supported Deterministic NAT Flavors
Number of Subscribers per Outside IP and per Pool
Referencing a Pool
Outside Pool Configuration
Mapping Rules and the map Command in Deterministic LSN44
Hashing Considerations in Deterministic LSN44
Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
Sharing of Deterministic NAT Pools
Simultaneous support of dynamic and deterministic NAT
Selecting Traffic for NAT
Inverse Mappings
MIB approach
Off-line Approach to Obtain Deterministic Mappings
Logging
Deterministic DS-Lite
Hashing Considerations in DS-Lite
Order of Configuration Steps in Deterministic DS-Lite
Destination Based NAT (DNAT)
Combination of SNAPT and DNAT
Forwarding Model in DNAT
DNAT Traffic Selection via NAT Classifier
Configuring DNAT
DNAT Traffic Selection and Destination IP Address Configuration
Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
NAT – Multiple NAT Policies per Inside Routing Context
Restrictions
Multiple NAT Policies Per Inside Routing Context
Routing Approach for NAT Diversion
Filter-Based Approach
Multiple NAT Policies with DS-Lite and NAT64
Default NAT Policy
Scaling Considerations
Multiple NAT Policies and SPF Configuration Considerations
Multiple NAT Policies and Forwarding Considerations
Logging
L2-Aware NAT Destination-Based Multiple NAT Policies
Logging
RADIUS Logging and Nat-Policy Change via CoA
Delay Between the NAT Resource Allocation and Logging During CoA
Static Port Forwards
UPnP
Port Control Protocol (PCP)
Universal Plug and Play Internet Gateway Device Service
Configuring UPnP IGD Service
NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
PPTP Protocol
Supported Control Messages
GRE Tunnel
PPTP ALG Operation
Multiple Sessions Initiated From the Same PPTP Client Node
Selection of Call IDs in NAT
NAT Logging
Syslog/SNMP/Local-File Logging
Filtering LSN Events to System Memory
NAT Logging to a Local File
SNMP Trap Logging
NAT Syslog
LSN RADIUS Logging
RADIUS Logging and L2-Aware NAT
LSN and L2-Aware NAT Flow Logging
Large Scale NAT44 Flow Logging Configuration Example
DS-Lite and NAT64 Fragmentation
Overview
IPv6 Fragmentation in DS-Lite
NAT64
Enhanced Statistics in NAT — Histogram
Configuration
NAT Stateless Dual-Homing
Configuration Considerations
Troubleshooting Commands
NAT ISA (Intra-Chassis) Redundancy
Active-Active ISA Redundancy Model
Start-up Conditions
Recovery
Adding Additional ISAs in the ISA Group
ISA Feature Interactions
MS-ISA Use with Service Mirrors
LNS, Application Assurance and NAT
Subscriber Aware Large Scale NAT44
Configuring NAT
ISA Redundancy
NAT Layer 2-Aware Configurations
Large Scale NAT Configuration
NAT Configuration Examples
Network Address Translation Command Reference
Command Hierarchies
ISA Configuration Commands
NAT Service Configuration Commands
IPFIX Commands
UPnP Commands
ISA RADIUS Policy Commands
VPRN Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT Router Configuration Commands
NAT DNAT Commands
NAT Admin Configuration Commands
TCP MSS Adjustment Commands
Tools Commands
Show Commands
Clear Commands
Tools Commands
Filter Commands
Command Descriptions
Generic Commands
ISA Configuration Commands
NAT Configuration Commands
NAT Service Configuration Commands
IPFlow Information Export Protocol Commands
AAA Policy Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT DNAT Commands
NAT Show Commands
NAT Clear Commands
NAT Tools Commands
NAT Filter Commands
TCP MSS Adjustment
In This Section
Overview
TCP MSS Adjustment for ESM Hosts
TCP MSS Adjustment for NAT Services
TCC MSS Adjustment Commands
Command Hierarchy
TCC MSS Adjustment Command Descriptions
L2TP Network Server
In This Chapter
Subscriber agg-rate-limit on LNS
LNS Reassembly
Overview
Reassembly Function
Load Sharing Between the ISAs
Inter-chassis ISA Redundancy
MLPPPoE, MLPPP(oE)oA with LFI on LNS
Terminology
LNS MLPPPoX
MLPPP Encapsulation
MLPPPoX Negotiation
Enabling MLPPPoX
Link Fragmentation and Interleaving (LFI)
MLPPPoX Fragmentation, MRRU and MRU Considerations
LFI Functionality Implemented in LNS
Last Mile QoS Awareness in the LNS
BBB-ISA Processing
LNS-LAC Link
AN-RG Link
Home Link
Optimum Fragment Size Calculation by LNS
Encapsulation Based Fragment Size
Fragment size Based on the Max Transmission Delay
Selection of the Optimum Fragment Length
Upstream Traffic Considerations
Multiple Links MLPPPoX With No Interleaving
MLPPPoX Session Support
Session Load Balancing Across Multiple BB-ISAs
BB-ISA Hashing Considerations
Last Mile Rate and Encapsulation Parameters
Link Failure Detection
CoA Support
Accounting
Filters and Mirroring
PTA Considerations
QoS Considerations
Dual-Pass
Traffic Prioritization in LFI
Shaping Based on the Last Mile Wire Rates
Downstream Bandwidth Management on Egress Port
Sub/Sla-Profile Considerations
Example of MLPPPoX Session Setup Flow
Other Considerations
Configuration Notes
L2TP Network Server Command Reference
Command Hierarchies
ISA Commands
MLPPP on LNS Commands
Command Descriptions
Generic Commands
LNS Commands
Network Address Translation (NAT) Commands
MLPPP on LNS Commands
Threat Management Service
In This Section
TMS Service Introduction
Configuration Guidelines and Example
TMS Image Location
Configuration Example For TMS Interfaces on the SR OS
Dynamic Control of IP Filter Entries
Threat Management Service Command Reference
Command Hierarchies
Card Commands
MDA Commands
TMS Commands
Policy Commands
Command Descriptions
Generic Commands
Card Commands
MDA Commands
Threat Management Service Interface Commands
Policy Commands
TMS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
TMS-Related Show Commands
Clear Commands
Debug Commands
Standards and Protocol Support
Customer Documentation and Product Support
OAM and Diagnostics Guide R14.0.R1
Getting Started
About This Guide
Router Configuration Process
Mirror Services
In This Chapter
Service Mirroring
Mirror Implementation
Mirror Source and Destinations
Local and Remote Mirroring
Slicing
Mirroring Performance
Mirroring Configuration
ATM Mirroring
IP Mirroring
Remote IP Mirroring
Local IP Mirroring
Port-ID Enabled PPP Mirroring
Mirrored Traffic Transport using MPLS-TP SDPs
Subscriber Mirroring
Lawful Intercept
LI Activation Through RADIUS
Routable Lawful Intercept Encapsulation
Pseudowire Redundant Mirror Services
Redundant Mirror Source Notes
Carrier Grade NAT – Lawful Intercept
Configuration Process Overview
Configuration Notes
Configuring Service Mirroring with CLI
Mirror Configuration Overview
Defining Mirrored Traffic
Lawful Intercept Configuration Overview
Saving LI Data
Regulating LI Access
LI User Access
LI Source Configuration
Configurable Filter Lock for Lawful Intercept
LI MAC Filter Configuration
LI Logging
Basic Mirroring Configuration
Mirror Classification Rules
Port
SAP
MAC filter
IP filter
Ingress label
Subscriber
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirrors and LI
Configuring a Remote Mirror Service
Configuring an ATM Mirror Service
Configuring Lawful Intercept Parameters
Pseudowire Redundancy for Mirror Services Configuration Example
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Lawful Intercept Commands
Command Descriptions
Generic Commands
Mirror Destination Configuration Commands
Lawful Intercept Commands
Other LI Configuration Commands
Mirror Service Show and Debug Command Reference
Command Hierarchies
Show Commands
Debug Commands
Command Descriptions
Show Commands
Debug Commands
OAM, SAA, and OAM-PM
In This Chapter
OAM Overview
LSP Diagnostics: LSP Ping and Trace
LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
ECMP Considerations
lsp-ping and lsp-trace over Unnumbered IP Interface
Downstream Detailed Mapping (DDMAP) TLV
Using DDMAP TLV in LSP Stitching and LSP Hierarchy
Responder Node Procedures
Sender Node Procedures
LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
LDP ECMP Tree Building
Periodic Path Exercising
LSP Ping for RSVP P2MP LSP (P2MP)
LSP Trace for RSVP P2MP LSP
LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
Tunneling of ICMP Reply Packets over MPLS LSP
QoS Handling of Tunneled ICMP Reply Packets
Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
SDP Diagnostics
SDP Ping
SDP MTU Path Discovery
Service Diagnostics
VPLS MAC Diagnostics
MAC Ping
MAC Trace
CPE Ping
CPE Ping for PBB Epipe
Hardware Support
MAC Populate
MAC Purge
VLL Diagnostics
VCCV Ping
VCCV-Ping Application
VCCV Ping in a Multi-Segment Pseudowire
Automated VCCV-Trace Capability for MS-Pseudowire
VCCV for Static Pseudowire Segments
Detailed VCCV-Trace Operation
Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
Sending a VCCV Echo Request
Receiving an VCCV Echo Request
Receiving an VCCV Echo Reply
IGMP Snooping Diagnostics
MFIB Ping
ATM Diagnostics
MPLS-TP On-Demand OAM Commands
MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
MPLS-TP LSPs: LSP-Ping/LSP Trace
VxLAN Ping Supporting EVPN for VxLAN
Show Commands
BFD
IP Performance Monitoring (IP PM)
Two-Way Active Measurement Protocol (TWAMP)
Two-Way Active Measurement Protocol Light (TWAMP Light)
Ethernet Connectivity Fault Management (ETH-CFM)
ETH-CFM Building Blocks
Loopback
Loopback Multicast
Linktrace
Continuity Check (CC)
CC Remote Peer Auto-Discovery
CCM Grace Period
CCM Hold Timers
Alarm Indication Signal (ETH-AIS Y.1731)
Client Signal Fail (ETH-CSF Y.1731)
Test (ETH-TST Y.1731)
One-Way Delay Measurement (ETH-1DM Y.1731)
Two-Way Delay Measurement (ETH-DMM Y.1731)
Synthetic Loss Measurement (ETH-SLM Y.1731)
Configuration Example
Frame Loss Measurement (ETH-LMM Y.1731)
ETH-CFM Statistics
ETH-CFM Packet Debug
ETH-CFM CoS Considerations
OAM Mapping
CFM Connectivity Fault Conditions
CFM Fault Propagation Methods
Epipe Services
CFM Detected Fault
SAP/SDP-Binding Failure (Including Pseudowire Status)
Service Down
Interaction with Pseudowire Redundancy
Ipipe Services
CFM Detected Fault
SAP/SDP-binding Failure (Including Pseudowire Status)
Service Administratively Shutdown
Interaction with Pseudowire Redundancy
VPLS Service
CFM Detected Fault
SAP/SDP-Binding Failure (Including Pseudowire Status)
Service Down
Pseudowire Redundancy and Spanning Tree Protocol
IES and VPRN Services
Pseudowire Switching
LLF and CFM Fault Propagation
802.3ah EFM OAM Mapping and Interaction with Service Manager
Service Assurance Agent (SAA)
OAM Performance Monitoring (OAM-PM)
Session
Standard PM Packets
Detectable Transmit Errors
Measurement Intervals
Data Structures and Storage
Bin Groups
Relating the Components
IP Performance Monitoring
Accounting Policy Configuration
Service Configuration
OAM-PM Configuration
Ethernet Performance Monitoring
Accounting Policy Configuration
ETH-CFM Configuration
Service Configuration
Ethernet OAM-PM Configuration
OAM-PM Event Monitoring
Traceroute with ICMP Tunneling In Common Applications
BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
VPRN Inter-AS Option B
VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
Diagnostics Command Reference
Command Hierarchies
OAM Commands
Base Operational Commands
ATM Diagnostics
IGMP Snooping
LDP Diagnostics
LSP Diagnostics
SDP Diagnostics
Common Service Diagnostics
VLL Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM OAM Commands
SAA Commands
OAM Performance Monitoring and Binning Commands
IP Performance Monitoring Commands
TWAMP
TWAMP Light
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
OAM and SAA Commands
Generic Commands
OAM Commands
ATM Diagnostics
Service Diagnostics
VPLS MAC Diagnostics
IGMP Snooping Diagnostics
EFM Commands
ETH-CFM OAM Commands
Service Assurance Agent (SAA) Commands
OAM SAA Commands
OAM Performance Monitoring and Binning Commands
LDP Treetrace Commands
TWAMP Commands
TWAMP Light Commands
Show Commands
OAM Performance Monitoring and Binning Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Router Configuration Process
Mirror Services
In This Chapter
Service Mirroring
Mirror Implementation
Mirror Source and Destinations
Local and Remote Mirroring
Slicing
Mirroring Performance
Mirroring Configuration
ATM Mirroring
IP Mirroring
Remote IP Mirroring
Local IP Mirroring
Port-ID Enabled PPP Mirroring
Mirrored Traffic Transport using MPLS-TP SDPs
Subscriber Mirroring
Lawful Intercept
LI Activation Through RADIUS
Routable Lawful Intercept Encapsulation
Pseudowire Redundant Mirror Services
Redundant Mirror Source Notes
Carrier Grade NAT – Lawful Intercept
Configuration Process Overview
Configuration Notes
Configuring Service Mirroring with CLI
Mirror Configuration Overview
Defining Mirrored Traffic
Lawful Intercept Configuration Overview
Saving LI Data
Regulating LI Access
LI User Access
LI Source Configuration
Configurable Filter Lock for Lawful Intercept
LI MAC Filter Configuration
LI Logging
Basic Mirroring Configuration
Mirror Classification Rules
Port
SAP
MAC filter
IP filter
Ingress label
Subscriber
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirrors and LI
Configuring a Remote Mirror Service
Configuring an ATM Mirror Service
Configuring Lawful Intercept Parameters
Pseudowire Redundancy for Mirror Services Configuration Example
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Lawful Intercept Commands
Command Descriptions
Generic Commands
Mirror Destination Configuration Commands
Lawful Intercept Commands
Other LI Configuration Commands
Mirror Service Show and Debug Command Reference
Command Hierarchies
Show Commands
Debug Commands
Command Descriptions
Show Commands
Debug Commands
OAM, SAA, and OAM-PM
In This Chapter
OAM Overview
LSP Diagnostics: LSP Ping and Trace
LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
ECMP Considerations
lsp-ping and lsp-trace over Unnumbered IP Interface
Downstream Detailed Mapping (DDMAP) TLV
Using DDMAP TLV in LSP Stitching and LSP Hierarchy
Responder Node Procedures
Sender Node Procedures
LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
LDP ECMP Tree Building
Periodic Path Exercising
LSP Ping for RSVP P2MP LSP (P2MP)
LSP Trace for RSVP P2MP LSP
LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
Tunneling of ICMP Reply Packets over MPLS LSP
QoS Handling of Tunneled ICMP Reply Packets
Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
SDP Diagnostics
SDP Ping
SDP MTU Path Discovery
Service Diagnostics
VPLS MAC Diagnostics
MAC Ping
MAC Trace
CPE Ping
CPE Ping for PBB Epipe
Hardware Support
MAC Populate
MAC Purge
VLL Diagnostics
VCCV Ping
VCCV-Ping Application
VCCV Ping in a Multi-Segment Pseudowire
Automated VCCV-Trace Capability for MS-Pseudowire
VCCV for Static Pseudowire Segments
Detailed VCCV-Trace Operation
Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
Sending a VCCV Echo Request
Receiving an VCCV Echo Request
Receiving an VCCV Echo Reply
IGMP Snooping Diagnostics
MFIB Ping
ATM Diagnostics
MPLS-TP On-Demand OAM Commands
MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
MPLS-TP LSPs: LSP-Ping/LSP Trace
VxLAN Ping Supporting EVPN for VxLAN
Show Commands
BFD
IP Performance Monitoring (IP PM)
Two-Way Active Measurement Protocol (TWAMP)
Two-Way Active Measurement Protocol Light (TWAMP Light)
Ethernet Connectivity Fault Management (ETH-CFM)
ETH-CFM Building Blocks
Loopback
Loopback Multicast
Linktrace
Continuity Check (CC)
CC Remote Peer Auto-Discovery
CCM Grace Period
CCM Hold Timers
Alarm Indication Signal (ETH-AIS Y.1731)
Client Signal Fail (ETH-CSF Y.1731)
Test (ETH-TST Y.1731)
One-Way Delay Measurement (ETH-1DM Y.1731)
Two-Way Delay Measurement (ETH-DMM Y.1731)
Synthetic Loss Measurement (ETH-SLM Y.1731)
Configuration Example
Frame Loss Measurement (ETH-LMM Y.1731)
ETH-CFM Statistics
ETH-CFM Packet Debug
ETH-CFM CoS Considerations
OAM Mapping
CFM Connectivity Fault Conditions
CFM Fault Propagation Methods
Epipe Services
CFM Detected Fault
SAP/SDP-Binding Failure (Including Pseudowire Status)
Service Down
Interaction with Pseudowire Redundancy
Ipipe Services
CFM Detected Fault
SAP/SDP-binding Failure (Including Pseudowire Status)
Service Administratively Shutdown
Interaction with Pseudowire Redundancy
VPLS Service
CFM Detected Fault
SAP/SDP-Binding Failure (Including Pseudowire Status)
Service Down
Pseudowire Redundancy and Spanning Tree Protocol
IES and VPRN Services
Pseudowire Switching
LLF and CFM Fault Propagation
802.3ah EFM OAM Mapping and Interaction with Service Manager
Service Assurance Agent (SAA)
OAM Performance Monitoring (OAM-PM)
Session
Standard PM Packets
Detectable Transmit Errors
Measurement Intervals
Data Structures and Storage
Bin Groups
Relating the Components
IP Performance Monitoring
Accounting Policy Configuration
Service Configuration
OAM-PM Configuration
Ethernet Performance Monitoring
Accounting Policy Configuration
ETH-CFM Configuration
Service Configuration
Ethernet OAM-PM Configuration
OAM-PM Event Monitoring
Traceroute with ICMP Tunneling In Common Applications
BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
VPRN Inter-AS Option B
VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
Diagnostics Command Reference
Command Hierarchies
OAM Commands
Base Operational Commands
ATM Diagnostics
IGMP Snooping
LDP Diagnostics
LSP Diagnostics
SDP Diagnostics
Common Service Diagnostics
VLL Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM OAM Commands
SAA Commands
OAM Performance Monitoring and Binning Commands
IP Performance Monitoring Commands
TWAMP
TWAMP Light
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
OAM and SAA Commands
Generic Commands
OAM Commands
ATM Diagnostics
Service Diagnostics
VPLS MAC Diagnostics
IGMP Snooping Diagnostics
EFM Commands
ETH-CFM OAM Commands
Service Assurance Agent (SAA) Commands
OAM SAA Commands
OAM Performance Monitoring and Binning Commands
LDP Treetrace Commands
TWAMP Commands
TWAMP Light Commands
Show Commands
OAM Performance Monitoring and Binning Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Standards and Protocol Support
Customer Documentation and Product Support
Quality of Service Guide R14.0.R1
Getting Started
About This Guide
Alcatel-Lucent SR-Series Router Services Configuration Process
QoS Policies
In This Chapter
QoS Overview
Forwarding Classes
High Priority Classes
Assured Classes
Best-Effort Classes
Queue Parameters
Queue ID
Unicast or Multipoint Queue
Queue Hardware Scheduler
Committed Information Rate
Peak Information Rate
Adaptation Rule
Committed Burst Size
Maximum Burst Size
High Priority Only Buffers
Hi-Low Priority Only Buffers
WRED Per Queue
Native Queue Mode
Pool per Queue Mode
Packet Markings
Queue Counters
Queue-Types
Color Aware Profiling
QoS Policies
Service versus Network QoS
QoS Policy Entities
Network QoS Policies
Network Queue QoS Policies
Service Ingress QoS Policies
FC Mapping Based on EXP Bits at VLL/VPLS SAP
Egress Forwarding Class Override
Service Egress QoS Policies
Named Pool Policies
Slope Policies
RED Slopes
Tuning the Shared Buffer Utilization Calculation
Slope Policy Parameters
Scheduler Policies
Virtual Hierarchical Scheduling
Tiers
Single Tier Scheduling
Hierarchical Scheduler Policies
Hierarchical Virtual Schedulers
Scheduler Policies Applied to Applications
Scheduler Policies Applied to SAPs
Customer Service Level Agreement (SLA)
Scheduler Policies Applied to Multi-Service Sites
Shared Queues
ATM Traffic Descriptor Profiles
Configuration Notes
Network QoS Policies
In This Section
Overview
Network Ingress Tunnel QoS Override
For Tunnel Terminated IP Routing Decisions
Normal QoS Operation
Network Ingress IP Match Criteria
Network Ingress IPv6 Match Criteria
Tunnel Termination QoS Override Operation
Enabling and Disabling Tunnel Termination QoS Override
QoS for Self-Generated (CPU) Traffic on Network Interfaces
Default DSCP Mapping Table
Basic Configurations
Create a Network QoS Policy
Applying Network Policies
Default Network Policy Values
Service Management Tasks
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Copying and Overwriting Network Policies
Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Multi-Class Frame-Relay Profile Commands
Self-Generated Traffic Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Multi-Link Frame Relay Commands
Network QoS Policy Commands
Network Ingress QoS Policy Commands
Network Egress QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-Generated Traffic Commands
Show Commands
Network Queue QoS Policies
In This Section
Overview
Network Queue Parent Scheduler
Basic Configurations
Create a Network Queue QoS Policy
Applying Network Queue Policies
XMAs and MDAs
Ethernet Ports
SONET/SDH Ports
Default Network Queue Policy Values
Service Management Tasks
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Network Queue QoS Policy Commands
Show Commands
Service Egress and Ingress QoS Policies
In This Section
Overview
Basic Configurations
Service Egress QoS Policy
Service Egress QoS Queue
Percent-Rate Support
Dynamic MBS for Egress Queue Group Queues
Queue Length as a Delay Value
Egress SAP Forwarding Class and Forwarding Profile Overrides
Egress Criteria Classification Directly to Policer
Dot1p Egress Remarking
DEI Egress Remarking
DEI in IEEE 802.1ad
DEI in IEEE 802.1ah
IEEE 802.1ad Use Case
IEEE 802.1ah Use Case
DSCP/Prec Egress Remarking
Queue Depth Monitoring
Service Ingress QoS Policy
Service Ingress QoS Queue
Percent-Rate Support
Service Ingress Forwarding Class (FC)
Service Ingress IP Match Criteria
Service Ingress IPv6 Match Criteria
Service Ingress MAC Match Criteria
VLAN ID Matching
Ingress Criteria Classification Directly to Policer
Virtual Network Identifier (VNI) Classification
FC Mapping Based on EXP Bits
Service Management Tasks
Applying Service Ingress and Egress Policies
Epipe
IES
VPLS
VPRN
Editing QoS Policies
Copying and Overwriting QoS Policies
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Service SAP QoS Policy Command Reference
Command Hierarchies
Service Ingress QoS Policy Commands
Service Egress QoS Policy Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Service Ingress QoS Policy Commands
Service Ingress QoS Policy Forwarding Class Commands
Service Ingress QoS Policy Entry Commands
IP QoS Policy Match Commands
Service Ingress MAC QoS Policy Match Commands
Service Egress QoS Policy Forwarding Class Commands
Service Queue QoS Policy Commands
Show Commands
Queue Sharing and Redirection
In This Section
Queue Sharing and Redirection
Supported Platforms
Queue Group Applications
Access SAP Queue Group Applications
Ingress Access Port Queue Group Hardware Queue Allocation
