Nokia 7450 ESS, 7750 SR, and 7950 XRS Release 14.0.R4
Legal Disclaimers
Customer Documentation and Product Support
Legal Disclaimers
Customer Documentation and Product Support
Acronym Reference Guide R14.0.R4
1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Document and Product Support
1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
Customer Document and Product Support
Basic System Configuration Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.1.1. Audience
1.2. In This Chapter
1.3. Router System Configuration Process
2. CLI Usage
2.1. In This Chapter
2.2. CLI Structure
2.3. Navigating in the CLI
2.3.1. CLI Contexts
2.3.2. Basic CLI Commands
2.3.3. CLI Environment Commands
2.3.4. CLI Monitor Commands
2.4. Getting Help in the CLI
2.5. The CLI Command Prompt
2.6. Displaying Configuration Contexts
2.7. EXEC Files
2.8. CLI Script Control
2.9. Entering CLI Commands
2.9.1. Command Completion
2.9.2. Unordered and Unnamed Parameters
2.9.3. Editing Keystrokes
2.9.4. Absolute Paths
2.9.5. History
2.9.6. Entering Numerical Ranges
2.9.7. Pipe/Match
2.9.8. Pipe/Count
2.9.9. Redirection
2.10. VI Editor
2.10.1. Summary of vi Commands
2.10.2. Using the vi Commands
2.10.3. EX Commands
2.11. Configuration Rollback
2.11.1. Feature Behavior
2.11.2. Rollback and SNMP
2.11.3. Rescue Configuration
2.11.4. Operational Guidelines
2.12. Transactional Configuration
2.12.1. Basic Operation
2.12.2. Transactions and Rollback
2.12.3. Authorization
Basic CLI Command Reference
Command Hierarchies
Global Commands
Monitor Commands
Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Command Descriptions
Global Commands
Monitor CLI Commands
CLI Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Show Commands
3. File System Management
3.1. In This Chapter
3.2. The File System
3.2.1. Compact Flash Devices
3.2.2. URLs
3.2.3. Wildcards
3.3. File Management Tasks
3.3.1. Modifying File Attributes
3.3.2. Creating Directories
3.3.3. Copying Files
3.3.4. Moving Files
3.3.5. Deleting Files and Removing Directories
3.3.6. Displaying Directory and File Information
3.3.7. Repairing the File System
File Command Reference
Command Hierarchy
File Commands
Command Descriptions
File System Commands
File Commands
4. Boot Options
4.1. In This Chapter
4.2. System Initialization
4.2.1. Configuration and Image Loading
4.2.1.1. Persistence
4.2.1.2. Lawful Intercept
4.2.1.3. FIPS-140-2 Mode
4.3. Initial System Startup Process Flow
4.4. Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Parameters
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting BOF Parameters
Saving a Configuration to a Different Filename
Rebooting
BOF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
File Management Commands
BOF Processing Control
Console Port Configuration
Image and Configuration Management
Management Ethernet Configuration
DNS Configuration Commands
BOF Show Command Reference
Command Hierarchies
Command Descriptions
BOF Show Commands
5. System Management
5.1. In This Chapter
5.2. System Management Parameters
5.2.1. System Information
5.2.1.1. System Name
5.2.1.2. System Contact
5.2.1.3. System Location
5.2.1.4. System Coordinates
5.2.1.5. Naming Objects
5.2.1.6. Common Language Location Identifier
5.2.1.7. DNS Security Extensions
5.2.2. System Time
5.2.2.1. Time Zones
5.2.2.2. Network Time Protocol (NTP)
5.2.2.3. SNTP Time Synchronization
5.2.2.4. CRON
5.3. High Availability
5.3.1. HA Features
5.3.1.1. Redundancy
5.3.1.1.1. Software Redundancy
5.3.1.1.2. Configuration Redundancy
5.3.1.1.3. Component Redundancy
5.3.1.1.4. Service Redundancy
5.3.1.1.5. Accounting Configuration Redundancy
5.3.1.2. Nonstop Forwarding
5.3.1.3. Nonstop Routing (NSR)
5.3.1.4. CPM Switchover
5.3.1.5. Synchronization
5.3.1.5.1. Configuration and boot-env Synchronization
5.3.1.5.2. State Database Synchronization
