Alcatel-Lucent 7450 ESS, 7750 SR, and 7950 XRS Release 14.0.R1
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
Acronym Reference Guide R14.0.R1
  7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Documentation and Product Support
  7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Documentation and Product Support
Basic System Configuration Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
    In This Chapter
    Router System Configuration Process
  CLI Usage
    In This Chapter
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      Basic CLI Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered and Unnamed Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges
      Pipe/Match
      Pipe/Count
      Redirection
    VI Editor
      Summary of vi Commands
      Using the vi Commands
      EX Commands
    Configuration Rollback
      Feature Behavior
      Rollback and SNMP
      Rescue Configuration
      Operational Guidelines
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Basic CLI Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        CLI Environment Commands
        Monitor CLI Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  File System Management
    In This Chapter
    The File System
      Compact Flash Devices
      URLs
      Wildcards
    File Management Tasks
      Modifying File Attributes
      Creating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  Boot Options
    In This Chapter
    System Initialization
      Configuration and Image Loading
        Persistence
        Lawful Intercept
        FIPS-140-2 Mode
    Initial System Startup Process Flow
    Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  System Management
    In This Chapter
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Naming Objects
        Common Language Location Identifier
        DNS Security Extensions
      System Time
        Time Zones
        Network Time Protocol (NTP)
        SNTP Time Synchronization
        CRON
    High Availability
      HA Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Service Redundancy
          Accounting Configuration Redundancy
        Nonstop Forwarding
        Nonstop Routing (NSR)
        CPM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    Synchronization and Redundancy
      Active and Standby Designations
      When the Active CPM Goes Offline
      OOB Management Ethernet Port Redundancy
      Persistence
        Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    Network Synchronization
      Central Synchronization Sub-System
      7950 XRS-40 Extension Chassis Central Clocks
      Synchronization Status Messages (SSM)
        DS1 Signals
        E1 Signals
        SONET/SDH Signals
        DS3/E3
      Synchronous Ethernet
      Clock Source Quality Level Definitions
      IEEE 1588v2 PTP
        PTP Clock Synchronization
        Performance Considerations
          Port-Based Timestamping of PTP Messages
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock for Frequency and Time
        PTP Clock Redundancy
        PTP Time for System Time and OAM Time
        PTP within Routing Instances
    System-Wide ATM Parameters
    Link Layer Discovery Protocol (LLDP)
    IP Hashing as an LSR
    Ethernet Satellites
      Software Repositories for Satellites
      Satellite Configuration
        Satellite Client Port Association
    Software Repositories
    Administrative Tasks
      Configuring the Chassis Mode
      Saving Configurations
      Specifying Post-Boot Configuration Files
      Network Timing
      Power Supplies
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    System Configuration Process Overview
    Configuration Notes
      General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Administration (Admin) Commands
        System Synchronization Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          CRON Commands
          Script Control Commands
          System Time Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
    In This Chapter
    Router System Configuration Process
  CLI Usage
    In This Chapter
    CLI Structure
    Navigating in the CLI
      CLI Contexts
      Basic CLI Commands
      CLI Environment Commands
      CLI Monitor Commands
    Getting Help in the CLI
    The CLI Command Prompt
    Displaying Configuration Contexts
    EXEC Files
    CLI Script Control
    Entering CLI Commands
      Command Completion
      Unordered and Unnamed Parameters
      Editing Keystrokes
      Absolute Paths
      History
      Entering Numerical Ranges
      Pipe/Match
      Pipe/Count
      Redirection
    VI Editor
      Summary of vi Commands
      Using the vi Commands
      EX Commands
    Configuration Rollback
      Feature Behavior
      Rollback and SNMP
      Rescue Configuration
      Operational Guidelines
    Transactional Configuration
      Basic Operation
      Transactions and Rollback
      Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Basic CLI Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        CLI Environment Commands
        Monitor CLI Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  File System Management
    In This Chapter
    The File System
      Compact Flash Devices
      URLs
      Wildcards
    File Management Tasks
      Modifying File Attributes
      Creating Directories
      Copying Files
      Moving Files
      Deleting Files and Removing Directories
      Displaying Directory and File Information
      Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  Boot Options
    In This Chapter
    System Initialization
      Configuration and Image Loading
        Persistence
        Lawful Intercept
        FIPS-140-2 Mode
    Initial System Startup Process Flow
    Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  System Management
    In This Chapter
    System Management Parameters
      System Information
        System Name
        System Contact
        System Location
        System Coordinates
        Naming Objects
        Common Language Location Identifier
        DNS Security Extensions
      System Time
        Time Zones
        Network Time Protocol (NTP)
        SNTP Time Synchronization
        CRON
    High Availability
      HA Features
        Redundancy
          Software Redundancy
          Configuration Redundancy
          Component Redundancy
          Service Redundancy
          Accounting Configuration Redundancy
        Nonstop Forwarding
        Nonstop Routing (NSR)
        CPM Switchover
        Synchronization
          Configuration and boot-env Synchronization
          State Database Synchronization
    Synchronization and Redundancy
      Active and Standby Designations
      When the Active CPM Goes Offline
      OOB Management Ethernet Port Redundancy
      Persistence
        Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    Network Synchronization
      Central Synchronization Sub-System
      7950 XRS-40 Extension Chassis Central Clocks
      Synchronization Status Messages (SSM)
        DS1 Signals
        E1 Signals
        SONET/SDH Signals
        DS3/E3
      Synchronous Ethernet
      Clock Source Quality Level Definitions
      IEEE 1588v2 PTP
        PTP Clock Synchronization
        Performance Considerations
          Port-Based Timestamping of PTP Messages
        PTP Capabilities
        PTP Ordinary Slave Clock For Frequency
        PTP Ordinary Master Clock For Frequency
        PTP Boundary Clock for Frequency and Time
        PTP Clock Redundancy
        PTP Time for System Time and OAM Time
        PTP within Routing Instances
    System-Wide ATM Parameters
    Link Layer Discovery Protocol (LLDP)
    IP Hashing as an LSR
    Ethernet Satellites
      Software Repositories for Satellites
      Satellite Configuration
        Satellite Client Port Association
    Software Repositories
    Administrative Tasks
      Configuring the Chassis Mode
      Saving Configurations
      Specifying Post-Boot Configuration Files
      Network Timing
      Power Supplies
      Automatic Synchronization
        Boot-Env Option
        Config Option
      Manual Synchronization
        Forcing a Switchover
    System Configuration Process Overview
    Configuration Notes
      General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Administration (Admin) Commands
        System Synchronization Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          CRON Commands
          Script Control Commands
          System Time Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Gx AVPs Reference Guide R14.0.R1
  Gx AVP
    In This Section
    AVPs
      Reserved Keywords in the 7750 SR
      Standard Diameter AVPs
      Standard Diameter AVPs (format)
      ALU-Specific AVPs
      ALU-Specific VSAs (format)
      Diameter-Based AVP Applicability
      Gx AVP Applicability
      ALU-Specific AVP Applicability
      Result Codes (Result-Code AVP)
      Rule Failure Codes (Rule-Failure-Code AVP)
      Event Triggers (Event-Trigger AVP)
      Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Documentation and Product Support
  Gx AVP
    In This Section
    AVPs
      Reserved Keywords in the 7750 SR
      Standard Diameter AVPs
      Standard Diameter AVPs (format)
      ALU-Specific AVPs
      ALU-Specific VSAs (format)
      Diameter-Based AVP Applicability
      Gx AVP Applicability
      ALU-Specific AVP Applicability
      Result Codes (Result-Code AVP)
      Rule Failure Codes (Rule-Failure-Code AVP)
      Event Triggers (Event-Trigger AVP)
      Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Documentation and Product Support
Interface Configuration Guide R14.0.R1
   Getting Started
    About This Guide
    Interface Configuration Process
   Interfaces
    In This Chapter
    Configuration Overview
      Chassis Slots and Cards
      MCMs
      MDAs
      XMAs/C-XMAs
      CMAs
      Versatile Service Module (VSM)
      Oversubscribed Ethernet MDAs
        Rate Limiting
        Packet Classification and Scheduling
      Channelized MDA/CMA Support
        Channelized DS-1/E-1 CMA
        Channelized DS-3/E-3 CMA
        Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        Channelized OC-12/STM-4 ASAP MDAs
        Channelized DS-3/E-3 ASAP MDA (4-Port)
        Channelized DS-3/E-3 ASAP MDA (12-Port)
        Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        Network Interconnections
    Digital Diagnostics Monitoring
      Alcatel-Lucent SFPs and XFPs
      Statistics Collection
    Ports
      Port Types
      Port Features
        Port State and Operational State
        802.1x Network Access Control
          802.1x Modes
          802.1x Basics
          802.1x Timers
          802.1x Tunneling
          802.1x Configuration and Limitations
        SONET/SDH Port Attributes
        SONET/SDH Path Attributes
        Multilink Frame Relay
          MLFR Bundle Data Plane
          MLFR Bundle Link Integrity Protocol
        FRF.12 End-to-End Fragmentation
          SAP Fragment Interleaving Option
        FRF.12 UNI/NNI Link Fragmentation
        MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        Multilink Point-to-Point Protocol (MLPPP)
          Protocol Field (PID)
          B & E Bits
          Sequence Number
          Information Field
          Padding
          FCS
          LCP
          Link Fragmentation and Interleaving Support
        Multi-Class MLPPP
          QoS in MC-MLPPP
        Cisco HDLC
          SLARP
          SONET/SDH Scrambling and C2-Byte
          Timers
        Automatic Protection Switching (APS)
          Single Chassis and Multi-Chassis APS
          APS Switching Modes
          APS Channel and SONET Header K Bytes
          Revertive Switching
          Bidirectional 1+1 Switchover Operation Example
          Annex B (1+1 Optimized) Operation
          Protection of Upper Layer Protocols and Services
          APS User-Initiated Requests
          APS and SNMP
          APS Applicability, Restrictions and Interactions
          Sample APS Applications
        Inverse Multiplexing Over ATM (IMA)
          Inverse Multiplexing over ATM (IMA) Features
        Ethernet Local Management Interface (E-LMI)
        Link Layer Discovery Protocol (LLDP)
          LLDP Protocol Features
      Per Port Aggregate Egress Queue Statistics Monitoring
    Port Cross-Connect (PXC)
      PXC Terminology
      Caveats
      PXC - Physical Port in Cross-Connect (Loopback) Mode
        Operational State
      PXC Sub-Ports
        PXC Sub-Port Operational State
      Port Statistics
        Statistics on Physical PXC Ports
      LAG with PXC Ports – PXC LAG
      Basic PXC Provisioning
      QoS
        Queue Allocation on PXC Sub-Ports
        Pool Allocations on PXC Ports
        QoS Summary
      Mirroring and LI on PXC Ports
      Multi-Chassis Redundancy
      Health Monitoring on the PXC Sub-Ports
      Configuration Example
    LAG
      LACP
        LACP Multiplexing
      Active-Standby LAG Operation
      LAG on Access QoS Consideration
        Adapt QoS Modes
        Per-fp-ing-queuing
        Per-fp-egr-queuing
        Per-fp-sap-instance
      LAG and ECMP Hashing
        Per Flow Hashing
          Changing Default Per Flow Hashing Inputs
        Per Link Hashing
          Weighted per-link-hash
        Explicit Per Link Hash Using LAG Link Mapping Profiles
        Consistent Per Service Hashing
        ESM – LAG Hashing per Vport
          Background
          Hashing per Vport
          Link Placement
          Multicast Consideration
          VPLS and Capture SAP Considerations
          LSR Default Hash Routine— Label-Only Hash Option
          LSR Label-IP Hash Option Enabled
          LSR IP-Only Hash Option Enabled
      LAG Hold Down Timers
      BFD over LAG Links
      Mixed Port-Speed LAG Support
        LAG Upgrade
      Multi-Chassis LAG
        Overview
        MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        DSLAM Dual Homing in Layer 2/3 TPSDA Model
    G.8031 Protected Ethernet Tunnels
    G.8032 Protected Ethernet Rings
    Ethernet Port Monitoring
    802.3ah OAM
      OAM Events
        Link Monitoring
          Capability Advertising
      Remote Loopback
      802.3ah OAM PDU Tunneling for Epipe Service
        802.3ah Grace Announcement
    MTU Configuration Guidelines
      Default MTU Values
      Modifying MTU Defaults
      Configuration Example
    Deploying Preprovisioned Components
    Configuring SFM5-12e Fabric Speed
      fabric-speed-a
      fabric-speed-b
    Configuration Process Overview
    Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        Power Commands
        Virtual Scheduler Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        General Port Commands
        Port XC Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Configuration Commands
        Forwarding Plane Tools Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Interface Configuration Process
   Interfaces
    In This Chapter
    Configuration Overview
      Chassis Slots and Cards
      MCMs
      MDAs
      XMAs/C-XMAs
      CMAs
      Versatile Service Module (VSM)
      Oversubscribed Ethernet MDAs
        Rate Limiting
        Packet Classification and Scheduling
      Channelized MDA/CMA Support
        Channelized DS-1/E-1 CMA
        Channelized DS-3/E-3 CMA
        Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        Channelized OC-12/STM-4 ASAP MDAs
        Channelized DS-3/E-3 ASAP MDA (4-Port)
        Channelized DS-3/E-3 ASAP MDA (12-Port)
        Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        Network Interconnections
    Digital Diagnostics Monitoring
      Alcatel-Lucent SFPs and XFPs
      Statistics Collection
    Ports
      Port Types
      Port Features
        Port State and Operational State
        802.1x Network Access Control
          802.1x Modes
          802.1x Basics
          802.1x Timers
          802.1x Tunneling
          802.1x Configuration and Limitations
        SONET/SDH Port Attributes
        SONET/SDH Path Attributes
        Multilink Frame Relay
          MLFR Bundle Data Plane
          MLFR Bundle Link Integrity Protocol
        FRF.12 End-to-End Fragmentation
          SAP Fragment Interleaving Option
        FRF.12 UNI/NNI Link Fragmentation
        MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        Multilink Point-to-Point Protocol (MLPPP)
          Protocol Field (PID)
          B & E Bits
          Sequence Number
          Information Field
          Padding
          FCS
          LCP
          Link Fragmentation and Interleaving Support
        Multi-Class MLPPP
          QoS in MC-MLPPP
        Cisco HDLC
          SLARP
          SONET/SDH Scrambling and C2-Byte
          Timers
        Automatic Protection Switching (APS)
          Single Chassis and Multi-Chassis APS
          APS Switching Modes
          APS Channel and SONET Header K Bytes
          Revertive Switching
          Bidirectional 1+1 Switchover Operation Example
          Annex B (1+1 Optimized) Operation
          Protection of Upper Layer Protocols and Services
          APS User-Initiated Requests
          APS and SNMP
          APS Applicability, Restrictions and Interactions
          Sample APS Applications
        Inverse Multiplexing Over ATM (IMA)
          Inverse Multiplexing over ATM (IMA) Features
        Ethernet Local Management Interface (E-LMI)
        Link Layer Discovery Protocol (LLDP)
          LLDP Protocol Features
      Per Port Aggregate Egress Queue Statistics Monitoring
    Port Cross-Connect (PXC)
      PXC Terminology
      Caveats
      PXC - Physical Port in Cross-Connect (Loopback) Mode
        Operational State
      PXC Sub-Ports
        PXC Sub-Port Operational State
      Port Statistics
        Statistics on Physical PXC Ports
      LAG with PXC Ports – PXC LAG
      Basic PXC Provisioning
      QoS
        Queue Allocation on PXC Sub-Ports
        Pool Allocations on PXC Ports
        QoS Summary
      Mirroring and LI on PXC Ports
      Multi-Chassis Redundancy
      Health Monitoring on the PXC Sub-Ports
      Configuration Example
    LAG
      LACP
        LACP Multiplexing
      Active-Standby LAG Operation
      LAG on Access QoS Consideration
        Adapt QoS Modes
        Per-fp-ing-queuing
        Per-fp-egr-queuing
        Per-fp-sap-instance
      LAG and ECMP Hashing
        Per Flow Hashing
          Changing Default Per Flow Hashing Inputs
        Per Link Hashing
          Weighted per-link-hash
        Explicit Per Link Hash Using LAG Link Mapping Profiles
        Consistent Per Service Hashing
        ESM – LAG Hashing per Vport
          Background
          Hashing per Vport
          Link Placement
          Multicast Consideration
          VPLS and Capture SAP Considerations
          LSR Default Hash Routine— Label-Only Hash Option
          LSR Label-IP Hash Option Enabled
          LSR IP-Only Hash Option Enabled
      LAG Hold Down Timers
      BFD over LAG Links
      Mixed Port-Speed LAG Support
        LAG Upgrade
      Multi-Chassis LAG
        Overview
        MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        DSLAM Dual Homing in Layer 2/3 TPSDA Model
    G.8031 Protected Ethernet Tunnels
    G.8032 Protected Ethernet Rings
    Ethernet Port Monitoring
    802.3ah OAM
      OAM Events
        Link Monitoring
          Capability Advertising
      Remote Loopback
      802.3ah OAM PDU Tunneling for Epipe Service
        802.3ah Grace Announcement
    MTU Configuration Guidelines
      Default MTU Values
      Modifying MTU Defaults
      Configuration Example
    Deploying Preprovisioned Components
    Configuring SFM5-12e Fabric Speed
      fabric-speed-a
      fabric-speed-b
    Configuration Process Overview
    Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        Power Commands
        Virtual Scheduler Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        General Port Commands
        Port XC Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Configuration Commands
        Forwarding Plane Tools Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Layer 2 Services and EVPN Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
   VLL Services
    In This Chapter
    ATM VLL (Apipe) Services
      ATM VLL For End-to-End ATM Service
      ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      Traffic Management Support
        Ingress Network Classification
        Ingress Queuing and Shaping on the IOM
        Egress Queuing and Shaping on the IOM
        Egress Shaping/Scheduling
    Circuit Emulation Services (Cpipe)
      Mobile Infrastructure
      Circuit Emulation Modes
      Circuit Emulation Parameters
        Circuit Emulation Modes
        Absolute Mode Option
        Payload Size
        Jitter Buffer
        CES Circuit Operation
      Services for Transporting CES Circuits
      Network Synchronization Considerations
      Cpipe Payload
    Ethernet Pipe (Epipe) Services
      Epipe Service Overview
      Epipe Service Pseudowire VLAN Tag Processing
      Epipe Up Operational State Configuration Option
      Epipe with PBB
      Epipe over L2TPv3
      Ethernet Interworking VLL
      VLL CAC
      MC-Ring and VLL
    Frame Relay VLL (Fpipe) Services
      Frame Relay VLL
      Frame Relay-to-ATM Interworking (FRF.5) VLL
      Traffic Management Support
        Frame Relay Traffic Management
        Ingress SAP Classification and Marking
        Egress Network EXP Marking
        Ingress Network Classification
    IP Interworking VLL (Ipipe) Services
      Ipipe VLL
      IP Interworking VLL Datapath
      Extension to IP VLL for Discovery of Ethernet CE IP Address
        VLL Ethernet SAP Procedures
          VLL FR SAP Procedures
          VLL ATM SAP Procedures
          VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      IPv6 Support on IP Interworking VLL
        IPv6 Datapath Operation
        IPv6 Stack Capability Signaling
    Services Configuration for MPLS-TP
      MPLS-TP SDPs
      VLL Spoke SDP Configuration
        Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      Configuring MPLS-TP Lock Instruct and Loopback
        MPLS-TP PW Lock Instruct and Loopback Overview
        Lock PW End-Point Model
        PW Redundancy and Lock Instruct and Loopback
        Configuring a Test SAP for an MPLS-TP PW
        Configuring an Administrative Lock
        Configuring a Loopback
    VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      VCCV BVD Support
      VCCV BFD Encapsulation on a Pseudowire
      BFD Session Operation
      Configuring VCCV BFD
    Pseudowire Switching
      Pseudowire Switching with Protection
      Pseudowire Switching Behavior
      Static-to-Dynamic Pseudowire Switching
      Ingress VLAN Swapping
        Ingress VLAN Translation
      Pseudowire Redundancy
      Dynamic Multi-Segment Pseudowire Routing
        Overview
        Pseudowire Routing
          Static Routing
          Explicit Paths
        Configuring VLLs using Dynamic MS-PWs
          Active/Passive T-PE Selection
          Automatic Endpoint Configuration
          Selecting a Path for an MS-PW
          Pseudowire Templates
        Pseudowire Redundancy
        VCCV OAM for Dynamic MS-PWs
        VCCV-Ping on Dynamic MS-PWs
        VCCV-Trace on Dynamic MS-PWs
      Example Dynamic MS-PW Configuration
      VLL Resilience with Two Destination PE Nodes
        Master-Slave Operation
          Interaction with SAP-Specific OAM
          Local Rules at Slave VLL PE
          Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          VLL Resilience for a Switched Pseudowire Path
      Pseudowire SAPs
      Epipe Using BGP-MH Site Support for Ethernet Tunnels
        Operational Overview
        Detailed Operation
          Sample Operation of G.8031 BGP-MH
        BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        T-LDP Status Notification Handling Rules of BGP-MH Epipes
          Rules for Processing Endpoint SAP Active/Standby Status Bits
          Rules for Processing, Merging Local, and Received Endpoint Operational Status
          Operation for BGP MH Site Support for Ethernet Tunnels
      Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      VLL Resilience for a Switched Pseudowire Path
    Pseudowire Redundancy Service Models
      Redundant VLL Service Model
      T-LDP Status Notification Handling Rules
        Processing Endpoint SAP Active/Standby Status Bits
        Processing and Merging
    High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      Primary Spoke-SDP Fallback to Secondary SAP
      Reversion to Primary Spoke SDP Path
      MC-APS and MC-LAG
        Failure Scenarios
    VLL Using G.8031 Protected Ethernet Tunnels
    MPLS Entropy Label and Hash Label
    BGP Virtual Private Wire Service (VPWS)
      Single-Homed BGP VPWS
      Dual-Homed BGP VPWS
      BGP VPWS Pseudowire Switching
        Pseudowire Signaling
        BGP VPWS Configuration Procedure
        Use of Pseudowire Template for BGP VPWS
        Use of Endpoint for BGP VPWS
    VLL Service Considerations
      SDPs
        SDP Statistics for VPLS and VLL Services
      SAP Encapsulations and Pseudowire Types
        PWE3 N-to-1 Cell Mode
        PWE3 AAL5 SDU Mode
        QoS Policies
        Filter Policies
        MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
   Virtual Private LAN Service
    In This Chapter
    VPLS Service Overview
      VPLS Packet Walkthrough
    VPLS Features
      VPLS Enhancements
      VPLS over MPLS
      VPLS Service Pseudowire VLAN Tag Processing
      VPLS MAC Learning and Packet Forwarding
        MAC Learning Protection
        DEI in IEEE 802.1ad
      VPLS Using G.8031 Protected Ethernet Tunnels
      Pseudowire Control Word
      Table Management
        FIB Size
        FIB Size Alarms
        Local and Remote Aging Timers
        Disable MAC Aging
        Disable MAC Learning
        Unknown MAC Discard
        VPLS and Rate Limiting
        MAC Move
        Auto-Learn MAC Protect
          Operation
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      VPLS and Spanning Tree Protocol
        Spanning Tree Operating Modes
        Multiple Spanning Tree
          Redundancy Access to VPLS
        MSTP for QinQ SAPs
        Provider MSTP
          MSTP General Principles
          MSTP in the SR-Series Platform
        Enhancements to the Spanning Tree Protocol
          L2PT Termination
          BPDU Translation
          L2PT and BPDU Translation
      Egress Multicast Groups
        Egress Multicast Group Provisioning
          Required Common SAP Parameters
          SAP Egress QoS Policy
          Efficient Multicast Egress SAP Chaining
          Mirroring and Efficient Multicast Replication
          IOM or XCM Chain Management
          IOM Mode B Capability
      VPLS Redundancy
        Spoke SDP Redundancy for Metro Interconnection
        Spoke SDP Based Redundant Access
        Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          Fast Detection of Peer Failure using BFD
          MC-EP Passive Mode
        Support for Single Chassis Endpoint Mechanisms
          MAC Flush Support in MC-EP
          Block-on-Mesh-Failure Support in MC-EP Scenario
          Support for Force Spoke SDP in MC-EP
          Revertive Behavior for Primary Pseudowire(s) in a MC-EP
        Using B-VPLS for Increased Scalability and Reduced Convergence Times
        MAC Flush Additions for PBB VPLS
      VPLS Access Redundancy
        STP-Based Redundant Access to VPLS
        Redundant Access to VPLS Without STP
      Object Grouping and State Monitoring
         VPLS Applicability — Block on VPLS a Failure
      MAC Flush Message Processing
        Dual Homing to a VPLS Service
        MC-Ring and VPLS
      ACL Next-Hop for VPLS
      SDP Statistics for VPLS and VLL Services
      BGP Auto-Discovery for LDP VPLS
        BGP AD Overview
        Information Model
        FEC Element for T-LDP Signaling
        BGP-AD and Target LDP (T-LDP) Interaction
        SDP Usage
        Automatic Creation of SDPs
        Manually Provisioned SDP
        Automatic Instantiation of Pseudowires (SDP Bindings)
        Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        Resiliency Schemes
      BGP VPLS
        Pseudowire Signaling Details
        Supported VPLS Features
      VCCV BFD Support for VPLS Services
      BGP Multi-Homing for VPLS
        Information Model and Required Extensions to L2VPN NLRI
        Supported Services and Multi-Homing Objects
        Blackhole Avoidance
          MAC Flush to the Core PEs
          Indicating non-DF status towards the access PE or CE
        BGP Multi-Homing for VPLS Inter-Domain Resiliency
      Multicast-Aware VPLS
        IGMP Snooping for VPLS
        MLD Snooping for VPLS
        PIM Snooping for VPLS
          Plain PIM Snooping
          PIM Proxy
        MAC-Based IPv6 Multicast Forwarding
        PIM and IGMP/MLD Snooping Interaction
        Multi-Chassis Synchronization for Layer 2 Snooping States
          IGMP Snooping Synchronization
          MLD Snooping Synchronization
          PIM Snooping for IPv4 Synchronization
        VPLS Multicast-Aware High Availability Features
      RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      MPLS Entropy Label and Hash Label
    Routed VPLS and I-VPLS
      IES or VPRN IP Interface Binding
        Assigning a Service Name to a VPLS Service
        Service Binding Requirements
        Bound Service Name Assignment
        Binding a Service Name to an IP Interface
        Bound Service Deletion or Service Name Removal
        IP Interface Attached VPLS Service Constraints
        IP Interface and VPLS Operational State Coordination
      IP Interface MTU and Fragmentation
        Unicast IP Routing into a VPLS Service
      ARP and VPLS FIB Interactions
        Routed VPLS Specific ARP Cache Behavior
      The allow-ip-int-bind VPLS Flag
        Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        Network Ports Restricted to FP2-Based Systems or IOMs
        LAG Port Membership Constraints
        Routed VPLS Feature Restrictions
        Routed I-VPLS Feature Restrictions
      IES IP Interface VPLS Binding and Chassis Mode Interaction
      VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      Route Leaking Between Routing Contexts
        Ingress LAG and FP1 to Routed VPLS Discards
      IPv4 and IPv6 Multicast Routing Support
      BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      Routed VPLS Caveats
        VPLS SAP Ingress IP Filter Override
        IP Interface Defined Egress QoS Reclassification
        Remarking for VPLS and Routed Packets
        7450 Mixed Mode Chassis
        IPv4 Multicast Routing
        Routed VPLS Supported Routing Related Protocols
        Spanning Tree and Split Horizon
    VPLS Service Considerations
      SAP Encapsulations
      VLAN Processing
      Ingress VLAN Swapping
      Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        Configure the MVRP Infrastructure using an M-VPLS Context
        Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        MVRP Activation of Service Connectivity
        MVRP Control Plane
        STP-MVRP Interaction
          Interaction Between MVRP and Instantiated SAP Status
          Using Temporary Flooding to Optimize Failover Times
      VPLS E-Tree Services
        VPLS E-Tree Services Overview
        Leaf-ac and Root-ac SAPs
        Leaf-ac and Root-ac SDP Binds
        Root-leaf-tag SAPs
        Root-leaf-tag SDP Binds
        Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
   IEEE 802.1ah Provider Backbone Bridging
    In This Chapter
    IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    PBB Features
      Integrated PBB-VPLS Solution
      PBB Technology
      PBB Mapping to Existing VPLS Configurations
      SAP and SDP Support
        PBB B-VPLS
        PBB I-VPLS
      PBB Packet Walkthrough
        PBB Control Planes
      Shortest Path Bridging MAC Mode (SPBM)
        Flooding and Learning Versus Link State
        SPB for B-VPLS
        Control B-VPLS and User B-VPLS
        Shortest Path and Single Tree
        Data Path and Forwarding
        SPB Ethernet OAM
        SPB Levels
      SPBM to Non-SPBM Interworking
        Static MACs and Static ISIDs
        Epipe Static Configuration
          I-VPLS Static Config
        SPBM ISID Policies
      ISID Policy Control
        Static ISID Advertisement
        I-VPLS for Unicast Service
      Default Behaviors
      Example Network Configuration
        Sample Configuration for Dut-A
          Show Commands Outputs
          Debug Commands
          Tools Commands
          Clear Commands
      IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      MMRP Support Over B-VPLS SAPs and SDPs
        I-VPLS Changes and Related MMRP Behavior
        Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        Optimization for Improved Convergence Time
        Controlling MRP Scope using MRP Policies
      PBB and BGP-AD
      PBB ELINE Service
        Non-Redundant PBB Epipe Spoke Termination
      PBB Using G.8031-Protected Ethernet Tunnels
        Solution Overview
        Detailed Solution Description
        Detailed PBB Emulated LAG Solution Description
        Support Service and Solution Combinations
      Periodic MAC Notification
      MAC Flush
        PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          Porting existing VPLS LDP MAC Flush in PBB VPLS
          PBB Blackholing Issue
          LDP MAC Flush Solution for PBB Blackholing
      Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        Solution Description for I-VPLS Over Native PBB Core
        Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          Dual-Homing into PBB Epipe - Local Switching Use Case
      BGP Multi-homing for I-VPLS
      Access Multi-Homing over MPLS for PBB Epipes
      PBB and IGMP/MLD Snooping
      PBB QoS
        Transparency of Customer QoS Indication through PBB Backbone
          Configuration Examples
          Details Solution Description
      Egress B-SAP per ISID Shaping
        B-SAP Egress ISID Shaping Configuration
        Provisioning Model
        Egress Queue Scheduling
        B-SAP per-ISID Shaping Configuration Example
      PBB OAM
        Mirroring
        OAM Commands
        CFM Support
    Configuration Examples
      PBB using G.8031 Protected Ethernet Tunnels
      MC-LAG Multihoming for Native PBB
      Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
   Ethernet Virtual Private Networks (EVPNs)
    In This Chapter
    Overview
    EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    EVPN for MPLS Tunnels in ELAN Services
    EVPN for MPLS Tunnels in ELINE Services
    EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    VXLAN
      VXLAN ECMP and LAG
      VXLAN VPLS Tag Handling
      VXLAN MTU Considerations
      VXLAN QoS
        Ingress
        Egress
      VXLAN Ping
      IGMP-Snooping on VXLAN
    BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    EVPN for VXLAN in VPLS Services
      Resiliency and BGP Multi-Homing
      Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      Use of the unknown-mac-route
    EVPN for VXLAN in R-VPLS Services
    EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    DC GW integration with the Nuage Virtual Services Directory (VSD)
      XMPP Interface on the DC GW
      Overview of the Static-Dynamic VSD Integration Model
        Step 1
        Step 2
        Step 3
        Step 4
        Step 5
      VSD-Domains and Association to Static-Dynamic Services
        VSD-Domain Type L2-DOMAIN
        VSD-Domain Type L2-DOMAIN-IRB
        VSD-Domain Type VRF-GRE
        VSD-Domain Type VRF-VXLAN
    Fully-Dynamic VSD Integration Model
      Step 1
      Step 2
      Step 3
      Step 4
      Step 5
      Python Script Implementation Details
      Provisioning Filters using the VSD Fully Dynamic Model
    BGP-EVPN Control Plane for MPLS Tunnels
    EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      EVPN and VPLS Integration
      Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      EVPN Multi-Homing in VPLS Services
      EVPN All-Active Multi-Homing
      All-Active Multi-Homing Service Model
      ES Discovery and DF Election Procedures
      Aliasing
      Network Failures and Convergence for All-Active Multi-Homing
        Logical Failures on Ethernet Segments and Black-Holes
        Transient Issues Due to MAC Route Delays
      EVPN Single-Active Multi-Homing
        Single-Active Multi-Homing Service Model
        ES and DF Election Procedures
        Backup PE Function
        Network Failures and Convergence for Single-Active Multi-Homing
          Logical Failures on Ethernet Segments and Black-Holes
    BGP-EVPN Control Plane for EVPN-VPWS
    EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    EVPN for MPLS Tunnels in Routed VPLS Services
    P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    BGP-EVPN Control Plane for PBB-EVPN
      EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      EVPN Route Type 4 - Ethernet Segment Route
    PBB-EVPN for I-VPLS and PBB Epipe Services
      Flood Containment for I-VPLS Services
      PBB-EVPN and PBB-VPLS Integration
      PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        System BMAC Assignment in PBB-EVPN
        PBB-EVPN all-active multi-homing service model
          Network failures and convergence for all-active multi-homing
        PBB-EVPN Single-Active Multi-Homing Service Model
          Network Failures and Convergence for Single-Active Multihoming
        PBB-Epipes and EVPN Multi-Homing
        PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
    ARP/ND Snooping and Proxy Support
      Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      Proxy-ND and the Router Flag in Neighbor Advertisement messages
        Procedure to Add the R Flag to a Specified Entry
    BGP-EVPN MAC-Mobility
    BGP-EVPN MAC-Duplication
    Conditional Static MAC and Protection
    Auto-Learn MAC Protect and Restricting Protected Source MACs
    Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    CFM Interaction with EVPN Services
    DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    BGP and EVPN Route Selection for EVPN Routes
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    Interaction of PBB-EVPN with Existing VPLS Features
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    Routing Policies for BGP EVPN IP Prefixes
    MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
   VLL Services
    In This Chapter
    ATM VLL (Apipe) Services
      ATM VLL For End-to-End ATM Service
      ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      Traffic Management Support
        Ingress Network Classification
        Ingress Queuing and Shaping on the IOM
        Egress Queuing and Shaping on the IOM
        Egress Shaping/Scheduling
    Circuit Emulation Services (Cpipe)
      Mobile Infrastructure
      Circuit Emulation Modes
      Circuit Emulation Parameters
        Circuit Emulation Modes
        Absolute Mode Option
        Payload Size
        Jitter Buffer
        CES Circuit Operation
      Services for Transporting CES Circuits
      Network Synchronization Considerations
      Cpipe Payload
    Ethernet Pipe (Epipe) Services
      Epipe Service Overview
      Epipe Service Pseudowire VLAN Tag Processing
      Epipe Up Operational State Configuration Option
      Epipe with PBB
      Epipe over L2TPv3
      Ethernet Interworking VLL
      VLL CAC
      MC-Ring and VLL
    Frame Relay VLL (Fpipe) Services
      Frame Relay VLL
      Frame Relay-to-ATM Interworking (FRF.5) VLL
      Traffic Management Support
        Frame Relay Traffic Management
        Ingress SAP Classification and Marking
        Egress Network EXP Marking
        Ingress Network Classification
    IP Interworking VLL (Ipipe) Services
      Ipipe VLL
      IP Interworking VLL Datapath
      Extension to IP VLL for Discovery of Ethernet CE IP Address
        VLL Ethernet SAP Procedures
          VLL FR SAP Procedures
          VLL ATM SAP Procedures
          VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      IPv6 Support on IP Interworking VLL
        IPv6 Datapath Operation
        IPv6 Stack Capability Signaling
    Services Configuration for MPLS-TP
      MPLS-TP SDPs
      VLL Spoke SDP Configuration
        Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      Configuring MPLS-TP Lock Instruct and Loopback
        MPLS-TP PW Lock Instruct and Loopback Overview
        Lock PW End-Point Model
        PW Redundancy and Lock Instruct and Loopback
        Configuring a Test SAP for an MPLS-TP PW
        Configuring an Administrative Lock
        Configuring a Loopback
    VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      VCCV BVD Support
      VCCV BFD Encapsulation on a Pseudowire
      BFD Session Operation
      Configuring VCCV BFD
    Pseudowire Switching
      Pseudowire Switching with Protection
      Pseudowire Switching Behavior
      Static-to-Dynamic Pseudowire Switching
      Ingress VLAN Swapping
        Ingress VLAN Translation
      Pseudowire Redundancy
      Dynamic Multi-Segment Pseudowire Routing
        Overview
        Pseudowire Routing
          Static Routing
          Explicit Paths
        Configuring VLLs using Dynamic MS-PWs
          Active/Passive T-PE Selection
          Automatic Endpoint Configuration
          Selecting a Path for an MS-PW
          Pseudowire Templates
        Pseudowire Redundancy
        VCCV OAM for Dynamic MS-PWs
        VCCV-Ping on Dynamic MS-PWs
        VCCV-Trace on Dynamic MS-PWs
      Example Dynamic MS-PW Configuration