Network Port Queue Groups for IP Interfaces
Pseudowire Shaping for Layer 2 and Layer 3 Services
QoS on Ingress Bindings
Queue Group Templates and Port Queue Groups
Queue Group Templates
Port Queue Groups
Percent-Rate Support
Forwarding Plane Queue Groups
Redirection Models
Access SAP Forwarding Class Based Redirection
Ingress and Egress SAP Forwarding Class Redirection Association Rules
Policy Based Provisioning Model
SAP-Based Provisioning Model
Access Queue Group Statistics
Port Queue Groups
Forwarding Plane Queue Groups
Network IP Interface Forwarding Class-Based Redirection
Egress Network Forwarding Class Redirection Association Rules
Egress Network IP Interface Statistics
Separate Ingress IPv4 and IPv6 Statistics
Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
Feature Configuration
Provisioning Model
Ingress Packet Classification
Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
Feature Configuration
Provisioning Model
Egress Marking of PW Packet Header
Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
Ingress Per SAP Statistics with Ingress Queue Groups
Ingress and Egress PW Statistics
Queue Group Behavior on LAG
Queue Group Queue Instantiation Per Link
Per Link Queue Group Queue Parameters
Adding a Queue Group to an Existing LAG
Removing a Queue Group from a LAG
Adding a Port to a LAG
Basic Configurations
Configuring an Ingress Queue Group Template
Configuring Egress Queue Group Template
Applying Ingress Queue Group to SAP Ingress Policy
Applying Egress Queue Group to SAP Egress Policy
SAP-based Egress Queue Re-direction
Configuring Queue Group on Ethernet Access Ingress Port
Configuring Overrides
Configuring Queue Group on Ethernet Access Egress Port
Configuring Queue Group for Network Egress Traffic on Port
Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
Specifying QoS Policies on Service SAPs
QoS Queue Group Template Command Reference
Command Hierarchies
Configuring Egress Queue Group Templates
Configuring Ingress Queue Group Templates
Show Commands
Monitor Commands
Command Descriptions
Configuration Commands
Generic Commands
Queue Group Commands
Show Commands
Monitor Commands
QoS Scheduler Policies
In This Section
Overview
Scheduler Policies
Egress Port-Based Schedulers
Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
Frame and Packet-Based Bandwidth Allocation
Queue Parental Association Scope
Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
Network Queue Parent Scheduler
Foster Parent Behavior for Orphaned Queues and Schedulers
Congestion Monitoring on Egress Port Scheduler
Scalability, Performance, and Operation
Restrictions
Frame-Based Accounting
Operational Modifications
Existing Egress Port Based Virtual Scheduling
Queue Behavior Modifications for Frame Based Accounting
Virtual Scheduler Rate and Queue Rate Parameter Interpretation
Virtual Scheduling Unused Bandwidth Distribution
Default Unused Bandwidth Distribution
Limit Unused Bandwidth
Configuring Port Scheduler Policies
Port Scheduler Structure
Special Orphan Queue and Scheduler Behavior
Packet to Frame Bandwidth Conversion
Aggregate Rate Limits for Directly Attached Queues
SAP Egress QoS Policy Queue Parenting
Network Queue QoS Policy Queue Parenting
Egress Port Scheduler Overrides
Applying a Port Scheduler Policy to a Virtual Port
Applying Aggregate Rate Limit to a VPORT
Applying a Scheduler Policy to a VPORT
Weighted Scheduler Group in a Port Scheduler Policy
Basic Configurations
Create a QoS Scheduler Policy
Applying Scheduler Policies
Customer
Epipe
IES
VPLS
VPRN
Creating a QoS Port Scheduler Policy
Configuring Port Parent Parameters
Within-CIR Priority Level Parameters
Above-CIR Priority Level Parameters
Configuring Distributed LAG Rate
Service Management Tasks
Deleting QoS Policies
Removing a QoS Policy from a Customer Multi-Service Site
Removing a QoS Policy from SAP(s)
Removing a Policy from the QoS Configuration
Copying and Overwriting Scheduler Policies
Editing QoS Policies
QoS Scheduler Policy Command Reference
Command Hierarchies
Scheduler Policy Configuration Commands
Port Scheduler Policy Configuration Commands
Operational Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Scheduler Policy Commands
Port Scheduler Policy Commands
Show Commands
Clear Commands
Slope QoS Policies
In This Section
Overview
Basic Configurations
Create a Slope QoS Policy
Applying Slope Policies
Ports
MDA (FP1)
FP (FP2 and higher based hardware)
Default Slope Policy Values
Deleting QoS Policies
Ports
MDA (FP1)
FP (FP2 and higher based hardware)
Remove a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Slope Policy QoS Commands
Slope Policy QoS Policy Commands
RED Slope Commands
Show Commands
Shared-Queue QoS Policies
In This Section
Overview
Multipoint Shared Queuing
Ingress Queuing Modes of Operation
Ingress Service Queuing
Ingress Shared Queuing
Ingress Multipoint Shared Queuing
Basic Configurations
Modifying the Default Shared-Queue Policy
Applying Shared-Queue Policies
Epipe Services
IES Services
VPLS Services
VPRN Services
Default Shared Queue Policy Values
Shared-Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shared Queue QoS Commands
Show Commands
Advanced QoS Policies
In This Section
Overview
Basic Configurations
Create an Advanced QoS Policy
Applying Advanced Policies
Queue Group
SAP Ingress
SAP Egress
Default Advanced Policy Values
Deleting QoS Policies
Queue Group
SAP Ingress
SAP Egress
Copying and Overwriting Advanced Policies
Editing Advanced Policies
Advanced QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Advanced Policy QoS Commands
Show Commands
QoS ATM Traffic Descriptor Profiles
In This Section
Overview
ATM Traffic Descriptor Profiles
ATM Traffic Management
QoS Model for ATM-Based Services
ATM Service Categories
ATM Traffic Descriptors and QoS Parameters
Policing
Shaping
ATM Queuing and Scheduling
Congestion Avoidance
Basic Configurations
Create an ATM-TD-Profile QoS Policy
Applying ATM-TD-Profile Policies
ATM VLL (Apipe) SAPs
Epipe SAPs
IES SAPs
Ipipe SAPs
VPRN SAPs
VPLS SAPs
Default ATM-TD-Profile Policy Values
Service Management Tasks
Removing a Profile from the QoS Configuration
Copying and Overwriting Profile
Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
ATM QoS Policy Commands
Show Commands
Named Pools
In This Section
Overview
Named Pool Mode for IOM3-XP Card
Basic Configuration
Create a Named Pool QoS Policy
Named pool Configuration Procedure
Allocation Steps
Named Pools QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Named Pool Policy Creation
Service Ingress and Egress QoS Policy Commands
Shared Queue QoS Commands
Network Queue QoS Policy Commands
Show Commands
Named Pool Show Commands
High Scale Ethernet MDA Capabilities
In This Section
HSMDA QoS Model
Queue Scaling
Port-Based Scheduling
Dual Pass Queuing
Egress Intermediate Destination Secondary Shapers
Packet and Octet Counting
Above CIR Discard with PIR Bypass
HSMDA Ingress Queue Policing Mode
HSMDA Buffer Utilization Controls
HSMDA Buffer Pools
Identifying Queue Groups as Provisioned or System
Provisioned and System Port Class Pools
Aggregate Pools for Type and Class Separation
Use of Aggregate Control Buffer Pools
HSMDA Buffer Pool Policy
Default HSMDA Buffer Pool Policy
Port Class Pool Sizing
HSMDA Available Buffer Register Operation
HSMDA Queue Congestion and Buffer Utilization Controls
Maximum HSMDA Queue Depth
Control Plane HSMDA RED Slope Policy Management
HSMDA Slope Policy MBS Parameter
HSMDA Slope Policy Slope Parameters
HSMDA Slope Shutdown Behavior
Ingress Packet Mapping to HSMDA RED Slope
Egress Packet Mapping to HSMDA RED Slope
HSMDA Queue Congestion or Pool Congestion Discard Stats
Egress Queue CIR Based Dot1P Remarking
SAP Ingress and SAP Egress QoS Policies
SAP Ingress QoS Policy
SAP Egress QoS Policy
Subscriber Queuing Differences
HSMDA Features
HSMDA LAG
Billing
Resource Management
HSMDA Queue Groups
Scheduling Classes
Scheduling Class Weighted Groups
Scheduler Strict Priority Levels
Strict Priority Level PIR
Scheduler Maximum Rate
HSMDA Scheduler Policy Overrides
Orphan Queues
Default HSMDA Scheduling Policy
Basic HSMDA Configurations
HSMDA Pool Policies
HSMDA Scheduler Policies
HSMDA Slope Policies
Egress Queue Group
Configuring HSMDA Queue Group Overrides
Applying HSMDA Policies
HSMDA Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
HSMDA Pool QoS Policy Commands
HSMDA Scheduler QoS Policy Commands
HSMDA Slope QoS Policy Commands
HSMDA WRR QoS Policy Commands
Show QoS HSMDA Commands
QoS in MC-MLPPP
In This Section
Overview
Ingress MLPPP Class Reassembly
Configuring MC-MLPPP QoS Parameters
Basic Configurations
Configuring MC-MLPPP
QoS in MLFR and FRF.12 Fragmentation
QoS in MLFR
QoS in FRF.12 End-to-End Fragmentation
MLPPP Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Configuration Commands
MC-MLPPP Commands
Class Fair Hierarchical Policing (CFHP)
In This Section
Introduction
Parent Policer Priority and Unfair Sensitive Discard Thresholds
CFHP Ingress and Egress Use Cases
Post-CFHP Queuing and Scheduling
Ingress CFHP Queuing
Egress CFHP Queuing
Policer to Local Queue Mapping
Egress Subscriber CFHP Queuing
Subscriber Destination String Queue Group Identification
SAP Default Destination String
CFHP Policer Control Policy
Policer Control Policy Root Arbiter
Tier 1 and Tier 2 Explicit Arbiters
Explicit Arbiter Rate Limits
CFHP with Child Policer Exceed PIR Enabled
CFHP Child Policer Definition and Creation
Policer Enabled SAP QoS Policy Applicability
Child Policer Parent Association
Profile Capped Policers
Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
Ingress ‘Undefined’ Initial Profile
Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
Ingress Explicit ‘Out-of-Profile’ State Packet Handling
Egress Explicit Profile Reclassification
Preserving Out of Profile State at Egress Policer
Egress Policer CIR Packet Handling without Profile Capped Mode
Egress Policer CIR Packet Handling with Profile Capped Mode
Forwarding Traffic Exceeding PIR in Egress Policers
Ingress Child Policer Stat-Mode
Egress Child Policer Stat-Mode
Profile Preferred Mode Root Policers
Class Fair Hierarchical Policing (CFHP) Policy Command Reference
Command Hierarchies
Class Fair Hierarchical Policing Commands
Command Descriptions
Configuration Commands
Generic Commands
Frequently Used QoS Terms
In This Chapter
Above CIR Distribution
Available Bandwidth
CBS
CIR
CIR Level
CIR Weight
Child
Level
MBS
MCR
Offered Load
Orphan
Parent
Queue
Rate
Root (Scheduler)
Scheduler Policy
Tier
Virtual Scheduler
Weight
Within CIR Distribution
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Alcatel-Lucent SR-Series Router Services Configuration Process
QoS Policies
In This Chapter
QoS Overview
Forwarding Classes
High Priority Classes
Assured Classes
Best-Effort Classes
Queue Parameters
Queue ID
Unicast or Multipoint Queue
Queue Hardware Scheduler
Committed Information Rate
Peak Information Rate
Adaptation Rule
Committed Burst Size
Maximum Burst Size
High Priority Only Buffers
Hi-Low Priority Only Buffers
WRED Per Queue
Native Queue Mode
Pool per Queue Mode
Packet Markings
Queue Counters
Queue-Types
Color Aware Profiling
QoS Policies
Service versus Network QoS
QoS Policy Entities
Network QoS Policies
Network Queue QoS Policies
Service Ingress QoS Policies
FC Mapping Based on EXP Bits at VLL/VPLS SAP
Egress Forwarding Class Override
Service Egress QoS Policies
Named Pool Policies
Slope Policies
RED Slopes
Tuning the Shared Buffer Utilization Calculation
Slope Policy Parameters
Scheduler Policies
Virtual Hierarchical Scheduling
Tiers
Single Tier Scheduling
Hierarchical Scheduler Policies
Hierarchical Virtual Schedulers
Scheduler Policies Applied to Applications
Scheduler Policies Applied to SAPs
Customer Service Level Agreement (SLA)
Scheduler Policies Applied to Multi-Service Sites
Shared Queues
ATM Traffic Descriptor Profiles
Configuration Notes
Network QoS Policies
In This Section
Overview
Network Ingress Tunnel QoS Override
For Tunnel Terminated IP Routing Decisions
Normal QoS Operation
Network Ingress IP Match Criteria
Network Ingress IPv6 Match Criteria
Tunnel Termination QoS Override Operation
Enabling and Disabling Tunnel Termination QoS Override
QoS for Self-Generated (CPU) Traffic on Network Interfaces
Default DSCP Mapping Table
Basic Configurations
Create a Network QoS Policy
Applying Network Policies
Default Network Policy Values
Service Management Tasks
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Copying and Overwriting Network Policies
Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Multi-Class Frame-Relay Profile Commands
Self-Generated Traffic Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Multi-Link Frame Relay Commands
Network QoS Policy Commands
Network Ingress QoS Policy Commands
Network Egress QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-Generated Traffic Commands
Show Commands
Network Queue QoS Policies
In This Section
Overview
Network Queue Parent Scheduler
Basic Configurations
Create a Network Queue QoS Policy
Applying Network Queue Policies
XMAs and MDAs
Ethernet Ports
SONET/SDH Ports
Default Network Queue Policy Values
Service Management Tasks
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Network Queue QoS Policy Commands
Show Commands
Service Egress and Ingress QoS Policies
In This Section
Overview
Basic Configurations
Service Egress QoS Policy
Service Egress QoS Queue
Percent-Rate Support
Dynamic MBS for Egress Queue Group Queues
Queue Length as a Delay Value
Egress SAP Forwarding Class and Forwarding Profile Overrides
Egress Criteria Classification Directly to Policer
Dot1p Egress Remarking
DEI Egress Remarking
DEI in IEEE 802.1ad
DEI in IEEE 802.1ah
IEEE 802.1ad Use Case
IEEE 802.1ah Use Case
DSCP/Prec Egress Remarking
Queue Depth Monitoring
Service Ingress QoS Policy
Service Ingress QoS Queue
Percent-Rate Support
Service Ingress Forwarding Class (FC)
Service Ingress IP Match Criteria
Service Ingress IPv6 Match Criteria
Service Ingress MAC Match Criteria
VLAN ID Matching
Ingress Criteria Classification Directly to Policer
Virtual Network Identifier (VNI) Classification
FC Mapping Based on EXP Bits
Service Management Tasks
Applying Service Ingress and Egress Policies
Epipe
IES
VPLS
VPRN
Editing QoS Policies
Copying and Overwriting QoS Policies
Deleting QoS Policies
Remove a Policy from the QoS Configuration
Service SAP QoS Policy Command Reference
Command Hierarchies
Service Ingress QoS Policy Commands
Service Egress QoS Policy Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Service Ingress QoS Policy Commands
Service Ingress QoS Policy Forwarding Class Commands
Service Ingress QoS Policy Entry Commands
IP QoS Policy Match Commands
Service Ingress MAC QoS Policy Match Commands
Service Egress QoS Policy Forwarding Class Commands
Service Queue QoS Policy Commands
Show Commands
Queue Sharing and Redirection
In This Section
Queue Sharing and Redirection
Supported Platforms
Queue Group Applications
Access SAP Queue Group Applications
Ingress Access Port Queue Group Hardware Queue Allocation
Network Port Queue Groups for IP Interfaces
Pseudowire Shaping for Layer 2 and Layer 3 Services
QoS on Ingress Bindings
Queue Group Templates and Port Queue Groups
Queue Group Templates
Port Queue Groups
Percent-Rate Support
Forwarding Plane Queue Groups
Redirection Models
Access SAP Forwarding Class Based Redirection
Ingress and Egress SAP Forwarding Class Redirection Association Rules
Policy Based Provisioning Model
SAP-Based Provisioning Model
Access Queue Group Statistics
Port Queue Groups
Forwarding Plane Queue Groups
Network IP Interface Forwarding Class-Based Redirection
Egress Network Forwarding Class Redirection Association Rules
Egress Network IP Interface Statistics
Separate Ingress IPv4 and IPv6 Statistics
Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
Feature Configuration
Provisioning Model
Ingress Packet Classification
Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
Feature Configuration
Provisioning Model
Egress Marking of PW Packet Header
Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
Ingress Per SAP Statistics with Ingress Queue Groups
Ingress and Egress PW Statistics
Queue Group Behavior on LAG
Queue Group Queue Instantiation Per Link
Per Link Queue Group Queue Parameters
Adding a Queue Group to an Existing LAG
Removing a Queue Group from a LAG
Adding a Port to a LAG
Basic Configurations
Configuring an Ingress Queue Group Template
Configuring Egress Queue Group Template
Applying Ingress Queue Group to SAP Ingress Policy
Applying Egress Queue Group to SAP Egress Policy
SAP-based Egress Queue Re-direction
Configuring Queue Group on Ethernet Access Ingress Port
Configuring Overrides
Configuring Queue Group on Ethernet Access Egress Port
Configuring Queue Group for Network Egress Traffic on Port
Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
Specifying QoS Policies on Service SAPs
QoS Queue Group Template Command Reference
Command Hierarchies
Configuring Egress Queue Group Templates
Configuring Ingress Queue Group Templates
Show Commands
Monitor Commands
Command Descriptions
Configuration Commands
Generic Commands
Queue Group Commands
Show Commands
Monitor Commands
QoS Scheduler Policies
In This Section
Overview
Scheduler Policies
Egress Port-Based Schedulers
Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
Frame and Packet-Based Bandwidth Allocation
Queue Parental Association Scope
Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
Network Queue Parent Scheduler
Foster Parent Behavior for Orphaned Queues and Schedulers
Congestion Monitoring on Egress Port Scheduler
Scalability, Performance, and Operation
Restrictions
Frame-Based Accounting
Operational Modifications
Existing Egress Port Based Virtual Scheduling
Queue Behavior Modifications for Frame Based Accounting
Virtual Scheduler Rate and Queue Rate Parameter Interpretation
Virtual Scheduling Unused Bandwidth Distribution
Default Unused Bandwidth Distribution
Limit Unused Bandwidth
Configuring Port Scheduler Policies
Port Scheduler Structure
Special Orphan Queue and Scheduler Behavior
Packet to Frame Bandwidth Conversion
Aggregate Rate Limits for Directly Attached Queues
SAP Egress QoS Policy Queue Parenting
Network Queue QoS Policy Queue Parenting
Egress Port Scheduler Overrides
Applying a Port Scheduler Policy to a Virtual Port
Applying Aggregate Rate Limit to a VPORT
Applying a Scheduler Policy to a VPORT
Weighted Scheduler Group in a Port Scheduler Policy
Basic Configurations
Create a QoS Scheduler Policy
Applying Scheduler Policies
Customer
Epipe
IES
VPLS
VPRN
Creating a QoS Port Scheduler Policy
Configuring Port Parent Parameters
Within-CIR Priority Level Parameters
Above-CIR Priority Level Parameters
Configuring Distributed LAG Rate
Service Management Tasks
Deleting QoS Policies
Removing a QoS Policy from a Customer Multi-Service Site
Removing a QoS Policy from SAP(s)
Removing a Policy from the QoS Configuration
Copying and Overwriting Scheduler Policies
Editing QoS Policies
QoS Scheduler Policy Command Reference
Command Hierarchies
Scheduler Policy Configuration Commands
Port Scheduler Policy Configuration Commands
Operational Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Scheduler Policy Commands
Port Scheduler Policy Commands
Show Commands
Clear Commands
Slope QoS Policies
In This Section
Overview
Basic Configurations
Create a Slope QoS Policy
Applying Slope Policies
Ports
MDA (FP1)
FP (FP2 and higher based hardware)
Default Slope Policy Values
Deleting QoS Policies
Ports
MDA (FP1)
FP (FP2 and higher based hardware)
Remove a Policy from the QoS Configuration
Copying and Overwriting QoS Policies
Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Slope Policy QoS Commands
Slope Policy QoS Policy Commands
RED Slope Commands
Show Commands
Shared-Queue QoS Policies
In This Section
Overview
Multipoint Shared Queuing
Ingress Queuing Modes of Operation
Ingress Service Queuing
Ingress Shared Queuing
Ingress Multipoint Shared Queuing
Basic Configurations
Modifying the Default Shared-Queue Policy
Applying Shared-Queue Policies
Epipe Services
IES Services
VPLS Services
VPRN Services
Default Shared Queue Policy Values
Shared-Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shared Queue QoS Commands
Show Commands
Advanced QoS Policies
In This Section
Overview
Basic Configurations
Create an Advanced QoS Policy
Applying Advanced Policies
Queue Group
SAP Ingress
SAP Egress
Default Advanced Policy Values
Deleting QoS Policies
Queue Group
SAP Ingress
SAP Egress
Copying and Overwriting Advanced Policies
Editing Advanced Policies
Advanced QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Advanced Policy QoS Commands
Show Commands
QoS ATM Traffic Descriptor Profiles
In This Section
Overview
ATM Traffic Descriptor Profiles
ATM Traffic Management
QoS Model for ATM-Based Services
ATM Service Categories
ATM Traffic Descriptors and QoS Parameters
Policing
Shaping
ATM Queuing and Scheduling
Congestion Avoidance
Basic Configurations
Create an ATM-TD-Profile QoS Policy
Applying ATM-TD-Profile Policies
ATM VLL (Apipe) SAPs
Epipe SAPs
IES SAPs
Ipipe SAPs
VPRN SAPs
VPLS SAPs
Default ATM-TD-Profile Policy Values
Service Management Tasks
Removing a Profile from the QoS Configuration
Copying and Overwriting Profile
Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
ATM QoS Policy Commands
Show Commands
Named Pools
In This Section
Overview
Named Pool Mode for IOM3-XP Card
Basic Configuration
Create a Named Pool QoS Policy
Named pool Configuration Procedure
Allocation Steps
Named Pools QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Named Pool Policy Creation
Service Ingress and Egress QoS Policy Commands
Shared Queue QoS Commands
Network Queue QoS Policy Commands
Show Commands
Named Pool Show Commands
High Scale Ethernet MDA Capabilities
In This Section
HSMDA QoS Model
Queue Scaling
Port-Based Scheduling
Dual Pass Queuing
Egress Intermediate Destination Secondary Shapers
Packet and Octet Counting
Above CIR Discard with PIR Bypass
HSMDA Ingress Queue Policing Mode
HSMDA Buffer Utilization Controls
HSMDA Buffer Pools
Identifying Queue Groups as Provisioned or System
Provisioned and System Port Class Pools
Aggregate Pools for Type and Class Separation
Use of Aggregate Control Buffer Pools
HSMDA Buffer Pool Policy