5.4. Synchronization and Redundancy
5.4.1. Active and Standby Designations
5.4.2. When the Active CPM Goes Offline
5.4.3. OOB Management Ethernet Port Redundancy
5.4.4. Persistence
5.4.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
5.5. Network Synchronization
5.5.1. Central Synchronization Sub-System
5.5.2. 7950 XRS-40 Extension Chassis Central Clocks
5.5.3. Synchronization Status Messages (SSM)
5.5.3.1. DS1 Signals
5.5.3.2. E1 Signals
5.5.3.3. SONET/SDH Signals
5.5.3.4. DS3/E3
5.5.4. Synchronous Ethernet
5.5.5. Clock Source Quality Level Definitions
5.5.6. IEEE 1588v2 PTP
5.5.6.1. PTP Clock Synchronization
5.5.6.2. Performance Considerations
5.5.6.2.1. Port-Based Timestamping of PTP Messages
5.5.6.3. PTP Capabilities
5.5.6.4. PTP Ordinary Slave Clock For Frequency
5.5.6.5. PTP Ordinary Master Clock For Frequency
5.5.6.6. PTP Boundary Clock for Frequency and Time
5.5.6.7. PTP Clock Redundancy
5.5.6.8. PTP Time for System Time and OAM Time
5.5.6.9. PTP within Routing Instances
5.6. System-Wide ATM Parameters
5.7. Link Layer Discovery Protocol (LLDP)
5.8. IP Hashing as an LSR
5.9. Ethernet Satellites
5.9.1. Software Repositories for Satellites
5.9.2. Satellite Software Upgrade Overview
5.9.3. Satellite Configuration
5.9.3.1. Satellite Client Port Association
5.10. Optical Extension Shelf (OES)
5.11. Administrative Tasks
5.11.1. Configuring the Chassis Mode
5.11.2. Saving Configurations
5.11.3. Specifying Post-Boot Configuration Files
5.11.4. Network Timing
5.11.5. Power Supplies
5.11.6. Automatic Synchronization
5.11.6.1. Boot-Env Option
5.11.6.2. Config Option
5.11.7. Manual Synchronization
5.11.7.1. Forcing a Switchover
5.12. System Router Instances
5.13. System Configuration Process Overview
5.14. Configuration Notes
5.14.1. General
Configuring System Management with CLI
System Management
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Conditions
NTP
Broadcastclient
SNTP
CRON
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Mixed Mode
Enabling Mixed Mode on a 7450 System
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Synchronization Commands
System Administration (Admin) Commands
High Availability (Redundancy) Commands
LLDP System Commands
LLDP Ethernet Port Commands
Optical Extension Shelf (OES) Commands
System Router Instance Commands
System Command Reference
Generic Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
Date and Time Commands
Network Time Protocol Commands
SNTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Synchronization Configuration Commands
System Administration Commands
Redundancy Commands
Peer Commands
Multi-Chassis Endpoint Commands
MC-LAG Commands
Multi-Chassis Ring Commands
LLDP System Commands
LLDP Ethernet Port Commands
Optical Extension Shelf (OES) Commands
System Router Instance Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Audience
1.2. In This Chapter
1.3. Router System Configuration Process
2. CLI Usage
2.1. In This Chapter
2.2. CLI Structure
2.3. Navigating in the CLI
2.3.1. CLI Contexts
2.3.2. Basic CLI Commands
2.3.3. CLI Environment Commands
2.3.4. CLI Monitor Commands
2.4. Getting Help in the CLI
2.5. The CLI Command Prompt
2.6. Displaying Configuration Contexts
2.7. EXEC Files
2.8. CLI Script Control
2.9. Entering CLI Commands
2.9.1. Command Completion
2.9.2. Unordered and Unnamed Parameters
2.9.3. Editing Keystrokes
2.9.4. Absolute Paths
2.9.5. History
2.9.6. Entering Numerical Ranges
2.9.7. Pipe/Match
2.9.8. Pipe/Count
2.9.9. Redirection
2.10. VI Editor
2.10.1. Summary of vi Commands
2.10.2. Using the vi Commands
2.10.3. EX Commands
2.11. Configuration Rollback
2.11.1. Feature Behavior
2.11.2. Rollback and SNMP
2.11.3. Rescue Configuration
2.11.4. Operational Guidelines
2.12. Transactional Configuration
2.12.1. Basic Operation