      VLL Resilience with Two Destination PE Nodes
        Master-Slave Operation
          Interaction with SAP-Specific OAM
          Local Rules at Slave VLL PE
          Operation of Master-Slave Pseudowire Redundancy with Existing Scenarios
          VLL Resilience for a Switched Pseudowire Path
      Pseudowire SAPs
      Epipe Using BGP-MH Site Support for Ethernet Tunnels
        Operational Overview
        Detailed Operation
          Sample Operation of G.8031 BGP-MH
        BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        T-LDP Status Notification Handling Rules of BGP-MH Epipes
          Rules for Processing Endpoint SAP Active/Standby Status Bits
          Rules for Processing, Merging Local, and Received Endpoint Operational Status
          Operation for BGP MH Site Support for Ethernet Tunnels
      Access Node Resilience Using MC-LAG and Pseudowire Redundancy
      VLL Resilience for a Switched Pseudowire Path
    Pseudowire Redundancy Service Models
      Redundant VLL Service Model
      T-LDP Status Notification Handling Rules
        Processing Endpoint SAP Active/Standby Status Bits
        Processing and Merging
    High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      Primary Spoke-SDP Fallback to Secondary SAP
      Reversion to Primary Spoke SDP Path
      MC-APS and MC-LAG
        Failure Scenarios
    VLL Using G.8031 Protected Ethernet Tunnels
    MPLS Entropy Label and Hash Label
    BGP Virtual Private Wire Service (VPWS)
      Single-Homed BGP VPWS
      Dual-Homed BGP VPWS
      BGP VPWS Pseudowire Switching
        Pseudowire Signaling
        BGP VPWS Configuration Procedure
        Use of Pseudowire Template for BGP VPWS
        Use of Endpoint for BGP VPWS
    VLL Service Considerations
      SDPs
        SDP Statistics for VPLS and VLL Services
      SAP Encapsulations and Pseudowire Types
        PWE3 N-to-1 Cell Mode
        PWE3 AAL5 SDU Mode
        QoS Policies
        Filter Policies
        MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
   Virtual Private LAN Service
    In This Chapter
    VPLS Service Overview
      VPLS Packet Walkthrough
    VPLS Features
      VPLS Enhancements
      VPLS over MPLS
      VPLS Service Pseudowire VLAN Tag Processing
      VPLS MAC Learning and Packet Forwarding
        MAC Learning Protection
        DEI in IEEE 802.1ad
      VPLS Using G.8031 Protected Ethernet Tunnels
      Pseudowire Control Word
      Table Management
        FIB Size
        FIB Size Alarms
        Local and Remote Aging Timers
        Disable MAC Aging
        Disable MAC Learning
        Unknown MAC Discard
        VPLS and Rate Limiting
        MAC Move
        Auto-Learn MAC Protect
          Operation
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      VPLS and Spanning Tree Protocol
        Spanning Tree Operating Modes
        Multiple Spanning Tree
          Redundancy Access to VPLS
        MSTP for QinQ SAPs
        Provider MSTP
          MSTP General Principles
          MSTP in the SR-Series Platform
        Enhancements to the Spanning Tree Protocol
          L2PT Termination
          BPDU Translation
          L2PT and BPDU Translation
      Egress Multicast Groups
        Egress Multicast Group Provisioning
          Required Common SAP Parameters
          SAP Egress QoS Policy
          Efficient Multicast Egress SAP Chaining
          Mirroring and Efficient Multicast Replication
          IOM or XCM Chain Management
          IOM Mode B Capability
      VPLS Redundancy
        Spoke SDP Redundancy for Metro Interconnection
        Spoke SDP Based Redundant Access
        Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          Fast Detection of Peer Failure using BFD
          MC-EP Passive Mode
        Support for Single Chassis Endpoint Mechanisms
          MAC Flush Support in MC-EP
          Block-on-Mesh-Failure Support in MC-EP Scenario
          Support for Force Spoke SDP in MC-EP
          Revertive Behavior for Primary Pseudowire(s) in a MC-EP
        Using B-VPLS for Increased Scalability and Reduced Convergence Times
        MAC Flush Additions for PBB VPLS
      VPLS Access Redundancy
        STP-Based Redundant Access to VPLS
        Redundant Access to VPLS Without STP
      Object Grouping and State Monitoring
         VPLS Applicability — Block on VPLS a Failure
      MAC Flush Message Processing
        Dual Homing to a VPLS Service
        MC-Ring and VPLS
      ACL Next-Hop for VPLS
      SDP Statistics for VPLS and VLL Services
      BGP Auto-Discovery for LDP VPLS
        BGP AD Overview
        Information Model
        FEC Element for T-LDP Signaling
        BGP-AD and Target LDP (T-LDP) Interaction
        SDP Usage
        Automatic Creation of SDPs
        Manually Provisioned SDP
        Automatic Instantiation of Pseudowires (SDP Bindings)
        Mixing Statically Configured and Auto-Discovered Pseudowires in a VPLS
        Resiliency Schemes
      BGP VPLS
        Pseudowire Signaling Details
        Supported VPLS Features
      VCCV BFD Support for VPLS Services
      BGP Multi-Homing for VPLS
        Information Model and Required Extensions to L2VPN NLRI
        Supported Services and Multi-Homing Objects
        Blackhole Avoidance
          MAC Flush to the Core PEs
          Indicating non-DF status towards the access PE or CE
        BGP Multi-Homing for VPLS Inter-Domain Resiliency
      Multicast-Aware VPLS
        IGMP Snooping for VPLS
        MLD Snooping for VPLS
        PIM Snooping for VPLS
          Plain PIM Snooping
          PIM Proxy
        MAC-Based IPv6 Multicast Forwarding
        PIM and IGMP/MLD Snooping Interaction
        Multi-Chassis Synchronization for Layer 2 Snooping States
          IGMP Snooping Synchronization
          MLD Snooping Synchronization
          PIM Snooping for IPv4 Synchronization
        VPLS Multicast-Aware High Availability Features
      RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      MPLS Entropy Label and Hash Label
    Routed VPLS and I-VPLS
      IES or VPRN IP Interface Binding
        Assigning a Service Name to a VPLS Service
        Service Binding Requirements
        Bound Service Name Assignment
        Binding a Service Name to an IP Interface
        Bound Service Deletion or Service Name Removal
        IP Interface Attached VPLS Service Constraints
        IP Interface and VPLS Operational State Coordination
      IP Interface MTU and Fragmentation
        Unicast IP Routing into a VPLS Service
      ARP and VPLS FIB Interactions
        Routed VPLS Specific ARP Cache Behavior
      The allow-ip-int-bind VPLS Flag
        Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        Network Ports Restricted to FP2-Based Systems or IOMs
        LAG Port Membership Constraints
        Routed VPLS Feature Restrictions
        Routed I-VPLS Feature Restrictions
      IES IP Interface VPLS Binding and Chassis Mode Interaction
      VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      Route Leaking Between Routing Contexts
        Ingress LAG and FP1 to Routed VPLS Discards
      IPv4 and IPv6 Multicast Routing Support
      BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      Routed VPLS Caveats
        VPLS SAP Ingress IP Filter Override
        IP Interface Defined Egress QoS Reclassification
        Remarking for VPLS and Routed Packets
        7450 Mixed Mode Chassis
        IPv4 Multicast Routing
        Routed VPLS Supported Routing Related Protocols
        Spanning Tree and Split Horizon
    VPLS Service Considerations
      SAP Encapsulations
      VLAN Processing
      Ingress VLAN Swapping
      Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        Configure the MVRP Infrastructure using an M-VPLS Context
        Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        MVRP Activation of Service Connectivity
        MVRP Control Plane
        STP-MVRP Interaction
          Interaction Between MVRP and Instantiated SAP Status
          Using Temporary Flooding to Optimize Failover Times
      VPLS E-Tree Services
        VPLS E-Tree Services Overview
        Leaf-ac and Root-ac SAPs
        Leaf-ac and Root-ac SDP Binds
        Root-leaf-tag SAPs
        Root-leaf-tag SDP Binds
        Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
   IEEE 802.1ah Provider Backbone Bridging
    In This Chapter
    IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    PBB Features
      Integrated PBB-VPLS Solution
      PBB Technology
      PBB Mapping to Existing VPLS Configurations
      SAP and SDP Support
        PBB B-VPLS
        PBB I-VPLS
      PBB Packet Walkthrough
        PBB Control Planes
      Shortest Path Bridging MAC Mode (SPBM)
        Flooding and Learning Versus Link State
        SPB for B-VPLS
        Control B-VPLS and User B-VPLS
        Shortest Path and Single Tree
        Data Path and Forwarding
        SPB Ethernet OAM
        SPB Levels
      SPBM to Non-SPBM Interworking
        Static MACs and Static ISIDs
        Epipe Static Configuration
          I-VPLS Static Config
        SPBM ISID Policies
      ISID Policy Control
        Static ISID Advertisement
        I-VPLS for Unicast Service
      Default Behaviors
      Example Network Configuration
        Sample Configuration for Dut-A
          Show Commands Outputs
          Debug Commands
          Tools Commands
          Clear Commands
      IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      MMRP Support Over B-VPLS SAPs and SDPs
        I-VPLS Changes and Related MMRP Behavior
        Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        Optimization for Improved Convergence Time
        Controlling MRP Scope using MRP Policies
      PBB and BGP-AD
      PBB ELINE Service
        Non-Redundant PBB Epipe Spoke Termination
      PBB Using G.8031-Protected Ethernet Tunnels
        Solution Overview
        Detailed Solution Description
        Detailed PBB Emulated LAG Solution Description
        Support Service and Solution Combinations
      Periodic MAC Notification
      MAC Flush
        PBB Resiliency for B-VPLS Over Pseudowire Infrastructure
          Porting existing VPLS LDP MAC Flush in PBB VPLS
          PBB Blackholing Issue
          LDP MAC Flush Solution for PBB Blackholing
      Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        Solution Description for I-VPLS Over Native PBB Core
        Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          Dual-Homing into PBB Epipe - Local Switching Use Case
      BGP Multi-homing for I-VPLS
      Access Multi-Homing over MPLS for PBB Epipes
      PBB and IGMP/MLD Snooping
      PBB QoS
        Transparency of Customer QoS Indication through PBB Backbone
          Configuration Examples
          Details Solution Description
      Egress B-SAP per ISID Shaping
        B-SAP Egress ISID Shaping Configuration
        Provisioning Model
        Egress Queue Scheduling
        B-SAP per-ISID Shaping Configuration Example
      PBB OAM
        Mirroring
        OAM Commands
        CFM Support
    Configuration Examples
      PBB using G.8031 Protected Ethernet Tunnels
      MC-LAG Multihoming for Native PBB
      Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
   Ethernet Virtual Private Networks (EVPNs)
    In This Chapter
    Overview
    EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    EVPN for MPLS Tunnels in ELAN Services
    EVPN for MPLS Tunnels in ELINE Services
    EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    VXLAN
      VXLAN ECMP and LAG
      VXLAN VPLS Tag Handling
      VXLAN MTU Considerations
      VXLAN QoS
        Ingress
        Egress
      VXLAN Ping
      IGMP-Snooping on VXLAN
    BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    EVPN for VXLAN in VPLS Services
      Resiliency and BGP Multi-Homing
      Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      Use of the unknown-mac-route
    EVPN for VXLAN in R-VPLS Services
    EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    DC GW integration with the Nuage Virtual Services Directory (VSD)
      XMPP Interface on the DC GW
      Overview of the Static-Dynamic VSD Integration Model
        Step 1
        Step 2
        Step 3
        Step 4
        Step 5
      VSD-Domains and Association to Static-Dynamic Services
        VSD-Domain Type L2-DOMAIN
        VSD-Domain Type L2-DOMAIN-IRB
        VSD-Domain Type VRF-GRE
        VSD-Domain Type VRF-VXLAN
    Fully-Dynamic VSD Integration Model
      Step 1
      Step 2
      Step 3
      Step 4
      Step 5
      Python Script Implementation Details
      Provisioning Filters using the VSD Fully Dynamic Model
    BGP-EVPN Control Plane for MPLS Tunnels
    EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      EVPN and VPLS Integration
      Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      EVPN Multi-Homing in VPLS Services
      EVPN All-Active Multi-Homing
      All-Active Multi-Homing Service Model
      ES Discovery and DF Election Procedures
      Aliasing
      Network Failures and Convergence for All-Active Multi-Homing
        Logical Failures on Ethernet Segments and Black-Holes
        Transient Issues Due to MAC Route Delays
      EVPN Single-Active Multi-Homing
        Single-Active Multi-Homing Service Model
        ES and DF Election Procedures
        Backup PE Function
        Network Failures and Convergence for Single-Active Multi-Homing
          Logical Failures on Ethernet Segments and Black-Holes
    BGP-EVPN Control Plane for EVPN-VPWS
    EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    EVPN for MPLS Tunnels in Routed VPLS Services
    P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    BGP-EVPN Control Plane for PBB-EVPN
      EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      EVPN Route Type 4 - Ethernet Segment Route
    PBB-EVPN for I-VPLS and PBB Epipe Services
      Flood Containment for I-VPLS Services
      PBB-EVPN and PBB-VPLS Integration
      PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        System BMAC Assignment in PBB-EVPN
        PBB-EVPN all-active multi-homing service model
          Network failures and convergence for all-active multi-homing
        PBB-EVPN Single-Active Multi-Homing Service Model
          Network Failures and Convergence for Single-Active Multihoming
        PBB-Epipes and EVPN Multi-Homing
        PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
    ARP/ND Snooping and Proxy Support
      Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      Proxy-ND and the Router Flag in Neighbor Advertisement messages
        Procedure to Add the R Flag to a Specified Entry
    BGP-EVPN MAC-Mobility
    BGP-EVPN MAC-Duplication
    Conditional Static MAC and Protection
    Auto-Learn MAC Protect and Restricting Protected Source MACs
    Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    CFM Interaction with EVPN Services
    DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    BGP and EVPN Route Selection for EVPN Routes
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    Interaction of PBB-EVPN with Existing VPLS Features
    Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    Routing Policies for BGP EVPN IP Prefixes
    MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Layer 3 Services Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
   Internet Enhanced Service
    In This Chapter
    IES Service Overview
    IES Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP Interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
          IES IP Interface Applicability
      Subscriber Interfaces
        IPv6 Enhanced Subscriber Management (ESM)
        RADIUS Accounting
      SAPs
        Encapsulations
        ATM SAP Encapsulations for IES
        Pseudowire SAPs
        Encapsulation
        Pseudowire SAP Configuration
        QoS for Pseudowire Ports and Pseudowire SAPs
        Shaping and Bandwidth Control
        Lag Considerations
        Last Mile Packet Size Adjustment
        Redundancy with Pseudowire SAPs
        Operational Group Support for PW Ports
      Routing Protocols
        CPE Connectivity Check
      QoS Policies
      Filter Policies
      MPLS Entropy Label and Hash Label
      Spoke SDPs
      SRRP
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
        BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Managment Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
          Redundant Interface Commands
          IES Subscriber Interface Commands
        IES Interface Commands
          IES Interface DHCP Commands
          PPPoE Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
          ATM Commands
          IES Interface VRRP Commands
          IPSec Gateway Commands
          Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
   Virtual Private Routed Network Service
    In This Chapter
    VPRN Service Overview
      Routing Prerequisites
      Core MP-BGP Support
      Route Distinguishers
        eiBGP Load Balancing
      Route Reflector
      CE to PE Route Exchange
        Route Redistribution
        CPE Connectivity Check
      Constrained Route Distribution (RT Constraint)
        Constrained VPN Route Distribution Based on Route Targets
        Configuring the Route Target Address Family
        Originating RT Constraint Routes
        Receiving and Re-Advertising RT Constraint Routes
        Using RT Constraint Routes
      BGP Fast Reroute in a VPRN
        BGP Fast Reroute in a VPRN Configuration
      BGP Best-External in a VPRN Context
    VPRN Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
        QPPB Applications
        Inter-AS Coordination of QoS Policies
        Traffic Differentiation Based on Route Characteristics
        QPPB
        Associating an FC and Priority with a Route
        Displaying QoS Information Associated with Routes
        Enabling QPPB on an IP interface
        QPPB When Next-Hops are Resolved by QPPB Routes
        QPPB and Multiple Paths to a Destination
        QPPB and Policy-Based Routing
        QPPB and GRT Lookup
        QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
        VPRN IP Interface Applicability
      Subscriber Interfaces
      SAPs
        Encapsulations
        ATM SAP Encapsulations for VPRN Services
        Pseudowire SAPs
      QoS Policies
      Filter Policies
      DSCP Marking
        Default DSCP Mapping Table
      Configuration of TTL Propagation for VPRN Routes
      CE to PE Routing Protocols
        PE to PE Tunneling Mechanisms
        Per VRF Route Limiting
      Spoke SDPs
        T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        Spoke SDP Redundancy into IES/VPRN
      IP-VPNs
        Using OSPF in IP-VPNs
      IPCP Subnet Negotiation
      Cflowd for IP-VPNs
      Inter-AS VPRNs
      Carrier Supporting Carrier (CsC)
        Terminology
        CSC Connectivity Models
        CSC-PE Configuration and Operation
        CSC Interface
        QoS
        MPLS
        CSC VPRN Service Configuration
      Traffic Leaking to GRT
      Traffic Leaking from VPRN to GRT for IPv6
      RIP Metric Propagation in VPRNs
      NTP Within a VPRN Service
      PTP Within a VPRN Service
      VPN Route Label Allocation
        Configuring the Service Label Mode
        Restrictions and Usage Notes
      VPRN Support for BGP Flowspec
      MPLS Entropy Label and Hash Label
    QoS on Ingress Bindings
    Multicast in IP-VPN Applications
      Use of Data MDTs
      Multicast Protocols Supported in the Provider Network
      MVPN Membership Auto-discovery using BGP
      MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
      PE-PE Transmission of C-Multicast Routing using BGP
      VRF Route Import Extended Community
      Provider Tunnel Support
        Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        P2MP RSVP-TE I-PMSI and S-PMSI
        P2MP LDP I-PMSI and S-PMSI
        Wildcard (C-*, C-*) P2MP LSP S-PMSI
        P2MP LSP S-PMSI
        Dynamic Multicast Signaling over P2MP LDP in VRF
        MVPN Sender-only/Receiver-only
        S-PMSI Trigger Thresholds
        Migration from Existing Rosen Implementation
      MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      Multicast VPN Extranet
        Multicast Extranet for Rosen MVPN for PIM SSM
        Multicast Extranet for NG-MVPN for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM SSM
        Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM ASM
      Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      Multicast Auto RP Discovery
      IPv6 MVPN Support
      Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      NG-MVPN Multicast Source Geo-Redundancy
      Multicast Core Diversity for Rosen MDT SAFI MVPNs
      Inter-AS MVPN
        BGP Connector Attribute
        PIM RPF Vector
        Inter-AS MVPN Option B
        Inter-AS MVPN Option C
    VPRN Off-Ramp
      DDoS Off-Ramping Through Flowspec
    FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        IGMP Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        Log Commands
        Multicast VPN Commands
        Network Time Protocol Commands
        Redundant Interface Commands
        SDP Commands
        Interface Commands
          Interface DHCP Commands
          Interface ICMP Commands
          Interface ICMP Commands
        Router Advertisement Commands
          NAT Commands
          Subscriber Interface Commands
          PPPoE Commands
          Interface ICMP Commands
          Interface SAP Commands
          Interface SAP ATM Commands
          Interface Anti-Spoofing Commands
          Interface SAP Filter and QoS Policy Commands
          Routed VPLS Commands
        ETH-CFM Service Commands
        SAP Subscriber Management Commands
        Interface VRRP Commands
        PIM Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        Network Interface Commands
        Network Ingress Commands
        BGP Commands
        IS-IS Commands
        OSPF Commands
        RIP Commands
        IPSec Configuration Commands
          Threat Management Service Interface Commands
          RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
   Internet Enhanced Service
    In This Chapter
    IES Service Overview
    IES Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP Interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
          IES IP Interface Applicability
      Subscriber Interfaces
        IPv6 Enhanced Subscriber Management (ESM)
        RADIUS Accounting
      SAPs
        Encapsulations
        ATM SAP Encapsulations for IES
        Pseudowire SAPs
        Encapsulation
        Pseudowire SAP Configuration
        QoS for Pseudowire Ports and Pseudowire SAPs
        Shaping and Bandwidth Control
        Lag Considerations
        Last Mile Packet Size Adjustment
        Redundancy with Pseudowire SAPs
        Operational Group Support for PW Ports
      Routing Protocols
        CPE Connectivity Check
      QoS Policies
      Filter Policies
      MPLS Entropy Label and Hash Label
      Spoke SDPs
      SRRP
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
        BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Managment Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
          Redundant Interface Commands
          IES Subscriber Interface Commands
        IES Interface Commands
          IES Interface DHCP Commands
          PPPoE Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
          ATM Commands
          IES Interface VRRP Commands
          IPSec Gateway Commands
          Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
   Virtual Private Routed Network Service
    In This Chapter
    VPRN Service Overview
      Routing Prerequisites
      Core MP-BGP Support
      Route Distinguishers
        eiBGP Load Balancing
      Route Reflector
      CE to PE Route Exchange
        Route Redistribution
        CPE Connectivity Check
      Constrained Route Distribution (RT Constraint)
        Constrained VPN Route Distribution Based on Route Targets
        Configuring the Route Target Address Family
        Originating RT Constraint Routes
        Receiving and Re-Advertising RT Constraint Routes
        Using RT Constraint Routes
      BGP Fast Reroute in a VPRN
        BGP Fast Reroute in a VPRN Configuration
      BGP Best-External in a VPRN Context
    VPRN Features
      IP Interfaces
        QoS Policy Propagation Using BGP (QPPB)
        QPPB Applications
        Inter-AS Coordination of QoS Policies
        Traffic Differentiation Based on Route Characteristics
        QPPB
        Associating an FC and Priority with a Route
        Displaying QoS Information Associated with Routes
        Enabling QPPB on an IP interface
        QPPB When Next-Hops are Resolved by QPPB Routes
        QPPB and Multiple Paths to a Destination
        QPPB and Policy-Based Routing
        QPPB and GRT Lookup
        QPPB Interaction with SAP Ingress QoS Policy
        Object Grouping and State Monitoring
        VPRN IP Interface Applicability
      Subscriber Interfaces
      SAPs
        Encapsulations
        ATM SAP Encapsulations for VPRN Services
        Pseudowire SAPs
      QoS Policies
      Filter Policies
      DSCP Marking
        Default DSCP Mapping Table
      Configuration of TTL Propagation for VPRN Routes
      CE to PE Routing Protocols
        PE to PE Tunneling Mechanisms
        Per VRF Route Limiting
      Spoke SDPs
        T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        Spoke SDP Redundancy into IES/VPRN
      IP-VPNs
        Using OSPF in IP-VPNs
      IPCP Subnet Negotiation
      Cflowd for IP-VPNs
      Inter-AS VPRNs
      Carrier Supporting Carrier (CsC)
        Terminology
        CSC Connectivity Models
        CSC-PE Configuration and Operation
        CSC Interface
        QoS
        MPLS
        CSC VPRN Service Configuration
      Traffic Leaking to GRT
      Traffic Leaking from VPRN to GRT for IPv6
      RIP Metric Propagation in VPRNs
      NTP Within a VPRN Service
      PTP Within a VPRN Service
      VPN Route Label Allocation
        Configuring the Service Label Mode
        Restrictions and Usage Notes
      VPRN Support for BGP Flowspec
      MPLS Entropy Label and Hash Label
    QoS on Ingress Bindings
    Multicast in IP-VPN Applications
      Use of Data MDTs
      Multicast Protocols Supported in the Provider Network
      MVPN Membership Auto-discovery using BGP
      MVPN (Rosen) Membership Auto-Discovery using BGP MDT-SAFI
      PE-PE Transmission of C-Multicast Routing using BGP
      VRF Route Import Extended Community
      Provider Tunnel Support
        Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        P2MP RSVP-TE I-PMSI and S-PMSI
        P2MP LDP I-PMSI and S-PMSI
        Wildcard (C-*, C-*) P2MP LSP S-PMSI
        P2MP LSP S-PMSI
        Dynamic Multicast Signaling over P2MP LDP in VRF
        MVPN Sender-only/Receiver-only
        S-PMSI Trigger Thresholds
        Migration from Existing Rosen Implementation
      MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      Multicast VPN Extranet
        Multicast Extranet for Rosen MVPN for PIM SSM
        Multicast Extranet for NG-MVPN for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM SSM
        Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        Multicast Extranet with Per-group Mapping for PIM ASM
      Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      Multicast Auto RP Discovery
      IPv6 MVPN Support
      Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      NG-MVPN Multicast Source Geo-Redundancy
      Multicast Core Diversity for Rosen MDT SAFI MVPNs
      Inter-AS MVPN
        BGP Connector Attribute
        PIM RPF Vector
        Inter-AS MVPN Option B
        Inter-AS MVPN Option C
    VPRN Off-Ramp
      DDoS Off-Ramping Through Flowspec
    FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        IGMP Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        Log Commands
        Multicast VPN Commands
        Network Time Protocol Commands
        Redundant Interface Commands
        SDP Commands
        Interface Commands
          Interface DHCP Commands
          Interface ICMP Commands
          Interface ICMP Commands
        Router Advertisement Commands
          NAT Commands
          Subscriber Interface Commands
          PPPoE Commands
          Interface ICMP Commands
          Interface SAP Commands
          Interface SAP ATM Commands
          Interface Anti-Spoofing Commands
          Interface SAP Filter and QoS Policy Commands
          Routed VPLS Commands
        ETH-CFM Service Commands
        SAP Subscriber Management Commands
        Interface VRRP Commands
        PIM Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        Network Interface Commands
        Network Ingress Commands
        BGP Commands
        IS-IS Commands
        OSPF Commands
        RIP Commands
        IPSec Configuration Commands
          Threat Management Service Interface Commands
          RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
MPLS Guide R14.0.R1
  Getting Started
    About This Guide
    Alcatel-Lucent Router Configuration Process
   MPLS and RSVP
    In This Chapter
    MPLS
      MPLS Label Stack
        Label Values
      MPLS Entropy Label and Hash Label
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
        Egress LER
        Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        Entropy Label on OAM Packets
      Label Switching Routers
        LSP Types
      Bidirectional Forwarding Detection for MPLS LSPs
        Bootstrapping the BFD Session
        LSP BFD Configuration
        Enabling and Implementing Limits for LSP BFD on a Node
        BFD Configuration on RSVP-TE LSPs
        MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        Manual Bypass LSP
          PLR Bypass LSP Selection Rules
          FRR Node-Protection (Facility)
        Uniform FRR Failover Time
        MPLS/RSVP on Broadcast Interface
        Automatic Bandwidth Allocation for RSVP LSPs
          Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          Measurement of LSP Bandwidth
          Passive Monitoring of LSP Bandwidth
          Periodic Automatic Bandwidth Adjustment
          Overflow-Triggered Auto-Bandwidth Adjustment
          Manually-Triggered Auto-Bandwidth Adjustment
    RSVP
      Using RSVP for MPLS
        RSVP Traffic Engineering Extensions for MPLS
        Hello Protocol
        MD5 Authentication of RSVP Interface
        Configuring Authentication using Keychains
      Reservation Styles
        RSVP Message Pacing
      RSVP Overhead Refresh Reduction
      RSVP Graceful Restart Helper
      Enhancements to RSVP control plane congestion control
      RSVP LSP Statistics
      P2MP RSVP-TE LSP Statistics
        Configuring RSVP P2MP LSP Egress Statistics
        Configuring RSVP P2MP LSP Ingress Statistics
        Configuring Implicit Null
      Using Unnumbered Point-to-Point Interface in RSVP
        Operation of RSVP FRR Facility Backup over Unnumbered Interface
    MPLS Transport Profile
      MPLS-TP Model
      MPLS-TP Provider Edge and Gateway
        VLL Services
        Spoke-SDP Termination
      MPLS-TP LSR
      Detailed Descriptions of MPLS-TP
        MPLS-TP LSPs
        MPLS-TP on Pseudowires
      MPLS-TP Maintenance Identifiers
        Generic Associated Channel
        MPLS-TP Operations, Administration and Maintenance (OAM)
          On-Demand Connectivity Verification (CV) using LSP-Ping
          Proactive CC, CV and RDI
          BFD-based RDI
        PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        PW Control Channel Status Request Mechanism
        Pseudowire Redundancy and Active / Standby Dual Homing
        Lock Instruct and Loopback for MPLS-TP Pseudowires
        MPLS-TP LSP Protection
      Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      Alarm Indication Signal (AIS)
      Configuring MPLS-TP
        Configuration Overview
        Node-Wide MPLS-TP Parameter Configuration
        Node-Wide MPLS-TP Identifier Configuration
        Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        Interface Configuration for MPLS-TP
        LER Configuration for MPLS-TP
          LSP and Path Configuration
          Support for Downstream Mapping Information
          Proactive CC/CV (using BFD) Configuration
          Protection templates and Linear Protection Configuration
        Intermediate LSR Configuration for MPLS-TP LSPs
      MPLS-TP Show Commands
        Static MPLS Labels
        MPLS-TP Tunnel Configuration
        MPLS-TP Path configuration
        MPLS-TP Protection
        MPLS TP Node Configuration
        MPLS-TP Interfaces
      MPLS-TP Debug Commands
    Traffic Engineering
      TE Metric (IS-IS and OSPF)
      Admin Group Support on Facility Bypass Backup LSP
        Procedures at Head-End Node
        Procedures at PLR Node
      Diff-Serv Traffic Engineering
        Mapping of Traffic to a Diff-Serv LSP
        Admission Control of Classes
          Maximum Allocation Model
          Russian Doll Model
        RSVP Control Plane Extensions
        IGP Extensions
        Diff-Serv TE Configuration and Operation
          RSVP Protocol Level
          RSVP Interface Level
          LSP and LSP Path Levels
      Diff-Serv TE LSP Class Type Change under Failure
        LSP Primary Path Retry Procedures
        Bandwidth Sharing Across Class Types
        Downgrading the CT of Bandwidth Sharing LSP Paths
        Upgrading the CT of Bandwidth Sharing LSP Paths
    Advanced MPLS/RSVP Features
      Extending RSVP LSP to use Loopback Interfaces Other Than router-id
      LSP Path Change
      Manual LSP Path Switch
      Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      Automatic Creation of RSVP-TE LSP Mesh
      RSVP-TE LSP Shortcut for IGP Resolution
        Using LSP Relative Metric with IGP Shortcut
        ECMP Considerations
        Handling of Control Packets
        Forwarding Adjacency
        LDP Forwarding over IGP Shortcut
        Handling of Multicast Packets
          Disabling TTL Propagation in an LSP Shortcut
      RSVP-TE LSP Signaling using LSP Template
      Shared Risk Link Groups
        Enabling Disjoint Backup Paths
        SRLG Penalty Weights for Detour and Bypass LSPs
        Static Configurations of SRLG Memberships
      TE Graceful Shutdown
      Soft Preemption of Diff-Serv RSVP LSP
      Least-Fill Bandwidth Rule in CSPF ECMP Selection
      Inter-Area TE LSP (ERO Expansion Method)
        Area Border Node FRR Protection for Inter-Area LSP
          Rerouting of Inter-Area LSP
          Behavior of MPLS Options in Inter-Area LSP
        Inter-Area LSP support of OSPF Virtual Links
        Area Border Node FRR Protection for Inter-Area LSP
      Automatic Creation of a RSVP Mesh LSP
        Feature Configuration
        Feature Behavior
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding and Statistics
      Timer-based Reversion for RSVP-TE LSPs
      Automatic Creation of an RSVP One-Hop LSP
        Feature Configuration
        Feature Behavior
      MPLS Entropy Label
    Point-to-Multipoint (P2MP) RSVP LSP
      Application in Video Broadcast
      P2MP LSP Data Plane
        Procedures at Ingress LER Node
        Procedures at LSR Node
        Procedures at Branch LSR Node
        Procedures at Egress LER Node
        Procedures at BUD LSR Node
      Ingress Path Management for P2MP LSP Packets
        Ingress P2MP Path Management on XCM/IOM-3/IMMs
        Ingress P2MP Path Management on IOM-2
      RSVP Control Plane in a P2MP LSP
      Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        Procedures at Ingress LER Node
        Procedures at Egress LER Node
          Procedures with a Primary Tunnel Interface
    Segment Routing With Traffic Engineering (SR-TE)
      Configuring and Operating SR-TE
        SR-TE LSP Configuration Overview
        SR-TE LSP Instantiation
          PCC-Initiated and PCC-Controlled LSP
          PCC-Initiated and PCE-Computed/Controlled LSP
        SR-TE LSP Path Computation
        SR-TE LSP Protection
        Data Path Support
          SR-TE LSP Metric and MTU Settings
          Hash Label Support
        Static Route Resolution using SR-TE LSP
        BGP Shortcut using SR-TE LSP
        BGP Label Route Resolution using SR-TE LSP
        Service Packet Forwarding using SR-TE LSP
    MPLS Service Usage
      Service Distribution Paths
    MPLS/RSVP Configuration Process Overview
    Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
   GMPLS
    In This Chapter
    GMPLS
      Example Applications
        Use Case 1: Dynamic Connection Setup with Constraints
        Use Case 2: Multi-Layer Resiliency
    GMPLS UNI Architecture
      Addressing and End-to-End gLSP Architecture
    1830 PSS Identifiers
    Recovery Reference Models
      End to End Recovery (IP-layer)
      End to End ECMP
      End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      End to End Recovery (GMPLS Layer)
        Unprotected gLSP
        Full LSP Rerouting
        1: N Protection
        Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  PCEP
    In This Chapter
    Introduction to the Path Computation Element Protocol (PCEP)
      PCC and PCE Configuration
      Base Implementation of Path Computation Elements (PCE)
      PCEP Session Establishment and Maintenance
      PCEP Parameters
        Stateful PCE
        PCEP Extensions in Support of SR-TE LSPs
        LSP Initiation
          PCC-Initiated and PCE-Computed/Controlled LSPs
          LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
   Label Distribution Protocol
    In This Chapter
    Label Distribution Protocol
      LDP and MPLS
      LDP Architecture
      Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Other Reasons for Label Actions
        Cleanup
        Configuring Implicit Null Label
      Global LDP Filters
        Per LDP Peer FEC Import and Export Policies
      Configuring Multiple LDP LSR ID
      T-LDP hello reduction
      Tracking a T-LDP Peer with BFD
      Link LDP Hello Adjacency Tracking with BFD
      LDP LSP Statistics
    TTL Security for BGP and LDP
    ECMP Support for LDP
      Label Operations
    Unnumbered Interface Support in LDP
      Feature Configuration
      Operation of LDP over an Unnumbered IP Interface
        Link LDP
        Targeted LDP
        FEC Resolution
    LDP over RSVP Tunnels
      Signaling and Operation
        LDP Label Distribution and FEC Resolution
        Default FEC Resolution Procedure
        FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      Rerouting Around Failures
        LDP-over-RSVP Tunnel Protection
        ABR Protection
    LDP over RSVP Without Area Boundary
      LDP over RSVP and ECMP
    Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      Configuration and Operation
    LDP ECMP Uniform Failover
    LDP Fast-Reroute for IS-IS and OSPF Prefixes
      LDP FRR Configuration
        Reducing the Scope of the LFA Calculation by SPF
      LDP FRR Procedures
        ECMP Considerations
        LDP FRR and LDP Shortcut
        LDP FRR and LDP-over-RSVP
        LDP FRR and RSVP Shortcut (IGP Shortcut)
      IS-IS and OSPF Support for Loop-Free Alternate Calculation
        Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    mLDP Fast Upstream Switchover
    LDP FEC to BGP Label Route Stitching
      Configuration
      Detailed LDP FEC Resolution
      Detailed BGP Labeled Route Resolution
      Data Plane Forwarding
    LDP-SR Stitching for IPv4 prefixes (IS-IS)
      LDP-SR Stitching Configuration
      Stitching in the LDP-to-SR Direction
      Stitching in the SR-to-LDP Direction
    LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    Automatic Creation of a Targeted Hello Adjacency and LDP Session
      Feature Configuration
      Feature Behavior
    Multicast P2MP LDP for GRT
    LDP P2MP Support
      LDP P2MP Configuration
      LDP P2MP Protocol
      Make Before Break (MBB)
      ECMP Support
    Multicast LDP Fast Upstream Switchover
      Feature Configuration
      Feature Behavior
      Uniform Failover from Primary to Backup ILM
    Multi-Area and Multi-Instance Extensions to LDP
      LDP Shortcut for BGP Next-Hop Resolution
      LDP Shortcut for IGP Routes
        LDP Shortcut Configuration
        IGP Route Resolution
        LDP Shortcut Forwarding Plane
      ECMP Considerations
      Disabling TTL Propagation in an LSP Shortcut
    LDP Graceful Handling of Resource Exhaustion
      LDP Base Graceful Handling of Resources
    LDP Enhanced Graceful Handling of Resources
      LSR Overload Notification
      LSR Overload Protection Capability
      Procedures for LSR overload protection
    User Guidelines and Troubleshooting Procedures
      Common Procedures
      Base Resource Handling Procedures
      Enhanced Resource Handling Procedures
    LDP IPv6 Control and Data Planes
      LDP Operation in an IPv6 Network
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      Address and FEC Distribution
      Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services and Lawful Intercept
        Configuration at mirror source node
        Configuration at mirror destination node
      Static Route Resolution to a LDP IPv6 FEC
      IGP Route Resolution to a LDP IPv6 FEC
      OAM Support with LDP IPv6
      LDP IPv6 Interoperability Considerations
        Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    LDP Process Overview
    LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Alcatel-Lucent Router Configuration Process
   MPLS and RSVP
    In This Chapter
    MPLS
      MPLS Label Stack
        Label Values