Default HSMDA Buffer Pool Policy
Port Class Pool Sizing
HSMDA Available Buffer Register Operation
HSMDA Queue Congestion and Buffer Utilization Controls
Maximum HSMDA Queue Depth
Control Plane HSMDA RED Slope Policy Management
HSMDA Slope Policy MBS Parameter
HSMDA Slope Policy Slope Parameters
HSMDA Slope Shutdown Behavior
Ingress Packet Mapping to HSMDA RED Slope
Egress Packet Mapping to HSMDA RED Slope
HSMDA Queue Congestion or Pool Congestion Discard Stats
Egress Queue CIR Based Dot1P Remarking
SAP Ingress and SAP Egress QoS Policies
SAP Ingress QoS Policy
SAP Egress QoS Policy
Subscriber Queuing Differences
HSMDA Features
HSMDA LAG
Billing
Resource Management
HSMDA Queue Groups
Scheduling Classes
Scheduling Class Weighted Groups
Scheduler Strict Priority Levels
Strict Priority Level PIR
Scheduler Maximum Rate
HSMDA Scheduler Policy Overrides
Orphan Queues
Default HSMDA Scheduling Policy
Basic HSMDA Configurations
HSMDA Pool Policies
HSMDA Scheduler Policies
HSMDA Slope Policies
Egress Queue Group
Configuring HSMDA Queue Group Overrides
Applying HSMDA Policies
HSMDA Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
HSMDA Pool QoS Policy Commands
HSMDA Scheduler QoS Policy Commands
HSMDA Slope QoS Policy Commands
HSMDA WRR QoS Policy Commands
Show QoS HSMDA Commands
QoS in MC-MLPPP
In This Section
Overview
Ingress MLPPP Class Reassembly
Configuring MC-MLPPP QoS Parameters
Basic Configurations
Configuring MC-MLPPP
QoS in MLFR and FRF.12 Fragmentation
QoS in MLFR
QoS in FRF.12 End-to-End Fragmentation
MLPPP Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Configuration Commands
MC-MLPPP Commands
Class Fair Hierarchical Policing (CFHP)
In This Section
Introduction
Parent Policer Priority and Unfair Sensitive Discard Thresholds
CFHP Ingress and Egress Use Cases
Post-CFHP Queuing and Scheduling
Ingress CFHP Queuing
Egress CFHP Queuing
Policer to Local Queue Mapping
Egress Subscriber CFHP Queuing
Subscriber Destination String Queue Group Identification
SAP Default Destination String
CFHP Policer Control Policy
Policer Control Policy Root Arbiter
Tier 1 and Tier 2 Explicit Arbiters
Explicit Arbiter Rate Limits
CFHP with Child Policer Exceed PIR Enabled
CFHP Child Policer Definition and Creation
Policer Enabled SAP QoS Policy Applicability
Child Policer Parent Association
Profile Capped Policers
Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
Ingress ‘Undefined’ Initial Profile
Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
Ingress Explicit ‘Out-of-Profile’ State Packet Handling
Egress Explicit Profile Reclassification
Preserving Out of Profile State at Egress Policer
Egress Policer CIR Packet Handling without Profile Capped Mode
Egress Policer CIR Packet Handling with Profile Capped Mode
Forwarding Traffic Exceeding PIR in Egress Policers
Ingress Child Policer Stat-Mode
Egress Child Policer Stat-Mode
Profile Preferred Mode Root Policers
Class Fair Hierarchical Policing (CFHP) Policy Command Reference
Command Hierarchies
Class Fair Hierarchical Policing Commands
Command Descriptions
Configuration Commands
Generic Commands
Frequently Used QoS Terms
In This Chapter
Above CIR Distribution
Available Bandwidth
CBS
CIR
CIR Level
CIR Weight
Child
Level
MBS
MCR
Offered Load
Orphan
Parent
Queue
Rate
Root (Scheduler)
Scheduler Policy
Tier
Virtual Scheduler
Weight
Within CIR Distribution
Standards and Protocol Support
Customer Documentation and Product Support
RADIUS Attributes Reference Guide R14.0.R1
RADIUS Attributes Reference
About this Guide
Audience
RADIUS Authentication Attributes
Subscriber Host Identification
Wholesale-Retail — Local Access Mode
Wholesale-Retail — L2TP Tunneled Access Mode
Business Service Access
Accounting On-Line Charging
IP and IPv6 Filters
IP Filter Attribute Details
Subscriber Host Creation
Subscriber Services
WLAN Gateway
Virtual Residential Gateway
Dynamic Data Services
Lawful Intercept
IPSEC
Application Assurance
CLI User Authentication and Authorization
AAA Route Downloader
RADIUS Accounting Attributes
Enhanced Subscriber Management (ESM) Accounting
Distributed Subscriber Management (DSM) Accounting
Subscriber Service Accounting
Large Scale NAT (LSN) Accounting
L2TP Tunnel Accounting
Application Assurance (AA) Accounting
Dynamic Data Service accounting
CLI User Access Accounting
Accounting Terminate Causes
Accounting Triggered Reason VSA Values
RADIUS CoA and Disconnect Message Attributes
Subscriber Host Identification Attributes
WLAN-GW migrant users Identification Attributes
Distributed Subscriber Management (DSM) UE Identification Attributes
IPSec Tunnel Identification Attributes
Dynamic Data Services Identification Attributes
Overview of CoA Attributes
[101] Error-Cause Attribute Values
Standards and Protocol Support
Customer Documentation and Product Support
RADIUS Attributes Reference
About this Guide
Audience
RADIUS Authentication Attributes
Subscriber Host Identification
Wholesale-Retail — Local Access Mode
Wholesale-Retail — L2TP Tunneled Access Mode
Business Service Access
Accounting On-Line Charging
IP and IPv6 Filters
IP Filter Attribute Details
Subscriber Host Creation
Subscriber Services
WLAN Gateway
Virtual Residential Gateway
Dynamic Data Services
Lawful Intercept
IPSEC
Application Assurance
CLI User Authentication and Authorization
AAA Route Downloader
RADIUS Accounting Attributes
Enhanced Subscriber Management (ESM) Accounting
Distributed Subscriber Management (DSM) Accounting
Subscriber Service Accounting
Large Scale NAT (LSN) Accounting
L2TP Tunnel Accounting
Application Assurance (AA) Accounting
Dynamic Data Service accounting
CLI User Access Accounting
Accounting Terminate Causes
Accounting Triggered Reason VSA Values
RADIUS CoA and Disconnect Message Attributes
Subscriber Host Identification Attributes
WLAN-GW migrant users Identification Attributes
Distributed Subscriber Management (DSM) UE Identification Attributes
IPSec Tunnel Identification Attributes
Dynamic Data Services Identification Attributes
Overview of CoA Attributes
[101] Error-Cause Attribute Values
Standards and Protocol Support
Customer Documentation and Product Support
Router Configuration Guide R14.0.R1
Getting Started
About This Guide
In This Chapter
Router Configuration Process
IP Router Configuration
In This Chapter
Configuring IP Router Parameters
Interfaces
Network Interface
Network Domains
System Interface
Unicast Reverse Path Forwarding Check (uRPF)
Creating an IP Address Range
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Router ID
Autonomous Systems (AS)
Confederations
Proxy ARP
Exporting an Inactive BGP Route from a VPRN
DHCP Relay
Internet Protocol Versions
IPv6 Address Format
IPv6 Applications
DNS
Secure Neighbor Discovery (SeND)
SeND Persistent CGAs
Persistent RSA Key Pair
Persistent CGA Modifier
Making non-persistent CGAs persistent
Booting from a saved configuration file
IPv6 Provider Edge Router over MPLS (6PE)
6PE Control Plane Support
6PE Data Plane Support
Static Route Resolution Using Tunnels
Static Route ECMP Support
Weighted Load-Balancing over MPLS LSP
Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
Feature Configuration
Feature Behavior
ECMP Considerations
Weighted Load Balancing Static Route Packets over MPLS LSP
Feature Configuration
Feature Behavior
Bi-directional Forwarding Detection
BFD Control Packet
Control Packet Format
BFD for RSVP-TE
Echo Support
BFD Support for BGP
Centralized BFD
IES Over Spoke SDP
BFD Over LAG and VSM Interfaces
Aggregate Next Hop
Invalidate Next-Hop Based on ARP/Neighbor Cache State
Invalidate Next-Hop Based on IPV4 ARP
Invalidate Next-Hop Based on Neighbor Cache State
LDP Shortcut for IGP Route Resolution
IGP Route Resolution
LDP-IGP Synchronization
LDP Shortcut Forwarding Plane
ECMP Considerations
Handling of Control Packets
Handling of Multicast Packets
Interaction with BGP Route Resolution to an LDP FEC
Interaction with Static Route Resolution to an LDP FEC
LDP Control Plane
Weighted Load-Balancing over Interface Next-hops
Process Overview
Configuration Notes
Configuring an IP Router with CLI
Router Configuration Overview
System Interface
Network Interface
Basic Configuration
Common Configuration Tasks
Configuring a System Name
Configuring Interfaces
Configuring a System Interface
Configuring a Network Interface
Configuring IPv6 Parameters
Configuring IPv6 Over IPv4 Parameters
Tunnel Ingress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Tunnel Egress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Router Advertisement
Configuring IPv6 Parameters
An Example of a IPv6 Over IPv4 Tunnel Configuration
Configuring Proxy ARP
Creating an IP Address Range
Deriving the Router ID
Configuring a Confederation
Configuring an Autonomous System
Configuring Overload State on a Single SFM
Service Management Tasks
Changing the System Name
Modifying Interface Parameters
Deleting a Logical IP Interface
IP Router Configuration Command Reference
Command Hierarchies
Router Commands
Router BFD commands
Router L2TP Commands
Router Interface Commands
Router Interface IPv6 Commands
Router Advertisement Commands
Command Descriptions
Generic Commands
Router Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router Interface Commands
Router Interface Filter Commands
Router Interface ICMP Commands
Router Interface IPv6 Commands
Router Interface DHCP Commands
Router Advertisement Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
L2TP Show Commands
Clear Commands
Debug Commands
VRRP
In This Chapter
VRRP Overview
VRRP Components
Virtual Router
IP Address Owner
Primary and Secondary IP Addresses
Virtual Router Master
Virtual Router Backup
Owner and Non-Owner VRRP
Configurable Parameters
Virtual Router ID (VRID)
Priority
IP Addresses
Message Interval and Master Inheritance
Skew Time
Master Down Interval
Preempt Mode
VRRP Message Authentication
Authentication Type 0 – No Authentication
Authentication Type 1 – Simple Text Password
Authentication Failure
Authentication Data
Virtual MAC Address
VRRP Advertisement Message IP Address List Verification
Inherit Master VRRP Router’s Advertisement Interval Timer
IPv6 Virtual Router Instance Operationally Up
Policies
VRRP Priority Control Policies
VRRP Virtual Router Policy Constraints
VRRP Virtual Router Instance Base Priority
VRRP Priority Control Policy Delta In-Use Priority Limit
VRRP Priority Control Policy Priority Events
Priority Event Hold-Set Timers
Port Down Priority Event
LAG Degrade Priority Event
Host Unreachable Priority Event
Route Unknown Priority Event
VRRP Non-Owner Accessibility
Non-Owner Access Ping Reply
Non-Owner Access Telnet
Non-Owner Access SSH
VRRP Configuration Process Overview
Configuration Notes
General
Configuring VRRP with CLI
VRRP Configuration Overview
Preconfiguration Requirements
Basic VRRP Configurations
VRRP Policy
VRRP IES Service Parameters
Configure VRRP for IPv6
VRRP Router Interface Parameters
Common Configuration Tasks
Creating Interface Parameters
Configuring VRRP Policy Components
Configuring Service VRRP Parameters
Non-Owner VRRP Example
Owner Service VRRP
Configuring Router Interface VRRP Parameters
Router Interface VRRP Non-Owner
Router Interface VRRP Owner
VRRP Configuration Management Tasks
Modifying a VRRP Policy
Deleting a VRRP Policy
Modifying Service and Interface VRRP Parameters
Modifying Non-Owner Parameters
Modifying Owner Parameters
Deleting VRRP on an Interface or Service
VRRP Configuration Command Reference
Command Hierarchies
IPv4 Interface Commands
Router Interface Commands
IPv6 Interface Commands
Priority Control Event Policy Commands
Command Descriptions
Interface Configuration Commands
Priority Policy Commands
Priority Policy Event Commands
Priority Policy Port Down Event Commands
Priority Policy LAG Events Commands
Priority Policy Host Unreachable Event Commands
Priority Policy Route Unknown Event Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Filter Policies
In This Chapter
ACL Filter Policy Overview
Filter Policy Basics
Filter Policy Packet Match Criteria
IPv4/IPv6 Filter Policy Entry Match Criteria
MAC Filter Policy Entry Match Criteria
Filter Policy Actions
Filter Policy Statistics
Filter Policy Logging
Filter Policy cflowd Sampling
Filter Policy Management
Modifying Existing Filter Policy
Filter Policy Copy and Renumbering
Filter Policy Advanced Topics
Match-list for Filter Policies
Auto-generation of Filter-policy Address Prefix Match Lists
Primary and Secondary Filter Policy Action for PBF Redundancy
Destination MAC Rewrite when Deploying Policy-Based Forwarding
Embedded Filters
System-level IPv4/IPv6 Line Card Filter Policy
Network-port VPRN Filter Policy
ISID MAC Filters
VID MAC filters
Arbitrary Bit Matching of VID Filters
Port Group Configuration Example
Redirect Policies
Router Instance Support for Redirect Policies
HTTP-redirect (Captive Portal)
Traffic Flow
Filter Policies and Dynamic Policy-Driven Interfaces
Filter Policy-based ESM Service Chaining
Policy-Based Forwarding for Deep Packet Inspection in VPLS
Filter Configuration Command Reference
Command Hierarchies
DHCP Filter Policy Commands
IP Filter Policy Commands
IPv6 Filter Policy Commands
System Filter Policy Commands
Log Filter Commands
MAC Filter Commands
Match Filter List Commands
Redirect Policy Configuration Commands
Copy Filter Commands
Command Descriptions
Generic Commands
Global Filter Commands
DHCP Filter Commands
Filter Log Commands
ACL Filter Policy Commands
General Filter Entry Commands
IP (v4/v6) Filter Entry Commands
Match List Configuration Commands
MAC Filter Entry Commands
MAC Filter Match Criteria
Policy and Entry Maintenance Commands
Redirect Policy Commands
Configuring Filter Policies with CLI
Common Configuration Tasks
Creating an IPv4 Filter Policy
IPv4 Filter Entry
Configuring the HTTP-Redirect Option
Cflowd Filter Sampling
Creating an IPv6 Filter Policy
Creating a MAC Filter Policy
MAC Filter Policy
MAC ISID Filter Policy
MAC VID Filter Policy
MAC Filter Entry
Creating a Match List for Filter Policies
Applying Filter Policies
Apply IP (v4/v6) and MAC Filter Policies to a Service
Applying (IPv4/v6) Filter Policies to a Network Port
Creating a Redirect Policy
Filter Management Tasks
Renumbering Filter Policy Entries
Modifying a Filter Policy
Deleting a Filter Policy
Modifying a Redirect Policy
Deleting a Redirect Policy
Copying Filter Policies
Show, Clear, Monitor, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Hybrid OpenFlow Switch
In This Chapter
Hybrid OpenFlow Switching
Redundant Controllers and Multiple Switch Instances
GRT-only and Multi-Service H-OFS Mode of Operations
Port and VLAN ID Match in Flow Table Entries
Hybrid OpenFlow Switch Steering using Filter Policies
Hybrid OpenFlow Switch Statistics
OpenFlow Switch Auxiliary Channels
Hybrid OpenFlow Switch Traffic Steering Details
SR OS H-OFS Logical Port
SR OS H-OFS Port and VLAN Encoding
Redirect to IP next-hop
Redirect to GRT Instance or VRF Instance
Redirect to Next-hop and VRF/GRT Instance
Redirect to LSP
Redirect to SAP
Redirect to SDP
Forward action
Drop action
Default no-match Action
Configuration Notes
OpenFlow Command Reference
Command Hierarchies
OpenFlow Commands
Show Commands
Tools Commands
Command Descriptions
Generic Commands
Show Commands
Debug Commands
Cflowd
In This Chapter
Cflowd Overview
Operation
Version 8
Version 9
Version 10
Cflowd Filter Matching
Cflowd Configuration Process Overview
Configuration Notes
Configuring Cflowd with CLI
Cflowd Configuration Overview
Traffic Sampling
Collectors
Aggregation
Basic Cflowd Configuration
Common Configuration Tasks
Global Cflowd Components
Configuring Cflowd
Enabling Cflowd
Configuring Global Cflowd Parameters
Configuring Cflowd Collectors
Version 9 and Version 10 Templates
Enabling Cflowd on Interfaces and Filters
Specifying Cflowd Options on an IP Interface
Interface Configurations
Service Interfaces
Specifying Sampling Options in Filter Entries
Filter Configurations
Dependencies
Cflowd Configuration Management Tasks
Modifying Global Cflowd Components
Modifying Cflowd Collector Parameters
Cflowd Configuration Command Reference
Command Hierarchies
Command Descriptions
Global Commands
Show, Tools, and Clear Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer documentation and product support
Getting Started
About This Guide
In This Chapter
Router Configuration Process
IP Router Configuration
In This Chapter
Configuring IP Router Parameters
Interfaces
Network Interface
Network Domains
System Interface
Unicast Reverse Path Forwarding Check (uRPF)
Creating an IP Address Range
QoS Policy Propagation Using BGP (QPPB)
QPPB Applications
Inter-AS Coordination of QoS Policies
Traffic Differentiation Based on Route Characteristics
QPPB
Associating an FC and Priority with a Route
Displaying QoS Information Associated with Routes
Enabling QPPB on an IP interface
QPPB When Next-Hops are Resolved by QPPB Routes
QPPB and Multiple Paths to a Destination
QPPB and Policy-Based Routing
QPPB and GRT Lookup
QPPB Interaction with SAP Ingress QoS Policy
Router ID
Autonomous Systems (AS)
Confederations
Proxy ARP
Exporting an Inactive BGP Route from a VPRN
DHCP Relay
Internet Protocol Versions
IPv6 Address Format
IPv6 Applications
DNS
Secure Neighbor Discovery (SeND)
SeND Persistent CGAs
Persistent RSA Key Pair
Persistent CGA Modifier
Making non-persistent CGAs persistent
Booting from a saved configuration file
IPv6 Provider Edge Router over MPLS (6PE)
6PE Control Plane Support
6PE Data Plane Support
Static Route Resolution Using Tunnels
Static Route ECMP Support
Weighted Load-Balancing over MPLS LSP
Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
Feature Configuration
Feature Behavior
ECMP Considerations
Weighted Load Balancing Static Route Packets over MPLS LSP
Feature Configuration
Feature Behavior
Bi-directional Forwarding Detection
BFD Control Packet
Control Packet Format
BFD for RSVP-TE
Echo Support
BFD Support for BGP
Centralized BFD
IES Over Spoke SDP
BFD Over LAG and VSM Interfaces
Aggregate Next Hop
Invalidate Next-Hop Based on ARP/Neighbor Cache State
Invalidate Next-Hop Based on IPV4 ARP
Invalidate Next-Hop Based on Neighbor Cache State
LDP Shortcut for IGP Route Resolution
IGP Route Resolution
LDP-IGP Synchronization
LDP Shortcut Forwarding Plane
ECMP Considerations
Handling of Control Packets
Handling of Multicast Packets
Interaction with BGP Route Resolution to an LDP FEC
Interaction with Static Route Resolution to an LDP FEC
LDP Control Plane
Weighted Load-Balancing over Interface Next-hops
Process Overview
Configuration Notes
Configuring an IP Router with CLI
Router Configuration Overview
System Interface
Network Interface
Basic Configuration
Common Configuration Tasks
Configuring a System Name
Configuring Interfaces
Configuring a System Interface
Configuring a Network Interface
Configuring IPv6 Parameters
Configuring IPv6 Over IPv4 Parameters
Tunnel Ingress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Tunnel Egress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Router Advertisement
Configuring IPv6 Parameters
An Example of a IPv6 Over IPv4 Tunnel Configuration
Configuring Proxy ARP
Creating an IP Address Range
Deriving the Router ID
Configuring a Confederation
Configuring an Autonomous System
Configuring Overload State on a Single SFM
Service Management Tasks
Changing the System Name
Modifying Interface Parameters
Deleting a Logical IP Interface
IP Router Configuration Command Reference
Command Hierarchies
Router Commands
Router BFD commands
Router L2TP Commands
Router Interface Commands
Router Interface IPv6 Commands
Router Advertisement Commands
Command Descriptions
Generic Commands
Router Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router Interface Commands
Router Interface Filter Commands
Router Interface ICMP Commands
Router Interface IPv6 Commands
Router Interface DHCP Commands
Router Advertisement Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
L2TP Show Commands
Clear Commands
Debug Commands
VRRP
In This Chapter
VRRP Overview
VRRP Components
Virtual Router
IP Address Owner
Primary and Secondary IP Addresses
Virtual Router Master
Virtual Router Backup
Owner and Non-Owner VRRP
Configurable Parameters
Virtual Router ID (VRID)
Priority
IP Addresses
Message Interval and Master Inheritance
Skew Time
Master Down Interval
Preempt Mode
VRRP Message Authentication
Authentication Type 0 – No Authentication
Authentication Type 1 – Simple Text Password
Authentication Failure
Authentication Data
Virtual MAC Address
VRRP Advertisement Message IP Address List Verification
Inherit Master VRRP Router’s Advertisement Interval Timer
IPv6 Virtual Router Instance Operationally Up
Policies
VRRP Priority Control Policies
VRRP Virtual Router Policy Constraints
VRRP Virtual Router Instance Base Priority
VRRP Priority Control Policy Delta In-Use Priority Limit
VRRP Priority Control Policy Priority Events
Priority Event Hold-Set Timers
Port Down Priority Event
LAG Degrade Priority Event
Host Unreachable Priority Event
Route Unknown Priority Event
VRRP Non-Owner Accessibility
Non-Owner Access Ping Reply
Non-Owner Access Telnet
Non-Owner Access SSH
VRRP Configuration Process Overview
Configuration Notes
General
Configuring VRRP with CLI
VRRP Configuration Overview
Preconfiguration Requirements
Basic VRRP Configurations
VRRP Policy
VRRP IES Service Parameters
Configure VRRP for IPv6
VRRP Router Interface Parameters
Common Configuration Tasks
Creating Interface Parameters
Configuring VRRP Policy Components
Configuring Service VRRP Parameters
Non-Owner VRRP Example
Owner Service VRRP
Configuring Router Interface VRRP Parameters
Router Interface VRRP Non-Owner
Router Interface VRRP Owner
VRRP Configuration Management Tasks
Modifying a VRRP Policy
Deleting a VRRP Policy
Modifying Service and Interface VRRP Parameters
Modifying Non-Owner Parameters
Modifying Owner Parameters
Deleting VRRP on an Interface or Service
VRRP Configuration Command Reference
Command Hierarchies
IPv4 Interface Commands
Router Interface Commands
IPv6 Interface Commands
Priority Control Event Policy Commands
Command Descriptions
Interface Configuration Commands
Priority Policy Commands
Priority Policy Event Commands
Priority Policy Port Down Event Commands
Priority Policy LAG Events Commands
Priority Policy Host Unreachable Event Commands