2.12.2. Transactions and Rollback
2.12.3. Authorization
Basic CLI Command Reference
Command Hierarchies
Global Commands
Monitor Commands
Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Command Descriptions
Global Commands
Monitor CLI Commands
CLI Environment Commands
Candidate Commands
Rollback Commands
Management Infrastructure Control Commands
Show Commands
3. File System Management
3.1. In This Chapter
3.2. The File System
3.2.1. Compact Flash Devices
3.2.2. URLs
3.2.3. Wildcards
3.3. File Management Tasks
3.3.1. Modifying File Attributes
3.3.2. Creating Directories
3.3.3. Copying Files
3.3.4. Moving Files
3.3.5. Deleting Files and Removing Directories
3.3.6. Displaying Directory and File Information
3.3.7. Repairing the File System
File Command Reference
Command Hierarchy
File Commands
Command Descriptions
File System Commands
File Commands
4. Boot Options
4.1. In This Chapter
4.2. System Initialization
4.2.1. Configuration and Image Loading
4.2.1.1. Persistence
4.2.1.2. Lawful Intercept
4.2.1.3. FIPS-140-2 Mode
4.3. Initial System Startup Process Flow
4.4. Configuration Notes
Configuring Boot Options File with CLI
BOF Configuration Overview
Basic BOF Configuration
Common Configuration Tasks
Searching for the BOF
Accessing the CLI
Console Connection
Configuring BOF Parameters
Service Management Tasks
System Administration Commands
Viewing the Current Configuration
Modifying and Saving a Configuration
Deleting BOF Parameters
Saving a Configuration to a Different Filename
Rebooting
BOF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
File Management Commands
BOF Processing Control
Console Port Configuration
Image and Configuration Management
Management Ethernet Configuration
DNS Configuration Commands
BOF Show Command Reference
Command Hierarchies
Command Descriptions
BOF Show Commands
5. System Management
5.1. In This Chapter
5.2. System Management Parameters
5.2.1. System Information
5.2.1.1. System Name
5.2.1.2. System Contact
5.2.1.3. System Location
5.2.1.4. System Coordinates
5.2.1.5. Naming Objects
5.2.1.6. Common Language Location Identifier
5.2.1.7. DNS Security Extensions
5.2.2. System Time
5.2.2.1. Time Zones
5.2.2.2. Network Time Protocol (NTP)
5.2.2.3. SNTP Time Synchronization
5.2.2.4. CRON
5.3. High Availability
5.3.1. HA Features
5.3.1.1. Redundancy
5.3.1.1.1. Software Redundancy
5.3.1.1.2. Configuration Redundancy
5.3.1.1.3. Component Redundancy
5.3.1.1.4. Service Redundancy
5.3.1.1.5. Accounting Configuration Redundancy
5.3.1.2. Nonstop Forwarding
5.3.1.3. Nonstop Routing (NSR)
5.3.1.4. CPM Switchover
5.3.1.5. Synchronization
5.3.1.5.1. Configuration and boot-env Synchronization
5.3.1.5.2. State Database Synchronization
5.4. Synchronization and Redundancy
5.4.1. Active and Standby Designations
5.4.2. When the Active CPM Goes Offline
5.4.3. OOB Management Ethernet Port Redundancy
5.4.4. Persistence
5.4.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
5.5. Network Synchronization
5.5.1. Central Synchronization Sub-System
5.5.2. 7950 XRS-40 Extension Chassis Central Clocks
5.5.3. Synchronization Status Messages (SSM)
5.5.3.1. DS1 Signals
5.5.3.2. E1 Signals
5.5.3.3. SONET/SDH Signals
5.5.3.4. DS3/E3
5.5.4. Synchronous Ethernet
5.5.5. Clock Source Quality Level Definitions
5.5.6. IEEE 1588v2 PTP
5.5.6.1. PTP Clock Synchronization
5.5.6.2. Performance Considerations
5.5.6.2.1. Port-Based Timestamping of PTP Messages
5.5.6.3. PTP Capabilities
5.5.6.4. PTP Ordinary Slave Clock For Frequency
5.5.6.5. PTP Ordinary Master Clock For Frequency
5.5.6.6. PTP Boundary Clock for Frequency and Time
5.5.6.7. PTP Clock Redundancy
5.5.6.8. PTP Time for System Time and OAM Time
5.5.6.9. PTP within Routing Instances
5.6. System-Wide ATM Parameters
5.7. Link Layer Discovery Protocol (LLDP)
5.8. IP Hashing as an LSR
5.9. Ethernet Satellites