      MPLS Entropy Label and Hash Label
        Inserting and Processing the Entropy Label
          Ingress LER
          LSR
        Egress LER
        Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        Entropy Label on OAM Packets
      Label Switching Routers
        LSP Types
      Bidirectional Forwarding Detection for MPLS LSPs
        Bootstrapping the BFD Session
        LSP BFD Configuration
        Enabling and Implementing Limits for LSP BFD on a Node
        BFD Configuration on RSVP-TE LSPs
        MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        Manual Bypass LSP
          PLR Bypass LSP Selection Rules
          FRR Node-Protection (Facility)
        Uniform FRR Failover Time
        MPLS/RSVP on Broadcast Interface
        Automatic Bandwidth Allocation for RSVP LSPs
          Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          Measurement of LSP Bandwidth
          Passive Monitoring of LSP Bandwidth
          Periodic Automatic Bandwidth Adjustment
          Overflow-Triggered Auto-Bandwidth Adjustment
          Manually-Triggered Auto-Bandwidth Adjustment
    RSVP
      Using RSVP for MPLS
        RSVP Traffic Engineering Extensions for MPLS
        Hello Protocol
        MD5 Authentication of RSVP Interface
        Configuring Authentication using Keychains
      Reservation Styles
        RSVP Message Pacing
      RSVP Overhead Refresh Reduction
      RSVP Graceful Restart Helper
      Enhancements to RSVP control plane congestion control
      RSVP LSP Statistics
      P2MP RSVP-TE LSP Statistics
        Configuring RSVP P2MP LSP Egress Statistics
        Configuring RSVP P2MP LSP Ingress Statistics
        Configuring Implicit Null
      Using Unnumbered Point-to-Point Interface in RSVP
        Operation of RSVP FRR Facility Backup over Unnumbered Interface
    MPLS Transport Profile
      MPLS-TP Model
      MPLS-TP Provider Edge and Gateway
        VLL Services
        Spoke-SDP Termination
      MPLS-TP LSR
      Detailed Descriptions of MPLS-TP
        MPLS-TP LSPs
        MPLS-TP on Pseudowires
      MPLS-TP Maintenance Identifiers
        Generic Associated Channel
        MPLS-TP Operations, Administration and Maintenance (OAM)
          On-Demand Connectivity Verification (CV) using LSP-Ping
          Proactive CC, CV and RDI
          BFD-based RDI
        PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        PW Control Channel Status Request Mechanism
        Pseudowire Redundancy and Active / Standby Dual Homing
        Lock Instruct and Loopback for MPLS-TP Pseudowires
        MPLS-TP LSP Protection
      Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      Alarm Indication Signal (AIS)
      Configuring MPLS-TP
        Configuration Overview
        Node-Wide MPLS-TP Parameter Configuration
        Node-Wide MPLS-TP Identifier Configuration
        Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        Interface Configuration for MPLS-TP
        LER Configuration for MPLS-TP
          LSP and Path Configuration
          Support for Downstream Mapping Information
          Proactive CC/CV (using BFD) Configuration
          Protection templates and Linear Protection Configuration
        Intermediate LSR Configuration for MPLS-TP LSPs
      MPLS-TP Show Commands
        Static MPLS Labels
        MPLS-TP Tunnel Configuration
        MPLS-TP Path configuration
        MPLS-TP Protection
        MPLS TP Node Configuration
        MPLS-TP Interfaces
      MPLS-TP Debug Commands
    Traffic Engineering
      TE Metric (IS-IS and OSPF)
      Admin Group Support on Facility Bypass Backup LSP
        Procedures at Head-End Node
        Procedures at PLR Node
      Diff-Serv Traffic Engineering
        Mapping of Traffic to a Diff-Serv LSP
        Admission Control of Classes
          Maximum Allocation Model
          Russian Doll Model
        RSVP Control Plane Extensions
        IGP Extensions
        Diff-Serv TE Configuration and Operation
          RSVP Protocol Level
          RSVP Interface Level
          LSP and LSP Path Levels
      Diff-Serv TE LSP Class Type Change under Failure
        LSP Primary Path Retry Procedures
        Bandwidth Sharing Across Class Types
        Downgrading the CT of Bandwidth Sharing LSP Paths
        Upgrading the CT of Bandwidth Sharing LSP Paths
    Advanced MPLS/RSVP Features
      Extending RSVP LSP to use Loopback Interfaces Other Than router-id
      LSP Path Change
      Manual LSP Path Switch
      Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      Automatic Creation of RSVP-TE LSP Mesh
      RSVP-TE LSP Shortcut for IGP Resolution
        Using LSP Relative Metric with IGP Shortcut
        ECMP Considerations
        Handling of Control Packets
        Forwarding Adjacency
        LDP Forwarding over IGP Shortcut
        Handling of Multicast Packets
          Disabling TTL Propagation in an LSP Shortcut
      RSVP-TE LSP Signaling using LSP Template
      Shared Risk Link Groups
        Enabling Disjoint Backup Paths
        SRLG Penalty Weights for Detour and Bypass LSPs
        Static Configurations of SRLG Memberships
      TE Graceful Shutdown
      Soft Preemption of Diff-Serv RSVP LSP
      Least-Fill Bandwidth Rule in CSPF ECMP Selection
      Inter-Area TE LSP (ERO Expansion Method)
        Area Border Node FRR Protection for Inter-Area LSP
          Rerouting of Inter-Area LSP
          Behavior of MPLS Options in Inter-Area LSP
        Inter-Area LSP support of OSPF Virtual Links
        Area Border Node FRR Protection for Inter-Area LSP
      Automatic Creation of a RSVP Mesh LSP
        Feature Configuration
        Feature Behavior
        Multi-Area and Multi-Instance Support
        Mesh LSP Name Encoding and Statistics
      Timer-based Reversion for RSVP-TE LSPs
      Automatic Creation of an RSVP One-Hop LSP
        Feature Configuration
        Feature Behavior
      MPLS Entropy Label
    Point-to-Multipoint (P2MP) RSVP LSP
      Application in Video Broadcast
      P2MP LSP Data Plane
        Procedures at Ingress LER Node
        Procedures at LSR Node
        Procedures at Branch LSR Node
        Procedures at Egress LER Node
        Procedures at BUD LSR Node
      Ingress Path Management for P2MP LSP Packets
        Ingress P2MP Path Management on XCM/IOM-3/IMMs
        Ingress P2MP Path Management on IOM-2
      RSVP Control Plane in a P2MP LSP
      Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        Procedures at Ingress LER Node
        Procedures at Egress LER Node
          Procedures with a Primary Tunnel Interface
    Segment Routing With Traffic Engineering (SR-TE)
      Configuring and Operating SR-TE
        SR-TE LSP Configuration Overview
        SR-TE LSP Instantiation
          PCC-Initiated and PCC-Controlled LSP
          PCC-Initiated and PCE-Computed/Controlled LSP
        SR-TE LSP Path Computation
        SR-TE LSP Protection
        Data Path Support
          SR-TE LSP Metric and MTU Settings
          Hash Label Support
        Static Route Resolution using SR-TE LSP
        BGP Shortcut using SR-TE LSP
        BGP Label Route Resolution using SR-TE LSP
        Service Packet Forwarding using SR-TE LSP
    MPLS Service Usage
      Service Distribution Paths
    MPLS/RSVP Configuration Process Overview
    Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
   GMPLS
    In This Chapter
    GMPLS
      Example Applications
        Use Case 1: Dynamic Connection Setup with Constraints
        Use Case 2: Multi-Layer Resiliency
    GMPLS UNI Architecture
      Addressing and End-to-End gLSP Architecture
    1830 PSS Identifiers
    Recovery Reference Models
      End to End Recovery (IP-layer)
      End to End ECMP
      End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      End to End Recovery (GMPLS Layer)
        Unprotected gLSP
        Full LSP Rerouting
        1: N Protection
        Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  PCEP
    In This Chapter
    Introduction to the Path Computation Element Protocol (PCEP)
      PCC and PCE Configuration
      Base Implementation of Path Computation Elements (PCE)
      PCEP Session Establishment and Maintenance
      PCEP Parameters
        Stateful PCE
        PCEP Extensions in Support of SR-TE LSPs
        LSP Initiation
          PCC-Initiated and PCE-Computed/Controlled LSPs
          LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
   Label Distribution Protocol
    In This Chapter
    Label Distribution Protocol
      LDP and MPLS
      LDP Architecture
      Subsystem Interrelationships
        Memory Manager and LDP
        Label Manager
        LDP Configuration
        Logger
        Service Manager
      Execution Flow
        Initialization
        Session Lifetime
          Adjacency Establishment
          Session Establishment
      Label Exchange
        Other Reasons for Label Actions
        Cleanup
        Configuring Implicit Null Label
      Global LDP Filters
        Per LDP Peer FEC Import and Export Policies
      Configuring Multiple LDP LSR ID
      T-LDP hello reduction
      Tracking a T-LDP Peer with BFD
      Link LDP Hello Adjacency Tracking with BFD
      LDP LSP Statistics
    TTL Security for BGP and LDP
    ECMP Support for LDP
      Label Operations
    Unnumbered Interface Support in LDP
      Feature Configuration
      Operation of LDP over an Unnumbered IP Interface
        Link LDP
        Targeted LDP
        FEC Resolution
    LDP over RSVP Tunnels
      Signaling and Operation
        LDP Label Distribution and FEC Resolution
        Default FEC Resolution Procedure
        FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      Rerouting Around Failures
        LDP-over-RSVP Tunnel Protection
        ABR Protection
    LDP over RSVP Without Area Boundary
      LDP over RSVP and ECMP
    Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      Configuration and Operation
    LDP ECMP Uniform Failover
    LDP Fast-Reroute for IS-IS and OSPF Prefixes
      LDP FRR Configuration
        Reducing the Scope of the LFA Calculation by SPF
      LDP FRR Procedures
        ECMP Considerations
        LDP FRR and LDP Shortcut
        LDP FRR and LDP-over-RSVP
        LDP FRR and RSVP Shortcut (IGP Shortcut)
      IS-IS and OSPF Support for Loop-Free Alternate Calculation
        Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    mLDP Fast Upstream Switchover
    LDP FEC to BGP Label Route Stitching
      Configuration
      Detailed LDP FEC Resolution
      Detailed BGP Labeled Route Resolution
      Data Plane Forwarding
    LDP-SR Stitching for IPv4 prefixes (IS-IS)
      LDP-SR Stitching Configuration
      Stitching in the LDP-to-SR Direction
      Stitching in the SR-to-LDP Direction
    LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    Automatic Creation of a Targeted Hello Adjacency and LDP Session
      Feature Configuration
      Feature Behavior
    Multicast P2MP LDP for GRT
    LDP P2MP Support
      LDP P2MP Configuration
      LDP P2MP Protocol
      Make Before Break (MBB)
      ECMP Support
    Multicast LDP Fast Upstream Switchover
      Feature Configuration
      Feature Behavior
      Uniform Failover from Primary to Backup ILM
    Multi-Area and Multi-Instance Extensions to LDP
      LDP Shortcut for BGP Next-Hop Resolution
      LDP Shortcut for IGP Routes
        LDP Shortcut Configuration
        IGP Route Resolution
        LDP Shortcut Forwarding Plane
      ECMP Considerations
      Disabling TTL Propagation in an LSP Shortcut
    LDP Graceful Handling of Resource Exhaustion
      LDP Base Graceful Handling of Resources
    LDP Enhanced Graceful Handling of Resources
      LSR Overload Notification
      LSR Overload Protection Capability
      Procedures for LSR overload protection
    User Guidelines and Troubleshooting Procedures
      Common Procedures
      Base Resource Handling Procedures
      Enhanced Resource Handling Procedures
    LDP IPv6 Control and Data Planes
      LDP Operation in an IPv6 Network
      Link LDP
      Targeted LDP
      FEC Resolution
      LDP Session Capabilities
      LDP Adjacency Capabilities
      Address and FEC Distribution
      Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      IGP and Static Route Synchronization with LDP
      BFD Operation
      Services Using SDP with an LDP IPv6 FEC
      Mirror Services and Lawful Intercept
        Configuration at mirror source node
        Configuration at mirror destination node
      Static Route Resolution to a LDP IPv6 FEC
      IGP Route Resolution to a LDP IPv6 FEC
      OAM Support with LDP IPv6
      LDP IPv6 Interoperability Considerations
        Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    LDP Process Overview
    LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer documentation and product support
Multicast Routing Protocols Guide R14.0.R1
  Getting Started
    About This Guide
    Multicast Configuration Process
  Introduction to Multicast
    In This Chapter
    Multicast Overview
    Multicast Models
      Any-Source Multicast (ASM)
      Source Specific Multicast (SSM)
      Multicast in IP-VPN Networks
  IGMP
    In This Chapter
    IGMP Overview
      IGMP Versions and Interoperability Requirements
      IGMP Version Transition
      Source-Specific Multicast Groups
      Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLD
    In This Chapter
    MLD Overview
      MLDv1
      MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  PIM
    In This Chapter
    PIM Overview
      PIM-SM Functions
        Phase One
        Phase Two
        Phase Three
      Encapsulating Data Packets in the Register Tunnel
      PIM Bootstrap Router Mechanism
      PIM-SM Routing Policies
      Reverse Path Forwarding Checks
      Anycast RP for PIM-SM
        Implementation
      Distributing PIM Joins over Multiple ECMP Paths
      PIM Interface on IES Subscriber Group Interfaces
      Multicast Only Fast Reroute (MoFRR)
    IPv6 PIM models
      PIM SSM
      PIM ASM
      Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MSDP
    In This Chapter
    Multicast Source Discovery Protocol
      Anycast RP for MSDP
      MSDP Procedure
        MSDP Peering Scenarios
      MSDP Peer Groups
      MSDP Mesh Groups
      MSDP Routing Policies
      Auto-RP (discovery mode only) in Multicast VPN
      Multicast in Virtual Private Networks
        Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLDP
    In This Chapter
    Dynamic Multicast Signaling over P2MP in GRT Instance
  Multicast Extensions to BGP
    In This Chapter
    Multicast Extensions to BGP
      MBGP Multicast Topology Support
        Recursive Lookup for BGP Next Hops
  MCAC
    In This Chapter
    MCAC Overview
      MCAC Bundle Policy Overview
      MCAC Algorithm
        Interface-level MCAC details
          MCAC-interface-policy-level MCAC details
        Bundle-level MCAC details
      MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  Troubleshooting Tools
    In This Chapter
    Mtrace
      Finding the Last Hop Router
      Directing the Response
    Mstat
    Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Multicast Configuration Process
  Introduction to Multicast
    In This Chapter
    Multicast Overview
    Multicast Models
      Any-Source Multicast (ASM)
      Source Specific Multicast (SSM)
      Multicast in IP-VPN Networks
  IGMP
    In This Chapter
    IGMP Overview
      IGMP Versions and Interoperability Requirements
      IGMP Version Transition
      Source-Specific Multicast Groups
      Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
          Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLD
    In This Chapter
    MLD Overview
      MLDv1
      MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  PIM
    In This Chapter
    PIM Overview
      PIM-SM Functions
        Phase One
        Phase Two
        Phase Three
      Encapsulating Data Packets in the Register Tunnel
      PIM Bootstrap Router Mechanism
      PIM-SM Routing Policies
      Reverse Path Forwarding Checks
      Anycast RP for PIM-SM
        Implementation
      Distributing PIM Joins over Multiple ECMP Paths
      PIM Interface on IES Subscriber Group Interfaces
      Multicast Only Fast Reroute (MoFRR)
    IPv6 PIM models
      PIM SSM
      PIM ASM
      Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MSDP
    In This Chapter
    Multicast Source Discovery Protocol
      Anycast RP for MSDP
      MSDP Procedure
        MSDP Peering Scenarios
      MSDP Peer Groups
      MSDP Mesh Groups
      MSDP Routing Policies
      Auto-RP (discovery mode only) in Multicast VPN
      Multicast in Virtual Private Networks
        Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  MLDP
    In This Chapter
    Dynamic Multicast Signaling over P2MP in GRT Instance
  Multicast Extensions to BGP
    In This Chapter
    Multicast Extensions to BGP
      MBGP Multicast Topology Support
        Recursive Lookup for BGP Next Hops
  MCAC
    In This Chapter
    MCAC Overview
      MCAC Bundle Policy Overview
      MCAC Algorithm
        Interface-level MCAC details
          MCAC-interface-policy-level MCAC details
        Bundle-level MCAC details
      MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  Troubleshooting Tools
    In This Chapter
    Mtrace
      Finding the Last Hop Router
      Directing the Response
    Mstat
    Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
Multiservice Integrated Service Adapter Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
  ISA Hardware
    In This Section
    MS-ISA2 Overview
    MS-ISA Overview
    MS-ISM Overview
    Application Assurance Hardware Features
      AA System Support
      Host IOM Support for AA on ISAs
  Application Assurance
    In This Section
    Application Assurance (AA) Overview
      Application Assurance: Inline Policy Enforcement
      AA Integration in Subscriber Edge Gateways
      Fixed Residential Broadband Services
        Dual-Stack Lite – DS-Lite
        6to4 /6RD
      Wireless LAN Gateway Broadband Services
      Application-Aware Business VPN Services
      SeGW Firewall Service
    Application Assurance System Architecture
      AA ISA Resource Configuration
        AA ISA Groups
          AA ISA Groups
          AA Group Partitions
          Bypass Modes
        Redundancy
          No AA ISA Group Redundancy
          Failure to Fabric
          N+1 AA ISA Card Warm Redundancy
        ISA Load Balancing
        Asymmetry Removal
          Asymmetry Removal Overview
          Failure Modes
          AARP Peered Node/Instance Configuration
          Multi-Chassis Control Link (MC-CTL)
          Multi-Chassis Datapath Shunts
        ISA Overload Detection
      AA Packet Processing
        Divert of Traffic and Subscribers
          Services and AA Subscribers
          Spoke SDPs
          Transit AA Subs
          AA Subscriber Application Service Definition
        Application Identification
          Application Assurance Identification Components
          Protocol Signatures
          Custom Protocols
          Protocol Shutdown
          Supported Protocol Signatures
          Application Groups
          Charging Groups
          Applications
          Application Filters
          HTTP
          AA IP Prefix Lists
        Statistics and Accounting
          Per-AA-Subscriber Special Study
          System Aspects
          Application Assurance XML Volume Statistics and Accounting
          AA Partition Traffic Type Statistics
          Configurable AA-Subscriber Statistics Collection
          AA-Performance Record for ISA Load
          AA Partition Traffic Type Statistics
          AA Partition Admit–Deny Statistics
          RADIUS Accounting AA Records
          AA GX Based Usage Monitoring
          Supported AVPs
          Cflowd AA Records
        Application QoS Policy (AQP)
          AQP Match Criteria
          AQP Actions
          Application Assurance Policers
          Time of Day Policing Adjustments
          Application Assurance HTTP Redirect
          ICAP - Large Scale Category based URL Filtering
          Local URL-List Filtering
          HTTP Header Enrichment
          HTTP In Browser Notification
        Application Assurance Firewall
          SeGW Firewall Protection
      Service Monitoring and Debugging
      CPU Utilization
      CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
       Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
       Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  IP Tunnels
    In This Section
    IP Tunnels Overview
      Tunnel ISAs
        Public Tunnel SAPs
        Private Tunnel SAPs
        IP Interface Configuration
        GRE and IP-IP Tunnel Configuration
        IP Fragmentation and Reassembly for IP Tunnels
      Operational Conditions
      QoS Interactions
      OAM Interactions
      Redundancy
      Statistics Collection
      Security
        GRE Tunnel Multicast Support
        IPv6 over IPv4 GRE Tunnel
      IKEv2
        IKEv2 Traffic Selector and TS-List
      SHA2 Support
      IPSec Client Lockout
    X.509v3 Certificate Overview
      SROS X.509v3 Certificate Support
      Local Storage
      CA-Profile
      CA Chain Computation
      Certificate Enrollment
      Certificate Revocation Check
      Certificate/CRL Expiration Warning
      Certificate/CRL/Key Cache
      Auto CRL Update
    Using Certificates For IPSec Tunnel Authentication
    Trust-Anchor-Profile
    Cert-Profile
      Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    Certificate Management Protocol Version 2 (CMPv2)
    OCSP
    Video Wholesale Example
    Multi-Chassis IPSec Redundancy Overview
      Architecture
      MC-IPSec Mastership Protocol (MIMP)
        MIMP Protocol States
        Election Logic
        Protection Status
        Other Details
      Routing
        Routing in Public Service
        Routing in Private Services
        Other Details About Shunting
      MC-IPSec Aware VRRP
      Synchronization
        Automatic CHILD_SA Rekey
      Responder Only
    IPSec Deployment Requirements
    IKEv2 Remote-Access Tunnel
      IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        IKEv2 Remote-Access Tunnel – EAP Authentication
      IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      IKEv2 Remote-Access Tunnel – Address Assignment
        DHCPv4 Address Assignment
        DHCPv6 Address Assignment
        DHCPv4/v6 Usage Notes
      IPv6 IPSec Support
        IPv6 as Payload
        IPv6 as Payload: Static LAN-to-LAN Tunnel
        IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        IPv6 as Payload: Remote-Access Tunnel
        IPv6 as Encapsulation
    Configuring IPSec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPSec
      Configuring IPSec Parameters
      Configuring IPSec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPSec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPSec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote-Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPSec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPSec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Internet Key Exchange (IKE) Commands
        IPSec Configuration Commands
        Interface SAP Tunnel Commands
          IPSec Gateway Commands
        IPSec Mastership Election Commands
        IPSec RADIUS Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Video Services
    In This Section
    Video Services
      Video Groups
      Video SAP
      Video Interface
      Multicast Information Policies
      Duplicate Stream Protection
      Duplicate Stream Selection
        Stream Identification
        Initial Sequence Identification
        Packet Selection
        Clock Recovery
        Playout
        Loss of Transport
      Video Quality Monitoring
        VoIP/Video/Teleconferencing Performance Measurements
        Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    Retransmission and Fast Channel Change
      RET and FCC Overview
        Retransmission
        Fast Channel Change (FCC)
          Retransmission Client
          Retransmission Server
          Fast Channel Change Server
          Logging and Accounting for RET and FCC
        RET and FCC Server Concurrency
          Prerequisites and Restrictions
      Multi-Service ISA Support in the IOM-3 for Video Services
        Prioritization Mechanism for RET vs. FCC
        RET Features
          Statistics ALU SQM MIB Additions
          RET Server Multicast Tuning Parameters
        FCC Features
          FCC Hybrid Mode Support
    Ad Insertion
      Local/Zoned Ad Insertion
        Transport Stream Ad Splicing
        Ad Zones
        Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Network Address Translation
    In This Chapter
    Terminology
    Network Address Translation (NAT) Overview
      Principles of NAT
      Application Compatibility
    Large Scale NAT
      Port Range Blocks
        Reserved Ports and Priority Sessions
        Preventing Port Block Starvation
          Dynamic Port Block Starvation in LSN
          Dynamic Port Block Reservation
      Timeouts
      Watermarks
    L2-Aware NAT
    One-to-One (1:1) NAT
      Static 1:1 NAT
        Protocol Agnostic Behavior
        Modification of Parameters in Static 1:1 NAT
        Load Distribution over ISAs in Static 1:1 NAT
        NAT-Policy Selection
        Mapping Timeout
        Logging
        Restrictions
      ICMP
    Deterministic NAT
      Overview
      Supported Deterministic NAT Flavors
      Number of Subscribers per Outside IP and per Pool
      Referencing a Pool
      Outside Pool Configuration
      Mapping Rules and the map Command in Deterministic LSN44
      Hashing Considerations in Deterministic LSN44
        Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      Sharing of Deterministic NAT Pools
      Simultaneous support of dynamic and deterministic NAT
      Selecting Traffic for NAT
      Inverse Mappings
        MIB approach
        Off-line Approach to Obtain Deterministic Mappings
      Logging
      Deterministic DS-Lite
        Hashing Considerations in DS-Lite
        Order of Configuration Steps in Deterministic DS-Lite
    Destination Based NAT (DNAT)
      Combination of SNAPT and DNAT
      Forwarding Model in DNAT
      DNAT Traffic Selection via NAT Classifier
      Configuring DNAT
        DNAT Traffic Selection and Destination IP Address Configuration
        Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    NAT – Multiple NAT Policies per Inside Routing Context
      Restrictions
      Multiple NAT Policies Per Inside Routing Context
      Routing Approach for NAT Diversion
      Filter-Based Approach
      Multiple NAT Policies with DS-Lite and NAT64
      Default NAT Policy
      Scaling Considerations
      Multiple NAT Policies and SPF Configuration Considerations
        Multiple NAT Policies and Forwarding Considerations
      Logging
    L2-Aware NAT Destination-Based Multiple NAT Policies
      Logging
        RADIUS Logging and Nat-Policy Change via CoA
        Delay Between the NAT Resource Allocation and Logging During CoA
      Static Port Forwards
      UPnP
    Port Control Protocol (PCP)
    Universal Plug and Play Internet Gateway Device Service
      Configuring UPnP IGD Service
    NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      PPTP Protocol
        Supported Control Messages
        GRE Tunnel
      PPTP ALG Operation
      Multiple Sessions Initiated From the Same PPTP Client Node
      Selection of Call IDs in NAT
    NAT Logging
      Syslog/SNMP/Local-File Logging
        Filtering LSN Events to System Memory
        NAT Logging to a Local File
      SNMP Trap Logging
      NAT Syslog
      LSN RADIUS Logging
        RADIUS Logging and L2-Aware NAT
      LSN and L2-Aware NAT Flow Logging
        Large Scale NAT44 Flow Logging Configuration Example
    DS-Lite and NAT64 Fragmentation
      Overview
      IPv6 Fragmentation in DS-Lite
      NAT64
    Enhanced Statistics in NAT — Histogram
      Configuration
    NAT Stateless Dual-Homing
      Configuration Considerations
      Troubleshooting Commands
    NAT ISA (Intra-Chassis) Redundancy
      Active-Active ISA Redundancy Model
      Start-up Conditions
      Recovery
      Adding Additional ISAs in the ISA Group
    ISA Feature Interactions
      MS-ISA Use with Service Mirrors
      LNS, Application Assurance and NAT
      Subscriber Aware Large Scale NAT44
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        TCP MSS Adjustment Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT Show Commands
        NAT Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  TCP MSS Adjustment
    In This Section
    Overview
    TCP MSS Adjustment for ESM Hosts
    TCP MSS Adjustment for NAT Services
    TCC MSS Adjustment Commands
      Command Hierarchy
        TCC MSS Adjustment Command Descriptions
  L2TP Network Server
    In This Chapter
    Subscriber agg-rate-limit on LNS
    LNS Reassembly
      Overview
      Reassembly Function
      Load Sharing Between the ISAs
      Inter-chassis ISA Redundancy
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BBB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  Threat Management Service
    In This Section
    TMS Service Introduction
    Configuration Guidelines and Example
      TMS Image Location
      Configuration Example For TMS Interfaces on the SR OS
      Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
  ISA Hardware
    In This Section
    MS-ISA2 Overview
    MS-ISA Overview
    MS-ISM Overview
    Application Assurance Hardware Features
      AA System Support
      Host IOM Support for AA on ISAs
  Application Assurance
    In This Section
    Application Assurance (AA) Overview
      Application Assurance: Inline Policy Enforcement
      AA Integration in Subscriber Edge Gateways
      Fixed Residential Broadband Services
        Dual-Stack Lite – DS-Lite
        6to4 /6RD
      Wireless LAN Gateway Broadband Services
      Application-Aware Business VPN Services
      SeGW Firewall Service
    Application Assurance System Architecture
      AA ISA Resource Configuration
        AA ISA Groups
          AA ISA Groups
          AA Group Partitions
          Bypass Modes
        Redundancy
          No AA ISA Group Redundancy
          Failure to Fabric
          N+1 AA ISA Card Warm Redundancy
        ISA Load Balancing
        Asymmetry Removal
          Asymmetry Removal Overview
          Failure Modes
          AARP Peered Node/Instance Configuration
          Multi-Chassis Control Link (MC-CTL)
          Multi-Chassis Datapath Shunts
        ISA Overload Detection
      AA Packet Processing
        Divert of Traffic and Subscribers
          Services and AA Subscribers
          Spoke SDPs
          Transit AA Subs
          AA Subscriber Application Service Definition
        Application Identification
          Application Assurance Identification Components
          Protocol Signatures
          Custom Protocols
          Protocol Shutdown
          Supported Protocol Signatures
          Application Groups
          Charging Groups
          Applications
          Application Filters
          HTTP
          AA IP Prefix Lists
        Statistics and Accounting
          Per-AA-Subscriber Special Study
          System Aspects
          Application Assurance XML Volume Statistics and Accounting
          AA Partition Traffic Type Statistics
          Configurable AA-Subscriber Statistics Collection
          AA-Performance Record for ISA Load
          AA Partition Traffic Type Statistics
          AA Partition Admit–Deny Statistics
          RADIUS Accounting AA Records
          AA GX Based Usage Monitoring
          Supported AVPs
          Cflowd AA Records
        Application QoS Policy (AQP)
          AQP Match Criteria
          AQP Actions
          Application Assurance Policers
          Time of Day Policing Adjustments
          Application Assurance HTTP Redirect
          ICAP - Large Scale Category based URL Filtering
          Local URL-List Filtering
          HTTP Header Enrichment
          HTTP In Browser Notification
        Application Assurance Firewall
          SeGW Firewall Protection
      Service Monitoring and Debugging
      CPU Utilization
      CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
       Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
       Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  IP Tunnels
    In This Section
    IP Tunnels Overview
      Tunnel ISAs
        Public Tunnel SAPs
        Private Tunnel SAPs
        IP Interface Configuration
        GRE and IP-IP Tunnel Configuration
        IP Fragmentation and Reassembly for IP Tunnels
      Operational Conditions
      QoS Interactions
      OAM Interactions
      Redundancy
      Statistics Collection
      Security
        GRE Tunnel Multicast Support
        IPv6 over IPv4 GRE Tunnel
      IKEv2
        IKEv2 Traffic Selector and TS-List
      SHA2 Support
      IPSec Client Lockout
    X.509v3 Certificate Overview
      SROS X.509v3 Certificate Support
      Local Storage
      CA-Profile
      CA Chain Computation
      Certificate Enrollment
      Certificate Revocation Check
      Certificate/CRL Expiration Warning
      Certificate/CRL/Key Cache
      Auto CRL Update
    Using Certificates For IPSec Tunnel Authentication
    Trust-Anchor-Profile
    Cert-Profile
      Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    Certificate Management Protocol Version 2 (CMPv2)
    OCSP
    Video Wholesale Example
    Multi-Chassis IPSec Redundancy Overview
      Architecture
      MC-IPSec Mastership Protocol (MIMP)
        MIMP Protocol States
        Election Logic
        Protection Status
        Other Details
      Routing
        Routing in Public Service
        Routing in Private Services
        Other Details About Shunting
      MC-IPSec Aware VRRP
      Synchronization
        Automatic CHILD_SA Rekey
      Responder Only
    IPSec Deployment Requirements
    IKEv2 Remote-Access Tunnel
      IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        IKEv2 Remote-Access Tunnel – EAP Authentication
      IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      IKEv2 Remote-Access Tunnel – Address Assignment
        DHCPv4 Address Assignment
        DHCPv6 Address Assignment
        DHCPv4/v6 Usage Notes
      IPv6 IPSec Support
        IPv6 as Payload
        IPv6 as Payload: Static LAN-to-LAN Tunnel
        IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        IPv6 as Payload: Remote-Access Tunnel
        IPv6 as Encapsulation
    Configuring IPSec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPSec
      Configuring IPSec Parameters
      Configuring IPSec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPSec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPSec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote-Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPSec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPSec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Internet Key Exchange (IKE) Commands
        IPSec Configuration Commands
        Interface SAP Tunnel Commands
          IPSec Gateway Commands
        IPSec Mastership Election Commands
        IPSec RADIUS Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Video Services
    In This Section
    Video Services
      Video Groups
      Video SAP
      Video Interface
      Multicast Information Policies
      Duplicate Stream Protection
      Duplicate Stream Selection
        Stream Identification
        Initial Sequence Identification
        Packet Selection
        Clock Recovery
        Playout
        Loss of Transport
      Video Quality Monitoring
        VoIP/Video/Teleconferencing Performance Measurements
        Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    Retransmission and Fast Channel Change
      RET and FCC Overview
        Retransmission
        Fast Channel Change (FCC)
          Retransmission Client
          Retransmission Server
          Fast Channel Change Server
          Logging and Accounting for RET and FCC
        RET and FCC Server Concurrency
          Prerequisites and Restrictions
      Multi-Service ISA Support in the IOM-3 for Video Services
        Prioritization Mechanism for RET vs. FCC
        RET Features
          Statistics ALU SQM MIB Additions
          RET Server Multicast Tuning Parameters
        FCC Features
          FCC Hybrid Mode Support
    Ad Insertion
      Local/Zoned Ad Insertion
        Transport Stream Ad Splicing
        Ad Zones
        Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Network Address Translation
    In This Chapter
    Terminology
    Network Address Translation (NAT) Overview
      Principles of NAT
      Application Compatibility
    Large Scale NAT
      Port Range Blocks
        Reserved Ports and Priority Sessions
        Preventing Port Block Starvation
          Dynamic Port Block Starvation in LSN
          Dynamic Port Block Reservation
      Timeouts
      Watermarks
    L2-Aware NAT
    One-to-One (1:1) NAT
      Static 1:1 NAT
        Protocol Agnostic Behavior
        Modification of Parameters in Static 1:1 NAT
        Load Distribution over ISAs in Static 1:1 NAT
        NAT-Policy Selection
        Mapping Timeout
        Logging
        Restrictions
      ICMP
    Deterministic NAT
      Overview
      Supported Deterministic NAT Flavors
      Number of Subscribers per Outside IP and per Pool
      Referencing a Pool
      Outside Pool Configuration
      Mapping Rules and the map Command in Deterministic LSN44
      Hashing Considerations in Deterministic LSN44
        Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      Sharing of Deterministic NAT Pools
      Simultaneous support of dynamic and deterministic NAT
      Selecting Traffic for NAT
      Inverse Mappings
        MIB approach
        Off-line Approach to Obtain Deterministic Mappings
      Logging
      Deterministic DS-Lite
        Hashing Considerations in DS-Lite
        Order of Configuration Steps in Deterministic DS-Lite
    Destination Based NAT (DNAT)
      Combination of SNAPT and DNAT
      Forwarding Model in DNAT
      DNAT Traffic Selection via NAT Classifier
      Configuring DNAT
        DNAT Traffic Selection and Destination IP Address Configuration
        Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    NAT – Multiple NAT Policies per Inside Routing Context
      Restrictions
      Multiple NAT Policies Per Inside Routing Context
      Routing Approach for NAT Diversion
      Filter-Based Approach
      Multiple NAT Policies with DS-Lite and NAT64
      Default NAT Policy
      Scaling Considerations
      Multiple NAT Policies and SPF Configuration Considerations
        Multiple NAT Policies and Forwarding Considerations
      Logging
    L2-Aware NAT Destination-Based Multiple NAT Policies
      Logging
        RADIUS Logging and Nat-Policy Change via CoA
        Delay Between the NAT Resource Allocation and Logging During CoA
      Static Port Forwards
      UPnP
    Port Control Protocol (PCP)
    Universal Plug and Play Internet Gateway Device Service
      Configuring UPnP IGD Service
    NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      PPTP Protocol
        Supported Control Messages
        GRE Tunnel
      PPTP ALG Operation
      Multiple Sessions Initiated From the Same PPTP Client Node
      Selection of Call IDs in NAT
    NAT Logging
      Syslog/SNMP/Local-File Logging
        Filtering LSN Events to System Memory
        NAT Logging to a Local File
      SNMP Trap Logging
      NAT Syslog
      LSN RADIUS Logging
        RADIUS Logging and L2-Aware NAT
      LSN and L2-Aware NAT Flow Logging
        Large Scale NAT44 Flow Logging Configuration Example
    DS-Lite and NAT64 Fragmentation
      Overview
      IPv6 Fragmentation in DS-Lite
      NAT64
    Enhanced Statistics in NAT — Histogram
      Configuration
    NAT Stateless Dual-Homing
      Configuration Considerations
      Troubleshooting Commands
    NAT ISA (Intra-Chassis) Redundancy
      Active-Active ISA Redundancy Model
      Start-up Conditions
      Recovery
      Adding Additional ISAs in the ISA Group
    ISA Feature Interactions
      MS-ISA Use with Service Mirrors
      LNS, Application Assurance and NAT
      Subscriber Aware Large Scale NAT44
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        TCP MSS Adjustment Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT Show Commands
        NAT Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  TCP MSS Adjustment
    In This Section
    Overview
    TCP MSS Adjustment for ESM Hosts
    TCP MSS Adjustment for NAT Services
    TCC MSS Adjustment Commands
      Command Hierarchy
        TCC MSS Adjustment Command Descriptions
  L2TP Network Server
    In This Chapter
    Subscriber agg-rate-limit on LNS
    LNS Reassembly
      Overview
      Reassembly Function
      Load Sharing Between the ISAs
      Inter-chassis ISA Redundancy
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BBB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  Threat Management Service
    In This Section
    TMS Service Introduction
    Configuration Guidelines and Example
      TMS Image Location
      Configuration Example For TMS Interfaces on the SR OS
      Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
OAM and Diagnostics Guide R14.0.R1
   Getting Started
    About This Guide
    Router Configuration Process
  Mirror Services
    In This Chapter
    Service Mirroring
    Mirror Implementation
      Mirror Source and Destinations
        Local and Remote Mirroring