Priority Policy Route Unknown Event Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Filter Policies
In This Chapter
ACL Filter Policy Overview
Filter Policy Basics
Filter Policy Packet Match Criteria
IPv4/IPv6 Filter Policy Entry Match Criteria
MAC Filter Policy Entry Match Criteria
Filter Policy Actions
Filter Policy Statistics
Filter Policy Logging
Filter Policy cflowd Sampling
Filter Policy Management
Modifying Existing Filter Policy
Filter Policy Copy and Renumbering
Filter Policy Advanced Topics
Match-list for Filter Policies
Auto-generation of Filter-policy Address Prefix Match Lists
Primary and Secondary Filter Policy Action for PBF Redundancy
Destination MAC Rewrite when Deploying Policy-Based Forwarding
Embedded Filters
System-level IPv4/IPv6 Line Card Filter Policy
Network-port VPRN Filter Policy
ISID MAC Filters
VID MAC filters
Arbitrary Bit Matching of VID Filters
Port Group Configuration Example
Redirect Policies
Router Instance Support for Redirect Policies
HTTP-redirect (Captive Portal)
Traffic Flow
Filter Policies and Dynamic Policy-Driven Interfaces
Filter Policy-based ESM Service Chaining
Policy-Based Forwarding for Deep Packet Inspection in VPLS
Filter Configuration Command Reference
Command Hierarchies
DHCP Filter Policy Commands
IP Filter Policy Commands
IPv6 Filter Policy Commands
System Filter Policy Commands
Log Filter Commands
MAC Filter Commands
Match Filter List Commands
Redirect Policy Configuration Commands
Copy Filter Commands
Command Descriptions
Generic Commands
Global Filter Commands
DHCP Filter Commands
Filter Log Commands
ACL Filter Policy Commands
General Filter Entry Commands
IP (v4/v6) Filter Entry Commands
Match List Configuration Commands
MAC Filter Entry Commands
MAC Filter Match Criteria
Policy and Entry Maintenance Commands
Redirect Policy Commands
Configuring Filter Policies with CLI
Common Configuration Tasks
Creating an IPv4 Filter Policy
IPv4 Filter Entry
Configuring the HTTP-Redirect Option
Cflowd Filter Sampling
Creating an IPv6 Filter Policy
Creating a MAC Filter Policy
MAC Filter Policy
MAC ISID Filter Policy
MAC VID Filter Policy
MAC Filter Entry
Creating a Match List for Filter Policies
Applying Filter Policies
Apply IP (v4/v6) and MAC Filter Policies to a Service
Applying (IPv4/v6) Filter Policies to a Network Port
Creating a Redirect Policy
Filter Management Tasks
Renumbering Filter Policy Entries
Modifying a Filter Policy
Deleting a Filter Policy
Modifying a Redirect Policy
Deleting a Redirect Policy
Copying Filter Policies
Show, Clear, Monitor, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Hybrid OpenFlow Switch
In This Chapter
Hybrid OpenFlow Switching
Redundant Controllers and Multiple Switch Instances
GRT-only and Multi-Service H-OFS Mode of Operations
Port and VLAN ID Match in Flow Table Entries
Hybrid OpenFlow Switch Steering using Filter Policies
Hybrid OpenFlow Switch Statistics
OpenFlow Switch Auxiliary Channels
Hybrid OpenFlow Switch Traffic Steering Details
SR OS H-OFS Logical Port
SR OS H-OFS Port and VLAN Encoding
Redirect to IP next-hop
Redirect to GRT Instance or VRF Instance
Redirect to Next-hop and VRF/GRT Instance
Redirect to LSP
Redirect to SAP
Redirect to SDP
Forward action
Drop action
Default no-match Action
Configuration Notes
OpenFlow Command Reference
Command Hierarchies
OpenFlow Commands
Show Commands
Tools Commands
Command Descriptions
Generic Commands
Show Commands
Debug Commands
Cflowd
In This Chapter
Cflowd Overview
Operation
Version 8
Version 9
Version 10
Cflowd Filter Matching
Cflowd Configuration Process Overview
Configuration Notes
Configuring Cflowd with CLI
Cflowd Configuration Overview
Traffic Sampling
Collectors
Aggregation
Basic Cflowd Configuration
Common Configuration Tasks
Global Cflowd Components
Configuring Cflowd
Enabling Cflowd
Configuring Global Cflowd Parameters
Configuring Cflowd Collectors
Version 9 and Version 10 Templates
Enabling Cflowd on Interfaces and Filters
Specifying Cflowd Options on an IP Interface
Interface Configurations
Service Interfaces
Specifying Sampling Options in Filter Entries
Filter Configurations
Dependencies
Cflowd Configuration Management Tasks
Modifying Global Cflowd Components
Modifying Cflowd Collector Parameters
Cflowd Configuration Command Reference
Command Hierarchies
Command Descriptions
Global Commands
Show, Tools, and Clear Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer documentation and product support
Services Overview Guide R14.0.R1
Getting Started
About This Guide
Audience
Services Overview
In This Chapter
Introduction
Service Types
Service Policies
Multipoint Shared Queuing
Ingress Queuing Modes of Operation
Ingress Service Queuing
Ingress Shared Queuing
Ingress Multipoint Shared Queuing
Alcatel-Lucent Service Model
Service Entities
Customers
Service Access Points (SAPs)
SAP Encapsulation Types and Identifiers
Ethernet Encapsulations
Default SAP on a Dot1q Port
QinQ SAPs
Services and SAP Encapsulations
SAP Configuration Considerations
G.8032 Protected Ethernet Rings
SAP Bandwidth CAC
CAC Enforcement
Connection Profile VLAN SAPs
Using connection-profile-vlan in Dot1q Ports
Using connection-profile-vlan in QinQ Ports
Service Distribution Points
SDP Binding
Spoke and Mesh SDPs
SDP Using BGP Route Tunnel
SDP Keepalives
SDP Administrative Groups
SDP Selection Rules
Class-Based Forwarding
Application of Class-Based Forwarding over RSVP LSPs
Operation of Class-Based Forwarding over RSVP LSPs
SAP & MPLS Binding Loopback with MAC Swap
Multi-Service Sites
G.8031 Protected Ethernet Tunnels
OAM Considerations
QoS Considerations
Mirroring and Lawful Intercept Considerations
Support Service and Solution Combinations
LAG Emulation using Ethernet Tunnels
G.8032 Ethernet Ring Protection Switching
Overview of G.8032 Operation
Ethernet Ring Sub-Rings
Virtual and Non-Virtual Channel
Lag Support
OAM Considerations
Support Service and Solution Combinations
Internal Objects Created for L2TP and NAT
Ethernet Unnumbered Interfaces
Service Creation Process Overview
Deploying and Provisioning Services
Phase 1: Core Network Construction
Phase 2: Service Administration
Phase 3: Service Provisioning
Configuration Notes
General
Configuring Global Service Entities with CLI
Service Model Entities
Basic Configuration
Common Configuration Tasks
Configuring Customers
Customer Information
Configuring Multi-Service-Sites
Configuring an SDP
SDP Configuration Tasks
Configuring an SDP
Configuring a Mixed-LSP SDP
Ethernet Connectivity Fault Management (ETH-CFM)
Facility MEPs
Common Actionable Failures
General Detection, Processing and Reaction
Port-Based MEP
LAG Based MEP
Tunnel Based MEP
Router Interface MEP
Hardware Support
ETH-CFM and MC-LAG
ETH-CFM and MC-LAG Default Behavior
Linking ETH-CFM to MC-LAG State
ETH-CFM Features
CCM Hold Timers
CCM Interval
MEP and MIP Support
Configuring ETH-CFM Parameters
Service Management Tasks
Modifying Customer Accounts
Deleting Customers
Modifying SDPs
Deleting SDPs
Global Services Configuration Command Reference
Command Hierarchies
Customer Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire (PW) Commands
SDP Commands
SAP Commands
Ethernet Ring Commands
ETH-CFM Configuration Commands
ETH Tunnel Commands
Connection Profile VLAN Commands
Command Descriptions
Generic Commands
Customer Management Commands
Service System Commands
MRP Commands
Oper Group Commands
Pseudowire Commands
SDP Commands
SDP Keepalive Commands
Ethernet Ring Commands
ETH-CFM Configuration Commands
ETH-Tunnel Commands
Connection Profile VLAN Commands
Tools Perform Commands
Tools Dump Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Tools Perform Commands
Tools Dump Commands
Command Descriptions
Service Commands
Connection Profile VLAN Commands
ETH-CFM Show Commands
Common CLI Command Descriptions
In This Chapter
Common Service Commands
SAP Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Audience
Services Overview
In This Chapter
Introduction
Service Types
Service Policies
Multipoint Shared Queuing
Ingress Queuing Modes of Operation
Ingress Service Queuing
Ingress Shared Queuing
Ingress Multipoint Shared Queuing
Alcatel-Lucent Service Model
Service Entities
Customers
Service Access Points (SAPs)
SAP Encapsulation Types and Identifiers
Ethernet Encapsulations
Default SAP on a Dot1q Port
QinQ SAPs
Services and SAP Encapsulations
SAP Configuration Considerations
G.8032 Protected Ethernet Rings
SAP Bandwidth CAC
CAC Enforcement
Connection Profile VLAN SAPs
Using connection-profile-vlan in Dot1q Ports
Using connection-profile-vlan in QinQ Ports
Service Distribution Points
SDP Binding
Spoke and Mesh SDPs
SDP Using BGP Route Tunnel
SDP Keepalives
SDP Administrative Groups
SDP Selection Rules
Class-Based Forwarding
Application of Class-Based Forwarding over RSVP LSPs
Operation of Class-Based Forwarding over RSVP LSPs
SAP & MPLS Binding Loopback with MAC Swap
Multi-Service Sites
G.8031 Protected Ethernet Tunnels
OAM Considerations
QoS Considerations
Mirroring and Lawful Intercept Considerations
Support Service and Solution Combinations
LAG Emulation using Ethernet Tunnels
G.8032 Ethernet Ring Protection Switching
Overview of G.8032 Operation
Ethernet Ring Sub-Rings
Virtual and Non-Virtual Channel
Lag Support
OAM Considerations
Support Service and Solution Combinations
Internal Objects Created for L2TP and NAT
Ethernet Unnumbered Interfaces
Service Creation Process Overview
Deploying and Provisioning Services
Phase 1: Core Network Construction
Phase 2: Service Administration
Phase 3: Service Provisioning
Configuration Notes
General
Configuring Global Service Entities with CLI
Service Model Entities
Basic Configuration
Common Configuration Tasks
Configuring Customers
Customer Information
Configuring Multi-Service-Sites
Configuring an SDP
SDP Configuration Tasks
Configuring an SDP
Configuring a Mixed-LSP SDP
Ethernet Connectivity Fault Management (ETH-CFM)
Facility MEPs
Common Actionable Failures
General Detection, Processing and Reaction
Port-Based MEP
LAG Based MEP
Tunnel Based MEP
Router Interface MEP
Hardware Support
ETH-CFM and MC-LAG
ETH-CFM and MC-LAG Default Behavior
Linking ETH-CFM to MC-LAG State
ETH-CFM Features
CCM Hold Timers
CCM Interval
MEP and MIP Support
Configuring ETH-CFM Parameters
Service Management Tasks
Modifying Customer Accounts
Deleting Customers
Modifying SDPs
Deleting SDPs
Global Services Configuration Command Reference
Command Hierarchies
Customer Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire (PW) Commands
SDP Commands
SAP Commands
Ethernet Ring Commands
ETH-CFM Configuration Commands
ETH Tunnel Commands
Connection Profile VLAN Commands
Command Descriptions
Generic Commands
Customer Management Commands
Service System Commands
MRP Commands
Oper Group Commands
Pseudowire Commands
SDP Commands
SDP Keepalive Commands
Ethernet Ring Commands
ETH-CFM Configuration Commands
ETH-Tunnel Commands
Connection Profile VLAN Commands
Tools Perform Commands
Tools Dump Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Tools Perform Commands
Tools Dump Commands
Command Descriptions
Service Commands
Connection Profile VLAN Commands
ETH-CFM Show Commands
Common CLI Command Descriptions
In This Chapter
Common Service Commands
SAP Commands
Standards and Protocol Support
Customer Documentation and Product Support
System Management Guide R14.0.R1
Getting Started
About This Guide
Router Configuration Process
Security
In This Chapter
Authentication, Authorization, and Accounting
Authentication
Local Authentication
RADIUS Authentication
RADIUS Server Selection
TACACS+ Authentication
Authorization
Local Authorization
RADIUS Authorization
TACACS+ Authorization
Examples
Accounting
RADIUS Accounting
TACACS+ Accounting
Security Controls
When a Server Does Not Respond
Access Request Flow
Centralized CPU Protection
CPU Protection Extensions for ETH-CFM
ETH-CFM Ingress Squelching
Distributed CPU Protection (DCP)
Applicability of Distributed CPU Protection
Log Events, Statistics, Status and SNMP support
DCP Policer Resource Management
Operational Guidelines and Tips
Classification-Based Priority for Extracted Protocol Traffic
Vendor-Specific Attributes (VSAs)
Other Security Features
Secure Shell (SSH)
SSH PKI Authentication
Key Generation
Per Peer CPM Queuing
CPM Filters and Traffic Management
TTL Security for BGP and LDP
Exponential Login Backoff
User Lockout
802.1x Network Access Control
TCP Enhanced Authentication Option
Packet Formats
Keychain
Configuration Notes
General
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Configuration Tasks
Security Configuration Procedures
Configuring Management Access Filters
Configuring IP CPM Filters Policy
Configuring MAC CPM Filters
Configuring IPv6 CPM Filters
Configuring CPM Queues
IPSec Certificates Parameters
Configuring Profiles
Parameters
Wildcards
CLI Session Resource Management
Configuring Users
Configuring Keychains
Copying and Overwriting Users and Profiles
User
Profile
RADIUS Configurations
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
TACACS+ Configurations
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Enabling SSH
Configuring Login Controls
Security Configuration Command Reference
Command Hierarchies
Security Commands
LLDP Commands
Management Access Filter Commands
CLI Script Authorization Commands
CPM Filter Commands
CPM Queue Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Password Commands
Public Key Infrastructure (PKI) Commands
Profile Commands
CLI Session Commands
RADIUS Commands
SSH Commands
TACPLUS Commands
User Commands
User Template Commands
Dot1x Commands
Keychain Commands
TTL Security Commands
Login Control Commands
Command Descriptions
General Security Commands
LLDP Commands
Login, Telnet, SSH and FTP Commands
Management Access Filter Commands
Password Commands
Public Key Infrastructure (PKI) Commands
Profile Management Commands
User Management Commands
CLI Session Management Commands
RADIUS Client Commands
TACACS+ Client Commands
Generic 802.1x COMMANDS
Keychain Authentication
CLI Script Commands
CPM Filter Commands
CPM Queue Commands
TTL Security Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Show, Clear, Debug, Tools, and Admin Command Reference
Command Hierarchies
Show Commands
Security
Login Control
Clear Commands
Debug Commands
Tools Commands
Admin Commands
Command Descriptions
Show Commands
Security Commands
Login Control
Clear Commands
CPU Protection Commands
Debug Commands
Tools Commands
Admin Commands
SNMP
In This Chapter
SNMP Overview
SNMP Architecture
Management Information Base
SNMP Protocol Operations
SNMP Versions
Management Information Access Control
User-Based Security Model Community Strings
Views
Access Groups
Users
Per-VPRN Logs and SNMP Access
Per-SNMP Community Source IP Address Validation
Which SNMP Version to Use?
Configuration Notes
General
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Configuration Command Reference
Command Hierarchies
SNMP System Commands
SNMP Security Commands
Command Descriptions
SNMP System Commandse
SNMP Security Commands
SNMP Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF
In This Chapter
NETCONF Overview
NETCONF in the SR OS
YANG Data Models
Transport and Sessions
Datastores and URLs
NETCONF Operations and Capabilities
<get>
<get-config>
<edit-config>
<copy-config> and <delete-config>
<lock>
<unlock>
<commit>
<discard-changes>
<validate>
Data Model, Datastore and Operation Combinations
General NETCONF Behavior
System-Provisioned Configuration (SPC) Objects
Establishing a NETCONF Session
XML Content Layer
<get> with XML Content Layer
<edit-config> with XML Content Layer
<get-config> with XML Content Layer
XML Content Layer Examples
CLI Content Layer
CLI Content Layer Examples
NETCONF Configuration Command Reference
Command Hierarchies
NETCONF System Commands
NETCONF Security Commands
Configuration Commands
NETCONF System Commands
NETCONF Security Commands
NETCONF Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF System Commands
NETCONF Admin Command Reference
Command Hierarchies
Admin Commands
Command Descriptions
Admin Commands
Event and Accounting Logs
In This Chapter
Logging Overview
Log Destinations
Console
Session
Memory Logs
Log Files
SNMP Trap Group
Syslog
Event Logs
Event Sources
Event Control
Log Manager and Event Logs
Event Filter Policies
Event Log Entries
Simple Logger Event Throttling
Default System Log
Event Handling System
Accounting Logs
Accounting Records
Accounting Files
Design Considerations
Reporting and Time-Based Accounting
Overhead Reduction in Accounting: Custom Record
User Configurable Records
Changed Statistics Only
Configurable Accounting Records
XML Accounting Files for Service and ESM-Based Accounting
RADIUS Accounting in Networks Using ESM
Significant Change Only Reporting
Immediate Completion of Records
Record Completion for XML Accounting
AA Accounting per Forwarding Class
Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Types
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control
Configuring a Log Filter
Configuring an SNMP Trap Group
Setting the Replay Parameter
Shutdown In-Band Port
No Shutdown Port
Configuring a Syslog Target
Configuring an Accounting Custom Record
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Modifying a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Configuration Command Reference
Command Hierarchies
Log Configuration Commands
Accounting Policy Commands
Custom Record Commands
File ID Commands
Event Filter Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Log ID Commands
SNMP Trap Group Commands
Syslog Commands
Command Descriptions
Generic Commands
Log File Commands
Log Filter Commands
Log Filter Entry Commands
Log Filter Entry Match Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Syslog Commands
SNMP Trap Groups
Accounting Policy Commands
Accounting Policy Custom Record Commands
Log Command Reference
Command Hierarchies
Show Commands
Clear Command
Command Descriptions
Show Commands
Clear Commands
sFlow
In This Chapter
sFlow Overview
sFlow Features
sFlow Counter Polling Architecture
sFlow Support on Logical Ethernet Ports
sFlow SAP Counter Map
sFlow Record Formats
sFlow Command Reference
Command Hierarchies
System Commands
Show Commands
sFlow Configuration Command Descriptions
Command Descriptions
System Commands
sFlow Show Command Descriptions
Command Descriptions
Show Commands
Facility Alarms
In This Chapter
Facility Alarms Overview
Facility Alarms vs. Log Events
Facility Alarm Severities and Alarm LED Behavior
Facility Alarm Hierarchy
Facility Alarm List
Configuring Logging with CLI
Basic Facility Alarm Configuration
Common Configuration Tasks
Configuring the Maximum Number of Alarms To Clear
Facility Alarms Configuration Command Reference
Command Hierarchies
Facility Alarm Configuration Commands
Command Descriptions
Generic Commands
Facility Alarms Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer Documentation and Product Support
Getting Started
About This Guide
Router Configuration Process
Security
In This Chapter
Authentication, Authorization, and Accounting
Authentication
Local Authentication
RADIUS Authentication
RADIUS Server Selection
TACACS+ Authentication
Authorization
Local Authorization
RADIUS Authorization
TACACS+ Authorization
Examples
Accounting
RADIUS Accounting
TACACS+ Accounting
Security Controls
When a Server Does Not Respond
Access Request Flow
Centralized CPU Protection
CPU Protection Extensions for ETH-CFM
ETH-CFM Ingress Squelching
Distributed CPU Protection (DCP)
Applicability of Distributed CPU Protection
Log Events, Statistics, Status and SNMP support
DCP Policer Resource Management
Operational Guidelines and Tips
Classification-Based Priority for Extracted Protocol Traffic
Vendor-Specific Attributes (VSAs)
Other Security Features
Secure Shell (SSH)
SSH PKI Authentication
Key Generation
Per Peer CPM Queuing
CPM Filters and Traffic Management
TTL Security for BGP and LDP
Exponential Login Backoff
User Lockout
802.1x Network Access Control
TCP Enhanced Authentication Option
Packet Formats
Keychain
Configuration Notes
General
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Configuration Tasks
Security Configuration Procedures
Configuring Management Access Filters
Configuring IP CPM Filters Policy
Configuring MAC CPM Filters
Configuring IPv6 CPM Filters
Configuring CPM Queues
IPSec Certificates Parameters
Configuring Profiles
Parameters
Wildcards
CLI Session Resource Management
Configuring Users
Configuring Keychains
Copying and Overwriting Users and Profiles
User
Profile
RADIUS Configurations
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
TACACS+ Configurations
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Enabling SSH
Configuring Login Controls
Security Configuration Command Reference
Command Hierarchies
Security Commands
LLDP Commands
Management Access Filter Commands
CLI Script Authorization Commands
CPM Filter Commands
CPM Queue Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Password Commands
Public Key Infrastructure (PKI) Commands
Profile Commands
CLI Session Commands
RADIUS Commands
SSH Commands
TACPLUS Commands
User Commands
User Template Commands
Dot1x Commands
Keychain Commands
TTL Security Commands
Login Control Commands
Command Descriptions
General Security Commands
LLDP Commands
Login, Telnet, SSH and FTP Commands
Management Access Filter Commands
Password Commands
Public Key Infrastructure (PKI) Commands
Profile Management Commands
User Management Commands
CLI Session Management Commands
RADIUS Client Commands
TACACS+ Client Commands
Generic 802.1x COMMANDS
Keychain Authentication
CLI Script Commands
CPM Filter Commands
CPM Queue Commands
TTL Security Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Show, Clear, Debug, Tools, and Admin Command Reference
Command Hierarchies
Show Commands
Security
Login Control
Clear Commands
Debug Commands
Tools Commands
Admin Commands
Command Descriptions
Show Commands
Security Commands
Login Control
Clear Commands
CPU Protection Commands
Debug Commands
Tools Commands
Admin Commands
SNMP
In This Chapter
SNMP Overview
SNMP Architecture
Management Information Base
SNMP Protocol Operations
SNMP Versions
Management Information Access Control
User-Based Security Model Community Strings
Views
Access Groups
Users
Per-VPRN Logs and SNMP Access
Per-SNMP Community Source IP Address Validation
Which SNMP Version to Use?