5.9.1. Software Repositories for Satellites
5.9.2. Satellite Software Upgrade Overview
5.9.3. Satellite Configuration
5.9.3.1. Satellite Client Port Association
5.10. Optical Extension Shelf (OES)
5.11. Administrative Tasks
5.11.1. Configuring the Chassis Mode
5.11.2. Saving Configurations
5.11.3. Specifying Post-Boot Configuration Files
5.11.4. Network Timing
5.11.5. Power Supplies
5.11.6. Automatic Synchronization
5.11.6.1. Boot-Env Option
5.11.6.2. Config Option
5.11.7. Manual Synchronization
5.11.7.1. Forcing a Switchover
5.12. System Router Instances
5.13. System Configuration Process Overview
5.14. Configuration Notes
5.14.1. General
Configuring System Management with CLI
System Management
Saving Configurations
Basic System Configuration
Common Configuration Tasks
System Information
System Information Parameters
Name
Contact
Location
CLLI Code
Coordinates
System Time Elements
Zone
Summer Time Conditions
NTP
Broadcastclient
SNTP
CRON
ANCP Enhancements
Configuring Synchronization and Redundancy
Configuring Persistence
Configuring Synchronization
Configuring Manual Synchronization
Forcing a Switchover
Configuring Synchronization Options
Configuring Multi-Chassis Redundancy for LAG
Configuring Mixed Mode
Enabling Mixed Mode on a 7450 System
Configuring Power Supply Parameters
Configuring ATM System Parameters
Configuring Backup Copies
Post-Boot Configuration Extension Files
Show Command Output and Console Messages
System Timing
Edit Mode
Configuring Timing References
Using the Revert Command
Other Editing Commands
Forcing a Specific Reference
Configuring System Monitoring Thresholds
Creating Events
System Alarm Contact Inputs
Configuring LLDP
System Command Reference
Command Hierarchies
Configuration Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Synchronization Commands
System Administration (Admin) Commands
High Availability (Redundancy) Commands
LLDP System Commands
LLDP Ethernet Port Commands
Optical Extension Shelf (OES) Commands
System Router Instance Commands
System Command Reference
Generic Commands
System Information Commands
System Alarm Contact Input Commands
System Threshold Alarm Commands
Mixed Mode Configuration Commands
Persistence Commands
PTP Commands
Date and Time Commands
Network Time Protocol Commands
SNTP Commands
System Time Commands
Cron Commands
Script Control Commands
System Synchronization Configuration Commands
System Administration Commands
Redundancy Commands
Peer Commands
Multi-Chassis Endpoint Commands
MC-LAG Commands
Multi-Chassis Ring Commands
LLDP System Commands
LLDP Ethernet Port Commands
Optical Extension Shelf (OES) Commands
System Router Instance Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Debug Commands
Tools Commands
Clear Commands
Standards and Protocol Support
Customer Document and Product Support
Gx AVPs Reference Guide R14.0.R4
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. ALU-Specific AVPs
1.2.5. ALU-Specific VSAs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. ALU-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
Standards and Protocol Support
Customer Document and Product Support
1. Gx AVP
1.1. In This Section
1.2. AVPs
1.2.1. Reserved Keywords in the 7750 SR
1.2.2. Standard Diameter AVPs
1.2.3. Standard Diameter AVPs (format)
1.2.4. ALU-Specific AVPs
1.2.5. ALU-Specific VSAs (format)
1.2.6. Diameter-Based AVP Applicability
1.2.7. Gx AVP Applicability
1.2.8. ALU-Specific AVP Applicability
1.2.9. Result Codes (Result-Code AVP)
1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
1.2.11. Event Triggers (Event-Trigger AVP)
1.2.12. Termination Causes (Termination-Cause AVP)
Standards and Protocol Support
Customer Document and Product Support
Interface Configuration Guide R14.0.R4
1.
Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2.