        Slicing
      Mirroring Performance
      Mirroring Configuration
      ATM Mirroring
      IP Mirroring
        Remote IP Mirroring
        Local IP Mirroring
        Port-ID Enabled PPP Mirroring
    Mirrored Traffic Transport using MPLS-TP SDPs
    Subscriber Mirroring
    Lawful Intercept
      LI Activation Through RADIUS
      Routable Lawful Intercept Encapsulation
    Pseudowire Redundant Mirror Services
      Redundant Mirror Source Notes
    Carrier Grade NAT – Lawful Intercept
    Configuration Process Overview
    Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
   OAM, SAA, and OAM-PM
    In This Chapter
    OAM Overview
      LSP Diagnostics: LSP Ping and Trace
      LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      ECMP Considerations
      lsp-ping and lsp-trace over Unnumbered IP Interface
      Downstream Detailed Mapping (DDMAP) TLV
      Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        Responder Node Procedures
        Sender Node Procedures
      LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      LDP ECMP Tree Building
      Periodic Path Exercising
      LSP Ping for RSVP P2MP LSP (P2MP)
      LSP Trace for RSVP P2MP LSP
        LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      Tunneling of ICMP Reply Packets over MPLS LSP
      QoS Handling of Tunneled ICMP Reply Packets
      Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      SDP Diagnostics
      SDP Ping
      SDP MTU Path Discovery
      Service Diagnostics
      VPLS MAC Diagnostics
      MAC Ping
      MAC Trace
      CPE Ping
      CPE Ping for PBB Epipe
        Hardware Support
      MAC Populate
      MAC Purge
      VLL Diagnostics
      VCCV Ping
        VCCV-Ping Application
        VCCV Ping in a Multi-Segment Pseudowire
      Automated VCCV-Trace Capability for MS-Pseudowire
        VCCV for Static Pseudowire Segments
        Detailed VCCV-Trace Operation
        Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          Sending a VCCV Echo Request
          Receiving an VCCV Echo Request
          Receiving an VCCV Echo Reply
      IGMP Snooping Diagnostics
      MFIB Ping
      ATM Diagnostics
      MPLS-TP On-Demand OAM Commands
      MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      MPLS-TP LSPs: LSP-Ping/LSP Trace
      VxLAN Ping Supporting EVPN for VxLAN
      Show Commands
      BFD
    IP Performance Monitoring (IP PM)
      Two-Way Active Measurement Protocol (TWAMP)
      Two-Way Active Measurement Protocol Light (TWAMP Light)
    Ethernet Connectivity Fault Management (ETH-CFM)
      ETH-CFM Building Blocks
      Loopback
      Loopback Multicast
      Linktrace
      Continuity Check (CC)
      CC Remote Peer Auto-Discovery
      CCM Grace Period
      CCM Hold Timers
      Alarm Indication Signal (ETH-AIS Y.1731)
      Client Signal Fail (ETH-CSF Y.1731)
      Test (ETH-TST Y.1731)
      One-Way Delay Measurement (ETH-1DM Y.1731)
      Two-Way Delay Measurement (ETH-DMM Y.1731)
      Synthetic Loss Measurement (ETH-SLM Y.1731)
        Configuration Example
      Frame Loss Measurement (ETH-LMM Y.1731)
    ETH-CFM Statistics
    ETH-CFM Packet Debug
    ETH-CFM CoS Considerations
    OAM Mapping
      CFM Connectivity Fault Conditions
      CFM Fault Propagation Methods
      Epipe Services
      CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Interaction with Pseudowire Redundancy
      Ipipe Services
        CFM Detected Fault
        SAP/SDP-binding Failure (Including Pseudowire Status)
        Service Administratively Shutdown
        Interaction with Pseudowire Redundancy
      VPLS Service
        CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Pseudowire Redundancy and Spanning Tree Protocol
      IES and VPRN Services
      Pseudowire Switching
      LLF and CFM Fault Propagation
      802.3ah EFM OAM Mapping and Interaction with Service Manager
    Service Assurance Agent (SAA)
    OAM Performance Monitoring (OAM-PM)
      Session
      Standard PM Packets
      Detectable Transmit Errors
      Measurement Intervals
      Data Structures and Storage
      Bin Groups
      Relating the Components
      IP Performance Monitoring
        Accounting Policy Configuration
        Service Configuration
        OAM-PM Configuration
      Ethernet Performance Monitoring
        Accounting Policy Configuration
        ETH-CFM Configuration
        Service Configuration
        Ethernet OAM-PM Configuration
      OAM-PM Event Monitoring
    Traceroute with ICMP Tunneling In Common Applications
      BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      VPRN Inter-AS Option B
      VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Router Configuration Process
  Mirror Services
    In This Chapter
    Service Mirroring
    Mirror Implementation
      Mirror Source and Destinations
        Local and Remote Mirroring
        Slicing
      Mirroring Performance
      Mirroring Configuration
      ATM Mirroring
      IP Mirroring
        Remote IP Mirroring
        Local IP Mirroring
        Port-ID Enabled PPP Mirroring
    Mirrored Traffic Transport using MPLS-TP SDPs
    Subscriber Mirroring
    Lawful Intercept
      LI Activation Through RADIUS
      Routable Lawful Intercept Encapsulation
    Pseudowire Redundant Mirror Services
      Redundant Mirror Source Notes
    Carrier Grade NAT – Lawful Intercept
    Configuration Process Overview
    Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
   OAM, SAA, and OAM-PM
    In This Chapter
    OAM Overview
      LSP Diagnostics: LSP Ping and Trace
      LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      ECMP Considerations
      lsp-ping and lsp-trace over Unnumbered IP Interface
      Downstream Detailed Mapping (DDMAP) TLV
      Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        Responder Node Procedures
        Sender Node Procedures
      LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      LDP ECMP Tree Building
      Periodic Path Exercising
      LSP Ping for RSVP P2MP LSP (P2MP)
      LSP Trace for RSVP P2MP LSP
        LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      Tunneling of ICMP Reply Packets over MPLS LSP
      QoS Handling of Tunneled ICMP Reply Packets
      Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      SDP Diagnostics
      SDP Ping
      SDP MTU Path Discovery
      Service Diagnostics
      VPLS MAC Diagnostics
      MAC Ping
      MAC Trace
      CPE Ping
      CPE Ping for PBB Epipe
        Hardware Support
      MAC Populate
      MAC Purge
      VLL Diagnostics
      VCCV Ping
        VCCV-Ping Application
        VCCV Ping in a Multi-Segment Pseudowire
      Automated VCCV-Trace Capability for MS-Pseudowire
        VCCV for Static Pseudowire Segments
        Detailed VCCV-Trace Operation
        Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          Sending a VCCV Echo Request
          Receiving an VCCV Echo Request
          Receiving an VCCV Echo Reply
      IGMP Snooping Diagnostics
      MFIB Ping
      ATM Diagnostics
      MPLS-TP On-Demand OAM Commands
      MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      MPLS-TP LSPs: LSP-Ping/LSP Trace
      VxLAN Ping Supporting EVPN for VxLAN
      Show Commands
      BFD
    IP Performance Monitoring (IP PM)
      Two-Way Active Measurement Protocol (TWAMP)
      Two-Way Active Measurement Protocol Light (TWAMP Light)
    Ethernet Connectivity Fault Management (ETH-CFM)
      ETH-CFM Building Blocks
      Loopback
      Loopback Multicast
      Linktrace
      Continuity Check (CC)
      CC Remote Peer Auto-Discovery
      CCM Grace Period
      CCM Hold Timers
      Alarm Indication Signal (ETH-AIS Y.1731)
      Client Signal Fail (ETH-CSF Y.1731)
      Test (ETH-TST Y.1731)
      One-Way Delay Measurement (ETH-1DM Y.1731)
      Two-Way Delay Measurement (ETH-DMM Y.1731)
      Synthetic Loss Measurement (ETH-SLM Y.1731)
        Configuration Example
      Frame Loss Measurement (ETH-LMM Y.1731)
    ETH-CFM Statistics
    ETH-CFM Packet Debug
    ETH-CFM CoS Considerations
    OAM Mapping
      CFM Connectivity Fault Conditions
      CFM Fault Propagation Methods
      Epipe Services
      CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Interaction with Pseudowire Redundancy
      Ipipe Services
        CFM Detected Fault
        SAP/SDP-binding Failure (Including Pseudowire Status)
        Service Administratively Shutdown
        Interaction with Pseudowire Redundancy
      VPLS Service
        CFM Detected Fault
        SAP/SDP-Binding Failure (Including Pseudowire Status)
        Service Down
        Pseudowire Redundancy and Spanning Tree Protocol
      IES and VPRN Services
      Pseudowire Switching
      LLF and CFM Fault Propagation
      802.3ah EFM OAM Mapping and Interaction with Service Manager
    Service Assurance Agent (SAA)
    OAM Performance Monitoring (OAM-PM)
      Session
      Standard PM Packets
      Detectable Transmit Errors
      Measurement Intervals
      Data Structures and Storage
      Bin Groups
      Relating the Components
      IP Performance Monitoring
        Accounting Policy Configuration
        Service Configuration
        OAM-PM Configuration
      Ethernet Performance Monitoring
        Accounting Policy Configuration
        ETH-CFM Configuration
        Service Configuration
        Ethernet OAM-PM Configuration
      OAM-PM Event Monitoring
    Traceroute with ICMP Tunneling In Common Applications
      BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      VPRN Inter-AS Option B
      VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Quality of Service Guide R14.0.R1
   Getting Started
    About This Guide
    Alcatel-Lucent SR-Series Router Services Configuration Process
   QoS Policies
    In This Chapter
    QoS Overview
      Forwarding Classes
        High Priority Classes
        Assured Classes
        Best-Effort Classes
    Queue Parameters
      Queue ID
      Unicast or Multipoint Queue
      Queue Hardware Scheduler
      Committed Information Rate
      Peak Information Rate
      Adaptation Rule
      Committed Burst Size
      Maximum Burst Size
      High Priority Only Buffers
      Hi-Low Priority Only Buffers
      WRED Per Queue
        Native Queue Mode
        Pool per Queue Mode
      Packet Markings
      Queue Counters
      Queue-Types
      Color Aware Profiling
    QoS Policies
      Service versus Network QoS
      QoS Policy Entities
      Network QoS Policies
      Network Queue QoS Policies
      Service Ingress QoS Policies
        FC Mapping Based on EXP Bits at VLL/VPLS SAP
        Egress Forwarding Class Override
      Service Egress QoS Policies
      Named Pool Policies
      Slope Policies
        RED Slopes
        Tuning the Shared Buffer Utilization Calculation
        Slope Policy Parameters
      Scheduler Policies
        Virtual Hierarchical Scheduling
        Tiers
          Single Tier Scheduling
          Hierarchical Scheduler Policies
          Hierarchical Virtual Schedulers
        Scheduler Policies Applied to Applications
        Scheduler Policies Applied to SAPs
        Customer Service Level Agreement (SLA)
        Scheduler Policies Applied to Multi-Service Sites
      Shared Queues
      ATM Traffic Descriptor Profiles
      Configuration Notes
   Network QoS Policies
    In This Section
    Overview
      Network Ingress Tunnel QoS Override
        For Tunnel Terminated IP Routing Decisions
          Normal QoS Operation
          Network Ingress IP Match Criteria
          Network Ingress IPv6 Match Criteria
          Tunnel Termination QoS Override Operation
          Enabling and Disabling Tunnel Termination QoS Override
        QoS for Self-Generated (CPU) Traffic on Network Interfaces
          Default DSCP Mapping Table
    Basic Configurations
      Create a Network QoS Policy
      Applying Network Policies
      Default Network Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting Network Policies
      Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame-Relay Profile Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Link Frame Relay Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
   Network Queue QoS Policies
    In This Section
    Overview
      Network Queue Parent Scheduler
    Basic Configurations
      Create a Network Queue QoS Policy
      Applying Network Queue Policies
        XMAs and MDAs
        Ethernet Ports
        SONET/SDH Ports
    Default Network Queue Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
   Service Egress and Ingress QoS Policies
    In This Section
    Overview
    Basic Configurations
    Service Egress QoS Policy
      Service Egress QoS Queue
      Percent-Rate Support
      Dynamic MBS for Egress Queue Group Queues
        Queue Length as a Delay Value
      Egress SAP Forwarding Class and Forwarding Profile Overrides
      Egress Criteria Classification Directly to Policer
      Dot1p Egress Remarking
        DEI Egress Remarking
          DEI in IEEE 802.1ad
          DEI in IEEE 802.1ah
          IEEE 802.1ad Use Case
          IEEE 802.1ah Use Case
      DSCP/Prec Egress Remarking
      Queue Depth Monitoring
    Service Ingress QoS Policy
      Service Ingress QoS Queue
      Percent-Rate Support
      Service Ingress Forwarding Class (FC)
      Service Ingress IP Match Criteria
      Service Ingress IPv6 Match Criteria
      Service Ingress MAC Match Criteria
        VLAN ID Matching
      Ingress Criteria Classification Directly to Policer
      Virtual Network Identifier (VNI) Classification
      FC Mapping Based on EXP Bits
    Service Management Tasks
      Applying Service Ingress and Egress Policies
        Epipe
        IES
        VPLS
        VPRN
      Editing QoS Policies
      Copying and Overwriting QoS Policies
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
     Service SAP QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Ingress QoS Policy Entry Commands
          IP QoS Policy Match Commands
          Service Ingress MAC QoS Policy Match Commands
          Service Egress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Show Commands
   Queue Sharing and Redirection
    In This Section
    Queue Sharing and Redirection
      Supported Platforms
      Queue Group Applications
      Access SAP Queue Group Applications
      Ingress Access Port Queue Group Hardware Queue Allocation
      Network Port Queue Groups for IP Interfaces
      Pseudowire Shaping for Layer 2 and Layer 3 Services
      QoS on Ingress Bindings
      Queue Group Templates and Port Queue Groups
      Queue Group Templates
      Port Queue Groups
        Percent-Rate Support
      Forwarding Plane Queue Groups
      Redirection Models
      Access SAP Forwarding Class Based Redirection
      Ingress and Egress SAP Forwarding Class Redirection Association Rules
        Policy Based Provisioning Model
        SAP-Based Provisioning Model
      Access Queue Group Statistics
        Port Queue Groups
        Forwarding Plane Queue Groups
      Network IP Interface Forwarding Class-Based Redirection
      Egress Network Forwarding Class Redirection Association Rules
      Egress Network IP Interface Statistics
      Separate Ingress IPv4 and IPv6 Statistics
      Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Ingress Packet Classification
      Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Egress Marking of PW Packet Header
        Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      Ingress Per SAP Statistics with Ingress Queue Groups
      Ingress and Egress PW Statistics
      Queue Group Behavior on LAG
      Queue Group Queue Instantiation Per Link
      Per Link Queue Group Queue Parameters
      Adding a Queue Group to an Existing LAG
      Removing a Queue Group from a LAG
      Adding a Port to a LAG
    Basic Configurations
      Configuring an Ingress Queue Group Template
      Configuring Egress Queue Group Template
      Applying Ingress Queue Group to SAP Ingress Policy
      Applying Egress Queue Group to SAP Egress Policy
      SAP-based Egress Queue Re-direction
      Configuring Queue Group on Ethernet Access Ingress Port
      Configuring Overrides
      Configuring Queue Group on Ethernet Access Egress Port
      Configuring Queue Group for Network Egress Traffic on Port
      Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Egress Queue Group Templates
        Configuring Ingress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
   QoS Scheduler Policies
    In This Section
    Overview
      Scheduler Policies
      Egress Port-Based Schedulers
        Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
        Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
          Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
        Frame and Packet-Based Bandwidth Allocation
        Queue Parental Association Scope
        Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
        Network Queue Parent Scheduler
        Foster Parent Behavior for Orphaned Queues and Schedulers
        Congestion Monitoring on Egress Port Scheduler
          Scalability, Performance, and Operation
          Restrictions
      Frame-Based Accounting
        Operational Modifications
        Existing Egress Port Based Virtual Scheduling
        Queue Behavior Modifications for Frame Based Accounting
        Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      Virtual Scheduling Unused Bandwidth Distribution
        Default Unused Bandwidth Distribution
        Limit Unused Bandwidth
      Configuring Port Scheduler Policies
        Port Scheduler Structure
        Special Orphan Queue and Scheduler Behavior
        Packet to Frame Bandwidth Conversion
        Aggregate Rate Limits for Directly Attached Queues
        SAP Egress QoS Policy Queue Parenting
        Network Queue QoS Policy Queue Parenting
        Egress Port Scheduler Overrides
        Applying a Port Scheduler Policy to a Virtual Port
        Applying Aggregate Rate Limit to a VPORT
        Applying a Scheduler Policy to a VPORT
        Weighted Scheduler Group in a Port Scheduler Policy
      Basic Configurations
        Create a QoS Scheduler Policy
        Applying Scheduler Policies
          Customer
          Epipe
          IES
          VPLS
          VPRN
        Creating a QoS Port Scheduler Policy
      Configuring Port Parent Parameters
        Within-CIR Priority Level Parameters
        Above-CIR Priority Level Parameters
      Configuring Distributed LAG Rate
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Customer Multi-Service Site
        Removing a QoS Policy from SAP(s)
        Removing a Policy from the QoS Configuration
      Copying and Overwriting Scheduler Policies
      Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
   Slope QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create a Slope QoS Policy
        Applying Slope Policies
          Ports
          MDA (FP1)
          FP (FP2 and higher based hardware)
      Default Slope Policy Values
      Deleting QoS Policies
        Ports
        MDA (FP1)
        FP (FP2 and higher based hardware)
        Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  Shared-Queue QoS Policies
    In This Section
    Overview
      Multipoint Shared Queuing
        Ingress Queuing Modes of Operation
        Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
      Basic Configurations
      Modifying the Default Shared-Queue Policy
        Applying Shared-Queue Policies
          Epipe Services
          IES Services
          VPLS Services
          VPRN Services
      Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  Advanced QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create an Advanced QoS Policy
        Applying Advanced Policies
          Queue Group
          SAP Ingress
          SAP Egress
      Default Advanced Policy Values
      Deleting QoS Policies
        Queue Group
        SAP Ingress
        SAP Egress
      Copying and Overwriting Advanced Policies
      Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
   QoS ATM Traffic Descriptor Profiles
    In This Section
    Overview
      ATM Traffic Descriptor Profiles
        ATM Traffic Management
        QoS Model for ATM-Based Services
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
      Basic Configurations
        Create an ATM-TD-Profile QoS Policy
        Applying ATM-TD-Profile Policies
          ATM VLL (Apipe) SAPs
          Epipe SAPs
          IES SAPs
          Ipipe SAPs
          VPRN SAPs
          VPLS SAPs
      Default ATM-TD-Profile Policy Values
    Service Management Tasks
      Removing a Profile from the QoS Configuration
      Copying and Overwriting Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
   Named Pools
    In This Section
    Overview
      Named Pool Mode for IOM3-XP Card
      Basic Configuration
        Create a Named Pool QoS Policy
        Named pool Configuration Procedure
        Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
          Service Ingress and Egress QoS Policy Commands
        Shared Queue QoS Commands
        Network Queue QoS Policy Commands
        Show Commands
          Named Pool Show Commands
   High Scale Ethernet MDA Capabilities
    In This Section
    HSMDA QoS Model
      Queue Scaling
      Port-Based Scheduling
      Dual Pass Queuing
      Egress Intermediate Destination Secondary Shapers
      Packet and Octet Counting
      Above CIR Discard with PIR Bypass
        HSMDA Ingress Queue Policing Mode
      HSMDA Buffer Utilization Controls
        HSMDA Buffer Pools
        Identifying Queue Groups as Provisioned or System
        Provisioned and System Port Class Pools
        Aggregate Pools for Type and Class Separation
        Use of Aggregate Control Buffer Pools
        HSMDA Buffer Pool Policy
          Default HSMDA Buffer Pool Policy
        Port Class Pool Sizing
        HSMDA Available Buffer Register Operation
      HSMDA Queue Congestion and Buffer Utilization Controls
        Maximum HSMDA Queue Depth
        Control Plane HSMDA RED Slope Policy Management
        HSMDA Slope Policy MBS Parameter
        HSMDA Slope Policy Slope Parameters
        HSMDA Slope Shutdown Behavior
        Ingress Packet Mapping to HSMDA RED Slope
        Egress Packet Mapping to HSMDA RED Slope
        HSMDA Queue Congestion or Pool Congestion Discard Stats
      Egress Queue CIR Based Dot1P Remarking
    SAP Ingress and SAP Egress QoS Policies
      SAP Ingress QoS Policy
      SAP Egress QoS Policy
    Subscriber Queuing Differences
    HSMDA Features
      HSMDA LAG
      Billing
      Resource Management
      HSMDA Queue Groups
        Scheduling Classes
        Scheduling Class Weighted Groups
        Scheduler Strict Priority Levels
        Strict Priority Level PIR
        Scheduler Maximum Rate
        HSMDA Scheduler Policy Overrides
        Orphan Queues
        Default HSMDA Scheduling Policy
      Basic HSMDA Configurations
        HSMDA Pool Policies
        HSMDA Scheduler Policies
        HSMDA Slope Policies
        Egress Queue Group
        Configuring HSMDA Queue Group Overrides
      Applying HSMDA Policies
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
   QoS in MC-MLPPP
    In This Section
    Overview
      Ingress MLPPP Class Reassembly
      Configuring MC-MLPPP QoS Parameters
    Basic Configurations
      Configuring MC-MLPPP
    QoS in MLFR and FRF.12 Fragmentation
      QoS in MLFR
      QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
   Class Fair Hierarchical Policing (CFHP)
    In This Section
    Introduction
    Parent Policer Priority and Unfair Sensitive Discard Thresholds
    CFHP Ingress and Egress Use Cases
    Post-CFHP Queuing and Scheduling
      Ingress CFHP Queuing
      Egress CFHP Queuing
        Policer to Local Queue Mapping
      Egress Subscriber CFHP Queuing
        Subscriber Destination String Queue Group Identification
      SAP Default Destination String
    CFHP Policer Control Policy
      Policer Control Policy Root Arbiter
      Tier 1 and Tier 2 Explicit Arbiters
      Explicit Arbiter Rate Limits
      CFHP with Child Policer Exceed PIR Enabled
    CFHP Child Policer Definition and Creation
    Policer Enabled SAP QoS Policy Applicability
    Child Policer Parent Association
    Profile Capped Policers
    Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
      Ingress ‘Undefined’ Initial Profile
      Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      Egress Explicit Profile Reclassification
      Preserving Out of Profile State at Egress Policer
      Egress Policer CIR Packet Handling without Profile Capped Mode
      Egress Policer CIR Packet Handling with Profile Capped Mode
      Forwarding Traffic Exceeding PIR in Egress Policers
      Ingress Child Policer Stat-Mode
      Egress Child Policer Stat-Mode
    Profile Preferred Mode Root Policers
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  Frequently Used QoS Terms
    In This Chapter
    Above CIR Distribution
    Available Bandwidth
    CBS
    CIR
    CIR Level
    CIR Weight
    Child
    Level
    MBS
    MCR
    Offered Load
    Orphan
    Parent
    Queue
    Rate
    Root (Scheduler)
    Scheduler Policy
    Tier
    Virtual Scheduler
    Weight
    Within CIR Distribution
  Standards and Protocol Support
  Customer Documentation and Product Support
   Getting Started
    About This Guide
    Alcatel-Lucent SR-Series Router Services Configuration Process
   QoS Policies
    In This Chapter
    QoS Overview
      Forwarding Classes
        High Priority Classes
        Assured Classes
        Best-Effort Classes
    Queue Parameters
      Queue ID
      Unicast or Multipoint Queue
      Queue Hardware Scheduler
      Committed Information Rate
      Peak Information Rate
      Adaptation Rule
      Committed Burst Size
      Maximum Burst Size
      High Priority Only Buffers
      Hi-Low Priority Only Buffers
      WRED Per Queue
        Native Queue Mode
        Pool per Queue Mode
      Packet Markings
      Queue Counters
      Queue-Types
      Color Aware Profiling
    QoS Policies
      Service versus Network QoS
      QoS Policy Entities
      Network QoS Policies
      Network Queue QoS Policies
      Service Ingress QoS Policies
        FC Mapping Based on EXP Bits at VLL/VPLS SAP
        Egress Forwarding Class Override
      Service Egress QoS Policies
      Named Pool Policies
      Slope Policies
        RED Slopes
        Tuning the Shared Buffer Utilization Calculation
        Slope Policy Parameters
      Scheduler Policies
        Virtual Hierarchical Scheduling
        Tiers
          Single Tier Scheduling
          Hierarchical Scheduler Policies
          Hierarchical Virtual Schedulers
        Scheduler Policies Applied to Applications
        Scheduler Policies Applied to SAPs
        Customer Service Level Agreement (SLA)
        Scheduler Policies Applied to Multi-Service Sites
      Shared Queues
      ATM Traffic Descriptor Profiles
      Configuration Notes
   Network QoS Policies
    In This Section
    Overview
      Network Ingress Tunnel QoS Override
        For Tunnel Terminated IP Routing Decisions
          Normal QoS Operation
          Network Ingress IP Match Criteria
          Network Ingress IPv6 Match Criteria
          Tunnel Termination QoS Override Operation
          Enabling and Disabling Tunnel Termination QoS Override
        QoS for Self-Generated (CPU) Traffic on Network Interfaces
          Default DSCP Mapping Table
    Basic Configurations
      Create a Network QoS Policy
      Applying Network Policies
      Default Network Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting Network Policies
      Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame-Relay Profile Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Link Frame Relay Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
   Network Queue QoS Policies
    In This Section
    Overview
      Network Queue Parent Scheduler
    Basic Configurations
      Create a Network Queue QoS Policy
      Applying Network Queue Policies
        XMAs and MDAs
        Ethernet Ports
        SONET/SDH Ports
    Default Network Queue Policy Values
    Service Management Tasks
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
   Service Egress and Ingress QoS Policies
    In This Section
    Overview
    Basic Configurations
    Service Egress QoS Policy
      Service Egress QoS Queue
      Percent-Rate Support
      Dynamic MBS for Egress Queue Group Queues
        Queue Length as a Delay Value
      Egress SAP Forwarding Class and Forwarding Profile Overrides
      Egress Criteria Classification Directly to Policer
      Dot1p Egress Remarking
        DEI Egress Remarking
          DEI in IEEE 802.1ad
          DEI in IEEE 802.1ah
          IEEE 802.1ad Use Case
          IEEE 802.1ah Use Case
      DSCP/Prec Egress Remarking
      Queue Depth Monitoring
    Service Ingress QoS Policy
      Service Ingress QoS Queue
      Percent-Rate Support
      Service Ingress Forwarding Class (FC)
      Service Ingress IP Match Criteria
      Service Ingress IPv6 Match Criteria
      Service Ingress MAC Match Criteria
        VLAN ID Matching
      Ingress Criteria Classification Directly to Policer
      Virtual Network Identifier (VNI) Classification
      FC Mapping Based on EXP Bits
    Service Management Tasks
      Applying Service Ingress and Egress Policies
        Epipe
        IES
        VPLS
        VPRN
      Editing QoS Policies
      Copying and Overwriting QoS Policies
      Deleting QoS Policies
      Remove a Policy from the QoS Configuration
     Service SAP QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Ingress QoS Policy Forwarding Class Commands
          Service Ingress QoS Policy Entry Commands
          IP QoS Policy Match Commands
          Service Ingress MAC QoS Policy Match Commands
          Service Egress QoS Policy Forwarding Class Commands
          Service Queue QoS Policy Commands
        Show Commands
   Queue Sharing and Redirection
    In This Section
    Queue Sharing and Redirection
      Supported Platforms
      Queue Group Applications
      Access SAP Queue Group Applications
      Ingress Access Port Queue Group Hardware Queue Allocation
      Network Port Queue Groups for IP Interfaces
      Pseudowire Shaping for Layer 2 and Layer 3 Services
      QoS on Ingress Bindings
      Queue Group Templates and Port Queue Groups
      Queue Group Templates
      Port Queue Groups
        Percent-Rate Support
      Forwarding Plane Queue Groups
      Redirection Models
      Access SAP Forwarding Class Based Redirection
      Ingress and Egress SAP Forwarding Class Redirection Association Rules
        Policy Based Provisioning Model
        SAP-Based Provisioning Model
      Access Queue Group Statistics
        Port Queue Groups
        Forwarding Plane Queue Groups
      Network IP Interface Forwarding Class-Based Redirection
      Egress Network Forwarding Class Redirection Association Rules
      Egress Network IP Interface Statistics
      Separate Ingress IPv4 and IPv6 Statistics
      Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Ingress Packet Classification
      Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        Feature Configuration
        Provisioning Model
        Egress Marking of PW Packet Header
        Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      Ingress Per SAP Statistics with Ingress Queue Groups
      Ingress and Egress PW Statistics
      Queue Group Behavior on LAG
      Queue Group Queue Instantiation Per Link
      Per Link Queue Group Queue Parameters
      Adding a Queue Group to an Existing LAG
      Removing a Queue Group from a LAG
      Adding a Port to a LAG
    Basic Configurations
      Configuring an Ingress Queue Group Template
      Configuring Egress Queue Group Template
      Applying Ingress Queue Group to SAP Ingress Policy
      Applying Egress Queue Group to SAP Egress Policy
      SAP-based Egress Queue Re-direction
      Configuring Queue Group on Ethernet Access Ingress Port
      Configuring Overrides
      Configuring Queue Group on Ethernet Access Egress Port
      Configuring Queue Group for Network Egress Traffic on Port
      Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Egress Queue Group Templates
        Configuring Ingress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
   QoS Scheduler Policies
    In This Section
    Overview
      Scheduler Policies
      Egress Port-Based Schedulers
        Service/Subscriber or Multi-service Site Egress Port Bandwidth Allocation
        Service or Subscriber or Multi-service site Scheduler Child to Port Scheduler Parent
          Direct Service or Subscriber or Multi-service site Queue Association to Port Scheduler Parents
        Frame and Packet-Based Bandwidth Allocation
        Queue Parental Association Scope
        Service or Subscriber or Multi-service Site-Level Scheduler Parental Association Scope
        Network Queue Parent Scheduler
        Foster Parent Behavior for Orphaned Queues and Schedulers
        Congestion Monitoring on Egress Port Scheduler
          Scalability, Performance, and Operation
          Restrictions
      Frame-Based Accounting
        Operational Modifications
        Existing Egress Port Based Virtual Scheduling
        Queue Behavior Modifications for Frame Based Accounting
        Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      Virtual Scheduling Unused Bandwidth Distribution
        Default Unused Bandwidth Distribution
        Limit Unused Bandwidth
      Configuring Port Scheduler Policies
        Port Scheduler Structure
        Special Orphan Queue and Scheduler Behavior
        Packet to Frame Bandwidth Conversion
        Aggregate Rate Limits for Directly Attached Queues
        SAP Egress QoS Policy Queue Parenting
        Network Queue QoS Policy Queue Parenting
        Egress Port Scheduler Overrides
        Applying a Port Scheduler Policy to a Virtual Port
        Applying Aggregate Rate Limit to a VPORT
        Applying a Scheduler Policy to a VPORT
        Weighted Scheduler Group in a Port Scheduler Policy
      Basic Configurations
        Create a QoS Scheduler Policy
        Applying Scheduler Policies
          Customer
          Epipe
          IES
          VPLS
          VPRN
        Creating a QoS Port Scheduler Policy
      Configuring Port Parent Parameters
        Within-CIR Priority Level Parameters
        Above-CIR Priority Level Parameters
      Configuring Distributed LAG Rate
    Service Management Tasks
      Deleting QoS Policies
        Removing a QoS Policy from a Customer Multi-Service Site
        Removing a QoS Policy from SAP(s)
        Removing a Policy from the QoS Configuration
      Copying and Overwriting Scheduler Policies
      Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
   Slope QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create a Slope QoS Policy
        Applying Slope Policies
          Ports
          MDA (FP1)
          FP (FP2 and higher based hardware)
      Default Slope Policy Values
      Deleting QoS Policies
        Ports
        MDA (FP1)
        FP (FP2 and higher based hardware)
        Remove a Policy from the QoS Configuration
      Copying and Overwriting QoS Policies
      Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  Shared-Queue QoS Policies
    In This Section
    Overview
      Multipoint Shared Queuing
        Ingress Queuing Modes of Operation
        Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
      Basic Configurations
      Modifying the Default Shared-Queue Policy
        Applying Shared-Queue Policies
          Epipe Services
          IES Services
          VPLS Services
          VPRN Services
      Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  Advanced QoS Policies
    In This Section
    Overview
      Basic Configurations
        Create an Advanced QoS Policy
        Applying Advanced Policies
          Queue Group
          SAP Ingress
          SAP Egress
      Default Advanced Policy Values
      Deleting QoS Policies
        Queue Group
        SAP Ingress
        SAP Egress
      Copying and Overwriting Advanced Policies
      Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
   QoS ATM Traffic Descriptor Profiles
    In This Section
    Overview
      ATM Traffic Descriptor Profiles
        ATM Traffic Management
        QoS Model for ATM-Based Services
        ATM Service Categories
        ATM Traffic Descriptors and QoS Parameters
        Policing
        Shaping
        ATM Queuing and Scheduling
        Congestion Avoidance
      Basic Configurations
        Create an ATM-TD-Profile QoS Policy
        Applying ATM-TD-Profile Policies
          ATM VLL (Apipe) SAPs
          Epipe SAPs
          IES SAPs
          Ipipe SAPs
          VPRN SAPs
          VPLS SAPs
      Default ATM-TD-Profile Policy Values
    Service Management Tasks
      Removing a Profile from the QoS Configuration
      Copying and Overwriting Profile
      Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
   Named Pools
    In This Section
    Overview
      Named Pool Mode for IOM3-XP Card
      Basic Configuration
        Create a Named Pool QoS Policy
        Named pool Configuration Procedure
        Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
          Service Ingress and Egress QoS Policy Commands
        Shared Queue QoS Commands
        Network Queue QoS Policy Commands
        Show Commands
          Named Pool Show Commands
   High Scale Ethernet MDA Capabilities
    In This Section
    HSMDA QoS Model
      Queue Scaling
      Port-Based Scheduling
      Dual Pass Queuing
      Egress Intermediate Destination Secondary Shapers
      Packet and Octet Counting
      Above CIR Discard with PIR Bypass
        HSMDA Ingress Queue Policing Mode
      HSMDA Buffer Utilization Controls
        HSMDA Buffer Pools
        Identifying Queue Groups as Provisioned or System
        Provisioned and System Port Class Pools
        Aggregate Pools for Type and Class Separation
        Use of Aggregate Control Buffer Pools
        HSMDA Buffer Pool Policy
          Default HSMDA Buffer Pool Policy
        Port Class Pool Sizing
        HSMDA Available Buffer Register Operation
      HSMDA Queue Congestion and Buffer Utilization Controls
        Maximum HSMDA Queue Depth
        Control Plane HSMDA RED Slope Policy Management
        HSMDA Slope Policy MBS Parameter
        HSMDA Slope Policy Slope Parameters
        HSMDA Slope Shutdown Behavior
        Ingress Packet Mapping to HSMDA RED Slope
        Egress Packet Mapping to HSMDA RED Slope
        HSMDA Queue Congestion or Pool Congestion Discard Stats
      Egress Queue CIR Based Dot1P Remarking
    SAP Ingress and SAP Egress QoS Policies
      SAP Ingress QoS Policy
      SAP Egress QoS Policy
    Subscriber Queuing Differences
    HSMDA Features
      HSMDA LAG
      Billing
      Resource Management
      HSMDA Queue Groups
        Scheduling Classes
        Scheduling Class Weighted Groups
        Scheduler Strict Priority Levels
        Strict Priority Level PIR
        Scheduler Maximum Rate
        HSMDA Scheduler Policy Overrides
        Orphan Queues
        Default HSMDA Scheduling Policy
      Basic HSMDA Configurations
        HSMDA Pool Policies
        HSMDA Scheduler Policies
        HSMDA Slope Policies
        Egress Queue Group
        Configuring HSMDA Queue Group Overrides
      Applying HSMDA Policies
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
   QoS in MC-MLPPP
    In This Section
    Overview
      Ingress MLPPP Class Reassembly
      Configuring MC-MLPPP QoS Parameters
    Basic Configurations
      Configuring MC-MLPPP
    QoS in MLFR and FRF.12 Fragmentation
      QoS in MLFR
      QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
   Class Fair Hierarchical Policing (CFHP)
    In This Section
    Introduction
    Parent Policer Priority and Unfair Sensitive Discard Thresholds
    CFHP Ingress and Egress Use Cases
    Post-CFHP Queuing and Scheduling
      Ingress CFHP Queuing
      Egress CFHP Queuing
        Policer to Local Queue Mapping
      Egress Subscriber CFHP Queuing
        Subscriber Destination String Queue Group Identification
      SAP Default Destination String
    CFHP Policer Control Policy
      Policer Control Policy Root Arbiter
      Tier 1 and Tier 2 Explicit Arbiters
      Explicit Arbiter Rate Limits
      CFHP with Child Policer Exceed PIR Enabled
    CFHP Child Policer Definition and Creation
    Policer Enabled SAP QoS Policy Applicability
    Child Policer Parent Association
    Profile Capped Policers
    Policer Interaction with Initial Profile, Discard Eligibility, and Ingress Priority
      Ingress ‘Undefined’ Initial Profile
      Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      Egress Explicit Profile Reclassification
      Preserving Out of Profile State at Egress Policer
      Egress Policer CIR Packet Handling without Profile Capped Mode
      Egress Policer CIR Packet Handling with Profile Capped Mode
      Forwarding Traffic Exceeding PIR in Egress Policers
      Ingress Child Policer Stat-Mode
      Egress Child Policer Stat-Mode
    Profile Preferred Mode Root Policers
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  Frequently Used QoS Terms
    In This Chapter
    Above CIR Distribution
    Available Bandwidth
    CBS
    CIR
    CIR Level
    CIR Weight
    Child
    Level
    MBS
    MCR
    Offered Load
    Orphan
    Parent
    Queue
    Rate
    Root (Scheduler)
    Scheduler Policy
    Tier
    Virtual Scheduler
    Weight
    Within CIR Distribution
  Standards and Protocol Support