Configuration Notes
General
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Configuration Command Reference
Command Hierarchies
SNMP System Commands
SNMP Security Commands
Command Descriptions
SNMP System Commandse
SNMP Security Commands
SNMP Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF
In This Chapter
NETCONF Overview
NETCONF in the SR OS
YANG Data Models
Transport and Sessions
Datastores and URLs
NETCONF Operations and Capabilities
<get>
<get-config>
<edit-config>
<copy-config> and <delete-config>
<lock>
<unlock>
<commit>
<discard-changes>
<validate>
Data Model, Datastore and Operation Combinations
General NETCONF Behavior
System-Provisioned Configuration (SPC) Objects
Establishing a NETCONF Session
XML Content Layer
<get> with XML Content Layer
<edit-config> with XML Content Layer
<get-config> with XML Content Layer
XML Content Layer Examples
CLI Content Layer
CLI Content Layer Examples
NETCONF Configuration Command Reference
Command Hierarchies
NETCONF System Commands
NETCONF Security Commands
Configuration Commands
NETCONF System Commands
NETCONF Security Commands
NETCONF Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF System Commands
NETCONF Admin Command Reference
Command Hierarchies
Admin Commands
Command Descriptions
Admin Commands
Event and Accounting Logs
In This Chapter
Logging Overview
Log Destinations
Console
Session
Memory Logs
Log Files
SNMP Trap Group
Syslog
Event Logs
Event Sources
Event Control
Log Manager and Event Logs
Event Filter Policies
Event Log Entries
Simple Logger Event Throttling
Default System Log
Event Handling System
Accounting Logs
Accounting Records
Accounting Files
Design Considerations
Reporting and Time-Based Accounting
Overhead Reduction in Accounting: Custom Record
User Configurable Records
Changed Statistics Only
Configurable Accounting Records
XML Accounting Files for Service and ESM-Based Accounting
RADIUS Accounting in Networks Using ESM
Significant Change Only Reporting
Immediate Completion of Records
Record Completion for XML Accounting
AA Accounting per Forwarding Class
Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Types
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control
Configuring a Log Filter
Configuring an SNMP Trap Group
Setting the Replay Parameter
Shutdown In-Band Port
No Shutdown Port
Configuring a Syslog Target
Configuring an Accounting Custom Record
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Modifying a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Configuration Command Reference
Command Hierarchies
Log Configuration Commands
Accounting Policy Commands
Custom Record Commands
File ID Commands
Event Filter Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Log ID Commands
SNMP Trap Group Commands
Syslog Commands
Command Descriptions
Generic Commands
Log File Commands
Log Filter Commands
Log Filter Entry Commands
Log Filter Entry Match Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Syslog Commands
SNMP Trap Groups
Accounting Policy Commands
Accounting Policy Custom Record Commands
Log Command Reference
Command Hierarchies
Show Commands
Clear Command
Command Descriptions
Show Commands
Clear Commands
sFlow
In This Chapter
sFlow Overview
sFlow Features
sFlow Counter Polling Architecture
sFlow Support on Logical Ethernet Ports
sFlow SAP Counter Map
sFlow Record Formats
sFlow Command Reference
Command Hierarchies
System Commands
Show Commands
sFlow Configuration Command Descriptions
Command Descriptions
System Commands
sFlow Show Command Descriptions
Command Descriptions
Show Commands
Facility Alarms
In This Chapter
Facility Alarms Overview
Facility Alarms vs. Log Events
Facility Alarm Severities and Alarm LED Behavior
Facility Alarm Hierarchy
Facility Alarm List
Configuring Logging with CLI
Basic Facility Alarm Configuration
Common Configuration Tasks
Configuring the Maximum Number of Alarms To Clear
Facility Alarms Configuration Command Reference
Command Hierarchies
Facility Alarm Configuration Commands
Command Descriptions
Generic Commands
Facility Alarms Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer Documentation and Product Support
Triple Play Service Delivery Architecture R14.0.R1
Getting Started
About This Guide
Alcatel-Lucent SR OS Services Configuration Process
Introduction to Triple Play
In This Section
Alcatel-Lucent’s Triple Play Service Delivery Architecture
Introduction to Triple Play
Blueprint for Optimizing Triple Play Service Infrastructures
Architectural Foundations
Optimizing Triple Play Service Infrastructures
Distributed Service Edges
Service Differentiation, QoS Enablement
Virtual MAC Subnetting for VPLS
Services
Service Types
Service Policies
Alcatel-Lucent Service Model
Introduction
Service Entities
Customers
Service Access Points (SAPs)
SAP Encapsulation Types and Identifiers
Ethernet Encapsulations
SAP Considerations
Service Distribution Points (SDPs)
SDP Binding
Spoke and Mesh SDPs
SDP Encapsulation Types
GRE
MPLS
SDP Keepalives
Epipe Service Overview
VPLS Service Overview
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
Residential Split Horizon Groups
IES Service Overview
IP Interface
VPRN Service Overview
Deploying and Provisioning Services
Phase 1: Core Network Construction
Phase 2: Service Administration
Phase 3: Service Provisioning
Configuration Notes
General
Configuring Triple Play Services with CLI
Configuring VPLS Residential Split Horizon Groups
Configuring Static Hosts
BNG Learning IP-Only Static Host’s MAC Address
Static Host Learning the IPv6 Default Gateway Address
Configuring Static Hosts on an VPLS SAP
Configuring Static Hosts on an IES SAP
Configuring Static Hosts on an VPRN SAP
Triple Play Services Command Reference
Command Hierarchies
Generic VPLS Triple Play Commands
Generic IES Triple Play Commands
Service DHCP and Anti-Spoof Filtering Commands
Triple Play ARP Commands
Triple Play Multicast Commands
Show Commands
Clear Commands
Tools Commands
Command Descriptions
Global Commands
Service Commands
VPLS SAP ATM Commands
Service Billing Commands
SAP Subscriber Management Commands
Multicast Commands
DHCP and Anti-Spoofing Commands
Filter and QoS Policy Commands
VPLS and IES SDP and SAP Commands
DHCP Commands
Egress Multicast Group Commands
Interface Commands
Interface IPv6 Commands
Show Commands
IGMP Snooping Show Commands
Clear Commands
Debug Commands
Tools Commands
DHCP Management
In This Chapter
DHCP Principles
DHCP Features
DHCP Relay
DHCPv4 Relay Proxy
Subscriber Identification Using Option 82 Field
Trusted and Untrusted
DHCP Snooping
DHCP Lease State Table
DHCP and Layer 3 Aggregation
DHCPv4 Snooping
DHCPv6 Snooping
Local DHCP Servers
Overview
Local DHCP Server Support
DHCPv6
DHCPv6 Relay Agent
DHCPv6 Prefix Options
Neighbor Resolution via DHCPv6 Relay
DHCPv6 Lease Persistency
Local Proxy Neighbor Discovery
IPv6oE Hosts Behind Bridged CPEs
IPv6 Link-Address Based Pool Selection
IPv6 Address/Prefix Stickiness
IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
Host Connectivity Checks for IPv6
Lease Query
DHCPv6 to Server Option
Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
DHCP Caching
Flexible Creation of DHCPv4/6 Host Parameters Utilizing Python and Internal Caching
Python DTC Variables and API
DTC Debugging Facility
Virtual Subnet for DHCPv4 Hosts
Address Reservation for Sticky Leases
Proxy DHCP Server
Local DHCP Servers
Terminology
Overview
DHCP Lease Synchronization
Intercommunication Link Failure Detection
DHCP Server Failover States
Lease Time Synchronization
Maximum Client Lead Time (MCLT)
Sharing IPv4 Address-Range or IPv6 Prefix Between Redundant 7x50 DHCP Servers in Access-Driven Mode
Fast-Switchover of IP Address/Prefix Delegation For Remote IP Address/Prefix Range
DHCP Server Synchronization and Local PPPoX Pools
Local Address Assignment
Stateless Address Auto-configuration
SLAAC
In This Chapter
Stateless Address Auto-configuration (SLAAC) Management
SLAAC Principles
Configuration Overview
Router-Solicit Trigger
SLAAC Address Assignment
Static SLAAC Prefix Assignment
Dynamic SLAAC Prefix Assignment
Configuring DHCP with CLI
Common Configuration Tasks
Enabling DHCP Snooping
Configuring Option 82 Handling
Enabling DHCP Relay
Configuring Local User Database Parameters
Triple Play DHCP Command Reference
Command Hierarchies
Global DHCP Commands
Router DHCP Commands
VPLS DHCP Commands
IES DHCP Commands
VPRN DHCP Commands
VPRN DHCP Subscriber Interface Commands
IES/VPRN IPv6-DHCP6 Commands
Local User Database Commands
IPoE Commands
PPP Commands
Show Commands
Tools Commands
Clear Commands
DHCP Debug Commands
Command Descriptions
Triple Play DHCP Configuration Commands
Global Commands
System Commands
DHCP Configuration Commands
Service Commands
Local User Database Commands
MLPPP on LNS Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Point-to-Point Protocol over Ethernet (PPPoE) Management
In This Chapter
PPPoE
PPPoE Authentication and Authorization
General Flow
RADIUS
Local User Database Directly Assigned to PPPoE Node
Subscriber per PPPoE Session Index
Local DHCP Server with Local User Database
Multiple Sessions Per MAC Address
Private Retail Subnets
IPCP Subnet Negotiation
Numbered WAN Support for Layer 3 RGs
IES as Retail Service for PPPoE Host
Unnumbered PPPoX
MLPPPoE, MLPPP(oE)oA with LFI on LNS
Terminology
LNS MLPPPoX
MLPPP Encapsulation
MLPPPoX Negotiation
Enabling MLPPPoX
Link Fragmentation and Interleaving (LFI)
MLPPPoX Fragmentation, MRRU and MRU Considerations
LFI Functionality Implemented in LNS
Last Mile QoS Awareness in the LNS
BB-ISA Processing
LNS-LAC Link
AN-RG Link
Home Link
Optimum Fragment Size Calculation by LNS
Encapsulation Based Fragment Size
Fragment Size Based on the Max Transmission Delay
Selection of the Optimum Fragment Length
Upstream Traffic Considerations
Multiple Links MLPPPoX With No Interleaving
MLPPPoX Session Support
Session Load Balancing Across Multiple BB-ISAs
BB-ISA Hashing Considerations
Last Mile Rate and Encapsulation Parameters
Link Failure Detection
CoA Support
Accounting
Filters and Mirroring
PTA Considerations
QoS Considerations
Dual-Pass
Traffic Prioritization in LFI
Shaping Based on the Last Mile Wire Rates
Downstream Bandwidth Management on Egress Port
Sub/Sla-Profile Considerations
Example of MLPPPoX Session Setup Flow
Other Considerations
Configuration Notes
PPP Command Reference
Command Hierarchies
PPPoE Policy Configuration Commands
PPPoE Service Commands
PPPoE Local User Database Commands
MLPPP on LNS Commands
Show Commands
Command Descriptions
PPP Configuration Commands
PPP/PPPoE Service Commands
RADIUS Attribute Commands
Show Commands
Clear Commands
Debug Commands
L2TP
In This Chapter
L2TP
Terminology
LAC DF Bit
Handling L2TP Tunnel/Session Initialization Failures
L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
Peer Blacklist
Tunnel Blacklists
Tunnel Timeout Due to the Peer IP Address Change
Tunnel Selection Mechanism
Tunnel Probing
Controlling the Size of Blacklist
Displaying the Content of a Blacklist
Generating Trap when the Blacklist is Full
Premature Removal of Blacklisted Entries
Manual Purging of Entities within the Blacklist
CDN Result Code Overwrite
L2TP LAC VPRN
Per-ISP Egress L2TP DSCP Reclassification
L2TP Tunnel RADIUS Accounting
Accounting Packets List
RADIUS Attributes Value Considerations
Other Optional RADIUS Attributes
RADIUS VSA to Enable L2TP Tunnel Accounting
MLPPP on the LNS Side
LNS Reassembly
L2TP Command Reference
Command Hierarchies
L2TP Configuration Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
L2TP Configuration Commands
Global Commands
L2TP Tunnel Account Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Debug Commands
Triple Play Security
In This Chapter
Triple Play Security Features
Anti-Spoofing Filters
Anti-spoofing Filter Types
Filtering Packets
Layer 2 Triple Play Security Features
MAC Pinning
MAC Protection
DoS Protection
Subscriber Aggregation Network
Network Control Filtering
VPLS Redirect Policy
ARP Handling
ARP Reply Agent
Dynamic ARP Table Population
Local Proxy ARP
Web Portal Redirect
Configuring Triple Play Security with CLI
Common Configuration Tasks
Configuring Anti-Spoofing Filters
Configuring Triple Play Security features
Configuring MAC Pinning
Configuring MAC Protection
Configuring VPLS Redirect Policy
Configuring ARP Handling
Configuring Proxy ARP
Configuring Local Proxy ARP
Configuring ARP Reply Agent in a VPLS Service
Configuring Remote Proxy ARP
Configuring Automatic ARP Table Population in an IES or VPRN Interface
Configuring CPU Protection
Configuring Web Portal Redirect
Triple Play Security Command Reference
Command Hierarchies
Anti-Spoofing Commands
Layer 2 Security Commands
ARP Handling Commands
Tools Commands
Command Descriptions
Triple Play Security Configuration Commands
Triple Play Anti-Spoofing Commands
Triple Play Layer 2 Security Commands
ARP Handling Commands
Show Commands
Tools Commands
Triple Play Multicast
In This Chapter
Introduction to Multicast
Multicast in the Broadband Service Router
Internet Group Management Protocol
IGMP Versions and Interoperability Requirements
IGMP Version Transition
Multicast Listener Discovery
MLD Versions and Interoperability Requirements
Source Specific Multicast Groups
Protocol Independent Multicast Sparse Mode (PIM-SM)
Ingress Multicast Path Management (IMPM) Enhancements
Multicast in the BSA
IGMP Snooping
IGMP/MLD Message Processing
IGMP Message Processing
MLD Message Processing
IGMP/MLD Filtering
Multicast VPLS Registration (MVR)
Layer 3 Multicast Load Balancing
IGMP State Reporter
IGMP Data Records
Transport Mechanism
HA Compliance
QoS Awareness
Hardware Support
IGMP Reporting Caveats
Multicast Support over Subscriber Interfaces in Routed CO Model
Hardware Support
Multicast Over IPoE
Per SAP Replication Mode
Per SAP Queue
IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
Per Subscriber Host Replication Mode
IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
Multicast Over PPPoE
IGMP Flooding Containment
IGMP/MLD Timers
IGMP/MLD Query Intervals
HQoS Adjustment
Host Tracking (HT) Considerations
HQoS Adjust Per Vport
Multi-Chassis Redundancy
Scalability Considerations
Redirection
Hierarchical Multicast CAC (H-MCAC)
MCAC Bundle Bandwidth Limit Considerations
Determining MCAC Policy in Effect
Multicast Filtering
Joining the Multicast Tree
Wholesale/Retail Requirements
QoS Considerations
Redundancy Considerations
Redirection Considerations
Configuring Triple Play Multicast Services with CLI
Configuring IGMP Snooping in the BSA
Enabling IGMP Snooping in a VPLS Service
With IGMPv3 Multicast Routers
With IGMPv1/2 Multicast Routers
Modifying IGMP Snooping Parameters
Modifying IGMP Snooping Parameters for a SAP or SDP
Configuring Static Multicast Groups on a SAP or SDP
Enabling IGMP Group Membership Report Filtering
Enabling IGMP Traffic Filtering
Configuring Multicast VPLS Registration (MVR)
Configuring IGMP, MKD, and PIM in the BSR
Enabling IGMP
Configuring IGMP Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Enabling MLD
Configuring MLD Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Configuring PIM
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Triple Play Multicast Command Reference
Command Hierarchies
MCAST Management Commands
Multicast Info Policy Bundle Commands
Triple Play Multicast Service Commands
Ingress Multicast Path Management Commands
Multicast Redirection
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Multicast Management Configuration Commands
Generic Commands
Multicast Management Commands
Bandwidth Policy Commands
Multicast Info Policy Commands
Chassis Level Commands
Multicast Redirection Commands
Forwarding Plane Commands
Triple Play Enhanced Subscriber Management
In This Section
Uniform RADIUS Server Configuration
RADIUS Server Configuration
Uniform RADIUS Server Configuration (Preferred)
Legacy RADIUS Server Configuration
RADIUS Authentication of Subscriber Sessions
RADIUS Authentication Extensions
Triple Play Network with RADIUS Authentication
RADIUS Authorization Extensions
Calling-Station-ID
Subscriber Session Timeout
Domain Name in Authentication
RADIUS Reply Message for PPPoE PAP/CHAP
SHCV Policy
radius-server-policy Retry Attempt Overview
AAA RADIUS Server Operation Status
AAA RADIUS Accounting Server Stickiness
AAA RADIUS Authentication Fallback Action
AAA Test User Account
Troubleshooting the RADIUS Server
Provisioning of Enhanced Subscriber Management (ESM) Objects
Provisioning IP Configuration of the Host
RADIUS Based Authentication in Wholesale Environment
Change of Authorization and Disconnect-Request
RADIUS-Based Accounting
RADIUS Accounting Terminating Cause
Accounting Modes Of Operation
Per Session Accounting
Caveats
RADIUS Session Accounting with PD as a Managed Route
No Host-Accounting
Host-Accounting Enabled
Reduction of Host Updates for Session Accounting Start and Stop
Accounting Interim Update Message Interval
CoA Triggered Accounting Interim Update
Class Attribute
User Name
Accounting-On and Accounting Off
RADIUS Accounting Message Buffering
Multiple Accounting Policies
Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
Enhanced Subscriber Management Overview
Enhanced Subscriber Management Basics
Standard and Enhanced Subscriber Management
Subscriber Management Definitions
Subscriber Identification Policy
Subscriber Identification String
Subscriber Profile
SLA Profile
Explicit Subscriber Profile Mapping
ESM for IPv6
Models
PPPoE Host
PPPoE RG
IPoE Host/RG
Setup
Behavior
Dual Stack
Router Advertisements (RA)
CoA and Disconnect-Request
Delegated-Prefix-Length
Order of Preference for DPL
DHCP Server Address Utilization and Delegated Prefix Length
DHCPv6 Relay Agent
Configuring a DHCPv6 Relay Agent
DHCPv6 Relay to Third Party DHCPv6 External Server
DHCPv6 Local Server
Dynamic Subscriber Host Processing
Dynamic Tables
Active Subscriber Table
SLA Profile Instance Table
Subscriber Host Table
DHCP Lease State Table
Enhanced Subscriber Management Entities
Instantiating a New Host
Packet Processing for an Existing Host
ESM Host Lockout
Functionality
ANCP and GSMP
ANCP
Static ANCP Management
Enhanced Subscriber Management (ESM) Dynamic ANCP
ANCP String
ANCP Persistency Support
General Switch Management Protocol Version 3 (GSMPv3)
DHCP Release Messages
DHCP Release
DHCP Client Mobility
DHCP Lease Control
Using Scripts for Dynamic Recognition of Subscribers
Python Language and Programmable Subscriber Configuration Policy (PSCP)
Determining the Subscriber Profile and SLA Profile of a Host
Determining the Subscriber Profile
Determining the SLA Profile
SLA-Based Egress QoS Marking
Auto-Sub ID
Sub-id Identifiers
Dual Stack Hosts
Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
PPPoA/PPPoEoA Considerations
Deployment Considerations
Caveats
Limiting Subscribers and Hosts on a SAP
Static Subscriber Hosts
QoS for Subscribers and Hosts
QoS Parameters in Different Profiles
QoS Policy Overrides
ESM Subscriber Hierarchical Traffic Control
Subscriber HQoS
Subscriber CFHP
ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
Broadband Network Gateway Application
Queue Determination and Scheduling
Weighted Scheduler Group
Queue and Subscriber Aggregate Rate Configuration and Adjustment
Frame Size, Rates, and Running Average Frame Expansion Ratio
Vport Determination and Evaluation
Applying Aggregate Rate Limit to a Vport
Applying a Scheduler Policy to a Vport
Signaling of Last Mile Encapsulation Type
Configuration Example
Subscriber Volume Statistics
IP (Layer 3) Volume Accounting
Separate IPv4 and IPv6 Counters
Configuring IP and IPv6 Filter Policies for Subscriber Hosts
IP Filter Attribute Format Details
Checking Filter Policy Details
ESM PPPoA/PPPoEoA
PPPoA
PPPoEoA
Hardware Support
Termination Points within 7x50
PPPoA Encapsulation
PPPoEoA Encapsulation
Encapsulation Summary
Concurrent Support for Different Service Types on the Same Port
Restrictions in Scaled ATM MDA Mode
QoS Implementation
Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
Per VP Shaping
ATM/IOM QoS Integration
Intermediate Node Rate Limit/Shaper
Provisioning Aspects
HQoS Combinations
ATM Rate Adjustment
Subscriber Instantiation Use Cases
Authentication
LUDB Access via Capture SAP
Encapsulation Autosensing
SAP Autoprovisioning
PPP Nodes and ppp-policy
MTU Considerations
PPP(oE) Session Antispoofing
Multi-Chassis Synchronization
Overview
Loss of Synchronization and Reconciliation
Subscriber Routed Redundancy Protocol (SRRP)
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
PPPoE MC Redundancy
Hardware Support
SRRP Considerations for PPPoE
SRRP Fact-Checks
State Synchronization
PPPoE Multi-chassis Synchronization (MCS) Model
Traffic Control and Redundant Interface
Subnet Assignment and Advertisement - Option ‘A’
Subnet Assignment and Advertisement - Option ‘B’
MSAP Considerations
Unnumbered Interface Support
Compatibility with MC-LAG
IPv6 Support
Considerations with Local DHCP Server
Redundant Interface Considerations
Routed Central Office (CO)
Layer 3 Subscriber Interfaces
DHCP Interactions
Routed CO for IES Service
Routed CO for VPRN Service
Wholesale Retail Routed CO
Wholesale Retail Model
Configuration and Applicability
Hub-and-Spoke Forwarding
Routed Subscriber Hosts
Static Configured IPv4 Managed Route
Static Configured IPv6 Managed Route
Dynamic BGP Peering
RIP Listener
RADIUS: Framed-Route and Framed-IPv6-Route
GRT Lookup and Routed CO in a VPRN
Dual Homing
Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
Steady-State Operation of Dual-homed Ring
Broken-Ring Operation and the Transition to this State
Transition from Broken to Closed Ring State
Provisioning Aspects and Error Cases
Dual Homing to Two BSR Nodes
MC Services
Routed CO Dual Homing
Redundant Interfaces
SRRP in Dual Homing
Synchronization
Wholesale-Retail Multi-Chassis Redundancy
SRRP and Multi-Chassis Synchronization
Dual Homing and ANCP
SRRP Enhancement
SRRP Fate Sharing
Fate Sharing Algorithm
SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
Subscriber Interface Routes (IPv4 and IPv6)
Managed Routes
Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
Activating SRRP State Tracking
SRRP in Conjunction with a PW in ESM Environment – Use Case
Group-monitor
Subscriber Override
Dual Stack Lite
IP-in-IP
Configuring Dual Stack Lite
L2TP over IPv6
L2TP Tunnel RADIUS Accounting
Accounting Packets List
RADIUS Attributes Value Considerations
Other Optional RADIUS Attributes
RADIUS VSA to Enable L2TP Tunnel Accounting
MLPPP on the LNS Side
RADIUS Route Download
Managed SAP (MSAP)
Sticky MSAP
ESM Identification Process
SAP-ID ESM Identifier
DSLAM-ID
Default-Subscriber
Multicast Management
Subscriber Mirroring
Volume and Time Based Accounting
Metering
Categories Map and Categories
Quota Consumption
Minimum Credit Control Quota Values
RADIUS VSA Alc-Credit-Control-Quota
Credit Negotiation Mechanisms
Action on Credit Exhaustion
Action on Error-Conditions
Applicability of Volume and Time Based Accounting
Subscriber Host Idle Timeout
Web Authentication Protocol (WPP)
WPP Configurations
WPP Triggered Host Creation
LUDB Support For WPP
WPP Multi-Chassis Redundancy Support
One-time HTTP Redirection Overview
ESM over MPLS Pseudowires
Encapsulation
ESM Configuration with PW-Ports and PW-SAPs
QoS Support
Bandwidth Control at PW-Port Level via Vport
Last Mile Shaping
BNG Redundancy with ESM over Pseudowire
Epipe-Based Aggregation Service
Sample Configuration on Master BNG
Sample Configuration on Slave BNG
Sample Configuration on A-PE
VPLS Based Aggregation Service
Sample BNG Redundancy (SRRP/MCS) Configuration with VPLS Service on A-PE
A-PE configuration with VPLS Aggregation Service (A-PE1)
A-PE Configuration with VPLS Aggregation Service (A-PE2)
Show Commands Related to Active/Standby Pseudowire on Dual BNGs
Logical Link Identifier (LLID)