Interfaces
2.1. In This Chapter
2.2. Configuration Overview
2.2.1. Chassis Slots and Cards
2.2.2. MCMs
2.2.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
2.2.4. XMAs/C-XMAs
2.2.5. CMAs
2.2.6. Versatile Service Module (VSM)
2.2.7. Oversubscribed Ethernet MDAs
2.2.7.1. Rate Limiting
2.2.7.2. Packet Classification and Scheduling
2.2.8. Channelized MDA/CMA Support
2.2.8.1. Channelized DS-1/E-1 CMA
2.2.8.2. Channelized DS-3/E-3 CMA
2.2.8.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.2.8.4. Channelized OC-12/STM-4 ASAP MDAs
2.2.8.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.2.8.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.2.8.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
2.2.8.8. Network Interconnections
2.3. Digital Diagnostics Monitoring
2.3.1. SFPs and XFPs
2.3.2. Statistics Collection
2.4. Ports
2.4.1. Port Types
2.4.2. Port Features
2.4.2.1. Port State and Operational State
2.4.2.2. 802.1x Network Access Control
2.4.2.2.1. 802.1x Modes
2.4.2.2.2. 802.1x Basics
2.4.2.2.3. 802.1x Timers
2.4.2.2.4. 802.1x Tunneling
2.4.2.2.5. 802.1x Configuration and Limitations
2.4.2.3. SONET/SDH Port Attributes
2.4.2.4. SONET/SDH Path Attributes
2.4.2.5. Multilink Frame Relay
2.4.2.5.1. MLFR Bundle Data Plane
2.4.2.5.2. MLFR Bundle Link Integrity Protocol
2.4.2.6. FRF.12 End-to-End Fragmentation
2.4.2.6.1. SAP Fragment Interleaving Option
2.4.2.7. FRF.12 UNI/NNI Link Fragmentation
2.4.2.8. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.4.2.9. Multilink Point-to-Point Protocol (MLPPP)
2.4.2.9.1. Protocol Field (PID)
2.4.2.9.2. B & E Bits
2.4.2.9.3. Sequence Number
2.4.2.9.4. Information Field
2.4.2.9.5. Padding
2.4.2.9.6. FCS
2.4.2.9.7. LCP
2.4.2.9.8. Link Fragmentation and Interleaving Support
2.4.2.10. Multi-Class MLPPP
2.4.2.10.1. QoS in MC-MLPPP
2.4.2.11. Cisco HDLC
2.4.2.11.1. SLARP
2.4.2.11.2. SONET/SDH Scrambling and C2-Byte
2.4.2.11.3. Timers
2.4.2.12. Automatic Protection Switching (APS)
2.4.2.12.1. Single Chassis and Multi-Chassis APS
2.4.2.12.2. APS Switching Modes
2.4.2.12.3. APS Channel and SONET Header K Bytes
2.4.2.12.4. Revertive Switching
2.4.2.12.5. Bidirectional 1+1 Switchover Operation Example
2.4.2.12.6. Annex B (1+1 Optimized) Operation
2.4.2.12.7. Protection of Upper Layer Protocols and Services
2.4.2.12.8. APS User-Initiated Requests
2.4.2.12.9. APS and SNMP
2.4.2.12.10. APS Applicability, Restrictions and Interactions
2.4.2.12.11. Sample APS Applications
2.4.2.13. Inverse Multiplexing Over ATM (IMA)
2.4.2.13.1. Inverse Multiplexing over ATM (IMA) Features
2.4.2.14. Ethernet Local Management Interface (E-LMI)
2.4.2.15. Link Layer Discovery Protocol (LLDP)
2.4.2.15.1. LLDP Protocol Features
2.4.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. Caveats
2.5.3. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.3.1. Operational State
2.5.4. PXC Sub-Ports
2.5.4.1. PXC Sub-Port Operational State
2.5.5. Port Statistics
2.5.5.1. Statistics on Physical PXC Ports
2.5.6. LAG with PXC Ports – PXC LAG
2.5.7. Basic PXC Provisioning
2.5.8. QoS
2.5.8.1. Queue Allocation on PXC Sub-Ports
2.5.8.2. Pool Allocations on PXC Ports
2.5.8.3. QoS Summary
2.5.9. Mirroring and LI on PXC Ports
2.5.10. Multi-Chassis Redundancy
2.5.11. Health Monitoring on the PXC Sub-Ports
2.5.12. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Link Placement
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.4.5.6. LSR Default Hash Routine— Label-Only Hash Option
2.7.4.5.7. LSR Label-IP Hash Option Enabled
2.7.4.5.8. LSR IP-Only Hash Option Enabled
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. Mixed Port-Speed LAG Support