  Customer Documentation and Product Support
RADIUS Attributes Reference Guide R14.0.R1
  RADIUS Attributes Reference
    About this Guide
      Audience
    RADIUS Authentication Attributes
      Subscriber Host Identification
      Wholesale-Retail — Local Access Mode
      Wholesale-Retail — L2TP Tunneled Access Mode
      Business Service Access
      Accounting On-Line Charging
      IP and IPv6 Filters
        IP Filter Attribute Details
      Subscriber Host Creation
      Subscriber Services
      WLAN Gateway
      Virtual Residential Gateway
      Dynamic Data Services
      Lawful Intercept
      IPSEC
      Application Assurance
      CLI User Authentication and Authorization
      AAA Route Downloader
    RADIUS Accounting Attributes
      Enhanced Subscriber Management (ESM) Accounting
      Distributed Subscriber Management (DSM) Accounting
      Subscriber Service Accounting
      Large Scale NAT (LSN) Accounting
      L2TP Tunnel Accounting
      Application Assurance (AA) Accounting
      Dynamic Data Service accounting
      CLI User Access Accounting
      Accounting Terminate Causes
      Accounting Triggered Reason VSA Values
    RADIUS CoA and Disconnect Message Attributes
      Subscriber Host Identification Attributes
      WLAN-GW migrant users Identification Attributes
      Distributed Subscriber Management (DSM) UE Identification Attributes
      IPSec Tunnel Identification Attributes
      Dynamic Data Services Identification Attributes
      Overview of CoA Attributes
      [101] Error-Cause Attribute Values
  Standards and Protocol Support
  Customer Documentation and Product Support
  RADIUS Attributes Reference
    About this Guide
      Audience
    RADIUS Authentication Attributes
      Subscriber Host Identification
      Wholesale-Retail — Local Access Mode
      Wholesale-Retail — L2TP Tunneled Access Mode
      Business Service Access
      Accounting On-Line Charging
      IP and IPv6 Filters
        IP Filter Attribute Details
      Subscriber Host Creation
      Subscriber Services
      WLAN Gateway
      Virtual Residential Gateway
      Dynamic Data Services
      Lawful Intercept
      IPSEC
      Application Assurance
      CLI User Authentication and Authorization
      AAA Route Downloader
    RADIUS Accounting Attributes
      Enhanced Subscriber Management (ESM) Accounting
      Distributed Subscriber Management (DSM) Accounting
      Subscriber Service Accounting
      Large Scale NAT (LSN) Accounting
      L2TP Tunnel Accounting
      Application Assurance (AA) Accounting
      Dynamic Data Service accounting
      CLI User Access Accounting
      Accounting Terminate Causes
      Accounting Triggered Reason VSA Values
    RADIUS CoA and Disconnect Message Attributes
      Subscriber Host Identification Attributes
      WLAN-GW migrant users Identification Attributes
      Distributed Subscriber Management (DSM) UE Identification Attributes
      IPSec Tunnel Identification Attributes
      Dynamic Data Services Identification Attributes
      Overview of CoA Attributes
      [101] Error-Cause Attribute Values
  Standards and Protocol Support
  Customer Documentation and Product Support
Router Configuration Guide R14.0.R1
  Getting Started
    About This Guide
    In This Chapter
    Router Configuration Process
   IP Router Configuration
    In This Chapter
    Configuring IP Router Parameters
      Interfaces
        Network Interface
        Network Domains
        System Interface
        Unicast Reverse Path Forwarding Check (uRPF)
        Creating an IP Address Range
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
      Router ID
      Autonomous Systems (AS)
      Confederations
      Proxy ARP
      Exporting an Inactive BGP Route from a VPRN
      DHCP Relay
      Internet Protocol Versions
        IPv6 Address Format
        IPv6 Applications
        DNS
        Secure Neighbor Discovery (SeND)
        SeND Persistent CGAs
          Persistent RSA Key Pair
          Persistent CGA Modifier
          Making non-persistent CGAs persistent
          Booting from a saved configuration file
        IPv6 Provider Edge Router over MPLS (6PE)
          6PE Control Plane Support
          6PE Data Plane Support
      Static Route Resolution Using Tunnels
        Static Route ECMP Support
    Weighted Load-Balancing over MPLS LSP
      Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        Feature Configuration
        Feature Behavior
        ECMP Considerations
        Weighted Load Balancing Static Route Packets over MPLS LSP
          Feature Configuration
          Feature Behavior
      Bi-directional Forwarding Detection
        BFD Control Packet
        Control Packet Format
        BFD for RSVP-TE
        Echo Support
        BFD Support for BGP
        Centralized BFD
          IES Over Spoke SDP
          BFD Over LAG and VSM Interfaces
        Aggregate Next Hop
        Invalidate Next-Hop Based on ARP/Neighbor Cache State
          Invalidate Next-Hop Based on IPV4 ARP
          Invalidate Next-Hop Based on Neighbor Cache State
        LDP Shortcut for IGP Route Resolution
          IGP Route Resolution
          LDP-IGP Synchronization
          LDP Shortcut Forwarding Plane
          ECMP Considerations
          Handling of Control Packets
          Handling of Multicast Packets
          Interaction with BGP Route Resolution to an LDP FEC
          Interaction with Static Route Resolution to an LDP FEC
          LDP Control Plane
    Weighted Load-Balancing over Interface Next-hops
    Process Overview
    Configuration Notes
     Configuring an IP Router with CLI
    Router Configuration Overview
      System Interface
      Network Interface
    Basic Configuration
    Common Configuration Tasks
      Configuring a System Name
      Configuring Interfaces
        Configuring a System Interface
        Configuring a Network Interface
        Configuring IPv6 Parameters
        Configuring IPv6 Over IPv4 Parameters
        Tunnel Ingress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Tunnel Egress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Router Advertisement
        Configuring IPv6 Parameters
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Configuring Proxy ARP
        Creating an IP Address Range
      Deriving the Router ID
      Configuring a Confederation
      Configuring an Autonomous System
      Configuring Overload State on a Single SFM
    Service Management Tasks
      Changing the System Name
      Modifying Interface Parameters
      Deleting a Logical IP Interface
    IP Router Configuration Command Reference
      Command Hierarchies
        Router Commands
        Router BFD commands
        Router L2TP Commands
        Router Interface Commands
        Router Interface IPv6 Commands
        Router Advertisement Commands
      Command Descriptions
        Generic Commands
        Router Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router Interface Commands
          Router Interface Filter Commands
          Router Interface ICMP Commands
          Router Interface IPv6 Commands
          Router Interface DHCP Commands
        Router Advertisement Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
          L2TP Show Commands
        Clear Commands
        Debug Commands
   VRRP
    In This Chapter
    VRRP Overview
    VRRP Components
      Virtual Router
      IP Address Owner
      Primary and Secondary IP Addresses
      Virtual Router Master
      Virtual Router Backup
      Owner and Non-Owner VRRP
      Configurable Parameters
        Virtual Router ID (VRID)
        Priority
        IP Addresses
        Message Interval and Master Inheritance
        Skew Time
        Master Down Interval
        Preempt Mode
        VRRP Message Authentication
          Authentication Type 0 – No Authentication
          Authentication Type 1 – Simple Text Password
          Authentication Failure
        Authentication Data
        Virtual MAC Address
        VRRP Advertisement Message IP Address List Verification
        Inherit Master VRRP Router’s Advertisement Interval Timer
        IPv6 Virtual Router Instance Operationally Up
        Policies
    VRRP Priority Control Policies
      VRRP Virtual Router Policy Constraints
      VRRP Virtual Router Instance Base Priority
      VRRP Priority Control Policy Delta In-Use Priority Limit
      VRRP Priority Control Policy Priority Events
        Priority Event Hold-Set Timers
        Port Down Priority Event
        LAG Degrade Priority Event
        Host Unreachable Priority Event
        Route Unknown Priority Event
    VRRP Non-Owner Accessibility
      Non-Owner Access Ping Reply
      Non-Owner Access Telnet
      Non-Owner Access SSH
    VRRP Configuration Process Overview
    Configuration Notes
      General
    Configuring VRRP with CLI
    VRRP Configuration Overview
      Preconfiguration Requirements
    Basic VRRP Configurations
      VRRP Policy
      VRRP IES Service Parameters
        Configure VRRP for IPv6
      VRRP Router Interface Parameters
    Common Configuration Tasks
      Creating Interface Parameters
    Configuring VRRP Policy Components
      Configuring Service VRRP Parameters
        Non-Owner VRRP Example
        Owner Service VRRP
      Configuring Router Interface VRRP Parameters
        Router Interface VRRP Non-Owner
        Router Interface VRRP Owner
    VRRP Configuration Management Tasks
      Modifying a VRRP Policy
        Deleting a VRRP Policy
      Modifying Service and Interface VRRP Parameters
        Modifying Non-Owner Parameters
        Modifying Owner Parameters
        Deleting VRRP on an Interface or Service
     VRRP Configuration Command Reference
      Command Hierarchies
        IPv4 Interface Commands
        Router Interface Commands
        IPv6 Interface Commands
        Priority Control Event Policy Commands
      Command Descriptions
        Interface Configuration Commands
        Priority Policy Commands
        Priority Policy Event Commands
        Priority Policy Port Down Event Commands
        Priority Policy LAG Events Commands
        Priority Policy Host Unreachable Event Commands
        Priority Policy Route Unknown Event Commands
     Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
   Filter Policies
    In This Chapter
    ACL Filter Policy Overview
      Filter Policy Basics
        Filter Policy Packet Match Criteria
        IPv4/IPv6 Filter Policy Entry Match Criteria
        MAC Filter Policy Entry Match Criteria
        Filter Policy Actions
        Filter Policy Statistics
        Filter Policy Logging
        Filter Policy cflowd Sampling
        Filter Policy Management
          Modifying Existing Filter Policy
          Filter Policy Copy and Renumbering
      Filter Policy Advanced Topics
        Match-list for Filter Policies
          Auto-generation of Filter-policy Address Prefix Match Lists
        Primary and Secondary Filter Policy Action for PBF Redundancy
        Destination MAC Rewrite when Deploying Policy-Based Forwarding
        Embedded Filters
        System-level IPv4/IPv6 Line Card Filter Policy
        Network-port VPRN Filter Policy
        ISID MAC Filters
        VID MAC filters
          Arbitrary Bit Matching of VID Filters
          Port Group Configuration Example
        Redirect Policies
          Router Instance Support for Redirect Policies
        HTTP-redirect (Captive Portal)
          Traffic Flow
        Filter Policies and Dynamic Policy-Driven Interfaces
        Filter Policy-based ESM Service Chaining
        Policy-Based Forwarding for Deep Packet Inspection in VPLS
    Filter Configuration Command Reference
      Command Hierarchies
        DHCP Filter Policy Commands
        IP Filter Policy Commands
        IPv6 Filter Policy Commands
        System Filter Policy Commands
        Log Filter Commands
        MAC Filter Commands
        Match Filter List Commands
        Redirect Policy Configuration Commands
        Copy Filter Commands
      Command Descriptions
        Generic Commands
        Global Filter Commands
        DHCP Filter Commands
        Filter Log Commands
        ACL Filter Policy Commands
        General Filter Entry Commands
        IP (v4/v6) Filter Entry Commands
        Match List Configuration Commands
        MAC Filter Entry Commands
        MAC Filter Match Criteria
        Policy and Entry Maintenance Commands
        Redirect Policy Commands
    Configuring Filter Policies with CLI
    Common Configuration Tasks
      Creating an IPv4 Filter Policy
        IPv4 Filter Entry
          Configuring the HTTP-Redirect Option
          Cflowd Filter Sampling
      Creating an IPv6 Filter Policy
      Creating a MAC Filter Policy
        MAC Filter Policy
        MAC ISID Filter Policy
        MAC VID Filter Policy
        MAC Filter Entry
      Creating a Match List for Filter Policies
      Applying Filter Policies
        Apply IP (v4/v6) and MAC Filter Policies to a Service
        Applying (IPv4/v6) Filter Policies to a Network Port
      Creating a Redirect Policy
    Filter Management Tasks
      Renumbering Filter Policy Entries
      Modifying a Filter Policy
      Deleting a Filter Policy
      Modifying a Redirect Policy
      Deleting a Redirect Policy
      Copying Filter Policies
    Show, Clear, Monitor, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  Hybrid OpenFlow Switch
    In This Chapter
    Hybrid OpenFlow Switching
      Redundant Controllers and Multiple Switch Instances
      GRT-only and Multi-Service H-OFS Mode of Operations
        Port and VLAN ID Match in Flow Table Entries
      Hybrid OpenFlow Switch Steering using Filter Policies
      Hybrid OpenFlow Switch Statistics
      OpenFlow Switch Auxiliary Channels
      Hybrid OpenFlow Switch Traffic Steering Details
        SR OS H-OFS Logical Port
        SR OS H-OFS Port and VLAN Encoding
        Redirect to IP next-hop
        Redirect to GRT Instance or VRF Instance
        Redirect to Next-hop and VRF/GRT Instance
        Redirect to LSP
        Redirect to SAP
        Redirect to SDP
        Forward action
        Drop action
        Default no-match Action
    Configuration Notes
    OpenFlow Command Reference
      Command Hierarchies
        OpenFlow Commands
        Show Commands
        Tools Commands
      Command Descriptions
        Generic Commands
         Show Commands
        Debug Commands
   Cflowd
    In This Chapter
    Cflowd Overview
      Operation
        Version 8
        Version 9
        Version 10
      Cflowd Filter Matching
    Cflowd Configuration Process Overview
    Configuration Notes
     Configuring Cflowd with CLI
    Cflowd Configuration Overview
      Traffic Sampling
      Collectors 
        Aggregation
    Basic Cflowd Configuration
    Common Configuration Tasks
      Global Cflowd Components
      Configuring Cflowd
      Enabling Cflowd
      Configuring Global Cflowd Parameters
      Configuring Cflowd Collectors
        Version 9 and Version 10 Templates
      Enabling Cflowd on Interfaces and Filters
      Specifying Cflowd Options on an IP Interface
        Interface Configurations
        Service Interfaces
      Specifying Sampling Options in Filter Entries
        Filter Configurations
        Dependencies
    Cflowd Configuration Management Tasks
      Modifying Global Cflowd Components
      Modifying Cflowd Collector Parameters
    Cflowd Configuration Command Reference
      Command Hierarchies
      Command Descriptions
        Global Commands
    Show, Tools, and Clear Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    In This Chapter
    Router Configuration Process
   IP Router Configuration
    In This Chapter
    Configuring IP Router Parameters
      Interfaces
        Network Interface
        Network Domains
        System Interface
        Unicast Reverse Path Forwarding Check (uRPF)
        Creating an IP Address Range
        QoS Policy Propagation Using BGP (QPPB)
          QPPB Applications
          Inter-AS Coordination of QoS Policies
          Traffic Differentiation Based on Route Characteristics
        QPPB
          Associating an FC and Priority with a Route
          Displaying QoS Information Associated with Routes
          Enabling QPPB on an IP interface
          QPPB When Next-Hops are Resolved by QPPB Routes
          QPPB and Multiple Paths to a Destination
          QPPB and Policy-Based Routing
        QPPB and GRT Lookup
          QPPB Interaction with SAP Ingress QoS Policy
      Router ID
      Autonomous Systems (AS)
      Confederations
      Proxy ARP
      Exporting an Inactive BGP Route from a VPRN
      DHCP Relay
      Internet Protocol Versions
        IPv6 Address Format
        IPv6 Applications
        DNS
        Secure Neighbor Discovery (SeND)
        SeND Persistent CGAs
          Persistent RSA Key Pair
          Persistent CGA Modifier
          Making non-persistent CGAs persistent
          Booting from a saved configuration file
        IPv6 Provider Edge Router over MPLS (6PE)
          6PE Control Plane Support
          6PE Data Plane Support
      Static Route Resolution Using Tunnels
        Static Route ECMP Support
    Weighted Load-Balancing over MPLS LSP
      Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        Feature Configuration
        Feature Behavior
        ECMP Considerations
        Weighted Load Balancing Static Route Packets over MPLS LSP
          Feature Configuration
          Feature Behavior
      Bi-directional Forwarding Detection
        BFD Control Packet
        Control Packet Format
        BFD for RSVP-TE
        Echo Support
        BFD Support for BGP
        Centralized BFD
          IES Over Spoke SDP
          BFD Over LAG and VSM Interfaces
        Aggregate Next Hop
        Invalidate Next-Hop Based on ARP/Neighbor Cache State
          Invalidate Next-Hop Based on IPV4 ARP
          Invalidate Next-Hop Based on Neighbor Cache State
        LDP Shortcut for IGP Route Resolution
          IGP Route Resolution
          LDP-IGP Synchronization
          LDP Shortcut Forwarding Plane
          ECMP Considerations
          Handling of Control Packets
          Handling of Multicast Packets
          Interaction with BGP Route Resolution to an LDP FEC
          Interaction with Static Route Resolution to an LDP FEC
          LDP Control Plane
    Weighted Load-Balancing over Interface Next-hops
    Process Overview
    Configuration Notes
     Configuring an IP Router with CLI
    Router Configuration Overview
      System Interface
      Network Interface
    Basic Configuration
    Common Configuration Tasks
      Configuring a System Name
      Configuring Interfaces
        Configuring a System Interface
        Configuring a Network Interface
        Configuring IPv6 Parameters
        Configuring IPv6 Over IPv4 Parameters
        Tunnel Ingress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Tunnel Egress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Router Advertisement
        Configuring IPv6 Parameters
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Configuring Proxy ARP
        Creating an IP Address Range
      Deriving the Router ID
      Configuring a Confederation
      Configuring an Autonomous System
      Configuring Overload State on a Single SFM
    Service Management Tasks
      Changing the System Name
      Modifying Interface Parameters
      Deleting a Logical IP Interface
    IP Router Configuration Command Reference
      Command Hierarchies
        Router Commands
        Router BFD commands
        Router L2TP Commands
        Router Interface Commands
        Router Interface IPv6 Commands
        Router Advertisement Commands
      Command Descriptions
        Generic Commands
        Router Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router Interface Commands
          Router Interface Filter Commands
          Router Interface ICMP Commands
          Router Interface IPv6 Commands
          Router Interface DHCP Commands
        Router Advertisement Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
          L2TP Show Commands
        Clear Commands
        Debug Commands
   VRRP
    In This Chapter
    VRRP Overview
    VRRP Components
      Virtual Router
      IP Address Owner
      Primary and Secondary IP Addresses
      Virtual Router Master
      Virtual Router Backup
      Owner and Non-Owner VRRP
      Configurable Parameters
        Virtual Router ID (VRID)
        Priority
        IP Addresses
        Message Interval and Master Inheritance
        Skew Time
        Master Down Interval
        Preempt Mode
        VRRP Message Authentication
          Authentication Type 0 – No Authentication
          Authentication Type 1 – Simple Text Password
          Authentication Failure
        Authentication Data
        Virtual MAC Address
        VRRP Advertisement Message IP Address List Verification
        Inherit Master VRRP Router’s Advertisement Interval Timer
        IPv6 Virtual Router Instance Operationally Up
        Policies
    VRRP Priority Control Policies
      VRRP Virtual Router Policy Constraints
      VRRP Virtual Router Instance Base Priority
      VRRP Priority Control Policy Delta In-Use Priority Limit
      VRRP Priority Control Policy Priority Events
        Priority Event Hold-Set Timers
        Port Down Priority Event
        LAG Degrade Priority Event
        Host Unreachable Priority Event
        Route Unknown Priority Event
    VRRP Non-Owner Accessibility
      Non-Owner Access Ping Reply
      Non-Owner Access Telnet
      Non-Owner Access SSH
    VRRP Configuration Process Overview
    Configuration Notes
      General
    Configuring VRRP with CLI
    VRRP Configuration Overview
      Preconfiguration Requirements
    Basic VRRP Configurations
      VRRP Policy
      VRRP IES Service Parameters
        Configure VRRP for IPv6
      VRRP Router Interface Parameters
    Common Configuration Tasks
      Creating Interface Parameters
    Configuring VRRP Policy Components
      Configuring Service VRRP Parameters
        Non-Owner VRRP Example
        Owner Service VRRP
      Configuring Router Interface VRRP Parameters
        Router Interface VRRP Non-Owner
        Router Interface VRRP Owner
    VRRP Configuration Management Tasks
      Modifying a VRRP Policy
        Deleting a VRRP Policy
      Modifying Service and Interface VRRP Parameters
        Modifying Non-Owner Parameters
        Modifying Owner Parameters
        Deleting VRRP on an Interface or Service
     VRRP Configuration Command Reference
      Command Hierarchies
        IPv4 Interface Commands
        Router Interface Commands
        IPv6 Interface Commands
        Priority Control Event Policy Commands
      Command Descriptions
        Interface Configuration Commands
        Priority Policy Commands
        Priority Policy Event Commands
        Priority Policy Port Down Event Commands
        Priority Policy LAG Events Commands
        Priority Policy Host Unreachable Event Commands
        Priority Policy Route Unknown Event Commands
     Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
   Filter Policies
    In This Chapter
    ACL Filter Policy Overview
      Filter Policy Basics
        Filter Policy Packet Match Criteria
        IPv4/IPv6 Filter Policy Entry Match Criteria
        MAC Filter Policy Entry Match Criteria
        Filter Policy Actions
        Filter Policy Statistics
        Filter Policy Logging
        Filter Policy cflowd Sampling
        Filter Policy Management
          Modifying Existing Filter Policy
          Filter Policy Copy and Renumbering
      Filter Policy Advanced Topics
        Match-list for Filter Policies
          Auto-generation of Filter-policy Address Prefix Match Lists
        Primary and Secondary Filter Policy Action for PBF Redundancy
        Destination MAC Rewrite when Deploying Policy-Based Forwarding
        Embedded Filters
        System-level IPv4/IPv6 Line Card Filter Policy
        Network-port VPRN Filter Policy
        ISID MAC Filters
        VID MAC filters
          Arbitrary Bit Matching of VID Filters
          Port Group Configuration Example
        Redirect Policies
          Router Instance Support for Redirect Policies
        HTTP-redirect (Captive Portal)
          Traffic Flow
        Filter Policies and Dynamic Policy-Driven Interfaces
        Filter Policy-based ESM Service Chaining
        Policy-Based Forwarding for Deep Packet Inspection in VPLS
    Filter Configuration Command Reference
      Command Hierarchies
        DHCP Filter Policy Commands
        IP Filter Policy Commands
        IPv6 Filter Policy Commands
        System Filter Policy Commands
        Log Filter Commands
        MAC Filter Commands
        Match Filter List Commands
        Redirect Policy Configuration Commands
        Copy Filter Commands
      Command Descriptions
        Generic Commands
        Global Filter Commands
        DHCP Filter Commands
        Filter Log Commands
        ACL Filter Policy Commands
        General Filter Entry Commands
        IP (v4/v6) Filter Entry Commands
        Match List Configuration Commands
        MAC Filter Entry Commands
        MAC Filter Match Criteria
        Policy and Entry Maintenance Commands
        Redirect Policy Commands
    Configuring Filter Policies with CLI
    Common Configuration Tasks
      Creating an IPv4 Filter Policy
        IPv4 Filter Entry
          Configuring the HTTP-Redirect Option
          Cflowd Filter Sampling
      Creating an IPv6 Filter Policy
      Creating a MAC Filter Policy
        MAC Filter Policy
        MAC ISID Filter Policy
        MAC VID Filter Policy
        MAC Filter Entry
      Creating a Match List for Filter Policies
      Applying Filter Policies
        Apply IP (v4/v6) and MAC Filter Policies to a Service
        Applying (IPv4/v6) Filter Policies to a Network Port
      Creating a Redirect Policy
    Filter Management Tasks
      Renumbering Filter Policy Entries
      Modifying a Filter Policy
      Deleting a Filter Policy
      Modifying a Redirect Policy
      Deleting a Redirect Policy
      Copying Filter Policies
    Show, Clear, Monitor, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  Hybrid OpenFlow Switch
    In This Chapter
    Hybrid OpenFlow Switching
      Redundant Controllers and Multiple Switch Instances
      GRT-only and Multi-Service H-OFS Mode of Operations
        Port and VLAN ID Match in Flow Table Entries
      Hybrid OpenFlow Switch Steering using Filter Policies
      Hybrid OpenFlow Switch Statistics
      OpenFlow Switch Auxiliary Channels
      Hybrid OpenFlow Switch Traffic Steering Details
        SR OS H-OFS Logical Port
        SR OS H-OFS Port and VLAN Encoding
        Redirect to IP next-hop
        Redirect to GRT Instance or VRF Instance
        Redirect to Next-hop and VRF/GRT Instance
        Redirect to LSP
        Redirect to SAP
        Redirect to SDP
        Forward action
        Drop action
        Default no-match Action
    Configuration Notes
    OpenFlow Command Reference
      Command Hierarchies
        OpenFlow Commands
        Show Commands
        Tools Commands
      Command Descriptions
        Generic Commands
         Show Commands
        Debug Commands
   Cflowd
    In This Chapter
    Cflowd Overview
      Operation
        Version 8
        Version 9
        Version 10
      Cflowd Filter Matching
    Cflowd Configuration Process Overview
    Configuration Notes
     Configuring Cflowd with CLI
    Cflowd Configuration Overview
      Traffic Sampling
      Collectors 
        Aggregation
    Basic Cflowd Configuration
    Common Configuration Tasks
      Global Cflowd Components
      Configuring Cflowd
      Enabling Cflowd
      Configuring Global Cflowd Parameters
      Configuring Cflowd Collectors
        Version 9 and Version 10 Templates
      Enabling Cflowd on Interfaces and Filters
      Specifying Cflowd Options on an IP Interface
        Interface Configurations
        Service Interfaces
      Specifying Sampling Options in Filter Entries
        Filter Configurations
        Dependencies
    Cflowd Configuration Management Tasks
      Modifying Global Cflowd Components
      Modifying Cflowd Collector Parameters
    Cflowd Configuration Command Reference
      Command Hierarchies
      Command Descriptions
        Global Commands
    Show, Tools, and Clear Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer documentation and product support
Services Overview Guide R14.0.R1
  Getting Started
    About This Guide
      Audience
   Services Overview
    In This Chapter
    Introduction
      Service Types
      Service Policies
        Multipoint Shared Queuing
          Ingress Queuing Modes of Operation
          Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
    Alcatel-Lucent Service Model
    Service Entities
      Customers
      Service Access Points (SAPs)
        SAP Encapsulation Types and Identifiers
        Ethernet Encapsulations
        Default SAP on a Dot1q Port
        QinQ SAPs
        Services and SAP Encapsulations
        SAP Configuration Considerations
        G.8032 Protected Ethernet Rings
        SAP Bandwidth CAC
          CAC Enforcement
      Connection Profile VLAN SAPs
        Using connection-profile-vlan in Dot1q Ports
        Using connection-profile-vlan in QinQ Ports
      Service Distribution Points
        SDP Binding
        Spoke and Mesh SDPs
        SDP Using BGP Route Tunnel
        SDP Keepalives
        SDP Administrative Groups
        SDP Selection Rules
        Class-Based Forwarding
          Application of Class-Based Forwarding over RSVP LSPs
          Operation of Class-Based Forwarding over RSVP LSPs
      SAP & MPLS Binding Loopback with MAC Swap
    Multi-Service Sites
    G.8031 Protected Ethernet Tunnels
      OAM Considerations
      QoS Considerations
      Mirroring and Lawful Intercept Considerations
      Support Service and Solution Combinations
      LAG Emulation using Ethernet Tunnels
    G.8032 Ethernet Ring Protection Switching
      Overview of G.8032 Operation
      Ethernet Ring Sub-Rings
        Virtual and Non-Virtual Channel
        Lag Support
      OAM Considerations
      Support Service and Solution Combinations
    Internal Objects Created for L2TP and NAT
    Ethernet Unnumbered Interfaces
    Service Creation Process Overview
    Deploying and Provisioning Services
      Phase 1: Core Network Construction
      Phase 2: Service Administration
      Phase 3: Service Provisioning
    Configuration Notes
      General
     Configuring Global Service Entities with CLI
      Service Model Entities
    Basic Configuration
    Common Configuration Tasks
      Configuring Customers
        Customer Information
        Configuring Multi-Service-Sites
      Configuring an SDP
        SDP Configuration Tasks
        Configuring an SDP
        Configuring a Mixed-LSP SDP
    Ethernet Connectivity Fault Management (ETH-CFM)
      Facility MEPs
        Common Actionable Failures
        General Detection, Processing and Reaction
        Port-Based MEP
        LAG Based MEP
        Tunnel Based MEP
        Router Interface MEP
        Hardware Support
      ETH-CFM and MC-LAG
        ETH-CFM and MC-LAG Default Behavior
        Linking ETH-CFM to MC-LAG State
      ETH-CFM Features
        CCM Hold Timers
        CCM Interval
        MEP and MIP Support
      Configuring ETH-CFM Parameters
    Service Management Tasks
      Modifying Customer Accounts
      Deleting Customers
      Modifying SDPs
      Deleting SDPs
     Global Services Configuration Command Reference
      Command Hierarchies
        Customer Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire (PW) Commands
        SDP Commands
        SAP Commands
        Ethernet Ring Commands
        ETH-CFM Configuration Commands
        ETH Tunnel Commands
        Connection Profile VLAN Commands
      Command Descriptions
        Generic Commands
        Customer Management Commands
        Service System Commands
        MRP Commands
        Oper Group Commands
        Pseudowire Commands
        SDP Commands
        SDP Keepalive Commands
        Ethernet Ring Commands
        ETH-CFM Configuration Commands
        ETH-Tunnel Commands
        Connection Profile VLAN Commands
        Tools Perform Commands
        Tools Dump Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Tools Perform Commands
        Tools Dump Commands
      Command Descriptions
        Service Commands
        Connection Profile VLAN Commands
        ETH-CFM Show Commands
   Common CLI Command Descriptions
    In This Chapter
      Common Service Commands
        SAP Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
      Audience
   Services Overview
    In This Chapter
    Introduction
      Service Types
      Service Policies
        Multipoint Shared Queuing
          Ingress Queuing Modes of Operation
          Ingress Service Queuing
          Ingress Shared Queuing
          Ingress Multipoint Shared Queuing
    Alcatel-Lucent Service Model
    Service Entities
      Customers
      Service Access Points (SAPs)
        SAP Encapsulation Types and Identifiers
        Ethernet Encapsulations
        Default SAP on a Dot1q Port
        QinQ SAPs
        Services and SAP Encapsulations
        SAP Configuration Considerations
        G.8032 Protected Ethernet Rings
        SAP Bandwidth CAC
          CAC Enforcement
      Connection Profile VLAN SAPs
        Using connection-profile-vlan in Dot1q Ports
        Using connection-profile-vlan in QinQ Ports
      Service Distribution Points
        SDP Binding
        Spoke and Mesh SDPs
        SDP Using BGP Route Tunnel
        SDP Keepalives
        SDP Administrative Groups
        SDP Selection Rules
        Class-Based Forwarding
          Application of Class-Based Forwarding over RSVP LSPs
          Operation of Class-Based Forwarding over RSVP LSPs
      SAP & MPLS Binding Loopback with MAC Swap
    Multi-Service Sites
    G.8031 Protected Ethernet Tunnels
      OAM Considerations
      QoS Considerations
      Mirroring and Lawful Intercept Considerations
      Support Service and Solution Combinations
      LAG Emulation using Ethernet Tunnels
    G.8032 Ethernet Ring Protection Switching
      Overview of G.8032 Operation
      Ethernet Ring Sub-Rings
        Virtual and Non-Virtual Channel
        Lag Support
      OAM Considerations
      Support Service and Solution Combinations
    Internal Objects Created for L2TP and NAT
    Ethernet Unnumbered Interfaces
    Service Creation Process Overview
    Deploying and Provisioning Services
      Phase 1: Core Network Construction
      Phase 2: Service Administration
      Phase 3: Service Provisioning
    Configuration Notes
      General
     Configuring Global Service Entities with CLI
      Service Model Entities
    Basic Configuration
    Common Configuration Tasks
      Configuring Customers
        Customer Information
        Configuring Multi-Service-Sites
      Configuring an SDP
        SDP Configuration Tasks
        Configuring an SDP
        Configuring a Mixed-LSP SDP
    Ethernet Connectivity Fault Management (ETH-CFM)
      Facility MEPs
        Common Actionable Failures
        General Detection, Processing and Reaction
        Port-Based MEP
        LAG Based MEP
        Tunnel Based MEP
        Router Interface MEP
        Hardware Support
      ETH-CFM and MC-LAG
        ETH-CFM and MC-LAG Default Behavior
        Linking ETH-CFM to MC-LAG State
      ETH-CFM Features
        CCM Hold Timers
        CCM Interval
        MEP and MIP Support
      Configuring ETH-CFM Parameters
    Service Management Tasks
      Modifying Customer Accounts
      Deleting Customers
      Modifying SDPs
      Deleting SDPs
     Global Services Configuration Command Reference
      Command Hierarchies
        Customer Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire (PW) Commands
        SDP Commands
        SAP Commands
        Ethernet Ring Commands
        ETH-CFM Configuration Commands
        ETH Tunnel Commands
        Connection Profile VLAN Commands
      Command Descriptions
        Generic Commands
        Customer Management Commands
        Service System Commands
        MRP Commands
        Oper Group Commands
        Pseudowire Commands
        SDP Commands
        SDP Keepalive Commands
        Ethernet Ring Commands
        ETH-CFM Configuration Commands
        ETH-Tunnel Commands
        Connection Profile VLAN Commands
        Tools Perform Commands
        Tools Dump Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Tools Perform Commands
        Tools Dump Commands
      Command Descriptions
        Service Commands
        Connection Profile VLAN Commands
        ETH-CFM Show Commands
   Common CLI Command Descriptions
    In This Chapter
      Common Service Commands
        SAP Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
System Management Guide R14.0.R1
  Getting Started
    About This Guide
    Router Configuration Process
  Security
    In This Chapter
    Authentication, Authorization, and Accounting
      Authentication
        Local Authentication
        RADIUS Authentication
          RADIUS Server Selection
        TACACS+ Authentication
      Authorization
        Local Authorization
        RADIUS Authorization
        TACACS+ Authorization
          Examples
      Accounting
        RADIUS Accounting
        TACACS+ Accounting
    Security Controls
      When a Server Does Not Respond
      Access Request Flow
    Centralized CPU Protection
      CPU Protection Extensions for ETH-CFM
      ETH-CFM Ingress Squelching
    Distributed CPU Protection (DCP)
      Applicability of Distributed CPU Protection
      Log Events, Statistics, Status and SNMP support
      DCP Policer Resource Management
      Operational Guidelines and Tips
    Classification-Based Priority for Extracted Protocol Traffic
    Vendor-Specific Attributes (VSAs)
    Other Security Features
      Secure Shell (SSH)
      SSH PKI Authentication
        Key Generation
      Per Peer CPM Queuing
      CPM Filters and Traffic Management
      TTL Security for BGP and LDP
      Exponential Login Backoff
      User Lockout
      802.1x Network Access Control
      TCP Enhanced Authentication Option
        Packet Formats
        Keychain
    Configuration Notes
      General
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Configuration Tasks
    Security Configuration Procedures
      Configuring Management Access Filters
      Configuring IP CPM Filters Policy
      Configuring MAC CPM Filters
      Configuring IPv6 CPM Filters
      Configuring CPM Queues
      IPSec Certificates Parameters
      Configuring Profiles
        Parameters
        Wildcards
        CLI Session Resource Management
      Configuring Users
      Configuring Keychains
      Copying and Overwriting Users and Profiles
        User
        Profile
    RADIUS Configurations
      Configuring RADIUS Authentication
      Configuring RADIUS Authorization
      Configuring RADIUS Accounting
    Configuring 802.1x RADIUS Policies
    TACACS+ Configurations
      Enabling TACACS+ Authentication
      Configuring TACACS+ Authorization
      Configuring TACACS+ Accounting
      Enabling SSH
    Configuring Login Controls
    Security Configuration Command Reference
      Command Hierarchies
        Security Commands
          LLDP Commands
          Management Access Filter Commands
          CLI Script Authorization Commands
          CPM Filter Commands
          CPM Queue Commands
          CPU Protection Commands
          Distributed CPU Protection Commands
          Extracted Protocol Traffic Priority Commands
          Security Password Commands
          Public Key Infrastructure (PKI) Commands
          Profile Commands
          CLI Session Commands
          RADIUS Commands
          SSH Commands
          TACPLUS Commands
          User Commands
          User Template Commands
          Dot1x Commands
          Keychain Commands
          TTL Security Commands
        Login Control Commands
      Command Descriptions
        General Security Commands
        LLDP Commands
        Login, Telnet, SSH and FTP Commands
        Management Access Filter Commands
        Password Commands
        Public Key Infrastructure (PKI) Commands
        Profile Management Commands
        User Management Commands
        CLI Session Management Commands
        RADIUS Client Commands
        TACACS+ Client Commands
        Generic 802.1x COMMANDS
        Keychain Authentication
        CLI Script Commands
        CPM Filter Commands
        CPM Queue Commands
        TTL Security Commands
        CPU Protection Commands
        Distributed CPU Protection Commands
        Extracted Protocol Traffic Priority Commands
    Security Show, Clear, Debug, Tools, and Admin Command Reference
      Command Hierarchies
        Show Commands
          Security
          Login Control
        Clear Commands
        Debug Commands
        Tools Commands
        Admin Commands
      Command Descriptions
        Show Commands
          Security Commands
          Login Control
        Clear Commands
          CPU Protection Commands
        Debug Commands
        Tools Commands
        Admin Commands
  SNMP
    In This Chapter
    SNMP Overview
      SNMP Architecture
      Management Information Base
      SNMP Protocol Operations
      SNMP Versions
      Management Information Access Control
      User-Based Security Model Community Strings
      Views
      Access Groups
      Users
      Per-VPRN Logs and SNMP Access
      Per-SNMP Community Source IP Address Validation
    Which SNMP Version to Use?