Open Authentication Model for DHCP and PPPoE Hosts
Terminology
LUDB and RADIUS Access Models
No Authentication
LUDB Only Access
LUDB Access via DHCPv4 Server
RADIUS Only Access
Consecutive Access to LUDB and RADIUS
RADIUS Fallback
Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
Terminology
Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
Default Gateway in IPv4 Flexible Addressing
IPv4 Subnet Sharing
IPv4 Subnet Mask Auto-Generation
Local-proxy-arp and arp-populate
Gi-address Configuration Consideration
PPPoE Considerations
IPoEv6 Considerations
General Configuration Guidelines for Flexible IP Address Assignment
Caveats
uRPF for Subscriber Management
IPoE Sessions
Enabling IPoE Sessions
IPoE Session Authentication
IPoE Session Accounting
IPoE Session Mid-Session Changes
IPoE Session Termination
Limiting the Number of IPoE sessions
SAP Session Index
Resiliency
Notes
Configuration Steps
IPoE Session Migration
Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
Data-triggered Subscriber Management
Provisioning Data-triggered ESM
Authentication and Host Creation
DoS Protection
RADIUS Subscriber Services
Subscriber Service Building Blocks
1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
2. RADIUS Python Interface
3. Python Script
4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
Subscriber Services RADIUS Vendor Specific Attributes (VSAs)
Subscriber Service RADIUS Accounting
Accounting Only Subscriber Service
QoS Override Subscriber Service
PCC Rules Subscriber Service
PCC Rules
PCC rule instantiation
PCC Rules as a Subscriber Service
Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule Subscriber Services on the Parent RADIUS Accounting Volume Counters
PCC Rule Subscriber Service Activation Failures
Combined Subscriber Services
Subscriber Services Python API
Common subscriber services Python API
Subscriber Service QoS Override Python API
Subscriber Service PCC Rules Python API
Operational commands
Show Commands
Debug Commands
Resource Monitoring
Residential Gateway Replacement
Configuring Enhanced Subscriber Management with CLI
Configuring RADIUS Authentication of DHCP Sessions
TCP MSS adjustment for ESM Hosts
Configuring Enhanced Subscriber Management
Basic Configurations
Subscriber Interface Configuration
Configuring Enhanced Subscriber Management Entities
Configuring a Subscriber Identification Policy
Configuring a Subscriber Profile
Configuring an SLA Profile
Configuring Explicit Mapping Entries
Routed CO with Basic Subscriber Management Features
Applying the Profiles and Policies
SLA Profile
Configuring Dual Homing
SHCV Policies
SHCV Policy
Subscriber Identification Policy
Subscriber Profile
Subscriber Management Command Reference
Command Hierarchies
ANCP Commands
GSMP Configuration Commands
Authentication Policy Commands
RADIUS Accounting Policy Commands
RADIUS Route Download Commands
Diameter Policy Commands
AAA Diameter Peer Policy Commands
Subscriber Management Diameter Application Policy Commands
Category Map and Credit Control Policy Commands
Filter Commands
BGP Peering Policy Commands
Explicit Subscriber Mapping Commands
IGMP Policy Command
Host Lockout Commands
Host Tracking Policy Commands
PIM Policy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Auto-Generated Subscriber Identification Key Commands
Auto-Generated Subscriber Identification Key Service Commands
Subscriber MCAC Policy Commands
Subscriber Profile Commands
IPoE Session Policy Commands
Multi-Chassis Redundancy Commands
SHCV Policy Commands
Subscriber Management Service Commands
VPLS Subscriber Management Configuration Commands
Managed SAP Policy Commands
VPRN Subscriber Interface Configuration Commands
VPRN Subscriber Interface Group Interface Commands
IES Subscriber Management Configuration Commands
IES Subscriber Interface Commands
IES Subscriber Interface Group Interface Commands
Service Subscriber Interface, Group Interface IPoE Command
RIP Commands
VPort Commands
Redundant Interface Commands
Wireless Portal Protocol (WPP) Commands
Multiple PPoE Session QoS Commands
Multicast Listener Discovery (MLD) Commands
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Triple Play Subscriber Management Configuration Commands
Triple Play Subscriber Management Configuration Commands
Generic Commands
ANCP and GSMP Commands
RADIUS Policy Commands
RADIUS Route Download Commands
IGMP Policy Commands
PIM Policy Commands
Managed SAP Policy Commands
Multi-Chassis Redundancy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Subscriber Profile Commands
Explicit Subscriber Mapping Commands
Subscriber Management Service Commands
Subscriber Management Service Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
In This Section
Overview
Terminology and Abbreviations
Restrictions
Deploying Oversubscribed Multi-Chassis Redundancy
Resource Exhaustion Notification and Simultaneous Failures
Resource Monitoring
Warm-Standby Mode Of Operation
IPoE vs PPPoE
Persistency
Routing and Redundant Interface in OMCR
Revertive Behavior
Service Restoration Times
Processing of the SRRP Flaps
Accounting
Configuration Guidelines
Troubleshooting Commands
OMCR Command Reference
Command Hierarchies
OMCR Configuration Commands
OMCR Configuration Commands
WIFI Aggregation and Offload
In This Section
WIFI Aggregation and Offload Overview
Layer 2 over Soft-GRE Tunnels
Encapsulation
Data Path
Tunnel Level Egress QoS
Operational Commands
Authentication
EAP-Based Authentication
RADIUS Proxy
RADIUS Proxy — Server Load-Balancing
RADIUS Proxy — Cache Lookup
RADIUS Proxy — Accounting
Portal Authentication
Address Assignment
WIFI Mobility Anchor
Wholesale
CGN on WLAN-GW
Lawful Intercept on WLAN-GW
WLAN Location Enhancements
Triggered Interim Accounting-Updates
Operational Support
WIFI Offload – 3G/4G Interworking
Signaling Call Flow
GTP Setup with EAP Authentication
APN Resolution
Configuration Objects
RADIUS Support
QoS Support with GTP
Selective Breakout
Location Notification in S2a
WLAN Location over S2a
Cellular Location over S2a
Cellular Location over Gn Interface
Operational Support
Operational Commands
show router wlan-gw mobile-gateway
show router 300 wlan-gw mgw-address-cache
show subscriber-mgmt wlan-gw gtp-session detail
show subscriber-mgmt wlan-gw mgw-profile "default"
show subscriber-mgmt wlan-gw gtp-statistics
Migrant User Support
Migrant User Support with Portal-Authentication
DHCP
Authentication and Forwarding
Migrant User Support with EAP Authentication
Data Triggered Subscriber Creation
Distributed Subscriber Management (DSM)
DHCP
Authentication and Accounting
DSM Data-Plane
IP Filtering
Policing
Lawful Intercept (LI)
Data-Triggered UE Creation
Idle-Timeout and Session-Timeout Management
Operational Commands
Pool Manager
DHCPv6 and SLAAC
Call Trace
Distributed RADIUS Proxy
Enhanced Subscriber Management
Distributed Subscriber Management
Operational Commands
WLAN-GW 1:1 Active-Backup Redundancy
DHCP Server Redundancy
Subscriber Creation after Switchover
WLAN-GW Triggered Stateless Redundancy (N:1)
AP Triggered Stateless WLAN-GW Redundancy (N:1)
IPv6-only Access
IPv6 GRE Tunnels
IPv6 Client-Side RADIUS Proxy
Dual-Stack UEs over WLAN-GW
SLAAC Prefix Assignment
DHCPv6 IA_NA Assignment
Migrant User Support
Accounting
Layer 2 Wholesale
VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
Soft-L2TPv3 Tunnels
WiFi Command Reference
Command Hierarchies
WLAN-GW Commands
Subscriber Management BRG Commands
DSM Call Trace Commands
WLAN-GW Service Commands
RADIUS Server and Proxy Commands
LUDB Matching for RADIUS Proxy Cache
Data Plane Related Commands
Port Policy Commands
WIFI Aggregation and Offload – Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
WIFI Aggregation and Offload Commands
WIFI Aggregation and Offload Commands
Generic Commands
WLAN-GW Commands
DSM Call Trace Commands
RADIUS Server Policy Commands
CLI Command Description for RADIUS Server
CLI Command Description for RADIUS Proxy Server
LUDB Matching of RADIUS Proxy Cache Commands
WLAN-GW-Group Commands
Port Policy Commands
WLAN-GW Group Interface Commands
Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
virtual Residential Gateway
In This Section
virtual Residential Gateway Overview
Access Modes
Home Context on the vRGW
Implicit Home Authentication
Explicit Home Authentication
Change of Configuration
Home Lifetime
Device Context on the vRGW
Dynamic Configuration Changes
Per-Home Pool Management and L2-Aware NAT
Sticky IP Addresses
Managed Static IPv4 Addresses
DMZ
IPv6
QoS and Filter Support
Data-Triggered Authentication
BRG and vRG Caveats
vRGW Command Reference
Command Hierarchies
Subscriber Management BRG Profile Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Command Descriptions
Generic Commands
vRGW Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Dynamic Data Services
In This Section
Introduction to Dynamic Data Services
RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
Data-Triggered Dynamic Data Services
Data Trigger
Dynamic Services Data Trigger Capture SAP
RADIUS Authentication
Local Authentication
Data-Triggered Dynamic Service Provisioning
Control Plane Protection
Debugging
RADIUS Triggered Dynamic Data Services Command Reference
Command Hierarchies
RADIUS Triggered Dynamic Data Services Commands
Basic System Command
Show Commands
Tools Commands
Clear Commands
Debug Commands
RADIUS Triggered Dynamic Data Services Commands
Configuration Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
Diameter and Diameter Applications
In This Section
Restrictions
Terminology
3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
Policy Management via Gx Interface
Gx Protocol
Policy Assignment Models
IP-CAN Session – Gx Session Identification
User Identification in PCRF
NAS-Port-Id as Subscription-Id
Gx Interface and ESM Subscriber Instantiation
Gx and Dual-Stack Hosts
Gx and PPPoEv6-DHCP
Gx Fallback Function
Gx CCR-I Replays
Gx CCR-t Replays
RAR and CCR-t Replay
CCR-t Replay And Multi-Chassis Redundancy
CCR-t Replay And High Availability
Automatic Updates for IP Address Allocation/De-allocation
DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
Gx, ESM and AA
ESM Subscriber-host vs AA Subscriber
AA Subscriber State
Policy Management via Gx
Gx-Based Overrides
Instantiation of Gx Overrides
HTTP Redirect Override
Removal of Overrides
Examples of Gx Overrides
PCC Rules
PCC Rule Concept
PCC Rule Instantiation
Base QoS-Policy and Base Filter
Generic Policy Sharing and Rule Sharing
PCC Rule Name and PCC Rule Removal
Gx Rule Ordering
PCC Rule Override
Aggregation of IP-Criterion
Combining IPv4 and IPv6 Entries within the Rule
Gx Rules with Multiple Actions and Action Sharing
Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
RADIUS and Gx Interaction
Bulk Changes via CLI while Gx Rules are Active
PCC Rule Direction
Action
Rate-Limiting Action (Ingress, Egress)
Dynamic Policers and Queue Mappings
Dynamic Policer Rates and Accounting Statistics
Forwarding-Class Change (Ingress, Egress)
QoS Forward (Ingress and Egress)
Next-Hop Redirect (Ingress)
HTTP Redirect (Ingress)
Filter Forward/Drop (Ingress and Egress)
Service Gating Function
PCC Rule Provisioning Example
Operational Aspects
PCC Rules and Capacity Planning
PCC Rule Scaling Example
NAS Filter Inserts
Examples of NAS Entry Inserts
Error Handing and Rule Failure Reporting in ESM
AVP Decoding Failure in Gx
ESM Rule-Installation Failure
Failure Reporting in AA
Summary of Failure Reporting
Usage-Monitoring and Reporting
ESM Usage-Monitoring - What is Being Monitored
AA Usage-Monitoring – What is Being Monitored
Requesting Usage-Monitoring in ESM
Reporting Accumulated Usage
Disabling Usage-Monitoring
Usage-Monitoring for PCC Rules
Session Termination
Usage-Monitoring Examples
Event Triggers
Subscriber Verification
Subscriber Termination
Mobility Support in WiFi
Redundancy
Persistency and Origin-State-ID AVP
Overload Protection
Diameter NASREQ Application
Sample Configuration Steps
Diameter Redundancy
Diameter Peer Level Redundancy
Diameter Multi-Chassis Redundancy
Diameter Proxy Model General Operational Principles
Diameter Proxy Activity Selection
Synchronization and MCS
Retransmissions
Retransmissions and the T-bit
Diameter Proxy Role
Diameter Proxy and CC-Request-Number AVP
Stateless Diameter Proxy
Switchover Scenarios
Log/Trap Generation Caused by Diameter Proxy State Change
Switchover Update Event (CCR-u)
Isolated Chassis
Diameter Identities
High Availability
Gx Specific Behavior
Diameter Debugging
Python Script Support for ESM
In This Chapter
Python Script Support for ESM
Python in SR-OS Overview
Python Changes
Python Support in sub-ident-policy
Configuration
Operator Debugging
Python Scripts
Sample Python Scripts
Example
Example
Example
Limitations
RADIUS Script Policy Overview
Python RADIUS API
Sample Script
Python Policy Overview
Python Policy – RADIUS API
Python Policy – DHCPv4 API
Python Policy – DHCPv6 API
Python Policy – Diameter API
Python Policy – DHCP Transaction Cache API
Python for PPPoE API
Python API for PPP Packet
Python API for PPP PAP
Python API for PPP CHAP
Python ESM API
Python Cache Support
Applying a Python Policy
Python Script Protection
Tips and Tricks
Python Command Reference
Command Hierarchies
Python Policy Commands
Python Script Commands
Services Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Command Descriptions
Python Configuration Commands
Global Commands
Python Policy Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Python RADIUS Command Reference
Command Hierarchies
Command Descriptions
Generic Commands
Script Commands
Standards and Protocol Support
Customer documentation and product support
Getting Started
About This Guide
Alcatel-Lucent SR OS Services Configuration Process
Introduction to Triple Play
In This Section
Alcatel-Lucent’s Triple Play Service Delivery Architecture
Introduction to Triple Play
Blueprint for Optimizing Triple Play Service Infrastructures
Architectural Foundations
Optimizing Triple Play Service Infrastructures
Distributed Service Edges
Service Differentiation, QoS Enablement
Virtual MAC Subnetting for VPLS
Services
Service Types
Service Policies
Alcatel-Lucent Service Model
Introduction
Service Entities
Customers
Service Access Points (SAPs)
SAP Encapsulation Types and Identifiers
Ethernet Encapsulations
SAP Considerations
Service Distribution Points (SDPs)
SDP Binding
Spoke and Mesh SDPs
SDP Encapsulation Types
GRE
MPLS
SDP Keepalives
Epipe Service Overview
VPLS Service Overview
Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
Residential Split Horizon Groups
IES Service Overview
IP Interface
VPRN Service Overview
Deploying and Provisioning Services
Phase 1: Core Network Construction
Phase 2: Service Administration
Phase 3: Service Provisioning
Configuration Notes
General
Configuring Triple Play Services with CLI
Configuring VPLS Residential Split Horizon Groups
Configuring Static Hosts
BNG Learning IP-Only Static Host’s MAC Address
Static Host Learning the IPv6 Default Gateway Address
Configuring Static Hosts on an VPLS SAP
Configuring Static Hosts on an IES SAP
Configuring Static Hosts on an VPRN SAP
Triple Play Services Command Reference
Command Hierarchies
Generic VPLS Triple Play Commands
Generic IES Triple Play Commands
Service DHCP and Anti-Spoof Filtering Commands
Triple Play ARP Commands
Triple Play Multicast Commands
Show Commands
Clear Commands
Tools Commands
Command Descriptions
Global Commands
Service Commands
VPLS SAP ATM Commands
Service Billing Commands
SAP Subscriber Management Commands
Multicast Commands
DHCP and Anti-Spoofing Commands
Filter and QoS Policy Commands
VPLS and IES SDP and SAP Commands
DHCP Commands
Egress Multicast Group Commands
Interface Commands
Interface IPv6 Commands
Show Commands
IGMP Snooping Show Commands
Clear Commands
Debug Commands
Tools Commands
DHCP Management
In This Chapter
DHCP Principles
DHCP Features
DHCP Relay
DHCPv4 Relay Proxy
Subscriber Identification Using Option 82 Field
Trusted and Untrusted
DHCP Snooping
DHCP Lease State Table
DHCP and Layer 3 Aggregation
DHCPv4 Snooping
DHCPv6 Snooping
Local DHCP Servers
Overview
Local DHCP Server Support
DHCPv6
DHCPv6 Relay Agent
DHCPv6 Prefix Options
Neighbor Resolution via DHCPv6 Relay
DHCPv6 Lease Persistency
Local Proxy Neighbor Discovery
IPv6oE Hosts Behind Bridged CPEs
IPv6 Link-Address Based Pool Selection
IPv6 Address/Prefix Stickiness
IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
Host Connectivity Checks for IPv6
Lease Query
DHCPv6 to Server Option
Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
DHCP Caching
Flexible Creation of DHCPv4/6 Host Parameters Utilizing Python and Internal Caching
Python DTC Variables and API
DTC Debugging Facility
Virtual Subnet for DHCPv4 Hosts
Address Reservation for Sticky Leases
Proxy DHCP Server
Local DHCP Servers
Terminology
Overview
DHCP Lease Synchronization
Intercommunication Link Failure Detection
DHCP Server Failover States
Lease Time Synchronization
Maximum Client Lead Time (MCLT)
Sharing IPv4 Address-Range or IPv6 Prefix Between Redundant 7x50 DHCP Servers in Access-Driven Mode
Fast-Switchover of IP Address/Prefix Delegation For Remote IP Address/Prefix Range
DHCP Server Synchronization and Local PPPoX Pools
Local Address Assignment
Stateless Address Auto-configuration
SLAAC
In This Chapter
Stateless Address Auto-configuration (SLAAC) Management
SLAAC Principles
Configuration Overview
Router-Solicit Trigger
SLAAC Address Assignment
Static SLAAC Prefix Assignment
Dynamic SLAAC Prefix Assignment
Configuring DHCP with CLI
Common Configuration Tasks
Enabling DHCP Snooping
Configuring Option 82 Handling
Enabling DHCP Relay
Configuring Local User Database Parameters
Triple Play DHCP Command Reference
Command Hierarchies
Global DHCP Commands
Router DHCP Commands
VPLS DHCP Commands
IES DHCP Commands
VPRN DHCP Commands
VPRN DHCP Subscriber Interface Commands
IES/VPRN IPv6-DHCP6 Commands
Local User Database Commands
IPoE Commands
PPP Commands
Show Commands
Tools Commands
Clear Commands
DHCP Debug Commands
Command Descriptions
Triple Play DHCP Configuration Commands
Global Commands
System Commands
DHCP Configuration Commands
Service Commands
Local User Database Commands
MLPPP on LNS Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Point-to-Point Protocol over Ethernet (PPPoE) Management
In This Chapter
PPPoE
PPPoE Authentication and Authorization
General Flow
RADIUS
Local User Database Directly Assigned to PPPoE Node
Subscriber per PPPoE Session Index
Local DHCP Server with Local User Database
Multiple Sessions Per MAC Address
Private Retail Subnets
IPCP Subnet Negotiation
Numbered WAN Support for Layer 3 RGs
IES as Retail Service for PPPoE Host
Unnumbered PPPoX
MLPPPoE, MLPPP(oE)oA with LFI on LNS
Terminology
LNS MLPPPoX
MLPPP Encapsulation
MLPPPoX Negotiation
Enabling MLPPPoX
Link Fragmentation and Interleaving (LFI)
MLPPPoX Fragmentation, MRRU and MRU Considerations
LFI Functionality Implemented in LNS
Last Mile QoS Awareness in the LNS
BB-ISA Processing
LNS-LAC Link
AN-RG Link
Home Link
Optimum Fragment Size Calculation by LNS
Encapsulation Based Fragment Size
Fragment Size Based on the Max Transmission Delay
Selection of the Optimum Fragment Length
Upstream Traffic Considerations
Multiple Links MLPPPoX With No Interleaving
MLPPPoX Session Support
Session Load Balancing Across Multiple BB-ISAs
BB-ISA Hashing Considerations
Last Mile Rate and Encapsulation Parameters
Link Failure Detection
CoA Support
Accounting
Filters and Mirroring
PTA Considerations
QoS Considerations
Dual-Pass
Traffic Prioritization in LFI
Shaping Based on the Last Mile Wire Rates
Downstream Bandwidth Management on Egress Port
Sub/Sla-Profile Considerations
Example of MLPPPoX Session Setup Flow
Other Considerations
Configuration Notes
PPP Command Reference
Command Hierarchies
PPPoE Policy Configuration Commands
PPPoE Service Commands
PPPoE Local User Database Commands
MLPPP on LNS Commands
Show Commands
Command Descriptions
PPP Configuration Commands
PPP/PPPoE Service Commands
RADIUS Attribute Commands
Show Commands
Clear Commands
Debug Commands
L2TP
In This Chapter
L2TP
Terminology
LAC DF Bit
Handling L2TP Tunnel/Session Initialization Failures
L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
Peer Blacklist
Tunnel Blacklists
Tunnel Timeout Due to the Peer IP Address Change
Tunnel Selection Mechanism
Tunnel Probing
Controlling the Size of Blacklist
Displaying the Content of a Blacklist
Generating Trap when the Blacklist is Full
Premature Removal of Blacklisted Entries
Manual Purging of Entities within the Blacklist
CDN Result Code Overwrite
L2TP LAC VPRN
Per-ISP Egress L2TP DSCP Reclassification
L2TP Tunnel RADIUS Accounting
Accounting Packets List
RADIUS Attributes Value Considerations
Other Optional RADIUS Attributes
RADIUS VSA to Enable L2TP Tunnel Accounting
MLPPP on the LNS Side
LNS Reassembly
L2TP Command Reference
Command Hierarchies
L2TP Configuration Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
L2TP Configuration Commands
Global Commands
L2TP Tunnel Account Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Debug Commands
Triple Play Security
In This Chapter
Triple Play Security Features
Anti-Spoofing Filters
Anti-spoofing Filter Types
Filtering Packets
Layer 2 Triple Play Security Features
MAC Pinning
MAC Protection
DoS Protection
Subscriber Aggregation Network
Network Control Filtering
VPLS Redirect Policy
ARP Handling
ARP Reply Agent
Dynamic ARP Table Population
Local Proxy ARP
Web Portal Redirect
Configuring Triple Play Security with CLI
Common Configuration Tasks
Configuring Anti-Spoofing Filters
Configuring Triple Play Security features
Configuring MAC Pinning
Configuring MAC Protection
Configuring VPLS Redirect Policy
Configuring ARP Handling
Configuring Proxy ARP
Configuring Local Proxy ARP
Configuring ARP Reply Agent in a VPLS Service
Configuring Remote Proxy ARP
Configuring Automatic ARP Table Population in an IES or VPRN Interface
Configuring CPU Protection
Configuring Web Portal Redirect
Triple Play Security Command Reference
Command Hierarchies
Anti-Spoofing Commands
Layer 2 Security Commands
ARP Handling Commands
Tools Commands
Command Descriptions
Triple Play Security Configuration Commands
Triple Play Anti-Spoofing Commands
Triple Play Layer 2 Security Commands
ARP Handling Commands
Show Commands
Tools Commands
Triple Play Multicast
In This Chapter
Introduction to Multicast
Multicast in the Broadband Service Router
Internet Group Management Protocol
IGMP Versions and Interoperability Requirements
IGMP Version Transition
Multicast Listener Discovery
MLD Versions and Interoperability Requirements
Source Specific Multicast Groups
Protocol Independent Multicast Sparse Mode (PIM-SM)
Ingress Multicast Path Management (IMPM) Enhancements
Multicast in the BSA
IGMP Snooping
IGMP/MLD Message Processing
IGMP Message Processing
MLD Message Processing
IGMP/MLD Filtering
Multicast VPLS Registration (MVR)
Layer 3 Multicast Load Balancing
IGMP State Reporter
IGMP Data Records
Transport Mechanism
HA Compliance
QoS Awareness
Hardware Support
IGMP Reporting Caveats
Multicast Support over Subscriber Interfaces in Routed CO Model
Hardware Support
Multicast Over IPoE
Per SAP Replication Mode
Per SAP Queue
IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
Per Subscriber Host Replication Mode
IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
Multicast Over PPPoE
IGMP Flooding Containment
IGMP/MLD Timers
IGMP/MLD Query Intervals
HQoS Adjustment
Host Tracking (HT) Considerations
HQoS Adjust Per Vport
Multi-Chassis Redundancy
Scalability Considerations
Redirection
Hierarchical Multicast CAC (H-MCAC)
MCAC Bundle Bandwidth Limit Considerations
Determining MCAC Policy in Effect
Multicast Filtering
Joining the Multicast Tree
Wholesale/Retail Requirements
QoS Considerations