2.7.7.1. LAG Upgrade
2.7.8. Multi-Chassis LAG
2.7.8.1. Overview
2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Configuring SFM5-12e Fabric Speed
2.14.1. fabric-speed-a
2.14.2. fabric-speed-b
2.15. Configuration Process Overview
2.16. Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring Cards, MCMs and MDAs
Configuring Cards and CMAs
Configuring Forwarding Plane Parameters
Configuring MDA Access and Network Pool Parameters
Configuring MDA Policies for Named Pools Mode
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Configuring APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Configuring Cpipe Port Parameters
Configuring a DS1 Port
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring a Channelized DS1 Card
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Service Management Tasks
Modifying or Deleting an MDA, MCM, CMA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Configuration Command Reference
Command Hierarchies
Card Commands
MCM Commands
MDA Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane (FP) Commands
Port Configuration Commands
Port XC Commands
Forwarding Path Extension (FPE) Commands
Port APS Commands
Ethernet Commands
Interface Group Handler Commands
Multilink Bundle Commands
SONET-SDH Commands
TDM Commands
DS3 Commands
E1 Commands
E3 Commands
LAG Commands
Ethernet Tunnel Commands
Multi-Chassis Redundancy Commands
Forward Path Extension Commands
Configuration Command Descriptions
Generic Commands
Card Commands
MCM Commands
MDA (XMA) Commands
MDA/Port QoS Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane Configuration Commands
General Port Commands
Port XC Commands
Forwarding Path Extention (FPE) Commands
APS Commands
Ethernet Port Commands
802.1x Port Commands
LLDP Port Commands
Network Port Commands
Interface Group Handler Commands
Multilink-Bundle Port Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
ATM Interface Commands
Frame Relay Commands
TDM Commands
LAG Commands
Eth Tunnel Commands
ETH-CFM Configuration Commands
Multi-Chassis Redundancy Commands
MC Endpoint Commands
MC LAG Commands
Multi-Chassis Ring Commands
Forwarding Plane Tools Commands
Forward Path Extension Commands
Show, Monitor, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Hardware Show Commands
PEQ Show Commands
APS Show Commands
Port Show Commands
Multilink Bundle Show Commands
LAG Show Commands
Monitor Commands
Clear Commands
Tools Commands
Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
1.
Getting Started
1.1. About This Guide
1.2. Interface Configuration Process
2.
Interfaces
2.1. In This Chapter
2.2. Configuration Overview
2.2.1. Chassis Slots and Cards
2.2.2. MCMs
2.2.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
2.2.4. XMAs/C-XMAs
2.2.5. CMAs
2.2.6. Versatile Service Module (VSM)
2.2.7. Oversubscribed Ethernet MDAs
2.2.7.1. Rate Limiting
2.2.7.2. Packet Classification and Scheduling
2.2.8. Channelized MDA/CMA Support
2.2.8.1. Channelized DS-1/E-1 CMA
2.2.8.2. Channelized DS-3/E-3 CMA
2.2.8.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
2.2.8.4. Channelized OC-12/STM-4 ASAP MDAs
2.2.8.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
2.2.8.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
2.2.8.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
2.2.8.8. Network Interconnections
2.3. Digital Diagnostics Monitoring
2.3.1. SFPs and XFPs
2.3.2. Statistics Collection
2.4. Ports
2.4.1. Port Types
2.4.2. Port Features
2.4.2.1. Port State and Operational State
2.4.2.2. 802.1x Network Access Control
2.4.2.2.1. 802.1x Modes