    Configuration Notes
      General
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Configuration Command Reference
      Command Hierarchies
         SNMP System Commands
        SNMP Security Commands
      Command Descriptions
        SNMP System Commandse
        SNMP Security Commands
    SNMP Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  NETCONF
    In This Chapter
    NETCONF Overview
    NETCONF in the SR OS
      YANG Data Models
      Transport and Sessions
      Datastores and URLs
      NETCONF Operations and Capabilities
        <get>
        <get-config>
        <edit-config>
        <copy-config> and <delete-config>
        <lock>
        <unlock>
        <commit>
        <discard-changes>
        <validate>
      Data Model, Datastore and Operation Combinations
      General NETCONF Behavior
        System-Provisioned Configuration (SPC) Objects
    Establishing a NETCONF Session
    XML Content Layer
      <get> with XML Content Layer
      <edit-config> with XML Content Layer
      <get-config> with XML Content Layer
    XML Content Layer Examples
    CLI Content Layer
    CLI Content Layer Examples
    NETCONF Configuration Command Reference
      Command Hierarchies
        NETCONF System Commands
        NETCONF Security Commands
      Configuration Commands
        NETCONF System Commands
        NETCONF Security Commands
    NETCONF Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          NETCONF System Commands
    NETCONF Admin Command Reference
      Command Hierarchies
        Admin Commands
      Command Descriptions
        Admin Commands
  Event and Accounting Logs
    In This Chapter
    Logging Overview
    Log Destinations
      Console
      Session
      Memory Logs
      Log Files
      SNMP Trap Group
      Syslog
    Event Logs
      Event Sources
      Event Control
      Log Manager and Event Logs
      Event Filter Policies
      Event Log Entries
      Simple Logger Event Throttling
      Default System Log
      Event Handling System
    Accounting Logs
      Accounting Records
      Accounting Files
      Design Considerations
      Reporting and Time-Based Accounting
      Overhead Reduction in Accounting: Custom Record
        User Configurable Records
        Changed Statistics Only
        Configurable Accounting Records
          XML Accounting Files for Service and ESM-Based Accounting
          RADIUS Accounting in Networks Using ESM
        Significant Change Only Reporting
      Immediate Completion of Records
        Record Completion for XML Accounting
      AA Accounting per Forwarding Class
    Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
      Log Types
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control
      Configuring a Log Filter
      Configuring an SNMP Trap Group
        Setting the Replay Parameter
        Shutdown In-Band Port
        No Shutdown Port
      Configuring a Syslog Target
        Configuring an Accounting Custom Record
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Modifying a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Configuration Command Reference
      Command Hierarchies
        Log Configuration Commands
        Accounting Policy Commands
        Custom Record Commands
        File ID Commands
        Event Filter Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Log ID Commands
        SNMP Trap Group Commands
        Syslog Commands
      Command Descriptions
        Generic Commands
        Log File Commands
        Log Filter Commands
        Log Filter Entry Commands
        Log Filter Entry Match Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Syslog Commands
        SNMP Trap Groups
        Accounting Policy Commands
          Accounting Policy Custom Record Commands
    Log Command Reference
      Command Hierarchies
        Show Commands
        Clear Command
      Command Descriptions
        Show Commands
        Clear Commands
  sFlow
    In This Chapter
    sFlow Overview
    sFlow Features
      sFlow Counter Polling Architecture
      sFlow Support on Logical Ethernet Ports
      sFlow SAP Counter Map
      sFlow Record Formats
    sFlow Command Reference
      Command Hierarchies
        System Commands
        Show Commands
    sFlow Configuration Command Descriptions
      Command Descriptions
        System Commands
    sFlow Show Command Descriptions
      Command Descriptions
        Show Commands
  Facility Alarms
    In This Chapter
    Facility Alarms Overview
    Facility Alarms vs. Log Events
    Facility Alarm Severities and Alarm LED Behavior
    Facility Alarm Hierarchy
    Facility Alarm List
    Configuring Logging with CLI
    Basic Facility Alarm Configuration
    Common Configuration Tasks
      Configuring the Maximum Number of Alarms To Clear
    Facility Alarms Configuration Command Reference
      Command Hierarchies
        Facility Alarm Configuration Commands
      Command Descriptions
        Generic Commands
    Facility Alarms Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
  Getting Started
    About This Guide
    Router Configuration Process
  Security
    In This Chapter
    Authentication, Authorization, and Accounting
      Authentication
        Local Authentication
        RADIUS Authentication
          RADIUS Server Selection
        TACACS+ Authentication
      Authorization
        Local Authorization
        RADIUS Authorization
        TACACS+ Authorization
          Examples
      Accounting
        RADIUS Accounting
        TACACS+ Accounting
    Security Controls
      When a Server Does Not Respond
      Access Request Flow
    Centralized CPU Protection
      CPU Protection Extensions for ETH-CFM
      ETH-CFM Ingress Squelching
    Distributed CPU Protection (DCP)
      Applicability of Distributed CPU Protection
      Log Events, Statistics, Status and SNMP support
      DCP Policer Resource Management
      Operational Guidelines and Tips
    Classification-Based Priority for Extracted Protocol Traffic
    Vendor-Specific Attributes (VSAs)
    Other Security Features
      Secure Shell (SSH)
      SSH PKI Authentication
        Key Generation
      Per Peer CPM Queuing
      CPM Filters and Traffic Management
      TTL Security for BGP and LDP
      Exponential Login Backoff
      User Lockout
      802.1x Network Access Control
      TCP Enhanced Authentication Option
        Packet Formats
        Keychain
    Configuration Notes
      General
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Configuration Tasks
    Security Configuration Procedures
      Configuring Management Access Filters
      Configuring IP CPM Filters Policy
      Configuring MAC CPM Filters
      Configuring IPv6 CPM Filters
      Configuring CPM Queues
      IPSec Certificates Parameters
      Configuring Profiles
        Parameters
        Wildcards
        CLI Session Resource Management
      Configuring Users
      Configuring Keychains
      Copying and Overwriting Users and Profiles
        User
        Profile
    RADIUS Configurations
      Configuring RADIUS Authentication
      Configuring RADIUS Authorization
      Configuring RADIUS Accounting
    Configuring 802.1x RADIUS Policies
    TACACS+ Configurations
      Enabling TACACS+ Authentication
      Configuring TACACS+ Authorization
      Configuring TACACS+ Accounting
      Enabling SSH
    Configuring Login Controls
    Security Configuration Command Reference
      Command Hierarchies
        Security Commands
          LLDP Commands
          Management Access Filter Commands
          CLI Script Authorization Commands
          CPM Filter Commands
          CPM Queue Commands
          CPU Protection Commands
          Distributed CPU Protection Commands
          Extracted Protocol Traffic Priority Commands
          Security Password Commands
          Public Key Infrastructure (PKI) Commands
          Profile Commands
          CLI Session Commands
          RADIUS Commands
          SSH Commands
          TACPLUS Commands
          User Commands
          User Template Commands
          Dot1x Commands
          Keychain Commands
          TTL Security Commands
        Login Control Commands
      Command Descriptions
        General Security Commands
        LLDP Commands
        Login, Telnet, SSH and FTP Commands
        Management Access Filter Commands
        Password Commands
        Public Key Infrastructure (PKI) Commands
        Profile Management Commands
        User Management Commands
        CLI Session Management Commands
        RADIUS Client Commands
        TACACS+ Client Commands
        Generic 802.1x COMMANDS
        Keychain Authentication
        CLI Script Commands
        CPM Filter Commands
        CPM Queue Commands
        TTL Security Commands
        CPU Protection Commands
        Distributed CPU Protection Commands
        Extracted Protocol Traffic Priority Commands
    Security Show, Clear, Debug, Tools, and Admin Command Reference
      Command Hierarchies
        Show Commands
          Security
          Login Control
        Clear Commands
        Debug Commands
        Tools Commands
        Admin Commands
      Command Descriptions
        Show Commands
          Security Commands
          Login Control
        Clear Commands
          CPU Protection Commands
        Debug Commands
        Tools Commands
        Admin Commands
  SNMP
    In This Chapter
    SNMP Overview
      SNMP Architecture
      Management Information Base
      SNMP Protocol Operations
      SNMP Versions
      Management Information Access Control
      User-Based Security Model Community Strings
      Views
      Access Groups
      Users
      Per-VPRN Logs and SNMP Access
      Per-SNMP Community Source IP Address Validation
    Which SNMP Version to Use?
    Configuration Notes
      General
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Configuration Command Reference
      Command Hierarchies
         SNMP System Commands
        SNMP Security Commands
      Command Descriptions
        SNMP System Commandse
        SNMP Security Commands
    SNMP Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  NETCONF
    In This Chapter
    NETCONF Overview
    NETCONF in the SR OS
      YANG Data Models
      Transport and Sessions
      Datastores and URLs
      NETCONF Operations and Capabilities
        <get>
        <get-config>
        <edit-config>
        <copy-config> and <delete-config>
        <lock>
        <unlock>
        <commit>
        <discard-changes>
        <validate>
      Data Model, Datastore and Operation Combinations
      General NETCONF Behavior
        System-Provisioned Configuration (SPC) Objects
    Establishing a NETCONF Session
    XML Content Layer
      <get> with XML Content Layer
      <edit-config> with XML Content Layer
      <get-config> with XML Content Layer
    XML Content Layer Examples
    CLI Content Layer
    CLI Content Layer Examples
    NETCONF Configuration Command Reference
      Command Hierarchies
        NETCONF System Commands
        NETCONF Security Commands
      Configuration Commands
        NETCONF System Commands
        NETCONF Security Commands
    NETCONF Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          NETCONF System Commands
    NETCONF Admin Command Reference
      Command Hierarchies
        Admin Commands
      Command Descriptions
        Admin Commands
  Event and Accounting Logs
    In This Chapter
    Logging Overview
    Log Destinations
      Console
      Session
      Memory Logs
      Log Files
      SNMP Trap Group
      Syslog
    Event Logs
      Event Sources
      Event Control
      Log Manager and Event Logs
      Event Filter Policies
      Event Log Entries
      Simple Logger Event Throttling
      Default System Log
      Event Handling System
    Accounting Logs
      Accounting Records
      Accounting Files
      Design Considerations
      Reporting and Time-Based Accounting
      Overhead Reduction in Accounting: Custom Record
        User Configurable Records
        Changed Statistics Only
        Configurable Accounting Records
          XML Accounting Files for Service and ESM-Based Accounting
          RADIUS Accounting in Networks Using ESM
        Significant Change Only Reporting
      Immediate Completion of Records
        Record Completion for XML Accounting
      AA Accounting per Forwarding Class
    Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
      Log Types
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control
      Configuring a Log Filter
      Configuring an SNMP Trap Group
        Setting the Replay Parameter
        Shutdown In-Band Port
        No Shutdown Port
      Configuring a Syslog Target
        Configuring an Accounting Custom Record
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Modifying a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Configuration Command Reference
      Command Hierarchies
        Log Configuration Commands
        Accounting Policy Commands
        Custom Record Commands
        File ID Commands
        Event Filter Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Log ID Commands
        SNMP Trap Group Commands
        Syslog Commands
      Command Descriptions
        Generic Commands
        Log File Commands
        Log Filter Commands
        Log Filter Entry Commands
        Log Filter Entry Match Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Syslog Commands
        SNMP Trap Groups
        Accounting Policy Commands
          Accounting Policy Custom Record Commands
    Log Command Reference
      Command Hierarchies
        Show Commands
        Clear Command
      Command Descriptions
        Show Commands
        Clear Commands
  sFlow
    In This Chapter
    sFlow Overview
    sFlow Features
      sFlow Counter Polling Architecture
      sFlow Support on Logical Ethernet Ports
      sFlow SAP Counter Map
      sFlow Record Formats
    sFlow Command Reference
      Command Hierarchies
        System Commands
        Show Commands
    sFlow Configuration Command Descriptions
      Command Descriptions
        System Commands
    sFlow Show Command Descriptions
      Command Descriptions
        Show Commands
  Facility Alarms
    In This Chapter
    Facility Alarms Overview
    Facility Alarms vs. Log Events
    Facility Alarm Severities and Alarm LED Behavior
    Facility Alarm Hierarchy
    Facility Alarm List
    Configuring Logging with CLI
    Basic Facility Alarm Configuration
    Common Configuration Tasks
      Configuring the Maximum Number of Alarms To Clear
    Facility Alarms Configuration Command Reference
      Command Hierarchies
        Facility Alarm Configuration Commands
      Command Descriptions
        Generic Commands
    Facility Alarms Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer Documentation and Product Support
Triple Play Service Delivery Architecture R14.0.R1
  Getting Started
    About This Guide
    Alcatel-Lucent SR OS Services Configuration Process
   Introduction to Triple Play
    In This Section
    Alcatel-Lucent’s Triple Play Service Delivery Architecture
      Introduction to Triple Play
      Blueprint for Optimizing Triple Play Service Infrastructures
      Architectural Foundations
      Optimizing Triple Play Service Infrastructures
        Distributed Service Edges
        Service Differentiation, QoS Enablement
        Virtual MAC Subnetting for VPLS
    Services
      Service Types
      Service Policies
    Alcatel-Lucent Service Model
      Introduction
      Service Entities
      Customers
      Service Access Points (SAPs)
        SAP Encapsulation Types and Identifiers
        Ethernet Encapsulations
        SAP Considerations
      Service Distribution Points (SDPs)
        SDP Binding
        Spoke and Mesh SDPs
        SDP Encapsulation Types
          GRE
          MPLS
        SDP Keepalives
    Epipe Service Overview
    VPLS Service Overview
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        Residential Split Horizon Groups
    IES Service Overview
      IP Interface
    VPRN Service Overview
    Deploying and Provisioning Services
      Phase 1: Core Network Construction
      Phase 2: Service Administration
      Phase 3: Service Provisioning
    Configuration Notes
      General
     Configuring Triple Play Services with CLI
      Configuring VPLS Residential Split Horizon Groups
        Configuring Static Hosts
          BNG Learning IP-Only Static Host’s MAC Address
          Static Host Learning the IPv6 Default Gateway Address
          Configuring Static Hosts on an VPLS SAP
          Configuring Static Hosts on an IES SAP
          Configuring Static Hosts on an VPRN SAP
     Triple Play Services Command Reference
      Command Hierarchies
        Generic VPLS Triple Play Commands
        Generic IES Triple Play Commands
        Service DHCP and Anti-Spoof Filtering Commands
        Triple Play ARP Commands
        Triple Play Multicast Commands
        Show Commands
        Clear Commands
        Tools Commands
      Command Descriptions
        Global Commands
        Service Commands
          VPLS SAP ATM Commands
          Service Billing Commands
          SAP Subscriber Management Commands
          Multicast Commands
          DHCP and Anti-Spoofing Commands
          Filter and QoS Policy Commands
          VPLS and IES SDP and SAP Commands
          DHCP Commands
          Egress Multicast Group Commands
          Interface Commands
          Interface IPv6 Commands
        Show Commands
          IGMP Snooping Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
   DHCP Management
    In This Chapter
    DHCP Principles
    DHCP Features
      DHCP Relay
      DHCPv4 Relay Proxy
      Subscriber Identification Using Option 82 Field
        Trusted and Untrusted
      DHCP Snooping
      DHCP Lease State Table
      DHCP and Layer 3 Aggregation
        DHCPv4 Snooping
        DHCPv6 Snooping
      Local DHCP Servers
        Overview
        Local DHCP Server Support
      DHCPv6
        DHCPv6 Relay Agent
        DHCPv6 Prefix Options
        Neighbor Resolution via DHCPv6 Relay
        DHCPv6 Lease Persistency
        Local Proxy Neighbor Discovery
        IPv6oE Hosts Behind Bridged CPEs
        IPv6 Link-Address Based Pool Selection
        IPv6 Address/Prefix Stickiness
        IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        Host Connectivity Checks for IPv6
      Lease Query
      DHCPv6 to Server Option
      Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      DHCP Caching
      Flexible Creation of DHCPv4/6 Host Parameters Utilizing Python and Internal Caching
      Python DTC Variables and API
        DTC Debugging Facility
      Virtual Subnet for DHCPv4 Hosts
      Address Reservation for Sticky Leases
    Proxy DHCP Server
      Local DHCP Servers
        Terminology
        Overview
        DHCP Lease Synchronization
        Intercommunication Link Failure Detection
        DHCP Server Failover States
        Lease Time Synchronization
        Maximum Client Lead Time (MCLT)
        Sharing IPv4 Address-Range or IPv6 Prefix Between Redundant 7x50 DHCP Servers in Access-Driven Mode
        Fast-Switchover of IP Address/Prefix Delegation For Remote IP Address/Prefix Range
          DHCP Server Synchronization and Local PPPoX Pools
    Local Address Assignment
      Stateless Address Auto-configuration
  SLAAC
    In This Chapter
    Stateless Address Auto-configuration (SLAAC) Management
    SLAAC Principles
    Configuration Overview
    Router-Solicit Trigger
    SLAAC Address Assignment
    Static SLAAC Prefix Assignment
    Dynamic SLAAC Prefix Assignment
     Configuring DHCP with CLI
    Common Configuration Tasks
      Enabling DHCP Snooping
      Configuring Option 82 Handling
      Enabling DHCP Relay
      Configuring Local User Database Parameters
     Triple Play DHCP Command Reference
      Command Hierarchies
        Global DHCP Commands
        Router DHCP Commands
        VPLS DHCP Commands
        IES DHCP Commands
        VPRN DHCP Commands
          VPRN DHCP Subscriber Interface Commands
        IES/VPRN IPv6-DHCP6 Commands
        Local User Database Commands
          IPoE Commands
          PPP Commands
        Show Commands
        Tools Commands
        Clear Commands
        DHCP Debug Commands
      Command Descriptions
         Triple Play DHCP Configuration Commands
          Global Commands
          System Commands
          DHCP Configuration Commands
          Service Commands
          Local User Database Commands
          MLPPP on LNS Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
   Point-to-Point Protocol over Ethernet (PPPoE) Management
    In This Chapter
    PPPoE
      PPPoE Authentication and Authorization
        General Flow
        RADIUS
        Local User Database Directly Assigned to PPPoE Node
        Subscriber per PPPoE Session Index
        Local DHCP Server with Local User Database
      Multiple Sessions Per MAC Address
      Private Retail Subnets
      IPCP Subnet Negotiation
        Numbered WAN Support for Layer 3 RGs
      IES as Retail Service for PPPoE Host
      Unnumbered PPPoX
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment Size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
     PPP Command Reference
      Command Hierarchies
        PPPoE Policy Configuration Commands
        PPPoE Service Commands
        PPPoE Local User Database Commands
        MLPPP on LNS Commands
        Show Commands
      Command Descriptions
         PPP Configuration Commands
          PPP/PPPoE Service Commands
          RADIUS Attribute Commands
        Show Commands
        Clear Commands
        Debug Commands
  L2TP
    In This Chapter
    L2TP
      Terminology
      LAC DF Bit
      Handling L2TP Tunnel/Session Initialization Failures
        L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        Peer Blacklist
        Tunnel Blacklists
          Tunnel Timeout Due to the Peer IP Address Change
        Tunnel Selection Mechanism
        Tunnel Probing
        Controlling the Size of Blacklist
        Displaying the Content of a Blacklist
        Generating Trap when the Blacklist is Full
        Premature Removal of Blacklisted Entries
        Manual Purging of Entities within the Blacklist
      CDN Result Code Overwrite
    L2TP LAC VPRN
      Per-ISP Egress L2TP DSCP Reclassification
    L2TP Tunnel RADIUS Accounting
      Accounting Packets List
    RADIUS Attributes Value Considerations
      Other Optional RADIUS Attributes
      RADIUS VSA to Enable L2TP Tunnel Accounting
      MLPPP on the LNS Side
      LNS Reassembly
    L2TP Command Reference
      Command Hierarchies
        L2TP Configuration Commands
        L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        L2TP Configuration Commands
          Global Commands
          L2TP Tunnel Account Commands
          L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Debug Commands
   Triple Play Security
    In This Chapter
    Triple Play Security Features
      Anti-Spoofing Filters
        Anti-spoofing Filter Types
        Filtering Packets
      Layer 2 Triple Play Security Features
        MAC Pinning
        MAC Protection
        DoS Protection
          Subscriber Aggregation Network
          Network Control Filtering
        VPLS Redirect Policy
      ARP Handling
        ARP Reply Agent
        Dynamic ARP Table Population
        Local Proxy ARP
      Web Portal Redirect
     Configuring Triple Play Security with CLI
      Common Configuration Tasks
        Configuring Anti-Spoofing Filters
        Configuring Triple Play Security features
          Configuring MAC Pinning
          Configuring MAC Protection
          Configuring VPLS Redirect Policy
        Configuring ARP Handling
          Configuring Proxy ARP
          Configuring Local Proxy ARP
          Configuring ARP Reply Agent in a VPLS Service
          Configuring Remote Proxy ARP
          Configuring Automatic ARP Table Population in an IES or VPRN Interface
          Configuring CPU Protection
        Configuring Web Portal Redirect
     Triple Play Security Command Reference
      Command Hierarchies
        Anti-Spoofing Commands
        Layer 2 Security Commands
        ARP Handling Commands
        Tools Commands
      Command Descriptions
         Triple Play Security Configuration Commands
          Triple Play Anti-Spoofing Commands
          Triple Play Layer 2 Security Commands
          ARP Handling Commands
        Show Commands
        Tools Commands
   Triple Play Multicast
    In This Chapter
    Introduction to Multicast
    Multicast in the Broadband Service Router
      Internet Group Management Protocol
        IGMP Versions and Interoperability Requirements
        IGMP Version Transition
      Multicast Listener Discovery
        MLD Versions and Interoperability Requirements
        Source Specific Multicast Groups
      Protocol Independent Multicast Sparse Mode (PIM-SM)
      Ingress Multicast Path Management (IMPM) Enhancements
    Multicast in the BSA
      IGMP Snooping
        IGMP/MLD Message Processing
        IGMP Message Processing
        MLD Message Processing
        IGMP/MLD Filtering
      Multicast VPLS Registration (MVR)
      Layer 3 Multicast Load Balancing
      IGMP State Reporter
        IGMP Data Records
        Transport Mechanism
        HA Compliance
        QoS Awareness
        Hardware Support
        IGMP Reporting Caveats
    Multicast Support over Subscriber Interfaces in Routed CO Model
      Hardware Support
      Multicast Over IPoE
        Per SAP Replication Mode
          Per SAP Queue
          IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        Per Subscriber Host Replication Mode
          IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      Multicast Over PPPoE
      IGMP Flooding Containment
      IGMP/MLD Timers
      IGMP/MLD Query Intervals
      HQoS Adjustment
        Host Tracking (HT) Considerations
        HQoS Adjust Per Vport
          Multi-Chassis Redundancy
          Scalability Considerations
      Redirection
      Hierarchical Multicast CAC (H-MCAC)
        MCAC Bundle Bandwidth Limit Considerations
      Determining MCAC Policy in Effect
      Multicast Filtering
      Joining the Multicast Tree
      Wholesale/Retail Requirements
      QoS Considerations
      Redundancy Considerations
        Redirection Considerations
    Configuring Triple Play Multicast Services with CLI
      Configuring IGMP Snooping in the BSA
        Enabling IGMP Snooping in a VPLS Service
        With IGMPv3 Multicast Routers
        With IGMPv1/2 Multicast Routers
        Modifying IGMP Snooping Parameters
        Modifying IGMP Snooping Parameters for a SAP or SDP
      Configuring Static Multicast Groups on a SAP or SDP
        Enabling IGMP Group Membership Report Filtering
          Enabling IGMP Traffic Filtering
      Configuring Multicast VPLS Registration (MVR)
      Configuring IGMP, MKD, and PIM in the BSR
        Enabling IGMP
        Configuring IGMP Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Enabling MLD
        Configuring MLD Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Configuring PIM
          Enabling PIM
          Configuring PIM Interface Parameters
          Importing PIM Join/Register Policies
          Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
     Triple Play Multicast Command Reference
      Command Hierarchies
        MCAST Management Commands
        Multicast Info Policy Bundle Commands
        Triple Play Multicast Service Commands
        Ingress Multicast Path Management Commands
        Multicast Redirection
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Multicast Management Configuration Commands
          Generic Commands
          Multicast Management Commands
          Bandwidth Policy Commands
          Multicast Info Policy Commands
          Chassis Level Commands
          Multicast Redirection Commands
          Forwarding Plane Commands
  Triple Play Enhanced Subscriber Management
    In This Section
    Uniform RADIUS Server Configuration
      RADIUS Server Configuration
        Uniform RADIUS Server Configuration (Preferred)
        Legacy RADIUS Server Configuration
    RADIUS Authentication of Subscriber Sessions
      RADIUS Authentication Extensions
        Triple Play Network with RADIUS Authentication
      RADIUS Authorization Extensions
        Calling-Station-ID
        Subscriber Session Timeout
          Domain Name in Authentication
        RADIUS Reply Message for PPPoE PAP/CHAP
        SHCV Policy
      radius-server-policy Retry Attempt Overview
      AAA RADIUS Server Operation Status
      AAA RADIUS Accounting Server Stickiness
      AAA RADIUS Authentication Fallback Action
      AAA Test User Account
      Troubleshooting the RADIUS Server
      Provisioning of Enhanced Subscriber Management (ESM) Objects
        Provisioning IP Configuration of the Host
        RADIUS Based Authentication in Wholesale Environment
        Change of Authorization and Disconnect-Request
        RADIUS-Based Accounting
        RADIUS Accounting Terminating Cause
        Accounting Modes Of Operation
        Per Session Accounting
          Caveats
        RADIUS Session Accounting with PD as a Managed Route
        No Host-Accounting
        Host-Accounting Enabled
        Reduction of Host Updates for Session Accounting Start and Stop
        Accounting Interim Update Message Interval
        CoA Triggered Accounting Interim Update
        Class Attribute
        User Name
        Accounting-On and Accounting Off
        RADIUS Accounting Message Buffering
        Multiple Accounting Policies
        Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    Enhanced Subscriber Management Overview
      Enhanced Subscriber Management Basics
        Standard and Enhanced Subscriber Management
          Subscriber Management Definitions
          Subscriber Identification Policy
          Subscriber Identification String
          Subscriber Profile
          SLA Profile
          Explicit Subscriber Profile Mapping
      ESM for IPv6
        Models
          PPPoE Host
          PPPoE RG
          IPoE Host/RG
        Setup
        Behavior
          Dual Stack
          Router Advertisements (RA)
          CoA and Disconnect-Request
        Delegated-Prefix-Length
          Order of Preference for DPL
          DHCP Server Address Utilization and Delegated Prefix Length
        DHCPv6 Relay Agent
          Configuring a DHCPv6 Relay Agent
        DHCPv6 Relay to Third Party DHCPv6 External Server
        DHCPv6 Local Server
      Dynamic Subscriber Host Processing
        Dynamic Tables
          Active Subscriber Table
          SLA Profile Instance Table
          Subscriber Host Table
          DHCP Lease State Table
      Enhanced Subscriber Management Entities
        Instantiating a New Host
        Packet Processing for an Existing Host
      ESM Host Lockout
        Functionality
      ANCP and GSMP
        ANCP
          Static ANCP Management
          Enhanced Subscriber Management (ESM) Dynamic ANCP
          ANCP String
          ANCP Persistency Support
        General Switch Management Protocol Version 3 (GSMPv3)
        DHCP Release Messages
          DHCP Release
        DHCP Client Mobility
        DHCP Lease Control
      Using Scripts for Dynamic Recognition of Subscribers
        Python Language and Programmable Subscriber Configuration Policy (PSCP)
        Determining the Subscriber Profile and SLA Profile of a Host
        Determining the Subscriber Profile
        Determining the SLA Profile
          SLA-Based Egress QoS Marking
      Auto-Sub ID
        Sub-id Identifiers
        Dual Stack Hosts
        Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
        PPPoA/PPPoEoA Considerations
        Deployment Considerations
        Caveats
      Limiting Subscribers and Hosts on a SAP
      Static Subscriber Hosts
      QoS for Subscribers and Hosts
        QoS Parameters in Different Profiles
        QoS Policy Overrides
      ESM Subscriber Hierarchical Traffic Control
        Subscriber HQoS
        Subscriber CFHP
        ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          Broadband Network Gateway Application
          Queue Determination and Scheduling
          Weighted Scheduler Group
          Queue and Subscriber Aggregate Rate Configuration and Adjustment
          Frame Size, Rates, and Running Average Frame Expansion Ratio
          Vport Determination and Evaluation
          Applying Aggregate Rate Limit to a Vport
          Applying a Scheduler Policy to a Vport
          Signaling of Last Mile Encapsulation Type
          Configuration Example
      Subscriber Volume Statistics
        IP (Layer 3) Volume Accounting
        Separate IPv4 and IPv6 Counters
      Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        IP Filter Attribute Format Details
        Checking Filter Policy Details
      ESM PPPoA/PPPoEoA
        PPPoA
        PPPoEoA
        Hardware Support
        Termination Points within 7x50
        PPPoA Encapsulation
          PPPoEoA Encapsulation
        Encapsulation Summary
        Concurrent Support for Different Service Types on the Same Port
        Restrictions in Scaled ATM MDA Mode
        QoS Implementation
        Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
        Per VP Shaping
        ATM/IOM QoS Integration
          Intermediate Node Rate Limit/Shaper
          Provisioning Aspects
          HQoS Combinations
          ATM Rate Adjustment
        Subscriber Instantiation Use Cases
        Authentication
        LUDB Access via Capture SAP
        Encapsulation Autosensing
        SAP Autoprovisioning
        PPP Nodes and ppp-policy
        MTU Considerations
          PPP(oE) Session Antispoofing
      Multi-Chassis Synchronization
        Overview
          Loss of Synchronization and Reconciliation
      Subscriber Routed Redundancy Protocol (SRRP)
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
      PPPoE MC Redundancy
        Hardware Support
        SRRP Considerations for PPPoE
          SRRP Fact-Checks
        State Synchronization
          PPPoE Multi-chassis Synchronization (MCS) Model
        Traffic Control and Redundant Interface
          Subnet Assignment and Advertisement - Option ‘A’
          Subnet Assignment and Advertisement - Option ‘B’
        MSAP Considerations
        Unnumbered Interface Support
        Compatibility with MC-LAG
        IPv6 Support
        Considerations with Local DHCP Server
        Redundant Interface Considerations
      Routed Central Office (CO)
        Layer 3 Subscriber Interfaces
          DHCP Interactions
          Routed CO for IES Service
          Routed CO for VPRN Service
        Wholesale Retail Routed CO
          Wholesale Retail Model
          Configuration and Applicability
          Hub-and-Spoke Forwarding
        Routed Subscriber Hosts
          Static Configured IPv4 Managed Route
          Static Configured IPv6 Managed Route
          Dynamic BGP Peering
          RIP Listener
          RADIUS: Framed-Route and Framed-IPv6-Route
          GRT Lookup and Routed CO in a VPRN
      Dual Homing
        Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        Steady-State Operation of Dual-homed Ring
        Broken-Ring Operation and the Transition to this State
        Transition from Broken to Closed Ring State
        Provisioning Aspects and Error Cases
        Dual Homing to Two BSR Nodes
        MC Services
        Routed CO Dual Homing
          Redundant Interfaces
          SRRP in Dual Homing
          Synchronization
          Wholesale-Retail Multi-Chassis Redundancy
        SRRP and Multi-Chassis Synchronization
        Dual Homing and ANCP
      SRRP Enhancement
        SRRP Fate Sharing
        Fate Sharing Algorithm
        SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          Subscriber Interface Routes (IPv4 and IPv6)
          Managed Routes
          Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          Activating SRRP State Tracking
        SRRP in Conjunction with a PW in ESM Environment – Use Case
        Group-monitor
      Subscriber Override
      Dual Stack Lite
        IP-in-IP
        Configuring Dual Stack Lite
        L2TP over IPv6
    L2TP Tunnel RADIUS Accounting
      Accounting Packets List
      RADIUS Attributes Value Considerations
      Other Optional RADIUS Attributes
      RADIUS VSA to Enable L2TP Tunnel Accounting
      MLPPP on the LNS Side
    RADIUS Route Download
    Managed SAP (MSAP)
      Sticky MSAP
      ESM Identification Process
        SAP-ID ESM Identifier
        DSLAM-ID
      Default-Subscriber
      Multicast Management
      Subscriber Mirroring
    Volume and Time Based Accounting
      Metering
        Categories Map and Categories
        Quota Consumption
        Minimum Credit Control Quota Values
        RADIUS VSA Alc-Credit-Control-Quota
      Credit Negotiation Mechanisms
      Action on Credit Exhaustion
      Action on Error-Conditions
      Applicability of Volume and Time Based Accounting
    Subscriber Host Idle Timeout
    Web Authentication Protocol (WPP)
      WPP Configurations
      WPP Triggered Host Creation
        LUDB Support For WPP
      WPP Multi-Chassis Redundancy Support
    One-time HTTP Redirection Overview
    ESM over MPLS Pseudowires
      Encapsulation
      ESM Configuration with PW-Ports and PW-SAPs
      QoS Support
        Bandwidth Control at PW-Port Level via Vport
        Last Mile Shaping
      BNG Redundancy with ESM over Pseudowire
        Epipe-Based Aggregation Service
          Sample Configuration on Master BNG
          Sample Configuration on Slave BNG
          Sample Configuration on A-PE
        VPLS Based Aggregation Service
          Sample BNG Redundancy (SRRP/MCS) Configuration with VPLS Service on A-PE
          A-PE configuration with VPLS Aggregation Service (A-PE1)
          A-PE Configuration with VPLS Aggregation Service (A-PE2)
        Show Commands Related to Active/Standby Pseudowire on Dual BNGs
    Logical Link Identifier (LLID)
    Open Authentication Model for DHCP and PPPoE Hosts
      Terminology
      LUDB and RADIUS Access Models
      No Authentication
      LUDB Only Access
      LUDB Access via DHCPv4 Server
      RADIUS Only Access
      Consecutive Access to LUDB and RADIUS
      RADIUS Fallback
    Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      Terminology
      Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
      Default Gateway in IPv4 Flexible Addressing
      IPv4 Subnet Sharing
      IPv4 Subnet Mask Auto-Generation
      Local-proxy-arp and arp-populate
      Gi-address Configuration Consideration
      PPPoE Considerations
      IPoEv6 Considerations
      General Configuration Guidelines for Flexible IP Address Assignment
      Caveats
    uRPF for Subscriber Management
    IPoE Sessions
      Enabling IPoE Sessions
      IPoE Session Authentication
      IPoE Session Accounting
      IPoE Session Mid-Session Changes
      IPoE Session Termination
      Limiting the Number of IPoE sessions
      SAP Session Index
      Resiliency
      Notes
      Configuration Steps
      IPoE Session Migration
        Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    Data-triggered Subscriber Management
      Provisioning Data-triggered ESM
      Authentication and Host Creation
      DoS Protection
    RADIUS Subscriber Services
      Subscriber Service Building Blocks
        1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        2. RADIUS Python Interface
        3. Python Script
        4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      Subscriber Services RADIUS Vendor Specific Attributes (VSAs)
      Subscriber Service RADIUS Accounting
      Accounting Only Subscriber Service
      QoS Override Subscriber Service
      PCC Rules Subscriber Service
        PCC Rules
        PCC rule instantiation
        PCC Rules as a Subscriber Service
        Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule Subscriber Services on the Parent RADIUS Accounting Volume Counters
        PCC Rule Subscriber Service Activation Failures
      Combined Subscriber Services
      Subscriber Services Python API
        Common subscriber services Python API
        Subscriber Service QoS Override Python API
        Subscriber Service PCC Rules Python API
      Operational commands
        Show Commands
        Debug Commands
        Resource Monitoring
    Residential Gateway Replacement
     Configuring Enhanced Subscriber Management with CLI
      Configuring RADIUS Authentication of DHCP Sessions
      TCP MSS adjustment for ESM Hosts
      Configuring Enhanced Subscriber Management
        Basic Configurations
        Subscriber Interface Configuration
        Configuring Enhanced Subscriber Management Entities
          Configuring a Subscriber Identification Policy
          Configuring a Subscriber Profile
          Configuring an SLA Profile
          Configuring Explicit Mapping Entries
        Routed CO with Basic Subscriber Management Features
        Applying the Profiles and Policies
          SLA Profile
      Configuring Dual Homing
        SHCV Policies
        SHCV Policy
        Subscriber Identification Policy
        Subscriber Profile
     Subscriber Management Command Reference
      Command Hierarchies
        ANCP Commands
        GSMP Configuration Commands
        Authentication Policy Commands
        RADIUS Accounting Policy Commands
        RADIUS Route Download Commands
        Diameter Policy Commands
          AAA Diameter Peer Policy Commands
        Subscriber Management Diameter Application Policy Commands
        Category Map and Credit Control Policy Commands
        Filter Commands
        BGP Peering Policy Commands
        Explicit Subscriber Mapping Commands
        IGMP Policy Command
        Host Lockout Commands
        Host Tracking Policy Commands
        PIM Policy Commands
        SLA Profile Commands
        Subscriber Identification Policy Commands
        Auto-Generated Subscriber Identification Key Commands
        Auto-Generated Subscriber Identification Key Service Commands
        Subscriber MCAC Policy Commands
        Subscriber Profile Commands