Redundancy Considerations
Redirection Considerations
Configuring Triple Play Multicast Services with CLI
Configuring IGMP Snooping in the BSA
Enabling IGMP Snooping in a VPLS Service
With IGMPv3 Multicast Routers
With IGMPv1/2 Multicast Routers
Modifying IGMP Snooping Parameters
Modifying IGMP Snooping Parameters for a SAP or SDP
Configuring Static Multicast Groups on a SAP or SDP
Enabling IGMP Group Membership Report Filtering
Enabling IGMP Traffic Filtering
Configuring Multicast VPLS Registration (MVR)
Configuring IGMP, MKD, and PIM in the BSR
Enabling IGMP
Configuring IGMP Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Enabling MLD
Configuring MLD Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Configuring PIM
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Triple Play Multicast Command Reference
Command Hierarchies
MCAST Management Commands
Multicast Info Policy Bundle Commands
Triple Play Multicast Service Commands
Ingress Multicast Path Management Commands
Multicast Redirection
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Multicast Management Configuration Commands
Generic Commands
Multicast Management Commands
Bandwidth Policy Commands
Multicast Info Policy Commands
Chassis Level Commands
Multicast Redirection Commands
Forwarding Plane Commands
Triple Play Enhanced Subscriber Management
In This Section
Uniform RADIUS Server Configuration
RADIUS Server Configuration
Uniform RADIUS Server Configuration (Preferred)
Legacy RADIUS Server Configuration
RADIUS Authentication of Subscriber Sessions
RADIUS Authentication Extensions
Triple Play Network with RADIUS Authentication
RADIUS Authorization Extensions
Calling-Station-ID
Subscriber Session Timeout
Domain Name in Authentication
RADIUS Reply Message for PPPoE PAP/CHAP
SHCV Policy
radius-server-policy Retry Attempt Overview
AAA RADIUS Server Operation Status
AAA RADIUS Accounting Server Stickiness
AAA RADIUS Authentication Fallback Action
AAA Test User Account
Troubleshooting the RADIUS Server
Provisioning of Enhanced Subscriber Management (ESM) Objects
Provisioning IP Configuration of the Host
RADIUS Based Authentication in Wholesale Environment
Change of Authorization and Disconnect-Request
RADIUS-Based Accounting
RADIUS Accounting Terminating Cause
Accounting Modes Of Operation
Per Session Accounting
Caveats
RADIUS Session Accounting with PD as a Managed Route
No Host-Accounting
Host-Accounting Enabled
Reduction of Host Updates for Session Accounting Start and Stop
Accounting Interim Update Message Interval
CoA Triggered Accounting Interim Update
Class Attribute
User Name
Accounting-On and Accounting Off
RADIUS Accounting Message Buffering
Multiple Accounting Policies
Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
Enhanced Subscriber Management Overview
Enhanced Subscriber Management Basics
Standard and Enhanced Subscriber Management
Subscriber Management Definitions
Subscriber Identification Policy
Subscriber Identification String
Subscriber Profile
SLA Profile
Explicit Subscriber Profile Mapping
ESM for IPv6
Models
PPPoE Host
PPPoE RG
IPoE Host/RG
Setup
Behavior
Dual Stack
Router Advertisements (RA)
CoA and Disconnect-Request
Delegated-Prefix-Length
Order of Preference for DPL
DHCP Server Address Utilization and Delegated Prefix Length
DHCPv6 Relay Agent
Configuring a DHCPv6 Relay Agent
DHCPv6 Relay to Third Party DHCPv6 External Server
DHCPv6 Local Server
Dynamic Subscriber Host Processing
Dynamic Tables
Active Subscriber Table
SLA Profile Instance Table
Subscriber Host Table
DHCP Lease State Table
Enhanced Subscriber Management Entities
Instantiating a New Host
Packet Processing for an Existing Host
ESM Host Lockout
Functionality
ANCP and GSMP
ANCP
Static ANCP Management
Enhanced Subscriber Management (ESM) Dynamic ANCP
ANCP String
ANCP Persistency Support
General Switch Management Protocol Version 3 (GSMPv3)
DHCP Release Messages
DHCP Release
DHCP Client Mobility
DHCP Lease Control
Using Scripts for Dynamic Recognition of Subscribers
Python Language and Programmable Subscriber Configuration Policy (PSCP)
Determining the Subscriber Profile and SLA Profile of a Host
Determining the Subscriber Profile
Determining the SLA Profile
SLA-Based Egress QoS Marking
Auto-Sub ID
Sub-id Identifiers
Dual Stack Hosts
Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
PPPoA/PPPoEoA Considerations
Deployment Considerations
Caveats
Limiting Subscribers and Hosts on a SAP
Static Subscriber Hosts
QoS for Subscribers and Hosts
QoS Parameters in Different Profiles
QoS Policy Overrides
ESM Subscriber Hierarchical Traffic Control
Subscriber HQoS
Subscriber CFHP
ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
Broadband Network Gateway Application
Queue Determination and Scheduling
Weighted Scheduler Group
Queue and Subscriber Aggregate Rate Configuration and Adjustment
Frame Size, Rates, and Running Average Frame Expansion Ratio
Vport Determination and Evaluation
Applying Aggregate Rate Limit to a Vport
Applying a Scheduler Policy to a Vport
Signaling of Last Mile Encapsulation Type
Configuration Example
Subscriber Volume Statistics
IP (Layer 3) Volume Accounting
Separate IPv4 and IPv6 Counters
Configuring IP and IPv6 Filter Policies for Subscriber Hosts
IP Filter Attribute Format Details
Checking Filter Policy Details
ESM PPPoA/PPPoEoA
PPPoA
PPPoEoA
Hardware Support
Termination Points within 7x50
PPPoA Encapsulation
PPPoEoA Encapsulation
Encapsulation Summary
Concurrent Support for Different Service Types on the Same Port
Restrictions in Scaled ATM MDA Mode
QoS Implementation
Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
Per VP Shaping
ATM/IOM QoS Integration
Intermediate Node Rate Limit/Shaper
Provisioning Aspects
HQoS Combinations
ATM Rate Adjustment
Subscriber Instantiation Use Cases
Authentication
LUDB Access via Capture SAP
Encapsulation Autosensing
SAP Autoprovisioning
PPP Nodes and ppp-policy
MTU Considerations
PPP(oE) Session Antispoofing
Multi-Chassis Synchronization
Overview
Loss of Synchronization and Reconciliation
Subscriber Routed Redundancy Protocol (SRRP)
SRRP Messaging
SRRP and Multi-Chassis Synchronization
SRRP Instance
SRRP Instance MCS Key
Containing Service Type and ID
Containing Subscriber IP Interface Name
Subscriber Subnet Information
Containing Group IP Interface Information
Remote Redundant IP Interface Mismatch
Remote Sending Redundant IP Interface Unavailable
Remote SRRP Advertisement SAP Non-existent
Remote Sending Local Receive SRRP Advertisement SAP Unavailable
Local and Remote Dual Master Detected
Subscriber Subnet Owned IP Address Connectivity
Subscriber Subnet SRRP Gateway IP Address Connectivity
Receive SRRP Advertisement SAP and Anti-Spoof
PPPoE MC Redundancy
Hardware Support
SRRP Considerations for PPPoE
SRRP Fact-Checks
State Synchronization
PPPoE Multi-chassis Synchronization (MCS) Model
Traffic Control and Redundant Interface
Subnet Assignment and Advertisement - Option ‘A’
Subnet Assignment and Advertisement - Option ‘B’
MSAP Considerations
Unnumbered Interface Support
Compatibility with MC-LAG
IPv6 Support
Considerations with Local DHCP Server
Redundant Interface Considerations
Routed Central Office (CO)
Layer 3 Subscriber Interfaces
DHCP Interactions
Routed CO for IES Service
Routed CO for VPRN Service
Wholesale Retail Routed CO
Wholesale Retail Model
Configuration and Applicability
Hub-and-Spoke Forwarding
Routed Subscriber Hosts
Static Configured IPv4 Managed Route
Static Configured IPv6 Managed Route
Dynamic BGP Peering
RIP Listener
RADIUS: Framed-Route and Framed-IPv6-Route
GRT Lookup and Routed CO in a VPRN
Dual Homing
Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
Steady-State Operation of Dual-homed Ring
Broken-Ring Operation and the Transition to this State
Transition from Broken to Closed Ring State
Provisioning Aspects and Error Cases
Dual Homing to Two BSR Nodes
MC Services
Routed CO Dual Homing
Redundant Interfaces
SRRP in Dual Homing
Synchronization
Wholesale-Retail Multi-Chassis Redundancy
SRRP and Multi-Chassis Synchronization
Dual Homing and ANCP
SRRP Enhancement
SRRP Fate Sharing
Fate Sharing Algorithm
SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
Subscriber Interface Routes (IPv4 and IPv6)
Managed Routes
Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
Activating SRRP State Tracking
SRRP in Conjunction with a PW in ESM Environment – Use Case
Group-monitor
Subscriber Override
Dual Stack Lite
IP-in-IP
Configuring Dual Stack Lite
L2TP over IPv6
L2TP Tunnel RADIUS Accounting
Accounting Packets List
RADIUS Attributes Value Considerations
Other Optional RADIUS Attributes
RADIUS VSA to Enable L2TP Tunnel Accounting
MLPPP on the LNS Side
RADIUS Route Download
Managed SAP (MSAP)
Sticky MSAP
ESM Identification Process
SAP-ID ESM Identifier
DSLAM-ID
Default-Subscriber
Multicast Management
Subscriber Mirroring
Volume and Time Based Accounting
Metering
Categories Map and Categories
Quota Consumption
Minimum Credit Control Quota Values
RADIUS VSA Alc-Credit-Control-Quota
Credit Negotiation Mechanisms
Action on Credit Exhaustion
Action on Error-Conditions
Applicability of Volume and Time Based Accounting
Subscriber Host Idle Timeout
Web Authentication Protocol (WPP)
WPP Configurations
WPP Triggered Host Creation
LUDB Support For WPP
WPP Multi-Chassis Redundancy Support
One-time HTTP Redirection Overview
ESM over MPLS Pseudowires
Encapsulation
ESM Configuration with PW-Ports and PW-SAPs
QoS Support
Bandwidth Control at PW-Port Level via Vport
Last Mile Shaping
BNG Redundancy with ESM over Pseudowire
Epipe-Based Aggregation Service
Sample Configuration on Master BNG
Sample Configuration on Slave BNG
Sample Configuration on A-PE
VPLS Based Aggregation Service
Sample BNG Redundancy (SRRP/MCS) Configuration with VPLS Service on A-PE
A-PE configuration with VPLS Aggregation Service (A-PE1)
A-PE Configuration with VPLS Aggregation Service (A-PE2)
Show Commands Related to Active/Standby Pseudowire on Dual BNGs
Logical Link Identifier (LLID)
Open Authentication Model for DHCP and PPPoE Hosts
Terminology
LUDB and RADIUS Access Models
No Authentication
LUDB Only Access
LUDB Access via DHCPv4 Server
RADIUS Only Access
Consecutive Access to LUDB and RADIUS
RADIUS Fallback
Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
Terminology
Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
Default Gateway in IPv4 Flexible Addressing
IPv4 Subnet Sharing
IPv4 Subnet Mask Auto-Generation
Local-proxy-arp and arp-populate
Gi-address Configuration Consideration
PPPoE Considerations
IPoEv6 Considerations
General Configuration Guidelines for Flexible IP Address Assignment
Caveats
uRPF for Subscriber Management
IPoE Sessions
Enabling IPoE Sessions
IPoE Session Authentication
IPoE Session Accounting
IPoE Session Mid-Session Changes
IPoE Session Termination
Limiting the Number of IPoE sessions
SAP Session Index
Resiliency
Notes
Configuration Steps
IPoE Session Migration
Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
Data-triggered Subscriber Management
Provisioning Data-triggered ESM
Authentication and Host Creation
DoS Protection
RADIUS Subscriber Services
Subscriber Service Building Blocks
1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
2. RADIUS Python Interface
3. Python Script
4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
Subscriber Services RADIUS Vendor Specific Attributes (VSAs)
Subscriber Service RADIUS Accounting
Accounting Only Subscriber Service
QoS Override Subscriber Service
PCC Rules Subscriber Service
PCC Rules
PCC rule instantiation
PCC Rules as a Subscriber Service
Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule Subscriber Services on the Parent RADIUS Accounting Volume Counters
PCC Rule Subscriber Service Activation Failures
Combined Subscriber Services
Subscriber Services Python API
Common subscriber services Python API
Subscriber Service QoS Override Python API
Subscriber Service PCC Rules Python API
Operational commands
Show Commands
Debug Commands
Resource Monitoring
Residential Gateway Replacement
Configuring Enhanced Subscriber Management with CLI
Configuring RADIUS Authentication of DHCP Sessions
TCP MSS adjustment for ESM Hosts
Configuring Enhanced Subscriber Management
Basic Configurations
Subscriber Interface Configuration
Configuring Enhanced Subscriber Management Entities
Configuring a Subscriber Identification Policy
Configuring a Subscriber Profile
Configuring an SLA Profile
Configuring Explicit Mapping Entries
Routed CO with Basic Subscriber Management Features
Applying the Profiles and Policies
SLA Profile
Configuring Dual Homing
SHCV Policies
SHCV Policy
Subscriber Identification Policy
Subscriber Profile
Subscriber Management Command Reference
Command Hierarchies
ANCP Commands
GSMP Configuration Commands
Authentication Policy Commands
RADIUS Accounting Policy Commands
RADIUS Route Download Commands
Diameter Policy Commands
AAA Diameter Peer Policy Commands
Subscriber Management Diameter Application Policy Commands
Category Map and Credit Control Policy Commands
Filter Commands
BGP Peering Policy Commands
Explicit Subscriber Mapping Commands
IGMP Policy Command
Host Lockout Commands
Host Tracking Policy Commands
PIM Policy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Auto-Generated Subscriber Identification Key Commands
Auto-Generated Subscriber Identification Key Service Commands
Subscriber MCAC Policy Commands
Subscriber Profile Commands
IPoE Session Policy Commands
Multi-Chassis Redundancy Commands
SHCV Policy Commands
Subscriber Management Service Commands
VPLS Subscriber Management Configuration Commands
Managed SAP Policy Commands
VPRN Subscriber Interface Configuration Commands
VPRN Subscriber Interface Group Interface Commands
IES Subscriber Management Configuration Commands
IES Subscriber Interface Commands
IES Subscriber Interface Group Interface Commands
Service Subscriber Interface, Group Interface IPoE Command
RIP Commands
VPort Commands
Redundant Interface Commands
Wireless Portal Protocol (WPP) Commands
Multiple PPoE Session QoS Commands
Multicast Listener Discovery (MLD) Commands
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Triple Play Subscriber Management Configuration Commands
Triple Play Subscriber Management Configuration Commands
Generic Commands
ANCP and GSMP Commands
RADIUS Policy Commands
RADIUS Route Download Commands
IGMP Policy Commands
PIM Policy Commands
Managed SAP Policy Commands
Multi-Chassis Redundancy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Subscriber Profile Commands
Explicit Subscriber Mapping Commands
Subscriber Management Service Commands
Subscriber Management Service Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
In This Section
Overview
Terminology and Abbreviations
Restrictions
Deploying Oversubscribed Multi-Chassis Redundancy
Resource Exhaustion Notification and Simultaneous Failures
Resource Monitoring
Warm-Standby Mode Of Operation
IPoE vs PPPoE
Persistency
Routing and Redundant Interface in OMCR
Revertive Behavior
Service Restoration Times
Processing of the SRRP Flaps
Accounting
Configuration Guidelines
Troubleshooting Commands
OMCR Command Reference
Command Hierarchies
OMCR Configuration Commands
OMCR Configuration Commands
WIFI Aggregation and Offload
In This Section
WIFI Aggregation and Offload Overview
Layer 2 over Soft-GRE Tunnels
Encapsulation
Data Path
Tunnel Level Egress QoS
Operational Commands
Authentication
EAP-Based Authentication
RADIUS Proxy
RADIUS Proxy — Server Load-Balancing
RADIUS Proxy — Cache Lookup
RADIUS Proxy — Accounting
Portal Authentication
Address Assignment
WIFI Mobility Anchor
Wholesale
CGN on WLAN-GW
Lawful Intercept on WLAN-GW
WLAN Location Enhancements
Triggered Interim Accounting-Updates
Operational Support
WIFI Offload – 3G/4G Interworking
Signaling Call Flow
GTP Setup with EAP Authentication
APN Resolution
Configuration Objects
RADIUS Support
QoS Support with GTP
Selective Breakout
Location Notification in S2a
WLAN Location over S2a
Cellular Location over S2a
Cellular Location over Gn Interface
Operational Support
Operational Commands
show router wlan-gw mobile-gateway
show router 300 wlan-gw mgw-address-cache
show subscriber-mgmt wlan-gw gtp-session detail
show subscriber-mgmt wlan-gw mgw-profile "default"
show subscriber-mgmt wlan-gw gtp-statistics
Migrant User Support
Migrant User Support with Portal-Authentication
DHCP
Authentication and Forwarding
Migrant User Support with EAP Authentication
Data Triggered Subscriber Creation
Distributed Subscriber Management (DSM)
DHCP
Authentication and Accounting
DSM Data-Plane
IP Filtering
Policing
Lawful Intercept (LI)
Data-Triggered UE Creation
Idle-Timeout and Session-Timeout Management
Operational Commands
Pool Manager
DHCPv6 and SLAAC
Call Trace
Distributed RADIUS Proxy
Enhanced Subscriber Management
Distributed Subscriber Management
Operational Commands
WLAN-GW 1:1 Active-Backup Redundancy
DHCP Server Redundancy
Subscriber Creation after Switchover
WLAN-GW Triggered Stateless Redundancy (N:1)
AP Triggered Stateless WLAN-GW Redundancy (N:1)
IPv6-only Access
IPv6 GRE Tunnels
IPv6 Client-Side RADIUS Proxy
Dual-Stack UEs over WLAN-GW
SLAAC Prefix Assignment
DHCPv6 IA_NA Assignment
Migrant User Support
Accounting
Layer 2 Wholesale
VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
Soft-L2TPv3 Tunnels
WiFi Command Reference
Command Hierarchies
WLAN-GW Commands
Subscriber Management BRG Commands
DSM Call Trace Commands
WLAN-GW Service Commands
RADIUS Server and Proxy Commands
LUDB Matching for RADIUS Proxy Cache
Data Plane Related Commands
Port Policy Commands
WIFI Aggregation and Offload – Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
WIFI Aggregation and Offload Commands
WIFI Aggregation and Offload Commands
Generic Commands
WLAN-GW Commands
DSM Call Trace Commands
RADIUS Server Policy Commands
CLI Command Description for RADIUS Server
CLI Command Description for RADIUS Proxy Server
LUDB Matching of RADIUS Proxy Cache Commands
WLAN-GW-Group Commands
Port Policy Commands
WLAN-GW Group Interface Commands
Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
virtual Residential Gateway
In This Section
virtual Residential Gateway Overview
Access Modes
Home Context on the vRGW
Implicit Home Authentication
Explicit Home Authentication
Change of Configuration
Home Lifetime
Device Context on the vRGW
Dynamic Configuration Changes
Per-Home Pool Management and L2-Aware NAT
Sticky IP Addresses
Managed Static IPv4 Addresses
DMZ
IPv6
QoS and Filter Support
Data-Triggered Authentication
BRG and vRG Caveats
vRGW Command Reference
Command Hierarchies
Subscriber Management BRG Profile Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Command Descriptions
Generic Commands
vRGW Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Dynamic Data Services
In This Section
Introduction to Dynamic Data Services
RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
Data-Triggered Dynamic Data Services
Data Trigger
Dynamic Services Data Trigger Capture SAP
RADIUS Authentication
Local Authentication
Data-Triggered Dynamic Service Provisioning
Control Plane Protection
Debugging
RADIUS Triggered Dynamic Data Services Command Reference
Command Hierarchies
RADIUS Triggered Dynamic Data Services Commands
Basic System Command
Show Commands
Tools Commands
Clear Commands
Debug Commands
RADIUS Triggered Dynamic Data Services Commands
Configuration Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
Diameter and Diameter Applications
In This Section
Restrictions
Terminology
3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
Policy Management via Gx Interface
Gx Protocol
Policy Assignment Models
IP-CAN Session – Gx Session Identification
User Identification in PCRF
NAS-Port-Id as Subscription-Id
Gx Interface and ESM Subscriber Instantiation
Gx and Dual-Stack Hosts
Gx and PPPoEv6-DHCP
Gx Fallback Function
Gx CCR-I Replays
Gx CCR-t Replays
RAR and CCR-t Replay
CCR-t Replay And Multi-Chassis Redundancy
CCR-t Replay And High Availability
Automatic Updates for IP Address Allocation/De-allocation
DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
Gx, ESM and AA
ESM Subscriber-host vs AA Subscriber
AA Subscriber State
Policy Management via Gx
Gx-Based Overrides
Instantiation of Gx Overrides
HTTP Redirect Override
Removal of Overrides
Examples of Gx Overrides
PCC Rules
PCC Rule Concept
PCC Rule Instantiation
Base QoS-Policy and Base Filter
Generic Policy Sharing and Rule Sharing
PCC Rule Name and PCC Rule Removal
Gx Rule Ordering
PCC Rule Override
Aggregation of IP-Criterion
Combining IPv4 and IPv6 Entries within the Rule
Gx Rules with Multiple Actions and Action Sharing
Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
RADIUS and Gx Interaction
Bulk Changes via CLI while Gx Rules are Active
PCC Rule Direction
Action
Rate-Limiting Action (Ingress, Egress)
Dynamic Policers and Queue Mappings
Dynamic Policer Rates and Accounting Statistics
Forwarding-Class Change (Ingress, Egress)
QoS Forward (Ingress and Egress)
Next-Hop Redirect (Ingress)
HTTP Redirect (Ingress)
Filter Forward/Drop (Ingress and Egress)
Service Gating Function
PCC Rule Provisioning Example
Operational Aspects
PCC Rules and Capacity Planning
PCC Rule Scaling Example
NAS Filter Inserts
Examples of NAS Entry Inserts
Error Handing and Rule Failure Reporting in ESM
AVP Decoding Failure in Gx
ESM Rule-Installation Failure
Failure Reporting in AA
Summary of Failure Reporting
Usage-Monitoring and Reporting
ESM Usage-Monitoring - What is Being Monitored
AA Usage-Monitoring – What is Being Monitored
Requesting Usage-Monitoring in ESM
Reporting Accumulated Usage
Disabling Usage-Monitoring
Usage-Monitoring for PCC Rules
Session Termination
Usage-Monitoring Examples
Event Triggers
Subscriber Verification
Subscriber Termination
Mobility Support in WiFi
Redundancy
Persistency and Origin-State-ID AVP
Overload Protection
Diameter NASREQ Application
Sample Configuration Steps
Diameter Redundancy
Diameter Peer Level Redundancy
Diameter Multi-Chassis Redundancy
Diameter Proxy Model General Operational Principles
Diameter Proxy Activity Selection
Synchronization and MCS
Retransmissions
Retransmissions and the T-bit
Diameter Proxy Role
Diameter Proxy and CC-Request-Number AVP
Stateless Diameter Proxy
Switchover Scenarios
Log/Trap Generation Caused by Diameter Proxy State Change
Switchover Update Event (CCR-u)
Isolated Chassis
Diameter Identities
High Availability
Gx Specific Behavior
Diameter Debugging
Python Script Support for ESM
In This Chapter
Python Script Support for ESM
Python in SR-OS Overview
Python Changes
Python Support in sub-ident-policy
Configuration
Operator Debugging
Python Scripts
Sample Python Scripts
Example
Example
Example
Limitations
RADIUS Script Policy Overview
Python RADIUS API
Sample Script
Python Policy Overview
Python Policy – RADIUS API
Python Policy – DHCPv4 API
Python Policy – DHCPv6 API
Python Policy – Diameter API
Python Policy – DHCP Transaction Cache API
Python for PPPoE API
Python API for PPP Packet
Python API for PPP PAP
Python API for PPP CHAP
Python ESM API
Python Cache Support
Applying a Python Policy
Python Script Protection
Tips and Tricks
Python Command Reference
Command Hierarchies
Python Policy Commands
Python Script Commands
Services Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Command Descriptions
Python Configuration Commands
Global Commands
Python Policy Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Python RADIUS Command Reference
Command Hierarchies
Command Descriptions
Generic Commands
Script Commands
Standards and Protocol Support
Customer documentation and product support
Unicast Routing Protocols Guide R14.0.R1
Getting Started
About This Guide
Router Configuration Process
RIP
In This Chapter
RIP Overview
RIP Features
RIP Version Types