2.4.2.2.2. 802.1x Basics
2.4.2.2.3. 802.1x Timers
2.4.2.2.4. 802.1x Tunneling
2.4.2.2.5. 802.1x Configuration and Limitations
2.4.2.3. SONET/SDH Port Attributes
2.4.2.4. SONET/SDH Path Attributes
2.4.2.5. Multilink Frame Relay
2.4.2.5.1. MLFR Bundle Data Plane
2.4.2.5.2. MLFR Bundle Link Integrity Protocol
2.4.2.6. FRF.12 End-to-End Fragmentation
2.4.2.6.1. SAP Fragment Interleaving Option
2.4.2.7. FRF.12 UNI/NNI Link Fragmentation
2.4.2.8. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
2.4.2.9. Multilink Point-to-Point Protocol (MLPPP)
2.4.2.9.1. Protocol Field (PID)
2.4.2.9.2. B & E Bits
2.4.2.9.3. Sequence Number
2.4.2.9.4. Information Field
2.4.2.9.5. Padding
2.4.2.9.6. FCS
2.4.2.9.7. LCP
2.4.2.9.8. Link Fragmentation and Interleaving Support
2.4.2.10. Multi-Class MLPPP
2.4.2.10.1. QoS in MC-MLPPP
2.4.2.11. Cisco HDLC
2.4.2.11.1. SLARP
2.4.2.11.2. SONET/SDH Scrambling and C2-Byte
2.4.2.11.3. Timers
2.4.2.12. Automatic Protection Switching (APS)
2.4.2.12.1. Single Chassis and Multi-Chassis APS
2.4.2.12.2. APS Switching Modes
2.4.2.12.3. APS Channel and SONET Header K Bytes
2.4.2.12.4. Revertive Switching
2.4.2.12.5. Bidirectional 1+1 Switchover Operation Example
2.4.2.12.6. Annex B (1+1 Optimized) Operation
2.4.2.12.7. Protection of Upper Layer Protocols and Services
2.4.2.12.8. APS User-Initiated Requests
2.4.2.12.9. APS and SNMP
2.4.2.12.10. APS Applicability, Restrictions and Interactions
2.4.2.12.11. Sample APS Applications
2.4.2.13. Inverse Multiplexing Over ATM (IMA)
2.4.2.13.1. Inverse Multiplexing over ATM (IMA) Features
2.4.2.14. Ethernet Local Management Interface (E-LMI)
2.4.2.15. Link Layer Discovery Protocol (LLDP)
2.4.2.15.1. LLDP Protocol Features
2.4.3. Per Port Aggregate Egress Queue Statistics Monitoring
2.5. Port Cross-Connect (PXC)
2.5.1. PXC Terminology
2.5.2. Caveats
2.5.3. PXC - Physical Port in Cross-Connect (Loopback) Mode
2.5.3.1. Operational State
2.5.4. PXC Sub-Ports
2.5.4.1. PXC Sub-Port Operational State
2.5.5. Port Statistics
2.5.5.1. Statistics on Physical PXC Ports
2.5.6. LAG with PXC Ports – PXC LAG
2.5.7. Basic PXC Provisioning
2.5.8. QoS
2.5.8.1. Queue Allocation on PXC Sub-Ports
2.5.8.2. Pool Allocations on PXC Ports
2.5.8.3. QoS Summary
2.5.9. Mirroring and LI on PXC Ports
2.5.10. Multi-Chassis Redundancy
2.5.11. Health Monitoring on the PXC Sub-Ports
2.5.12. Configuration Example
2.6. Forwarding Path Extensions (FPE)
2.7. LAG
2.7.1. LACP
2.7.1.1. LACP Multiplexing
2.7.2. Active-Standby LAG Operation
2.7.3. LAG on Access QoS Consideration
2.7.3.1. Adapt QoS Modes
2.7.3.2. Per-fp-ing-queuing
2.7.3.3. Per-fp-egr-queuing
2.7.3.4. Per-fp-sap-instance
2.7.4. LAG and ECMP Hashing
2.7.4.1. Per Flow Hashing
2.7.4.1.1. Changing Default Per Flow Hashing Inputs
2.7.4.2. Per Link Hashing
2.7.4.2.1. Weighted per-link-hash
2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
2.7.4.4. Consistent Per Service Hashing
2.7.4.5. ESM – LAG Hashing per Vport
2.7.4.5.1. Background
2.7.4.5.2. Hashing per Vport
2.7.4.5.3. Link Placement
2.7.4.5.4. Multicast Consideration
2.7.4.5.5. VPLS and Capture SAP Considerations
2.7.4.5.6. LSR Default Hash Routine— Label-Only Hash Option
2.7.4.5.7. LSR Label-IP Hash Option Enabled
2.7.4.5.8. LSR IP-Only Hash Option Enabled
2.7.5. LAG Hold Down Timers
2.7.6. BFD over LAG Links
2.7.7. Mixed Port-Speed LAG Support
2.7.7.1. LAG Upgrade
2.7.8. Multi-Chassis LAG
2.7.8.1. Overview
2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
2.8. G.8031 Protected Ethernet Tunnels
2.9. G.8032 Protected Ethernet Rings
2.10. Ethernet Port Monitoring
2.11. 802.3ah OAM
2.11.1. OAM Events