        IPoE Session Policy Commands
        Multi-Chassis Redundancy Commands
        SHCV Policy Commands
        Subscriber Management Service Commands
          VPLS Subscriber Management Configuration Commands
          Managed SAP Policy Commands
          VPRN Subscriber Interface Configuration Commands
          VPRN Subscriber Interface Group Interface Commands
          IES Subscriber Management Configuration Commands
          IES Subscriber Interface Commands
          IES Subscriber Interface Group Interface Commands
          Service Subscriber Interface, Group Interface IPoE Command
          RIP Commands
          VPort Commands
          Redundant Interface Commands
          Wireless Portal Protocol (WPP) Commands
          Multiple PPoE Session QoS Commands
          Multicast Listener Discovery (MLD) Commands
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
       Triple Play Subscriber Management Configuration Commands
         Triple Play Subscriber Management Configuration Commands
          Generic Commands
          ANCP and GSMP Commands
          RADIUS Policy Commands
          RADIUS Route Download Commands
          IGMP Policy Commands
          PIM Policy Commands
          Managed SAP Policy Commands
          Multi-Chassis Redundancy Commands
          SLA Profile Commands
          Subscriber Identification Policy Commands
          Subscriber Profile Commands
          Explicit Subscriber Mapping Commands
          Subscriber Management Service Commands
          Subscriber Management Service Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
          RIP Commands
          Vport Commands
          SHCV Policy Commands
        Show Commands
        Clear Commands
        Tools Commands
        Debug Commands
        Monitor Commands
  Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    In This Section
    Overview
      Terminology and Abbreviations
      Restrictions
    Deploying Oversubscribed Multi-Chassis Redundancy
      Resource Exhaustion Notification and Simultaneous Failures
      Resource Monitoring
      Warm-Standby Mode Of Operation
      IPoE vs PPPoE
      Persistency
      Routing and Redundant Interface in OMCR
      Revertive Behavior
      Service Restoration Times
      Processing of the SRRP Flaps
      Accounting
      Configuration Guidelines
      Troubleshooting Commands
    OMCR Command Reference
      Command Hierarchies
      OMCR Configuration Commands
        OMCR Configuration Commands
   WIFI Aggregation and Offload
    In This Section
    WIFI Aggregation and Offload Overview
    Layer 2 over Soft-GRE Tunnels
      Encapsulation
      Data Path
    Tunnel Level Egress QoS
      Operational Commands
    Authentication
      EAP-Based Authentication
        RADIUS Proxy
          RADIUS Proxy — Server Load-Balancing
          RADIUS Proxy — Cache Lookup
          RADIUS Proxy — Accounting
      Portal Authentication
    Address Assignment
    WIFI Mobility Anchor
    Wholesale
    CGN on WLAN-GW
    Lawful Intercept on WLAN-GW
    WLAN Location Enhancements
      Triggered Interim Accounting-Updates
      Operational Support
    WIFI Offload – 3G/4G Interworking
      Signaling Call Flow
        GTP Setup with EAP Authentication
      APN Resolution
      Configuration Objects
      RADIUS Support
      QoS Support with GTP
      Selective Breakout
      Location Notification in S2a
        WLAN Location over S2a
        Cellular Location over S2a
        Cellular Location over Gn Interface
        Operational Support
      Operational Commands
        show router wlan-gw mobile-gateway
        show router 300 wlan-gw mgw-address-cache
        show subscriber-mgmt wlan-gw gtp-session detail
        show subscriber-mgmt wlan-gw mgw-profile "default"
        show subscriber-mgmt wlan-gw gtp-statistics
    Migrant User Support
      Migrant User Support with Portal-Authentication
        DHCP
        Authentication and Forwarding
      Migrant User Support with EAP Authentication
      Data Triggered Subscriber Creation
    Distributed Subscriber Management (DSM)
      DHCP
      Authentication and Accounting
        DSM Data-Plane
      IP Filtering
        Policing
        Lawful Intercept (LI)
        Data-Triggered UE Creation
      Idle-Timeout and Session-Timeout Management
      Operational Commands
      Pool Manager
      DHCPv6 and SLAAC
      Call Trace
    Distributed RADIUS Proxy
      Enhanced Subscriber Management
      Distributed Subscriber Management
      Operational Commands
    WLAN-GW 1:1 Active-Backup Redundancy
      DHCP Server Redundancy
      Subscriber Creation after Switchover
    WLAN-GW Triggered Stateless Redundancy (N:1)
    AP Triggered Stateless WLAN-GW Redundancy (N:1)
    IPv6-only Access
      IPv6 GRE Tunnels
      IPv6 Client-Side RADIUS Proxy
      Dual-Stack UEs over WLAN-GW
        SLAAC Prefix Assignment
        DHCPv6 IA_NA Assignment
        Migrant User Support
        Accounting
    Layer 2 Wholesale
    VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    Soft-L2TPv3 Tunnels
     WiFi Command Reference
      Command Hierarchies
        WLAN-GW Commands
          Subscriber Management BRG Commands
          DSM Call Trace Commands
        WLAN-GW Service Commands
        RADIUS Server and Proxy Commands
        LUDB Matching for RADIUS Proxy Cache
        Data Plane Related Commands
        Port Policy Commands
        WIFI Aggregation and Offload – Migrant User Support Commands
        Distributed Subscriber Management Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
      WIFI Aggregation and Offload Commands
        WIFI Aggregation and Offload Commands
          Generic Commands
          WLAN-GW Commands
          DSM Call Trace Commands
          RADIUS Server Policy Commands
        CLI Command Description for RADIUS Server
        CLI Command Description for RADIUS Proxy Server
        LUDB Matching of RADIUS Proxy Cache Commands
        WLAN-GW-Group Commands
        Port Policy Commands
        WLAN-GW Group Interface Commands
        Migrant User Support Commands
          Distributed Subscriber Management Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
   virtual Residential Gateway
    In This Section
    virtual Residential Gateway Overview
      Access Modes
      Home Context on the vRGW
        Implicit Home Authentication
        Explicit Home Authentication
        Change of Configuration
        Home Lifetime
      Device Context on the vRGW
      Dynamic Configuration Changes
      Per-Home Pool Management and L2-Aware NAT
        Sticky IP Addresses
        Managed Static IPv4 Addresses
        DMZ
      IPv6
      QoS and Filter Support
      Data-Triggered Authentication
      BRG and vRG Caveats
     vRGW Command Reference
      Command Hierarchies
         Subscriber Management BRG Profile Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Generic Commands
        vRGW Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
  Dynamic Data Services
    In This Section
    Introduction to Dynamic Data Services
    RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    Data-Triggered Dynamic Data Services
      Data Trigger
      Dynamic Services Data Trigger Capture SAP
      RADIUS Authentication
      Local Authentication
      Data-Triggered Dynamic Service Provisioning
      Control Plane Protection
      Debugging
     RADIUS Triggered Dynamic Data Services Command Reference
      Command Hierarchies
        RADIUS Triggered Dynamic Data Services Commands
        Basic System Command
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      RADIUS Triggered Dynamic Data Services Commands
        Configuration Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Diameter and Diameter Applications
    In This Section
    Restrictions
    Terminology
    3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
    Policy Management via Gx Interface
      Gx Protocol
      Policy Assignment Models
      IP-CAN Session – Gx Session Identification
        User Identification in PCRF
        NAS-Port-Id as Subscription-Id
      Gx Interface and ESM Subscriber Instantiation
        Gx and Dual-Stack Hosts
        Gx and PPPoEv6-DHCP
      Gx Fallback Function
      Gx CCR-I Replays
      Gx CCR-t Replays
        RAR and CCR-t Replay
        CCR-t Replay And Multi-Chassis Redundancy
        CCR-t Replay And High Availability
      Automatic Updates for IP Address Allocation/De-allocation
      DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      Gx, ESM and AA
        ESM Subscriber-host vs AA Subscriber
        AA Subscriber State
      Policy Management via Gx
      Gx-Based Overrides
        Instantiation of Gx Overrides
        HTTP Redirect Override
        Removal of Overrides
        Examples of Gx Overrides
      PCC Rules
        PCC Rule Concept
        PCC Rule Instantiation
        Base QoS-Policy and Base Filter
        Generic Policy Sharing and Rule Sharing
        PCC Rule Name and PCC Rule Removal
        Gx Rule Ordering
        PCC Rule Override
        Aggregation of IP-Criterion
        Combining IPv4 and IPv6 Entries within the Rule
        Gx Rules with Multiple Actions and Action Sharing
        Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        RADIUS and Gx Interaction
        Bulk Changes via CLI while Gx Rules are Active
        PCC Rule Direction
        Action
        Rate-Limiting Action (Ingress, Egress)
          Dynamic Policers and Queue Mappings
          Dynamic Policer Rates and Accounting Statistics
        Forwarding-Class Change (Ingress, Egress)
        QoS Forward (Ingress and Egress)
        Next-Hop Redirect (Ingress)
        HTTP Redirect (Ingress)
        Filter Forward/Drop (Ingress and Egress)
        Service Gating Function
        PCC Rule Provisioning Example
        Operational Aspects
        PCC Rules and Capacity Planning
        PCC Rule Scaling Example
      NAS Filter Inserts
        Examples of NAS Entry Inserts
      Error Handing and Rule Failure Reporting in ESM
        AVP Decoding Failure in Gx
        ESM Rule-Installation Failure
        Failure Reporting in AA
        Summary of Failure Reporting
      Usage-Monitoring and Reporting
        ESM Usage-Monitoring - What is Being Monitored
        AA Usage-Monitoring – What is Being Monitored
        Requesting Usage-Monitoring in ESM
        Reporting Accumulated Usage
        Disabling Usage-Monitoring
        Usage-Monitoring for PCC Rules
        Session Termination
        Usage-Monitoring Examples
      Event Triggers
      Subscriber Verification
      Subscriber Termination
      Mobility Support in WiFi
        Redundancy
      Persistency and Origin-State-ID AVP
      Overload Protection
    Diameter NASREQ Application
      Sample Configuration Steps
    Diameter Redundancy
      Diameter Peer Level Redundancy
      Diameter Multi-Chassis Redundancy
        Diameter Proxy Model General Operational Principles
        Diameter Proxy Activity Selection
        Synchronization and MCS
        Retransmissions
        Retransmissions and the T-bit
        Diameter Proxy Role
        Diameter Proxy and CC-Request-Number AVP
        Stateless Diameter Proxy
        Switchover Scenarios
        Log/Trap Generation Caused by Diameter Proxy State Change
        Switchover Update Event (CCR-u)
        Isolated Chassis
        Diameter Identities
        High Availability
      Gx Specific Behavior
    Diameter Debugging
   Python Script Support for ESM
    In This Chapter
    Python Script Support for ESM
    Python in SR-OS Overview
      Python Changes
    Python Support in sub-ident-policy
      Configuration
      Operator Debugging
      Python Scripts
      Sample Python Scripts
        Example
        Example
        Example
      Limitations
    RADIUS Script Policy Overview
      Python RADIUS API
      Sample Script
    Python Policy Overview
      Python Policy – RADIUS API
      Python Policy – DHCPv4 API
      Python Policy – DHCPv6 API
      Python Policy – Diameter API
      Python Policy – DHCP Transaction Cache API
      Python for PPPoE API
      Python API for PPP Packet
      Python API for PPP PAP
      Python API for PPP CHAP
      Python ESM API
      Python Cache Support
      Applying a Python Policy
      Python Script Protection
    Tips and Tricks
    Python Command Reference
      Command Hierarchies
        Python Policy Commands
        Python Script Commands
        Services Commands
        Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
      Command Descriptions
        Python Configuration Commands
          Global Commands
          Python Policy Commands
          Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
     Python RADIUS Command Reference
      Command Hierarchies
      Command Descriptions
        Generic Commands
        Script Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Alcatel-Lucent SR OS Services Configuration Process
   Introduction to Triple Play
    In This Section
    Alcatel-Lucent’s Triple Play Service Delivery Architecture
      Introduction to Triple Play
      Blueprint for Optimizing Triple Play Service Infrastructures
      Architectural Foundations
      Optimizing Triple Play Service Infrastructures
        Distributed Service Edges
        Service Differentiation, QoS Enablement
        Virtual MAC Subnetting for VPLS
    Services
      Service Types
      Service Policies
    Alcatel-Lucent Service Model
      Introduction
      Service Entities
      Customers
      Service Access Points (SAPs)
        SAP Encapsulation Types and Identifiers
        Ethernet Encapsulations
        SAP Considerations
      Service Distribution Points (SDPs)
        SDP Binding
        Spoke and Mesh SDPs
        SDP Encapsulation Types
          GRE
          MPLS
        SDP Keepalives
    Epipe Service Overview
    VPLS Service Overview
      Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        Residential Split Horizon Groups
    IES Service Overview
      IP Interface
    VPRN Service Overview
    Deploying and Provisioning Services
      Phase 1: Core Network Construction
      Phase 2: Service Administration
      Phase 3: Service Provisioning
    Configuration Notes
      General
     Configuring Triple Play Services with CLI
      Configuring VPLS Residential Split Horizon Groups
        Configuring Static Hosts
          BNG Learning IP-Only Static Host’s MAC Address
          Static Host Learning the IPv6 Default Gateway Address
          Configuring Static Hosts on an VPLS SAP
          Configuring Static Hosts on an IES SAP
          Configuring Static Hosts on an VPRN SAP
     Triple Play Services Command Reference
      Command Hierarchies
        Generic VPLS Triple Play Commands
        Generic IES Triple Play Commands
        Service DHCP and Anti-Spoof Filtering Commands
        Triple Play ARP Commands
        Triple Play Multicast Commands
        Show Commands
        Clear Commands
        Tools Commands
      Command Descriptions
        Global Commands
        Service Commands
          VPLS SAP ATM Commands
          Service Billing Commands
          SAP Subscriber Management Commands
          Multicast Commands
          DHCP and Anti-Spoofing Commands
          Filter and QoS Policy Commands
          VPLS and IES SDP and SAP Commands
          DHCP Commands
          Egress Multicast Group Commands
          Interface Commands
          Interface IPv6 Commands
        Show Commands
          IGMP Snooping Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
   DHCP Management
    In This Chapter
    DHCP Principles
    DHCP Features
      DHCP Relay
      DHCPv4 Relay Proxy
      Subscriber Identification Using Option 82 Field
        Trusted and Untrusted
      DHCP Snooping
      DHCP Lease State Table
      DHCP and Layer 3 Aggregation
        DHCPv4 Snooping
        DHCPv6 Snooping
      Local DHCP Servers
        Overview
        Local DHCP Server Support
      DHCPv6
        DHCPv6 Relay Agent
        DHCPv6 Prefix Options
        Neighbor Resolution via DHCPv6 Relay
        DHCPv6 Lease Persistency
        Local Proxy Neighbor Discovery
        IPv6oE Hosts Behind Bridged CPEs
        IPv6 Link-Address Based Pool Selection
        IPv6 Address/Prefix Stickiness
        IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        Host Connectivity Checks for IPv6
      Lease Query
      DHCPv6 to Server Option
      Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      DHCP Caching
      Flexible Creation of DHCPv4/6 Host Parameters Utilizing Python and Internal Caching
      Python DTC Variables and API
        DTC Debugging Facility
      Virtual Subnet for DHCPv4 Hosts
      Address Reservation for Sticky Leases
    Proxy DHCP Server
      Local DHCP Servers
        Terminology
        Overview
        DHCP Lease Synchronization
        Intercommunication Link Failure Detection
        DHCP Server Failover States
        Lease Time Synchronization
        Maximum Client Lead Time (MCLT)
        Sharing IPv4 Address-Range or IPv6 Prefix Between Redundant 7x50 DHCP Servers in Access-Driven Mode
        Fast-Switchover of IP Address/Prefix Delegation For Remote IP Address/Prefix Range
          DHCP Server Synchronization and Local PPPoX Pools
    Local Address Assignment
      Stateless Address Auto-configuration
  SLAAC
    In This Chapter
    Stateless Address Auto-configuration (SLAAC) Management
    SLAAC Principles
    Configuration Overview
    Router-Solicit Trigger
    SLAAC Address Assignment
    Static SLAAC Prefix Assignment
    Dynamic SLAAC Prefix Assignment
     Configuring DHCP with CLI
    Common Configuration Tasks
      Enabling DHCP Snooping
      Configuring Option 82 Handling
      Enabling DHCP Relay
      Configuring Local User Database Parameters
     Triple Play DHCP Command Reference
      Command Hierarchies
        Global DHCP Commands
        Router DHCP Commands
        VPLS DHCP Commands
        IES DHCP Commands
        VPRN DHCP Commands
          VPRN DHCP Subscriber Interface Commands
        IES/VPRN IPv6-DHCP6 Commands
        Local User Database Commands
          IPoE Commands
          PPP Commands
        Show Commands
        Tools Commands
        Clear Commands
        DHCP Debug Commands
      Command Descriptions
         Triple Play DHCP Configuration Commands
          Global Commands
          System Commands
          DHCP Configuration Commands
          Service Commands
          Local User Database Commands
          MLPPP on LNS Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
   Point-to-Point Protocol over Ethernet (PPPoE) Management
    In This Chapter
    PPPoE
      PPPoE Authentication and Authorization
        General Flow
        RADIUS
        Local User Database Directly Assigned to PPPoE Node
        Subscriber per PPPoE Session Index
        Local DHCP Server with Local User Database
      Multiple Sessions Per MAC Address
      Private Retail Subnets
      IPCP Subnet Negotiation
        Numbered WAN Support for Layer 3 RGs
      IES as Retail Service for PPPoE Host
      Unnumbered PPPoX
    MLPPPoE, MLPPP(oE)oA with LFI on LNS
      Terminology
      LNS MLPPPoX
      MLPPP Encapsulation
      MLPPPoX Negotiation
      Enabling MLPPPoX
      Link Fragmentation and Interleaving (LFI)
        MLPPPoX Fragmentation, MRRU and MRU Considerations
      LFI Functionality Implemented in LNS
        Last Mile QoS Awareness in the LNS
        BB-ISA Processing
        LNS-LAC Link
        AN-RG Link
        Home Link
        Optimum Fragment Size Calculation by LNS
          Encapsulation Based Fragment Size
          Fragment Size Based on the Max Transmission Delay
          Selection of the Optimum Fragment Length
      Upstream Traffic Considerations
      Multiple Links MLPPPoX With No Interleaving
      MLPPPoX Session Support
      Session Load Balancing Across Multiple BB-ISAs
      BB-ISA Hashing Considerations
      Last Mile Rate and Encapsulation Parameters
      Link Failure Detection
      CoA Support
      Accounting
      Filters and Mirroring
      PTA Considerations
      QoS Considerations
        Dual-Pass
        Traffic Prioritization in LFI
        Shaping Based on the Last Mile Wire Rates
        Downstream Bandwidth Management on Egress Port
      Sub/Sla-Profile Considerations
      Example of MLPPPoX Session Setup Flow
      Other Considerations
    Configuration Notes
     PPP Command Reference
      Command Hierarchies
        PPPoE Policy Configuration Commands
        PPPoE Service Commands
        PPPoE Local User Database Commands
        MLPPP on LNS Commands
        Show Commands
      Command Descriptions
         PPP Configuration Commands
          PPP/PPPoE Service Commands
          RADIUS Attribute Commands
        Show Commands
        Clear Commands
        Debug Commands
  L2TP
    In This Chapter
    L2TP
      Terminology
      LAC DF Bit
      Handling L2TP Tunnel/Session Initialization Failures
        L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        Peer Blacklist
        Tunnel Blacklists
          Tunnel Timeout Due to the Peer IP Address Change
        Tunnel Selection Mechanism
        Tunnel Probing
        Controlling the Size of Blacklist
        Displaying the Content of a Blacklist
        Generating Trap when the Blacklist is Full
        Premature Removal of Blacklisted Entries
        Manual Purging of Entities within the Blacklist
      CDN Result Code Overwrite
    L2TP LAC VPRN
      Per-ISP Egress L2TP DSCP Reclassification
    L2TP Tunnel RADIUS Accounting
      Accounting Packets List
    RADIUS Attributes Value Considerations
      Other Optional RADIUS Attributes
      RADIUS VSA to Enable L2TP Tunnel Accounting
      MLPPP on the LNS Side
      LNS Reassembly
    L2TP Command Reference
      Command Hierarchies
        L2TP Configuration Commands
        L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        L2TP Configuration Commands
          Global Commands
          L2TP Tunnel Account Commands
          L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Debug Commands
   Triple Play Security
    In This Chapter
    Triple Play Security Features
      Anti-Spoofing Filters
        Anti-spoofing Filter Types
        Filtering Packets
      Layer 2 Triple Play Security Features
        MAC Pinning
        MAC Protection
        DoS Protection
          Subscriber Aggregation Network
          Network Control Filtering
        VPLS Redirect Policy
      ARP Handling
        ARP Reply Agent
        Dynamic ARP Table Population
        Local Proxy ARP
      Web Portal Redirect
     Configuring Triple Play Security with CLI
      Common Configuration Tasks
        Configuring Anti-Spoofing Filters
        Configuring Triple Play Security features
          Configuring MAC Pinning
          Configuring MAC Protection
          Configuring VPLS Redirect Policy
        Configuring ARP Handling
          Configuring Proxy ARP
          Configuring Local Proxy ARP
          Configuring ARP Reply Agent in a VPLS Service
          Configuring Remote Proxy ARP
          Configuring Automatic ARP Table Population in an IES or VPRN Interface
          Configuring CPU Protection
        Configuring Web Portal Redirect
     Triple Play Security Command Reference
      Command Hierarchies
        Anti-Spoofing Commands
        Layer 2 Security Commands
        ARP Handling Commands
        Tools Commands
      Command Descriptions
         Triple Play Security Configuration Commands
          Triple Play Anti-Spoofing Commands
          Triple Play Layer 2 Security Commands
          ARP Handling Commands
        Show Commands
        Tools Commands
   Triple Play Multicast
    In This Chapter
    Introduction to Multicast
    Multicast in the Broadband Service Router
      Internet Group Management Protocol
        IGMP Versions and Interoperability Requirements
        IGMP Version Transition
      Multicast Listener Discovery
        MLD Versions and Interoperability Requirements
        Source Specific Multicast Groups
      Protocol Independent Multicast Sparse Mode (PIM-SM)
      Ingress Multicast Path Management (IMPM) Enhancements
    Multicast in the BSA
      IGMP Snooping
        IGMP/MLD Message Processing
        IGMP Message Processing
        MLD Message Processing
        IGMP/MLD Filtering
      Multicast VPLS Registration (MVR)
      Layer 3 Multicast Load Balancing
      IGMP State Reporter
        IGMP Data Records
        Transport Mechanism
        HA Compliance
        QoS Awareness
        Hardware Support
        IGMP Reporting Caveats
    Multicast Support over Subscriber Interfaces in Routed CO Model
      Hardware Support
      Multicast Over IPoE
        Per SAP Replication Mode
          Per SAP Queue
          IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        Per Subscriber Host Replication Mode
          IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      Multicast Over PPPoE
      IGMP Flooding Containment
      IGMP/MLD Timers
      IGMP/MLD Query Intervals
      HQoS Adjustment
        Host Tracking (HT) Considerations
        HQoS Adjust Per Vport
          Multi-Chassis Redundancy
          Scalability Considerations
      Redirection
      Hierarchical Multicast CAC (H-MCAC)
        MCAC Bundle Bandwidth Limit Considerations
      Determining MCAC Policy in Effect
      Multicast Filtering
      Joining the Multicast Tree
      Wholesale/Retail Requirements
      QoS Considerations
      Redundancy Considerations
        Redirection Considerations
    Configuring Triple Play Multicast Services with CLI
      Configuring IGMP Snooping in the BSA
        Enabling IGMP Snooping in a VPLS Service
        With IGMPv3 Multicast Routers
        With IGMPv1/2 Multicast Routers
        Modifying IGMP Snooping Parameters
        Modifying IGMP Snooping Parameters for a SAP or SDP
      Configuring Static Multicast Groups on a SAP or SDP
        Enabling IGMP Group Membership Report Filtering
          Enabling IGMP Traffic Filtering
      Configuring Multicast VPLS Registration (MVR)
      Configuring IGMP, MKD, and PIM in the BSR
        Enabling IGMP
        Configuring IGMP Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Enabling MLD
        Configuring MLD Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Configuring PIM
          Enabling PIM
          Configuring PIM Interface Parameters
          Importing PIM Join/Register Policies
          Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
     Triple Play Multicast Command Reference
      Command Hierarchies
        MCAST Management Commands
        Multicast Info Policy Bundle Commands
        Triple Play Multicast Service Commands
        Ingress Multicast Path Management Commands
        Multicast Redirection
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Multicast Management Configuration Commands
          Generic Commands
          Multicast Management Commands
          Bandwidth Policy Commands
          Multicast Info Policy Commands
          Chassis Level Commands
          Multicast Redirection Commands
          Forwarding Plane Commands
  Triple Play Enhanced Subscriber Management
    In This Section
    Uniform RADIUS Server Configuration
      RADIUS Server Configuration
        Uniform RADIUS Server Configuration (Preferred)
        Legacy RADIUS Server Configuration
    RADIUS Authentication of Subscriber Sessions
      RADIUS Authentication Extensions
        Triple Play Network with RADIUS Authentication
      RADIUS Authorization Extensions
        Calling-Station-ID
        Subscriber Session Timeout
          Domain Name in Authentication
        RADIUS Reply Message for PPPoE PAP/CHAP
        SHCV Policy
      radius-server-policy Retry Attempt Overview
      AAA RADIUS Server Operation Status
      AAA RADIUS Accounting Server Stickiness
      AAA RADIUS Authentication Fallback Action
      AAA Test User Account
      Troubleshooting the RADIUS Server
      Provisioning of Enhanced Subscriber Management (ESM) Objects
        Provisioning IP Configuration of the Host
        RADIUS Based Authentication in Wholesale Environment
        Change of Authorization and Disconnect-Request
        RADIUS-Based Accounting
        RADIUS Accounting Terminating Cause
        Accounting Modes Of Operation
        Per Session Accounting
          Caveats
        RADIUS Session Accounting with PD as a Managed Route
        No Host-Accounting
        Host-Accounting Enabled
        Reduction of Host Updates for Session Accounting Start and Stop
        Accounting Interim Update Message Interval
        CoA Triggered Accounting Interim Update
        Class Attribute
        User Name
        Accounting-On and Accounting Off
        RADIUS Accounting Message Buffering
        Multiple Accounting Policies
        Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    Enhanced Subscriber Management Overview
      Enhanced Subscriber Management Basics
        Standard and Enhanced Subscriber Management
          Subscriber Management Definitions
          Subscriber Identification Policy
          Subscriber Identification String
          Subscriber Profile
          SLA Profile
          Explicit Subscriber Profile Mapping
      ESM for IPv6
        Models
          PPPoE Host
          PPPoE RG
          IPoE Host/RG
        Setup
        Behavior
          Dual Stack
          Router Advertisements (RA)
          CoA and Disconnect-Request
        Delegated-Prefix-Length
          Order of Preference for DPL
          DHCP Server Address Utilization and Delegated Prefix Length
        DHCPv6 Relay Agent
          Configuring a DHCPv6 Relay Agent
        DHCPv6 Relay to Third Party DHCPv6 External Server
        DHCPv6 Local Server
      Dynamic Subscriber Host Processing
        Dynamic Tables
          Active Subscriber Table
          SLA Profile Instance Table
          Subscriber Host Table
          DHCP Lease State Table
      Enhanced Subscriber Management Entities
        Instantiating a New Host
        Packet Processing for an Existing Host
      ESM Host Lockout
        Functionality
      ANCP and GSMP
        ANCP
          Static ANCP Management
          Enhanced Subscriber Management (ESM) Dynamic ANCP
          ANCP String
          ANCP Persistency Support
        General Switch Management Protocol Version 3 (GSMPv3)
        DHCP Release Messages
          DHCP Release
        DHCP Client Mobility
        DHCP Lease Control
      Using Scripts for Dynamic Recognition of Subscribers
        Python Language and Programmable Subscriber Configuration Policy (PSCP)
        Determining the Subscriber Profile and SLA Profile of a Host
        Determining the Subscriber Profile
        Determining the SLA Profile
          SLA-Based Egress QoS Marking
      Auto-Sub ID
        Sub-id Identifiers
        Dual Stack Hosts
        Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
        PPPoA/PPPoEoA Considerations
        Deployment Considerations
        Caveats
      Limiting Subscribers and Hosts on a SAP
      Static Subscriber Hosts
      QoS for Subscribers and Hosts
        QoS Parameters in Different Profiles
        QoS Policy Overrides
      ESM Subscriber Hierarchical Traffic Control
        Subscriber HQoS
        Subscriber CFHP
        ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          Broadband Network Gateway Application
          Queue Determination and Scheduling
          Weighted Scheduler Group
          Queue and Subscriber Aggregate Rate Configuration and Adjustment
          Frame Size, Rates, and Running Average Frame Expansion Ratio
          Vport Determination and Evaluation
          Applying Aggregate Rate Limit to a Vport
          Applying a Scheduler Policy to a Vport
          Signaling of Last Mile Encapsulation Type
          Configuration Example
      Subscriber Volume Statistics
        IP (Layer 3) Volume Accounting
        Separate IPv4 and IPv6 Counters
      Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        IP Filter Attribute Format Details
        Checking Filter Policy Details
      ESM PPPoA/PPPoEoA
        PPPoA
        PPPoEoA
        Hardware Support
        Termination Points within 7x50
        PPPoA Encapsulation
          PPPoEoA Encapsulation
        Encapsulation Summary
        Concurrent Support for Different Service Types on the Same Port
        Restrictions in Scaled ATM MDA Mode
        QoS Implementation
        Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
        Per VP Shaping
        ATM/IOM QoS Integration
          Intermediate Node Rate Limit/Shaper
          Provisioning Aspects
          HQoS Combinations
          ATM Rate Adjustment
        Subscriber Instantiation Use Cases
        Authentication
        LUDB Access via Capture SAP
        Encapsulation Autosensing
        SAP Autoprovisioning
        PPP Nodes and ppp-policy
        MTU Considerations
          PPP(oE) Session Antispoofing
      Multi-Chassis Synchronization
        Overview
          Loss of Synchronization and Reconciliation
      Subscriber Routed Redundancy Protocol (SRRP)
        SRRP Messaging
        SRRP and Multi-Chassis Synchronization
        SRRP Instance
          SRRP Instance MCS Key
          Containing Service Type and ID
          Containing Subscriber IP Interface Name
          Subscriber Subnet Information
          Containing Group IP Interface Information
          Remote Redundant IP Interface Mismatch
          Remote Sending Redundant IP Interface Unavailable
          Remote SRRP Advertisement SAP Non-existent
          Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          Local and Remote Dual Master Detected
        Subscriber Subnet Owned IP Address Connectivity
        Subscriber Subnet SRRP Gateway IP Address Connectivity
        Receive SRRP Advertisement SAP and Anti-Spoof
      PPPoE MC Redundancy
        Hardware Support
        SRRP Considerations for PPPoE
          SRRP Fact-Checks
        State Synchronization
          PPPoE Multi-chassis Synchronization (MCS) Model
        Traffic Control and Redundant Interface
          Subnet Assignment and Advertisement - Option ‘A’
          Subnet Assignment and Advertisement - Option ‘B’
        MSAP Considerations
        Unnumbered Interface Support
        Compatibility with MC-LAG
        IPv6 Support
        Considerations with Local DHCP Server
        Redundant Interface Considerations
      Routed Central Office (CO)
        Layer 3 Subscriber Interfaces
          DHCP Interactions
          Routed CO for IES Service
          Routed CO for VPRN Service
        Wholesale Retail Routed CO
          Wholesale Retail Model
          Configuration and Applicability
          Hub-and-Spoke Forwarding
        Routed Subscriber Hosts
          Static Configured IPv4 Managed Route
          Static Configured IPv6 Managed Route
          Dynamic BGP Peering
          RIP Listener
          RADIUS: Framed-Route and Framed-IPv6-Route
          GRT Lookup and Routed CO in a VPRN
      Dual Homing
        Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        Steady-State Operation of Dual-homed Ring
        Broken-Ring Operation and the Transition to this State
        Transition from Broken to Closed Ring State
        Provisioning Aspects and Error Cases
        Dual Homing to Two BSR Nodes
        MC Services
        Routed CO Dual Homing
          Redundant Interfaces
          SRRP in Dual Homing
          Synchronization
          Wholesale-Retail Multi-Chassis Redundancy
        SRRP and Multi-Chassis Synchronization
        Dual Homing and ANCP
      SRRP Enhancement
        SRRP Fate Sharing
        Fate Sharing Algorithm
        SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          Subscriber Interface Routes (IPv4 and IPv6)
          Managed Routes
          Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          Activating SRRP State Tracking
        SRRP in Conjunction with a PW in ESM Environment – Use Case
        Group-monitor
      Subscriber Override
      Dual Stack Lite
        IP-in-IP
        Configuring Dual Stack Lite
        L2TP over IPv6
    L2TP Tunnel RADIUS Accounting
      Accounting Packets List
      RADIUS Attributes Value Considerations
      Other Optional RADIUS Attributes
      RADIUS VSA to Enable L2TP Tunnel Accounting
      MLPPP on the LNS Side
    RADIUS Route Download
    Managed SAP (MSAP)
      Sticky MSAP
      ESM Identification Process
        SAP-ID ESM Identifier
        DSLAM-ID
      Default-Subscriber
      Multicast Management
      Subscriber Mirroring
    Volume and Time Based Accounting
      Metering
        Categories Map and Categories
        Quota Consumption
        Minimum Credit Control Quota Values
        RADIUS VSA Alc-Credit-Control-Quota
      Credit Negotiation Mechanisms
      Action on Credit Exhaustion
      Action on Error-Conditions
      Applicability of Volume and Time Based Accounting
    Subscriber Host Idle Timeout
    Web Authentication Protocol (WPP)
      WPP Configurations
      WPP Triggered Host Creation
        LUDB Support For WPP
      WPP Multi-Chassis Redundancy Support
    One-time HTTP Redirection Overview
    ESM over MPLS Pseudowires
      Encapsulation
      ESM Configuration with PW-Ports and PW-SAPs
      QoS Support
        Bandwidth Control at PW-Port Level via Vport
        Last Mile Shaping
      BNG Redundancy with ESM over Pseudowire
        Epipe-Based Aggregation Service
          Sample Configuration on Master BNG
          Sample Configuration on Slave BNG
          Sample Configuration on A-PE
        VPLS Based Aggregation Service
          Sample BNG Redundancy (SRRP/MCS) Configuration with VPLS Service on A-PE
          A-PE configuration with VPLS Aggregation Service (A-PE1)
          A-PE Configuration with VPLS Aggregation Service (A-PE2)
        Show Commands Related to Active/Standby Pseudowire on Dual BNGs
    Logical Link Identifier (LLID)
    Open Authentication Model for DHCP and PPPoE Hosts
      Terminology
      LUDB and RADIUS Access Models
      No Authentication
      LUDB Only Access
      LUDB Access via DHCPv4 Server
      RADIUS Only Access
      Consecutive Access to LUDB and RADIUS
      RADIUS Fallback
    Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      Terminology
      Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
      Default Gateway in IPv4 Flexible Addressing
      IPv4 Subnet Sharing
      IPv4 Subnet Mask Auto-Generation
      Local-proxy-arp and arp-populate
      Gi-address Configuration Consideration
      PPPoE Considerations
      IPoEv6 Considerations
      General Configuration Guidelines for Flexible IP Address Assignment
      Caveats
    uRPF for Subscriber Management
    IPoE Sessions
      Enabling IPoE Sessions
      IPoE Session Authentication
      IPoE Session Accounting
      IPoE Session Mid-Session Changes
      IPoE Session Termination
      Limiting the Number of IPoE sessions
      SAP Session Index
      Resiliency
      Notes
      Configuration Steps
      IPoE Session Migration
        Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    Data-triggered Subscriber Management
      Provisioning Data-triggered ESM
      Authentication and Host Creation
      DoS Protection
    RADIUS Subscriber Services
      Subscriber Service Building Blocks
        1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        2. RADIUS Python Interface
        3. Python Script
        4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      Subscriber Services RADIUS Vendor Specific Attributes (VSAs)
      Subscriber Service RADIUS Accounting
      Accounting Only Subscriber Service
      QoS Override Subscriber Service
      PCC Rules Subscriber Service
        PCC Rules
        PCC rule instantiation
        PCC Rules as a Subscriber Service
        Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule Subscriber Services on the Parent RADIUS Accounting Volume Counters
        PCC Rule Subscriber Service Activation Failures
      Combined Subscriber Services
      Subscriber Services Python API
        Common subscriber services Python API
        Subscriber Service QoS Override Python API
        Subscriber Service PCC Rules Python API
      Operational commands
        Show Commands
        Debug Commands
        Resource Monitoring
    Residential Gateway Replacement
     Configuring Enhanced Subscriber Management with CLI
      Configuring RADIUS Authentication of DHCP Sessions
      TCP MSS adjustment for ESM Hosts
      Configuring Enhanced Subscriber Management
        Basic Configurations
        Subscriber Interface Configuration
        Configuring Enhanced Subscriber Management Entities
          Configuring a Subscriber Identification Policy
          Configuring a Subscriber Profile
          Configuring an SLA Profile
          Configuring Explicit Mapping Entries
        Routed CO with Basic Subscriber Management Features
        Applying the Profiles and Policies
          SLA Profile
      Configuring Dual Homing
        SHCV Policies
        SHCV Policy
        Subscriber Identification Policy
        Subscriber Profile
     Subscriber Management Command Reference
      Command Hierarchies
        ANCP Commands
        GSMP Configuration Commands
        Authentication Policy Commands
        RADIUS Accounting Policy Commands
        RADIUS Route Download Commands
        Diameter Policy Commands
          AAA Diameter Peer Policy Commands
        Subscriber Management Diameter Application Policy Commands
        Category Map and Credit Control Policy Commands
        Filter Commands
        BGP Peering Policy Commands
        Explicit Subscriber Mapping Commands
        IGMP Policy Command
        Host Lockout Commands
        Host Tracking Policy Commands
        PIM Policy Commands
        SLA Profile Commands
        Subscriber Identification Policy Commands
        Auto-Generated Subscriber Identification Key Commands
        Auto-Generated Subscriber Identification Key Service Commands
        Subscriber MCAC Policy Commands
        Subscriber Profile Commands
        IPoE Session Policy Commands
        Multi-Chassis Redundancy Commands
        SHCV Policy Commands