RIPv2 Authentication
RIP Packet Format
RIPv1 Format
RIPv2 Format
RIPng
RIPng Protocol
Common Attributes
Metrics
Timers
Import and Export Policies
Hierarchical Levels
RIP Configuration Process Overview
Configuration Notes
General
Configuring RIP with CLI
RIP and RIPng Configuration Overview
Preconfiguration Requirements
RIP Hierarchy
Basic RIP Configuration
Common Configuration Tasks
Configuring Interfaces
Configuring a Route Policy
Configuring RIP Parameters
Configuring Global-Level Parameters
Configuring Group-Level Parameters
Configuring Neighbor-Level Parameters
RIP Configuration Management Tasks
Modifying RIP Parameters
Deleting a Group
Deleting a Neighbor
RIP Configuration Command Reference
Command Hierarchies
Configuration Commands
Group Commands
Neighbor Commands
RIPng Configuration Commands
Group Commands
Neighbor Commands
Command Descriptions
Generic Commands
RIP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show RIP Commands
Clear RIP Commands
Debug RIP Commands
Command Descriptions
Show Commands
Clear Commands
Debug RIP Commands
OSPF
In This Chapter
Configuring OSPF
OSPF Areas
Backbone Area
Stub Area
Not-So-Stubby Area
OSPF Super Backbone
Sham Links
Implementing the OSPF Super Backbone
Loop Avoidance
DN-BIT
Route Tag
Sham Links
OSPFv3 Authentication
OSPFv3 Graceful Restart Helper
Virtual Links
Neighbors and Adjacencies
Link-State Advertisements
Metrics
Authentication
IP Subnets
Preconfiguration Recommendations
Multiple OSPF Instances
Route Export Policies for OSPF
Preventing Route Redistribution Loops
Multi-Address Support for OSPFv3
IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
IP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
ECMP Considerations
IP FRR and RSVP Shortcut (IGP Shortcut)
IP FRR and BGP Next-Hop Resolution
OSPF and IS-IS Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
Configuration of Route Next-Hop Policy Template
Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
Configuring SRLG Group Constraint in Route Next-Hop Policy
Interaction of IP and MPLS Admin Group and SRLG
Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
Application of Route Next-Hop Policy Template to an Interface
Excluding Prefixes from LFA SPF
Modification to LFA Next-Hop Selection Algorithm
LFA Protection using Segment Routing Backup Node SID
Configuring LFA using Backup Node SID
Detailed Operation of LFA Protection using Backup Node SID
Duplicate SID Handling
OSPF Control Plane Extensions
Segment Routing in Shortest Path Forwarding
OSPF LSA Filtering
FIB Prioritization
OSPF Configuration Process Overview
Configuration Notes
General
OSPF Defaults
Configuring OSPF with CLI
OSPF Configuration Guidelines
Basic OSPF Configuration
Configuring the Router ID
Configuring OSPF Components
Configuring OSPF Parameters
Configuring OSPF3 Parameters
Configuring an OSPF or OSPF3 Area
Configuring a Stub Area
Configuring a Not-So-Stubby Area
Configuring a Virtual Link
Configuring an Interface
Configuring Authentication
Overview
Configuring Authentication Keys and Algorithms
Configuring Authentication using Keychains
Assigning a Designated Router
Configuring Route Summaries
Configuring Route Preferences
OSPF Configuration Management Tasks
Modifying a Router ID
Deleting a Router ID
Modifying OSPF Parameters
OSPF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
OSPF Global Commands
OSPF Area Commands
Interface/Virtual Link Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
IS-IS
In This Chapter
Configuring IS-IS
Routing
IS-IS Frequently Used Terms
ISO Network Addressing
IS-IS PDU Configuration
IS-IS Operations
IS-IS Route Summarization
Partial SPF Calculation
IS-IS MT-Topology Support
Native IPv6 Support
IS-IS Administrative Tags
Setting Route Tags
Using Route Tags
Unnumbered Interface Support
Segment Routing in Shortest Path Forwarding
Configuring Segment Routing in Shortest Path
Segment Routing Operational Procedures
Prefix Advertisement and Resolution
Error and Resource Exhaustion Handling
Segment Routing Tunnel Management
Tunnel MTU Determination
Remote LFA with Segment Routing
Data Path Support
Hash label support
Control Protocol Changes
IS-IS Control Protocol Changes
OSPF Control Protocol Changes
BGP Shortcut Using Segment Routing Tunnel
BGP Label Route Resolution Using Segment Routing Tunnel
Service Packet Forwarding with Segment Routing
Mirror Services and Lawful Intercept
Segment Routing Mapping Server Function for IPv4 Prefixes
Segment Routing Mapping Server
Segment Routing Mapping Server Prefix SID Resolution
FIB Prioritization
IS-IS Configuration Process Overview
Configuration Notes
General
Configuring IS-IS with CLI
IS-IS Configuration Overview
Router Levels
Area Address Attributes
Interface Level Capability
Route Leaking
Basic IS-IS Configuration
Common Configuration Tasks
Configuring IS-IS Components
Enabling IS-IS
Modifying Router-Level Parameters
Configuring ISO Area Addresses
Configuring Global IS-IS Parameters
Migration to IS-IS Multi-Topology
Configuring Interface Parameters
Example: Configuring a Level 1 Area
Example: Modifying a Router’s Level Capability
Configuring IS-IS Link Groups
IS-IS Configuration Management Tasks
Disabling IS-IS
Removing IS-IS
Modifying Global IS-IS Parameters
Modifying IS-IS Interface Parameters
Configuring Authentication using Keychains
Configuring Leaking
Redistributing External IS-IS Routers
Specifying MAC Addresses for All IS-IS Routers
IS-IS Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
IS-IS Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
BGP
In This Chapter
BGP Overview
BGP Sessions
BGP Session States
Detecting BGP Session Failures
Peer Tracking
Bidirectional Forwarding Detection (BFD)
Fast External Failover
High Availability BGP Sessions
BGP Graceful Restart
BGP Session Security
TCP MD5 Authentication
TTL Security Mechanism
BGP Groups
BGP Design Concepts
Route Reflection
BGP Confederations
BGP Messages
Open Message
Changing the Autonomous System Number
Changing a Confederation Number
BGP Advertisement
Update Message
Keepalive Message
Notification Message
UPDATE Message Error Handling
Route Refresh Message
BGP Path Attributes
Origin
AS Path
AS Override
Using Local AS for ASN Migration
4-Octet Autonomous System Numbers
Next-Hop
Next-Hop IPv4 Address Family over IPv6
Next-Hop VPN-IPv4 Address Family over IPv6
Next-Hop VPN-IPv6 Address Family over IPv6
Next-Hop Resolution
Next-Hop Tracking
Next-Hop Indirection
Using Multiple Address Families over IPv6 BGP Sessions
MED
Deterministic MED
Local Preference
Route Aggregation Path Attributes
Community and Extended Community Attributes
Route Reflection Attributes
Multi-Protocol BGP Attributes
4-Octet AS Attributes
AIGP Metric
BGP Routing Information Base (RIB)
RIB-IN Features
BGP Import Policies
LOC-RIB Features
BGP Decision Process
Always Compare MED
Ignore Next-Hop Metric
BGP Route Installation in the Route Table
Weighted ECMP for BGP Routes
BGP Route Installation in the Tunnel Table
BGP Fast Reroute
Calculating Backup Paths
Failure Detection and Switchover to the Backup Path
QoS Policy Propagation via BGP (QPPB)
BGP Policy Accounting
Route Flap Damping (RFD)
RIB-OUT Features
BGP Export Policies
Outbound Route Filtering (ORF)
RT Constrained Route Distribution
Min Route Advertisement Interval (MRAI)
Advertise-Inactive
Best-External
Add-Paths
Path Selection with Add-Paths
Split-Horizon
BGP Applications
Next-hop Resolution Using Tunnels
BGP Routes
BGP Labeled Routes
VPN-IPv4 and VPN-IPv6 Routes
BGP Flow-Spec
Validating Received Flow Routes
Using Flow Routes to Create Dynamic Filter Entries
Configuration of TTL Propagation for BGP Label Routes
TTL Propagation for RFC 3107 Label Route at Ingress LER
TTL Propagation for RFC 3107 Label Routes at LSR
BGP Prefix Origin Validation
BGP Route Leaking
BGP Configuration Process Overview
Configuration Notes
General
BGP Defaults
BGP MIB Notes
Configuring BGP with CLI
BGP Configuration Overview
Preconfiguration Requirements
BGP Hierarchy
Internal and External BGP Configurations
Basic BGP Configuration
Common Configuration Tasks
Creating an Autonomous System
Configuring a Router ID
BGP Confederations
BGP Route Reflectors
BGP Components
Configuring Group Attributes
Configuring Neighbor Attributes
Configuring Route Reflection
Configuring a Confederation
BGP Configuration Management Tasks
Modifying an AS Number
Modifying a Confederation Number
Modifying the BGP Router ID
Modifying the Router-Level Router ID
Deleting a Neighbor
Deleting Groups
BGP Command Reference
Command Hierarchies
Global BGP Commands
Group BGP Commands
Neighbor BGP Commands
Other BGP-Related Commands
Command Descriptions
Generic Commands
BGP Commands
Other BGP-Related Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Route Policies
In This Chapter
Configuring Route Policies
Policy Statements
Policy Statement Chaining and Logical Expressions
Routing Policy Subroutines
Policy Evaluation Command
Exclusive Editing for Policy Configuration
Default Action Behavior
Denied IP Unicast Prefixes
Controlling Route Flapping
Regular Expressions
BGP and OSPF Route Policy Support
BGP Route Policies
Re-advertised Route Policies
Triggered Policies
Set MED to IGP Cost using Route Policies
BGP Policy Subroutines
Route Policies for BGP Next-Hop Resolution and Peer Tracking
Routing Policy Parameterization
When to Use Route Policies
Route Policy Configuration Process Overview
Configuration Notes
General
Configuring Route Policies with CLI
Route Policy Configuration Overview
When to Create Routing Policies
Default Route Policy Actions
Policy Evaluation
Damping
Basic Configurations
Configuring Route Policy Components
Beginning the Policy Statement
Creating a Route Policy
Configuring a Default Action
Configuring an Entry
Configuring a Community List
Configuring Damping
Configuring a Prefix List
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Route Policy Configuration Management Tasks
Editing Policy Statements and Parameters
Deleting an Entry
Deleting a Policy Statement
Route Policy Command Reference
Command Hierarchies
Route Policy Configuration Commands
Command Descriptions
Generic Commands
Route Policy Options
Route Policy Damping Commands
Route Policy Prefix Commands
Route Policy Entry Match Commands
Route Policy Action Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer documentation and product support
Getting Started
About This Guide
Router Configuration Process
RIP
In This Chapter
RIP Overview
RIP Features
RIP Version Types
RIPv2 Authentication
RIP Packet Format
RIPv1 Format
RIPv2 Format
RIPng
RIPng Protocol
Common Attributes
Metrics
Timers
Import and Export Policies
Hierarchical Levels
RIP Configuration Process Overview
Configuration Notes
General
Configuring RIP with CLI
RIP and RIPng Configuration Overview
Preconfiguration Requirements
RIP Hierarchy
Basic RIP Configuration
Common Configuration Tasks
Configuring Interfaces
Configuring a Route Policy
Configuring RIP Parameters
Configuring Global-Level Parameters
Configuring Group-Level Parameters
Configuring Neighbor-Level Parameters
RIP Configuration Management Tasks
Modifying RIP Parameters
Deleting a Group
Deleting a Neighbor
RIP Configuration Command Reference
Command Hierarchies
Configuration Commands
Group Commands
Neighbor Commands
RIPng Configuration Commands
Group Commands
Neighbor Commands
Command Descriptions
Generic Commands
RIP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show RIP Commands
Clear RIP Commands
Debug RIP Commands
Command Descriptions
Show Commands
Clear Commands
Debug RIP Commands
OSPF
In This Chapter
Configuring OSPF
OSPF Areas
Backbone Area
Stub Area
Not-So-Stubby Area
OSPF Super Backbone
Sham Links
Implementing the OSPF Super Backbone
Loop Avoidance
DN-BIT
Route Tag
Sham Links
OSPFv3 Authentication
OSPFv3 Graceful Restart Helper
Virtual Links
Neighbors and Adjacencies
Link-State Advertisements
Metrics
Authentication
IP Subnets
Preconfiguration Recommendations
Multiple OSPF Instances
Route Export Policies for OSPF
Preventing Route Redistribution Loops
Multi-Address Support for OSPFv3
IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
IP FRR Configuration
Reducing the Scope of the LFA Calculation by SPF
ECMP Considerations
IP FRR and RSVP Shortcut (IGP Shortcut)
IP FRR and BGP Next-Hop Resolution
OSPF and IS-IS Support for Loop-Free Alternate Calculation
Loop-Free Alternate Calculation in the Presence of IGP shortcuts
Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
Loop-Free Alternate Shortest Path First (LFA SPF) Policies
Configuration of Route Next-Hop Policy Template
Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
Configuring SRLG Group Constraint in Route Next-Hop Policy
Interaction of IP and MPLS Admin Group and SRLG
Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
Application of Route Next-Hop Policy Template to an Interface
Excluding Prefixes from LFA SPF
Modification to LFA Next-Hop Selection Algorithm
LFA Protection using Segment Routing Backup Node SID
Configuring LFA using Backup Node SID
Detailed Operation of LFA Protection using Backup Node SID
Duplicate SID Handling
OSPF Control Plane Extensions
Segment Routing in Shortest Path Forwarding
OSPF LSA Filtering
FIB Prioritization
OSPF Configuration Process Overview
Configuration Notes
General
OSPF Defaults
Configuring OSPF with CLI
OSPF Configuration Guidelines
Basic OSPF Configuration
Configuring the Router ID
Configuring OSPF Components
Configuring OSPF Parameters
Configuring OSPF3 Parameters
Configuring an OSPF or OSPF3 Area
Configuring a Stub Area
Configuring a Not-So-Stubby Area
Configuring a Virtual Link
Configuring an Interface
Configuring Authentication
Overview
Configuring Authentication Keys and Algorithms
Configuring Authentication using Keychains
Assigning a Designated Router
Configuring Route Summaries
Configuring Route Preferences
OSPF Configuration Management Tasks
Modifying a Router ID
Deleting a Router ID
Modifying OSPF Parameters
OSPF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
OSPF Global Commands
OSPF Area Commands
Interface/Virtual Link Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
IS-IS
In This Chapter
Configuring IS-IS
Routing
IS-IS Frequently Used Terms
ISO Network Addressing
IS-IS PDU Configuration
IS-IS Operations
IS-IS Route Summarization
Partial SPF Calculation
IS-IS MT-Topology Support
Native IPv6 Support
IS-IS Administrative Tags
Setting Route Tags
Using Route Tags
Unnumbered Interface Support
Segment Routing in Shortest Path Forwarding
Configuring Segment Routing in Shortest Path
Segment Routing Operational Procedures
Prefix Advertisement and Resolution
Error and Resource Exhaustion Handling
Segment Routing Tunnel Management
Tunnel MTU Determination
Remote LFA with Segment Routing
Data Path Support
Hash label support
Control Protocol Changes
IS-IS Control Protocol Changes
OSPF Control Protocol Changes
BGP Shortcut Using Segment Routing Tunnel
BGP Label Route Resolution Using Segment Routing Tunnel
Service Packet Forwarding with Segment Routing
Mirror Services and Lawful Intercept
Segment Routing Mapping Server Function for IPv4 Prefixes
Segment Routing Mapping Server
Segment Routing Mapping Server Prefix SID Resolution
FIB Prioritization
IS-IS Configuration Process Overview
Configuration Notes
General
Configuring IS-IS with CLI
IS-IS Configuration Overview
Router Levels
Area Address Attributes
Interface Level Capability
Route Leaking
Basic IS-IS Configuration
Common Configuration Tasks
Configuring IS-IS Components
Enabling IS-IS
Modifying Router-Level Parameters
Configuring ISO Area Addresses
Configuring Global IS-IS Parameters
Migration to IS-IS Multi-Topology
Configuring Interface Parameters
Example: Configuring a Level 1 Area
Example: Modifying a Router’s Level Capability
Configuring IS-IS Link Groups
IS-IS Configuration Management Tasks
Disabling IS-IS
Removing IS-IS
Modifying Global IS-IS Parameters
Modifying IS-IS Interface Parameters
Configuring Authentication using Keychains
Configuring Leaking
Redistributing External IS-IS Routers
Specifying MAC Addresses for All IS-IS Routers
IS-IS Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
IS-IS Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
BGP
In This Chapter
BGP Overview
BGP Sessions
BGP Session States
Detecting BGP Session Failures
Peer Tracking
Bidirectional Forwarding Detection (BFD)
Fast External Failover
High Availability BGP Sessions
BGP Graceful Restart
BGP Session Security
TCP MD5 Authentication
TTL Security Mechanism
BGP Groups
BGP Design Concepts
Route Reflection
BGP Confederations
BGP Messages
Open Message
Changing the Autonomous System Number
Changing a Confederation Number
BGP Advertisement
Update Message
Keepalive Message
Notification Message
UPDATE Message Error Handling
Route Refresh Message
BGP Path Attributes
Origin
AS Path
AS Override
Using Local AS for ASN Migration
4-Octet Autonomous System Numbers
Next-Hop
Next-Hop IPv4 Address Family over IPv6
Next-Hop VPN-IPv4 Address Family over IPv6
Next-Hop VPN-IPv6 Address Family over IPv6
Next-Hop Resolution
Next-Hop Tracking
Next-Hop Indirection
Using Multiple Address Families over IPv6 BGP Sessions
MED
Deterministic MED
Local Preference
Route Aggregation Path Attributes
Community and Extended Community Attributes
Route Reflection Attributes
Multi-Protocol BGP Attributes
4-Octet AS Attributes
AIGP Metric
BGP Routing Information Base (RIB)
RIB-IN Features
BGP Import Policies
LOC-RIB Features
BGP Decision Process
Always Compare MED
Ignore Next-Hop Metric
BGP Route Installation in the Route Table
Weighted ECMP for BGP Routes
BGP Route Installation in the Tunnel Table
BGP Fast Reroute
Calculating Backup Paths
Failure Detection and Switchover to the Backup Path
QoS Policy Propagation via BGP (QPPB)
BGP Policy Accounting
Route Flap Damping (RFD)
RIB-OUT Features
BGP Export Policies
Outbound Route Filtering (ORF)
RT Constrained Route Distribution
Min Route Advertisement Interval (MRAI)
Advertise-Inactive
Best-External
Add-Paths
Path Selection with Add-Paths
Split-Horizon
BGP Applications
Next-hop Resolution Using Tunnels
BGP Routes
BGP Labeled Routes
VPN-IPv4 and VPN-IPv6 Routes
BGP Flow-Spec
Validating Received Flow Routes
Using Flow Routes to Create Dynamic Filter Entries
Configuration of TTL Propagation for BGP Label Routes
TTL Propagation for RFC 3107 Label Route at Ingress LER
TTL Propagation for RFC 3107 Label Routes at LSR
BGP Prefix Origin Validation
BGP Route Leaking
BGP Configuration Process Overview
Configuration Notes
General
BGP Defaults
BGP MIB Notes
Configuring BGP with CLI
BGP Configuration Overview
Preconfiguration Requirements
BGP Hierarchy
Internal and External BGP Configurations
Basic BGP Configuration
Common Configuration Tasks
Creating an Autonomous System
Configuring a Router ID
BGP Confederations
BGP Route Reflectors
BGP Components
Configuring Group Attributes
Configuring Neighbor Attributes
Configuring Route Reflection
Configuring a Confederation
BGP Configuration Management Tasks
Modifying an AS Number
Modifying a Confederation Number
Modifying the BGP Router ID
Modifying the Router-Level Router ID
Deleting a Neighbor
Deleting Groups
BGP Command Reference
Command Hierarchies
Global BGP Commands
Group BGP Commands
Neighbor BGP Commands
Other BGP-Related Commands
Command Descriptions
Generic Commands
BGP Commands
Other BGP-Related Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Route Policies
In This Chapter
Configuring Route Policies
Policy Statements
Policy Statement Chaining and Logical Expressions
Routing Policy Subroutines
Policy Evaluation Command
Exclusive Editing for Policy Configuration
Default Action Behavior
Denied IP Unicast Prefixes
Controlling Route Flapping
Regular Expressions
BGP and OSPF Route Policy Support
BGP Route Policies
Re-advertised Route Policies
Triggered Policies
Set MED to IGP Cost using Route Policies
BGP Policy Subroutines
Route Policies for BGP Next-Hop Resolution and Peer Tracking
Routing Policy Parameterization
When to Use Route Policies
Route Policy Configuration Process Overview
Configuration Notes
General
Configuring Route Policies with CLI
Route Policy Configuration Overview
When to Create Routing Policies
Default Route Policy Actions
Policy Evaluation
Damping
Basic Configurations
Configuring Route Policy Components
Beginning the Policy Statement
Creating a Route Policy
Configuring a Default Action
Configuring an Entry
Configuring a Community List
Configuring Damping
Configuring a Prefix List
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Route Policy Configuration Management Tasks
Editing Policy Statements and Parameters
Deleting an Entry
Deleting a Policy Statement
Route Policy Command Reference
Command Hierarchies
Route Policy Configuration Commands
Command Descriptions
Generic Commands
Route Policy Options
Route Policy Damping Commands
Route Policy Prefix Commands
Route Policy Entry Match Commands
Route Policy Action Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Standards and Protocol Support
Customer documentation and product support
Versatile Service Module Guide R14.0.R1
Versatile Service Module
In This Guide
In This Chapter
VSM Overview
Multiple System Solution
Hybrid Service Solution
Single System Multiple Interface Solution
Full Feature Internal Service Cross Connect Solution
Functional Components
Service Cross Connect Adapter (CCA)
Internal Service CCAG
Internal Service Cross Connect Identifier (CCID)
CCAG Bandwidth and Resiliency
CCAG LAG Attributes
CCAG Traffic Distribution
CCAG SAP QoS
Link Level CCAG SAP QoS Adaptation
Distributed CCAG SAP QoS Adaptation
VSM-CCA-XP
Configuration Process Overview
Configuration Notes
Configuring VSM and CCAG with CLI
Basic Configuration
Common Configuration Tasks
Configure VSM CCAG Components
Provision VSM on an MDA
Provision CCAG Parameters
Configure Path Components
Cross Connecting Network IP Interfaces
Cross Connecting Services
Epipe
VPLS
IES
VPRN
Service Management Tasks
Modifying or Deleting a VSM MDA
Modifying CCAG Parameters on a Network IP Interface
Modifying CCAG Parameters
Modifying Path Parameters
Modifying Service Parameters
Epipe
VPLS
IES
VPRN
VSM Command Reference
Command Hierarchies
VSM Configuration Commands
Related Commands
VSM Configuration Command Descriptions
Generic Commands
VSM CLI Tree Node Commands
VSM Path Commands
Related Commands
Services Commands
Service CCAG SAP Provisioning
Standards and Protocol Support
Customer Documentation and Product Support
Versatile Service Module
In This Guide
In This Chapter
VSM Overview
Multiple System Solution
Hybrid Service Solution
Single System Multiple Interface Solution
Full Feature Internal Service Cross Connect Solution
Functional Components
Service Cross Connect Adapter (CCA)
Internal Service CCAG
Internal Service Cross Connect Identifier (CCID)
CCAG Bandwidth and Resiliency
CCAG LAG Attributes
CCAG Traffic Distribution
CCAG SAP QoS
Link Level CCAG SAP QoS Adaptation
Distributed CCAG SAP QoS Adaptation
VSM-CCA-XP
Configuration Process Overview
Configuration Notes
Configuring VSM and CCAG with CLI
Basic Configuration
Common Configuration Tasks
Configure VSM CCAG Components
Provision VSM on an MDA
Provision CCAG Parameters
Configure Path Components
Cross Connecting Network IP Interfaces
Cross Connecting Services
Epipe
VPLS
IES
VPRN
Service Management Tasks
Modifying or Deleting a VSM MDA
Modifying CCAG Parameters on a Network IP Interface
Modifying CCAG Parameters
Modifying Path Parameters
Modifying Service Parameters
Epipe
VPLS
IES
VPRN
VSM Command Reference
Command Hierarchies
VSM Configuration Commands
Related Commands
VSM Configuration Command Descriptions
Generic Commands
VSM CLI Tree Node Commands
VSM Path Commands
Related Commands
Services Commands
Service CCAG SAP Provisioning
Standards and Protocol Support
Customer Documentation and Product Support