        Subscriber Management Service Commands
          VPLS Subscriber Management Configuration Commands
          Managed SAP Policy Commands
          VPRN Subscriber Interface Configuration Commands
          VPRN Subscriber Interface Group Interface Commands
          IES Subscriber Management Configuration Commands
          IES Subscriber Interface Commands
          IES Subscriber Interface Group Interface Commands
          Service Subscriber Interface, Group Interface IPoE Command
          RIP Commands
          VPort Commands
          Redundant Interface Commands
          Wireless Portal Protocol (WPP) Commands
          Multiple PPoE Session QoS Commands
          Multicast Listener Discovery (MLD) Commands
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
       Triple Play Subscriber Management Configuration Commands
         Triple Play Subscriber Management Configuration Commands
          Generic Commands
          ANCP and GSMP Commands
          RADIUS Policy Commands
          RADIUS Route Download Commands
          IGMP Policy Commands
          PIM Policy Commands
          Managed SAP Policy Commands
          Multi-Chassis Redundancy Commands
          SLA Profile Commands
          Subscriber Identification Policy Commands
          Subscriber Profile Commands
          Explicit Subscriber Mapping Commands
          Subscriber Management Service Commands
          Subscriber Management Service Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
          RIP Commands
          Vport Commands
          SHCV Policy Commands
        Show Commands
        Clear Commands
        Tools Commands
        Debug Commands
        Monitor Commands
  Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    In This Section
    Overview
      Terminology and Abbreviations
      Restrictions
    Deploying Oversubscribed Multi-Chassis Redundancy
      Resource Exhaustion Notification and Simultaneous Failures
      Resource Monitoring
      Warm-Standby Mode Of Operation
      IPoE vs PPPoE
      Persistency
      Routing and Redundant Interface in OMCR
      Revertive Behavior
      Service Restoration Times
      Processing of the SRRP Flaps
      Accounting
      Configuration Guidelines
      Troubleshooting Commands
    OMCR Command Reference
      Command Hierarchies
      OMCR Configuration Commands
        OMCR Configuration Commands
   WIFI Aggregation and Offload
    In This Section
    WIFI Aggregation and Offload Overview
    Layer 2 over Soft-GRE Tunnels
      Encapsulation
      Data Path
    Tunnel Level Egress QoS
      Operational Commands
    Authentication
      EAP-Based Authentication
        RADIUS Proxy
          RADIUS Proxy — Server Load-Balancing
          RADIUS Proxy — Cache Lookup
          RADIUS Proxy — Accounting
      Portal Authentication
    Address Assignment
    WIFI Mobility Anchor
    Wholesale
    CGN on WLAN-GW
    Lawful Intercept on WLAN-GW
    WLAN Location Enhancements
      Triggered Interim Accounting-Updates
      Operational Support
    WIFI Offload – 3G/4G Interworking
      Signaling Call Flow
        GTP Setup with EAP Authentication
      APN Resolution
      Configuration Objects
      RADIUS Support
      QoS Support with GTP
      Selective Breakout
      Location Notification in S2a
        WLAN Location over S2a
        Cellular Location over S2a
        Cellular Location over Gn Interface
        Operational Support
      Operational Commands
        show router wlan-gw mobile-gateway
        show router 300 wlan-gw mgw-address-cache
        show subscriber-mgmt wlan-gw gtp-session detail
        show subscriber-mgmt wlan-gw mgw-profile "default"
        show subscriber-mgmt wlan-gw gtp-statistics
    Migrant User Support
      Migrant User Support with Portal-Authentication
        DHCP
        Authentication and Forwarding
      Migrant User Support with EAP Authentication
      Data Triggered Subscriber Creation
    Distributed Subscriber Management (DSM)
      DHCP
      Authentication and Accounting
        DSM Data-Plane
      IP Filtering
        Policing
        Lawful Intercept (LI)
        Data-Triggered UE Creation
      Idle-Timeout and Session-Timeout Management
      Operational Commands
      Pool Manager
      DHCPv6 and SLAAC
      Call Trace
    Distributed RADIUS Proxy
      Enhanced Subscriber Management
      Distributed Subscriber Management
      Operational Commands
    WLAN-GW 1:1 Active-Backup Redundancy
      DHCP Server Redundancy
      Subscriber Creation after Switchover
    WLAN-GW Triggered Stateless Redundancy (N:1)
    AP Triggered Stateless WLAN-GW Redundancy (N:1)
    IPv6-only Access
      IPv6 GRE Tunnels
      IPv6 Client-Side RADIUS Proxy
      Dual-Stack UEs over WLAN-GW
        SLAAC Prefix Assignment
        DHCPv6 IA_NA Assignment
        Migrant User Support
        Accounting
    Layer 2 Wholesale
    VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    Soft-L2TPv3 Tunnels
     WiFi Command Reference
      Command Hierarchies
        WLAN-GW Commands
          Subscriber Management BRG Commands
          DSM Call Trace Commands
        WLAN-GW Service Commands
        RADIUS Server and Proxy Commands
        LUDB Matching for RADIUS Proxy Cache
        Data Plane Related Commands
        Port Policy Commands
        WIFI Aggregation and Offload – Migrant User Support Commands
        Distributed Subscriber Management Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
      WIFI Aggregation and Offload Commands
        WIFI Aggregation and Offload Commands
          Generic Commands
          WLAN-GW Commands
          DSM Call Trace Commands
          RADIUS Server Policy Commands
        CLI Command Description for RADIUS Server
        CLI Command Description for RADIUS Proxy Server
        LUDB Matching of RADIUS Proxy Cache Commands
        WLAN-GW-Group Commands
        Port Policy Commands
        WLAN-GW Group Interface Commands
        Migrant User Support Commands
          Distributed Subscriber Management Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
   virtual Residential Gateway
    In This Section
    virtual Residential Gateway Overview
      Access Modes
      Home Context on the vRGW
        Implicit Home Authentication
        Explicit Home Authentication
        Change of Configuration
        Home Lifetime
      Device Context on the vRGW
      Dynamic Configuration Changes
      Per-Home Pool Management and L2-Aware NAT
        Sticky IP Addresses
        Managed Static IPv4 Addresses
        DMZ
      IPv6
      QoS and Filter Support
      Data-Triggered Authentication
      BRG and vRG Caveats
     vRGW Command Reference
      Command Hierarchies
         Subscriber Management BRG Profile Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Generic Commands
        vRGW Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
  Dynamic Data Services
    In This Section
    Introduction to Dynamic Data Services
    RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    Data-Triggered Dynamic Data Services
      Data Trigger
      Dynamic Services Data Trigger Capture SAP
      RADIUS Authentication
      Local Authentication
      Data-Triggered Dynamic Service Provisioning
      Control Plane Protection
      Debugging
     RADIUS Triggered Dynamic Data Services Command Reference
      Command Hierarchies
        RADIUS Triggered Dynamic Data Services Commands
        Basic System Command
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      RADIUS Triggered Dynamic Data Services Commands
        Configuration Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  Diameter and Diameter Applications
    In This Section
    Restrictions
    Terminology
    3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
    Policy Management via Gx Interface
      Gx Protocol
      Policy Assignment Models
      IP-CAN Session – Gx Session Identification
        User Identification in PCRF
        NAS-Port-Id as Subscription-Id
      Gx Interface and ESM Subscriber Instantiation
        Gx and Dual-Stack Hosts
        Gx and PPPoEv6-DHCP
      Gx Fallback Function
      Gx CCR-I Replays
      Gx CCR-t Replays
        RAR and CCR-t Replay
        CCR-t Replay And Multi-Chassis Redundancy
        CCR-t Replay And High Availability
      Automatic Updates for IP Address Allocation/De-allocation
      DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      Gx, ESM and AA
        ESM Subscriber-host vs AA Subscriber
        AA Subscriber State
      Policy Management via Gx
      Gx-Based Overrides
        Instantiation of Gx Overrides
        HTTP Redirect Override
        Removal of Overrides
        Examples of Gx Overrides
      PCC Rules
        PCC Rule Concept
        PCC Rule Instantiation
        Base QoS-Policy and Base Filter
        Generic Policy Sharing and Rule Sharing
        PCC Rule Name and PCC Rule Removal
        Gx Rule Ordering
        PCC Rule Override
        Aggregation of IP-Criterion
        Combining IPv4 and IPv6 Entries within the Rule
        Gx Rules with Multiple Actions and Action Sharing
        Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        RADIUS and Gx Interaction
        Bulk Changes via CLI while Gx Rules are Active
        PCC Rule Direction
        Action
        Rate-Limiting Action (Ingress, Egress)
          Dynamic Policers and Queue Mappings
          Dynamic Policer Rates and Accounting Statistics
        Forwarding-Class Change (Ingress, Egress)
        QoS Forward (Ingress and Egress)
        Next-Hop Redirect (Ingress)
        HTTP Redirect (Ingress)
        Filter Forward/Drop (Ingress and Egress)
        Service Gating Function
        PCC Rule Provisioning Example
        Operational Aspects
        PCC Rules and Capacity Planning
        PCC Rule Scaling Example
      NAS Filter Inserts
        Examples of NAS Entry Inserts
      Error Handing and Rule Failure Reporting in ESM
        AVP Decoding Failure in Gx
        ESM Rule-Installation Failure
        Failure Reporting in AA
        Summary of Failure Reporting
      Usage-Monitoring and Reporting
        ESM Usage-Monitoring - What is Being Monitored
        AA Usage-Monitoring – What is Being Monitored
        Requesting Usage-Monitoring in ESM
        Reporting Accumulated Usage
        Disabling Usage-Monitoring
        Usage-Monitoring for PCC Rules
        Session Termination
        Usage-Monitoring Examples
      Event Triggers
      Subscriber Verification
      Subscriber Termination
      Mobility Support in WiFi
        Redundancy
      Persistency and Origin-State-ID AVP
      Overload Protection
    Diameter NASREQ Application
      Sample Configuration Steps
    Diameter Redundancy
      Diameter Peer Level Redundancy
      Diameter Multi-Chassis Redundancy
        Diameter Proxy Model General Operational Principles
        Diameter Proxy Activity Selection
        Synchronization and MCS
        Retransmissions
        Retransmissions and the T-bit
        Diameter Proxy Role
        Diameter Proxy and CC-Request-Number AVP
        Stateless Diameter Proxy
        Switchover Scenarios
        Log/Trap Generation Caused by Diameter Proxy State Change
        Switchover Update Event (CCR-u)
        Isolated Chassis
        Diameter Identities
        High Availability
      Gx Specific Behavior
    Diameter Debugging
   Python Script Support for ESM
    In This Chapter
    Python Script Support for ESM
    Python in SR-OS Overview
      Python Changes
    Python Support in sub-ident-policy
      Configuration
      Operator Debugging
      Python Scripts
      Sample Python Scripts
        Example
        Example
        Example
      Limitations
    RADIUS Script Policy Overview
      Python RADIUS API
      Sample Script
    Python Policy Overview
      Python Policy – RADIUS API
      Python Policy – DHCPv4 API
      Python Policy – DHCPv6 API
      Python Policy – Diameter API
      Python Policy – DHCP Transaction Cache API
      Python for PPPoE API
      Python API for PPP Packet
      Python API for PPP PAP
      Python API for PPP CHAP
      Python ESM API
      Python Cache Support
      Applying a Python Policy
      Python Script Protection
    Tips and Tricks
    Python Command Reference
      Command Hierarchies
        Python Policy Commands
        Python Script Commands
        Services Commands
        Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
      Command Descriptions
        Python Configuration Commands
          Global Commands
          Python Policy Commands
          Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
     Python RADIUS Command Reference
      Command Hierarchies
      Command Descriptions
        Generic Commands
        Script Commands
  Standards and Protocol Support
  Customer documentation and product support
Unicast Routing Protocols Guide R14.0.R1
  Getting Started
    About This Guide
    Router Configuration Process
  RIP
    In This Chapter
    RIP Overview
      RIP Features
        RIP Version Types
        RIPv2 Authentication
        RIP Packet Format
          RIPv1 Format
          RIPv2 Format
    RIPng
      RIPng Protocol
    Common Attributes
      Metrics
      Timers
      Import and Export Policies
      Hierarchical Levels
    RIP Configuration Process Overview
    Configuration Notes
      General
    Configuring RIP with CLI
    RIP and RIPng Configuration Overview
      Preconfiguration Requirements
      RIP Hierarchy
    Basic RIP Configuration
    Common Configuration Tasks
      Configuring Interfaces
      Configuring a Route Policy
      Configuring RIP Parameters
      Configuring Global-Level Parameters
      Configuring Group-Level Parameters
      Configuring Neighbor-Level Parameters
    RIP Configuration Management Tasks
      Modifying RIP Parameters
      Deleting a Group
      Deleting a Neighbor
    RIP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
          Group Commands
          Neighbor Commands
        RIPng Configuration Commands
          Group Commands
          Neighbor Commands
      Command Descriptions
        Generic Commands
        RIP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show RIP Commands
        Clear RIP Commands
        Debug RIP Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug RIP Commands
  OSPF
    In This Chapter
    Configuring OSPF
      OSPF Areas
        Backbone Area
        Stub Area
        Not-So-Stubby Area
          OSPF Super Backbone
          Sham Links
          Implementing the OSPF Super Backbone
          Loop Avoidance
          DN-BIT
          Route Tag
          Sham Links
      OSPFv3 Authentication
        OSPFv3 Graceful Restart Helper
      Virtual Links
      Neighbors and Adjacencies
      Link-State Advertisements
      Metrics
      Authentication
      IP Subnets
      Preconfiguration Recommendations
      Multiple OSPF Instances
        Route Export Policies for OSPF
        Preventing Route Redistribution Loops
      Multi-Address Support for OSPFv3
      IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        IP FRR Configuration
          Reducing the Scope of the LFA Calculation by SPF
        ECMP Considerations
        IP FRR and RSVP Shortcut (IGP Shortcut)
        IP FRR and BGP Next-Hop Resolution
        OSPF and IS-IS Support for Loop-Free Alternate Calculation
          Loop-Free Alternate Calculation in the Presence of IGP shortcuts
          Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      Configuration of Route Next-Hop Policy Template
        Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
        Configuring SRLG Group Constraint in Route Next-Hop Policy
        Interaction of IP and MPLS Admin Group and SRLG
        Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
      Application of Route Next-Hop Policy Template to an Interface
      Excluding Prefixes from LFA SPF
      Modification to LFA Next-Hop Selection Algorithm
    LFA Protection using Segment Routing Backup Node SID
      Configuring LFA using Backup Node SID
      Detailed Operation of LFA Protection using Backup Node SID
      Duplicate SID Handling
      OSPF Control Plane Extensions
    Segment Routing in Shortest Path Forwarding
    OSPF LSA Filtering
    FIB Prioritization
    OSPF Configuration Process Overview
    Configuration Notes
      General
        OSPF Defaults
     Configuring OSPF with CLI
    OSPF Configuration Guidelines
    Basic OSPF Configuration
      Configuring the Router ID
    Configuring OSPF Components
      Configuring OSPF Parameters
      Configuring OSPF3 Parameters
      Configuring an OSPF or OSPF3 Area
      Configuring a Stub Area
      Configuring a Not-So-Stubby Area
      Configuring a Virtual Link
      Configuring an Interface
      Configuring Authentication
        Overview
        Configuring Authentication Keys and Algorithms
        Configuring Authentication using Keychains
      Assigning a Designated Router
      Configuring Route Summaries
      Configuring Route Preferences
    OSPF Configuration Management Tasks
      Modifying a Router ID
      Deleting a Router ID
      Modifying OSPF Parameters
    OSPF Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        OSPF Global Commands
        OSPF Area Commands
        Interface/Virtual Link Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  IS-IS
    In This Chapter
    Configuring IS-IS
      Routing
      IS-IS Frequently Used Terms
      ISO Network Addressing
        IS-IS PDU Configuration
        IS-IS Operations
      IS-IS Route Summarization
        Partial SPF Calculation
      IS-IS MT-Topology Support
        Native IPv6 Support
      IS-IS Administrative Tags
        Setting Route Tags
        Using Route Tags
        Unnumbered Interface Support
      Segment Routing in Shortest Path Forwarding
        Configuring Segment Routing in Shortest Path
        Segment Routing Operational Procedures
          Prefix Advertisement and Resolution
          Error and Resource Exhaustion Handling
        Segment Routing Tunnel Management
          Tunnel MTU Determination
        Remote LFA with Segment Routing
        Data Path Support
          Hash label support
        Control Protocol Changes
          IS-IS Control Protocol Changes
          OSPF Control Protocol Changes
        BGP Shortcut Using Segment Routing Tunnel
        BGP Label Route Resolution Using Segment Routing Tunnel
        Service Packet Forwarding with Segment Routing
        Mirror Services and Lawful Intercept
      Segment Routing Mapping Server Function for IPv4 Prefixes
        Segment Routing Mapping Server
        Segment Routing Mapping Server Prefix SID Resolution
    FIB Prioritization
    IS-IS Configuration Process Overview
    Configuration Notes
      General
     Configuring IS-IS with CLI
    IS-IS Configuration Overview
      Router Levels
      Area Address Attributes
      Interface Level Capability
      Route Leaking
    Basic IS-IS Configuration
    Common Configuration Tasks
    Configuring IS-IS Components
      Enabling IS-IS
      Modifying Router-Level Parameters
      Configuring ISO Area Addresses
      Configuring Global IS-IS Parameters
      Migration to IS-IS Multi-Topology
      Configuring Interface Parameters
        Example: Configuring a Level 1 Area
        Example: Modifying a Router’s Level Capability
      Configuring IS-IS Link Groups
    IS-IS Configuration Management Tasks
      Disabling IS-IS
      Removing IS-IS
      Modifying Global IS-IS Parameters
      Modifying IS-IS Interface Parameters
      Configuring Authentication using Keychains
      Configuring Leaking
      Redistributing External IS-IS Routers
      Specifying MAC Addresses for All IS-IS Routers
    IS-IS Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        IS-IS Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  BGP
    In This Chapter
    BGP Overview
    BGP Sessions
      BGP Session States
      Detecting BGP Session Failures
        Peer Tracking
        Bidirectional Forwarding Detection (BFD)
        Fast External Failover
      High Availability BGP Sessions
        BGP Graceful Restart
      BGP Session Security
        TCP MD5 Authentication
        TTL Security Mechanism
      BGP Groups
    BGP Design Concepts
      Route Reflection
      BGP Confederations
    BGP Messages
      Open Message
        Changing the Autonomous System Number
        Changing a Confederation Number
        BGP Advertisement
      Update Message
      Keepalive Message
      Notification Message
        UPDATE Message Error Handling
      Route Refresh Message
    BGP Path Attributes
      Origin
      AS Path
        AS Override
        Using Local AS for ASN Migration
        4-Octet Autonomous System Numbers
      Next-Hop
        Next-Hop IPv4 Address Family over IPv6
        Next-Hop VPN-IPv4 Address Family over IPv6
        Next-Hop VPN-IPv6 Address Family over IPv6
        Next-Hop Resolution
        Next-Hop Tracking
        Next-Hop Indirection
        Using Multiple Address Families over IPv6 BGP Sessions
      MED
        Deterministic MED
      Local Preference
      Route Aggregation Path Attributes
      Community and Extended Community Attributes
      Route Reflection Attributes
      Multi-Protocol BGP Attributes
      4-Octet AS Attributes
      AIGP Metric
    BGP Routing Information Base (RIB)
      RIB-IN Features
        BGP Import Policies
      LOC-RIB Features
        BGP Decision Process
          Always Compare MED
          Ignore Next-Hop Metric
        BGP Route Installation in the Route Table
        Weighted ECMP for BGP Routes
        BGP Route Installation in the Tunnel Table
        BGP Fast Reroute
          Calculating Backup Paths
          Failure Detection and Switchover to the Backup Path
        QoS Policy Propagation via BGP (QPPB)
        BGP Policy Accounting
        Route Flap Damping (RFD)
      RIB-OUT Features
        BGP Export Policies
        Outbound Route Filtering (ORF)
        RT Constrained Route Distribution
        Min Route Advertisement Interval (MRAI)
        Advertise-Inactive
        Best-External
        Add-Paths
          Path Selection with Add-Paths
        Split-Horizon
    BGP Applications
      Next-hop Resolution Using Tunnels
        BGP Routes
        BGP Labeled Routes
        VPN-IPv4 and VPN-IPv6 Routes
      BGP Flow-Spec
        Validating Received Flow Routes
        Using Flow Routes to Create Dynamic Filter Entries
      Configuration of TTL Propagation for BGP Label Routes
        TTL Propagation for RFC 3107 Label Route at Ingress LER
        TTL Propagation for RFC 3107 Label Routes at LSR
      BGP Prefix Origin Validation
      BGP Route Leaking
    BGP Configuration Process Overview
    Configuration Notes
      General
        BGP Defaults
        BGP MIB Notes
    Configuring BGP with CLI
    BGP Configuration Overview
      Preconfiguration Requirements
      BGP Hierarchy
      Internal and External BGP Configurations
    Basic BGP Configuration
    Common Configuration Tasks
      Creating an Autonomous System
      Configuring a Router ID
      BGP Confederations
      BGP Route Reflectors
      BGP Components
      Configuring Group Attributes
      Configuring Neighbor Attributes
      Configuring Route Reflection
      Configuring a Confederation
      BGP Configuration Management Tasks
        Modifying an AS Number
        Modifying a Confederation Number
        Modifying the BGP Router ID
        Modifying the Router-Level Router ID
        Deleting a Neighbor
        Deleting Groups
    BGP Command Reference
      Command Hierarchies
        Global BGP Commands
        Group BGP Commands
        Neighbor BGP Commands
        Other BGP-Related Commands
      Command Descriptions
        Generic Commands
        BGP Commands
        Other BGP-Related Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Route Policies
    In This Chapter
    Configuring Route Policies
      Policy Statements
        Policy Statement Chaining and Logical Expressions
        Routing Policy Subroutines
        Policy Evaluation Command
        Exclusive Editing for Policy Configuration
        Default Action Behavior
        Denied IP Unicast Prefixes
        Controlling Route Flapping
      Regular Expressions
      BGP and OSPF Route Policy Support
        BGP Route Policies
        Re-advertised Route Policies
        Triggered Policies
        Set MED to IGP Cost using Route Policies
        BGP Policy Subroutines
        Route Policies for BGP Next-Hop Resolution and Peer Tracking
      Routing Policy Parameterization
      When to Use Route Policies
    Route Policy Configuration Process Overview
    Configuration Notes
      General
     Configuring Route Policies with CLI
    Route Policy Configuration Overview
      When to Create Routing Policies
      Default Route Policy Actions
      Policy Evaluation
      Damping
    Basic Configurations
    Configuring Route Policy Components
      Beginning the Policy Statement
      Creating a Route Policy
      Configuring a Default Action
      Configuring an Entry
      Configuring a Community List
      Configuring Damping
        Configuring a Prefix List
        Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
    Route Policy Configuration Management Tasks
      Editing Policy Statements and Parameters
      Deleting an Entry
      Deleting a Policy Statement
    Route Policy Command Reference
      Command Hierarchies
        Route Policy Configuration Commands
      Command Descriptions
        Generic Commands
        Route Policy Options
        Route Policy Damping Commands
        Route Policy Prefix Commands
        Route Policy Entry Match Commands
        Route Policy Action Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
  Getting Started
    About This Guide
    Router Configuration Process
  RIP
    In This Chapter
    RIP Overview
      RIP Features
        RIP Version Types
        RIPv2 Authentication
        RIP Packet Format
          RIPv1 Format
          RIPv2 Format
    RIPng
      RIPng Protocol
    Common Attributes
      Metrics
      Timers
      Import and Export Policies
      Hierarchical Levels
    RIP Configuration Process Overview
    Configuration Notes
      General
    Configuring RIP with CLI
    RIP and RIPng Configuration Overview
      Preconfiguration Requirements
      RIP Hierarchy
    Basic RIP Configuration
    Common Configuration Tasks
      Configuring Interfaces
      Configuring a Route Policy
      Configuring RIP Parameters
      Configuring Global-Level Parameters
      Configuring Group-Level Parameters
      Configuring Neighbor-Level Parameters
    RIP Configuration Management Tasks
      Modifying RIP Parameters
      Deleting a Group
      Deleting a Neighbor
    RIP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
          Group Commands
          Neighbor Commands
        RIPng Configuration Commands
          Group Commands
          Neighbor Commands
      Command Descriptions
        Generic Commands
        RIP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show RIP Commands
        Clear RIP Commands
        Debug RIP Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug RIP Commands
  OSPF
    In This Chapter
    Configuring OSPF
      OSPF Areas
        Backbone Area
        Stub Area
        Not-So-Stubby Area
          OSPF Super Backbone
          Sham Links
          Implementing the OSPF Super Backbone
          Loop Avoidance
          DN-BIT
          Route Tag
          Sham Links
      OSPFv3 Authentication
        OSPFv3 Graceful Restart Helper
      Virtual Links
      Neighbors and Adjacencies
      Link-State Advertisements
      Metrics
      Authentication
      IP Subnets
      Preconfiguration Recommendations
      Multiple OSPF Instances
        Route Export Policies for OSPF
        Preventing Route Redistribution Loops
      Multi-Address Support for OSPFv3
      IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        IP FRR Configuration
          Reducing the Scope of the LFA Calculation by SPF
        ECMP Considerations
        IP FRR and RSVP Shortcut (IGP Shortcut)
        IP FRR and BGP Next-Hop Resolution
        OSPF and IS-IS Support for Loop-Free Alternate Calculation
          Loop-Free Alternate Calculation in the Presence of IGP shortcuts
          Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      Configuration of Route Next-Hop Policy Template
        Configuring Affinity or Admin Group Constraint in Route Next-Hop Policy
        Configuring SRLG Group Constraint in Route Next-Hop Policy
        Interaction of IP and MPLS Admin Group and SRLG
        Configuring Protection Type and Next-Hop Type Preference in Route next-hop policy template
      Application of Route Next-Hop Policy Template to an Interface
      Excluding Prefixes from LFA SPF
      Modification to LFA Next-Hop Selection Algorithm
    LFA Protection using Segment Routing Backup Node SID
      Configuring LFA using Backup Node SID
      Detailed Operation of LFA Protection using Backup Node SID
      Duplicate SID Handling
      OSPF Control Plane Extensions
    Segment Routing in Shortest Path Forwarding
    OSPF LSA Filtering
    FIB Prioritization
    OSPF Configuration Process Overview
    Configuration Notes
      General
        OSPF Defaults
     Configuring OSPF with CLI
    OSPF Configuration Guidelines
    Basic OSPF Configuration
      Configuring the Router ID
    Configuring OSPF Components
      Configuring OSPF Parameters
      Configuring OSPF3 Parameters
      Configuring an OSPF or OSPF3 Area
      Configuring a Stub Area
      Configuring a Not-So-Stubby Area
      Configuring a Virtual Link
      Configuring an Interface
      Configuring Authentication
        Overview
        Configuring Authentication Keys and Algorithms
        Configuring Authentication using Keychains
      Assigning a Designated Router
      Configuring Route Summaries
      Configuring Route Preferences
    OSPF Configuration Management Tasks
      Modifying a Router ID
      Deleting a Router ID
      Modifying OSPF Parameters
    OSPF Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        OSPF Global Commands
        OSPF Area Commands
        Interface/Virtual Link Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  IS-IS
    In This Chapter
    Configuring IS-IS
      Routing
      IS-IS Frequently Used Terms
      ISO Network Addressing
        IS-IS PDU Configuration
        IS-IS Operations
      IS-IS Route Summarization
        Partial SPF Calculation
      IS-IS MT-Topology Support
        Native IPv6 Support
      IS-IS Administrative Tags
        Setting Route Tags
        Using Route Tags
        Unnumbered Interface Support
      Segment Routing in Shortest Path Forwarding
        Configuring Segment Routing in Shortest Path
        Segment Routing Operational Procedures
          Prefix Advertisement and Resolution
          Error and Resource Exhaustion Handling
        Segment Routing Tunnel Management
          Tunnel MTU Determination
        Remote LFA with Segment Routing
        Data Path Support
          Hash label support
        Control Protocol Changes
          IS-IS Control Protocol Changes
          OSPF Control Protocol Changes
        BGP Shortcut Using Segment Routing Tunnel
        BGP Label Route Resolution Using Segment Routing Tunnel
        Service Packet Forwarding with Segment Routing
        Mirror Services and Lawful Intercept
      Segment Routing Mapping Server Function for IPv4 Prefixes
        Segment Routing Mapping Server
        Segment Routing Mapping Server Prefix SID Resolution
    FIB Prioritization
    IS-IS Configuration Process Overview
    Configuration Notes
      General
     Configuring IS-IS with CLI
    IS-IS Configuration Overview
      Router Levels
      Area Address Attributes
      Interface Level Capability
      Route Leaking
    Basic IS-IS Configuration
    Common Configuration Tasks
    Configuring IS-IS Components
      Enabling IS-IS
      Modifying Router-Level Parameters
      Configuring ISO Area Addresses
      Configuring Global IS-IS Parameters
      Migration to IS-IS Multi-Topology
      Configuring Interface Parameters
        Example: Configuring a Level 1 Area
        Example: Modifying a Router’s Level Capability
      Configuring IS-IS Link Groups
    IS-IS Configuration Management Tasks
      Disabling IS-IS
      Removing IS-IS
      Modifying Global IS-IS Parameters
      Modifying IS-IS Interface Parameters
      Configuring Authentication using Keychains
      Configuring Leaking
      Redistributing External IS-IS Routers
      Specifying MAC Addresses for All IS-IS Routers
    IS-IS Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        IS-IS Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  BGP
    In This Chapter
    BGP Overview
    BGP Sessions
      BGP Session States
      Detecting BGP Session Failures
        Peer Tracking
        Bidirectional Forwarding Detection (BFD)
        Fast External Failover
      High Availability BGP Sessions
        BGP Graceful Restart
      BGP Session Security
        TCP MD5 Authentication
        TTL Security Mechanism
      BGP Groups
    BGP Design Concepts
      Route Reflection
      BGP Confederations
    BGP Messages
      Open Message
        Changing the Autonomous System Number
        Changing a Confederation Number
        BGP Advertisement
      Update Message
      Keepalive Message
      Notification Message
        UPDATE Message Error Handling
      Route Refresh Message
    BGP Path Attributes
      Origin
      AS Path
        AS Override
        Using Local AS for ASN Migration
        4-Octet Autonomous System Numbers
      Next-Hop
        Next-Hop IPv4 Address Family over IPv6
        Next-Hop VPN-IPv4 Address Family over IPv6
        Next-Hop VPN-IPv6 Address Family over IPv6
        Next-Hop Resolution
        Next-Hop Tracking
        Next-Hop Indirection
        Using Multiple Address Families over IPv6 BGP Sessions
      MED
        Deterministic MED
      Local Preference
      Route Aggregation Path Attributes
      Community and Extended Community Attributes
      Route Reflection Attributes
      Multi-Protocol BGP Attributes
      4-Octet AS Attributes
      AIGP Metric
    BGP Routing Information Base (RIB)
      RIB-IN Features
        BGP Import Policies
      LOC-RIB Features
        BGP Decision Process
          Always Compare MED
          Ignore Next-Hop Metric
        BGP Route Installation in the Route Table
        Weighted ECMP for BGP Routes
        BGP Route Installation in the Tunnel Table
        BGP Fast Reroute
          Calculating Backup Paths
          Failure Detection and Switchover to the Backup Path
        QoS Policy Propagation via BGP (QPPB)
        BGP Policy Accounting
        Route Flap Damping (RFD)
      RIB-OUT Features
        BGP Export Policies
        Outbound Route Filtering (ORF)
        RT Constrained Route Distribution
        Min Route Advertisement Interval (MRAI)
        Advertise-Inactive
        Best-External
        Add-Paths
          Path Selection with Add-Paths
        Split-Horizon
    BGP Applications
      Next-hop Resolution Using Tunnels
        BGP Routes
        BGP Labeled Routes
        VPN-IPv4 and VPN-IPv6 Routes
      BGP Flow-Spec
        Validating Received Flow Routes
        Using Flow Routes to Create Dynamic Filter Entries
      Configuration of TTL Propagation for BGP Label Routes
        TTL Propagation for RFC 3107 Label Route at Ingress LER
        TTL Propagation for RFC 3107 Label Routes at LSR
      BGP Prefix Origin Validation
      BGP Route Leaking
    BGP Configuration Process Overview
    Configuration Notes
      General
        BGP Defaults
        BGP MIB Notes
    Configuring BGP with CLI
    BGP Configuration Overview
      Preconfiguration Requirements
      BGP Hierarchy
      Internal and External BGP Configurations
    Basic BGP Configuration
    Common Configuration Tasks
      Creating an Autonomous System
      Configuring a Router ID
      BGP Confederations
      BGP Route Reflectors
      BGP Components
      Configuring Group Attributes
      Configuring Neighbor Attributes
      Configuring Route Reflection
      Configuring a Confederation
      BGP Configuration Management Tasks
        Modifying an AS Number
        Modifying a Confederation Number
        Modifying the BGP Router ID
        Modifying the Router-Level Router ID
        Deleting a Neighbor
        Deleting Groups
    BGP Command Reference
      Command Hierarchies
        Global BGP Commands
        Group BGP Commands
        Neighbor BGP Commands
        Other BGP-Related Commands
      Command Descriptions
        Generic Commands
        BGP Commands
        Other BGP-Related Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  Route Policies
    In This Chapter
    Configuring Route Policies
      Policy Statements
        Policy Statement Chaining and Logical Expressions
        Routing Policy Subroutines
        Policy Evaluation Command
        Exclusive Editing for Policy Configuration
        Default Action Behavior
        Denied IP Unicast Prefixes
        Controlling Route Flapping
      Regular Expressions
      BGP and OSPF Route Policy Support
        BGP Route Policies
        Re-advertised Route Policies
        Triggered Policies
        Set MED to IGP Cost using Route Policies
        BGP Policy Subroutines
        Route Policies for BGP Next-Hop Resolution and Peer Tracking
      Routing Policy Parameterization
      When to Use Route Policies
    Route Policy Configuration Process Overview
    Configuration Notes
      General
     Configuring Route Policies with CLI
    Route Policy Configuration Overview
      When to Create Routing Policies
      Default Route Policy Actions
      Policy Evaluation
      Damping
    Basic Configurations
    Configuring Route Policy Components
      Beginning the Policy Statement
      Creating a Route Policy
      Configuring a Default Action
      Configuring an Entry
      Configuring a Community List
      Configuring Damping
        Configuring a Prefix List
        Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
    Route Policy Configuration Management Tasks
      Editing Policy Statements and Parameters
      Deleting an Entry
      Deleting a Policy Statement
    Route Policy Command Reference
      Command Hierarchies
        Route Policy Configuration Commands
      Command Descriptions
        Generic Commands
        Route Policy Options
        Route Policy Damping Commands
        Route Policy Prefix Commands
        Route Policy Entry Match Commands
        Route Policy Action Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  Standards and Protocol Support
  Customer documentation and product support
Versatile Service Module Guide R14.0.R1
  Versatile Service Module
    In This Guide
      In This Chapter
    VSM Overview
      Multiple System Solution
      Hybrid Service Solution
      Single System Multiple Interface Solution
      Full Feature Internal Service Cross Connect Solution
    Functional Components
      Service Cross Connect Adapter (CCA)
      Internal Service CCAG
      Internal Service Cross Connect Identifier (CCID)
    CCAG Bandwidth and Resiliency
      CCAG LAG Attributes
      CCAG Traffic Distribution
      CCAG SAP QoS
        Link Level CCAG SAP QoS Adaptation
        Distributed CCAG SAP QoS Adaptation
      VSM-CCA-XP
    Configuration Process Overview
    Configuration Notes
    Configuring VSM and CCAG with CLI
    Basic Configuration
    Common Configuration Tasks
      Configure VSM CCAG Components
        Provision VSM on an MDA
        Provision CCAG Parameters
        Configure Path Components
        Cross Connecting Network IP Interfaces
        Cross Connecting Services
        Epipe
        VPLS
        IES
        VPRN
    Service Management Tasks
      Modifying or Deleting a VSM MDA
      Modifying CCAG Parameters on a Network IP Interface
      Modifying CCAG Parameters
      Modifying Path Parameters
      Modifying Service Parameters
        Epipe
        VPLS
        IES
        VPRN
    VSM Command Reference
      Command Hierarchies
        VSM Configuration Commands
        Related Commands
      VSM Configuration Command Descriptions
        Generic Commands
        VSM CLI Tree Node Commands
        VSM Path Commands
        Related Commands
        Services Commands
          Service CCAG SAP Provisioning
  Standards and Protocol Support
  Customer Documentation and Product Support
  Versatile Service Module
    In This Guide
      In This Chapter
    VSM Overview
      Multiple System Solution
      Hybrid Service Solution
      Single System Multiple Interface Solution
      Full Feature Internal Service Cross Connect Solution
    Functional Components
      Service Cross Connect Adapter (CCA)
      Internal Service CCAG
      Internal Service Cross Connect Identifier (CCID)
    CCAG Bandwidth and Resiliency
      CCAG LAG Attributes
      CCAG Traffic Distribution
      CCAG SAP QoS
        Link Level CCAG SAP QoS Adaptation
        Distributed CCAG SAP QoS Adaptation
      VSM-CCA-XP
    Configuration Process Overview
    Configuration Notes
    Configuring VSM and CCAG with CLI
    Basic Configuration
    Common Configuration Tasks
      Configure VSM CCAG Components
        Provision VSM on an MDA
        Provision CCAG Parameters
        Configure Path Components
        Cross Connecting Network IP Interfaces
        Cross Connecting Services
        Epipe
        VPLS
        IES
        VPRN
    Service Management Tasks
      Modifying or Deleting a VSM MDA
      Modifying CCAG Parameters on a Network IP Interface
      Modifying CCAG Parameters
      Modifying Path Parameters
      Modifying Service Parameters
        Epipe
        VPLS
        IES
        VPRN
    VSM Command Reference
      Command Hierarchies
        VSM Configuration Commands
        Related Commands
      VSM Configuration Command Descriptions
        Generic Commands
        VSM CLI Tree Node Commands
        VSM Path Commands
        Related Commands
        Services Commands
          Service CCAG SAP Provisioning
  Standards and Protocol Support
  Customer Documentation and Product Support