2.11.1.1. Link Monitoring
2.11.1.1.1. Capability Advertising
2.11.2. Remote Loopback
2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
2.11.3.1. 802.3ah Grace Announcement
2.12. MTU Configuration Guidelines
2.12.1. Default MTU Values
2.12.2. Modifying MTU Defaults
2.12.3. Configuration Example
2.13. Deploying Preprovisioned Components
2.14. Configuring SFM5-12e Fabric Speed
2.14.1. fabric-speed-a
2.14.2. fabric-speed-b
2.15. Configuration Process Overview
2.16. Configuration Notes
Configuring Physical Ports with CLI
Preprovisioning Guidelines
Predefining Entities
Preprovisioning a Port
Maximizing Bandwidth Use
Basic Configuration
Common Configuration Tasks
Configuring Cards and MDAs
Configuring Cards, MCMs and MDAs
Configuring Cards and CMAs
Configuring Forwarding Plane Parameters
Configuring MDA Access and Network Pool Parameters
Configuring MDA Policies for Named Pools Mode
Configuring Ports
Configuring Port Pool Parameters
Changing Hybrid-Buffer-Allocation
Configuring APS Parameters
Configuring Ethernet Port Parameters
Ethernet Network Port
Ethernet Access Port
Configuring 802.1x Authentication Port Parameters
Configuring SONET/SDH Port Parameters
SONET/SDH Network Port
SONET/SDH Access Port
Configuring Channelized Ports
Verify the MDA Type
Configuring a Channelized DS3 Port
Configuring a Channelized OC-12-SFP Port
Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
Configuring Cisco HDLC on a Channelized Port
Configuring Channelized STM1/OC3 Parameters
Configuring Cpipe Port Parameters
Configuring a DS1 Port
Configuring ATM SAPs
ATM SAP in an IES Service
ATM SAP in an Epipe Service
Configuring DWDM Port Parameters
Configuring WaveTracker Parameters
Configuring OTU Port Parameters
Configuring ATM Interface Parameters
PLCP/Direct Mapping
ATM Interface Configurations
Configuring Frame Relay Parameters
SONET/SDH Interfaces
Configuring Multilink PPP Bundles
Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
IMA Bundles
Multi-Class MLPPP
IMA Test Procedure
Configuring Bundle Protection Group Ports
Configuring a Channelized DS1 Card
Configuring LAG Parameters
Configuring BFD on LAG Links
Configuring G.8031 Protected Ethernet Tunnels
Service Management Tasks
Modifying or Deleting an MDA, MCM, CMA or XMA
Modifying a Card Type
Deleting a Card
Deleting Port Parameters
Soft IOM Reset
Soft Reset
Deferred MDA Reset
Configuration Command Reference
Command Hierarchies
Card Commands
MCM Commands
MDA Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane (FP) Commands
Port Configuration Commands
Port XC Commands
Forwarding Path Extension (FPE) Commands
Port APS Commands
Ethernet Commands
Interface Group Handler Commands
Multilink Bundle Commands
SONET-SDH Commands
TDM Commands
DS3 Commands
E1 Commands
E3 Commands
LAG Commands
Ethernet Tunnel Commands
Multi-Chassis Redundancy Commands
Forward Path Extension Commands
Configuration Command Descriptions
Generic Commands
Card Commands
MCM Commands
MDA (XMA) Commands
MDA/Port QoS Commands
Power Commands
Virtual Scheduler Commands
Forwarding Plane Configuration Commands
General Port Commands
Port XC Commands
Forwarding Path Extention (FPE) Commands
APS Commands
Ethernet Port Commands
802.1x Port Commands
LLDP Port Commands
Network Port Commands
Interface Group Handler Commands
Multilink-Bundle Port Commands
SONET/SDH Port Commands
SONET/SDH Path Commands
ATM Interface Commands
Frame Relay Commands
TDM Commands
LAG Commands
Eth Tunnel Commands
ETH-CFM Configuration Commands
Multi-Chassis Redundancy Commands
MC Endpoint Commands
MC LAG Commands
Multi-Chassis Ring Commands
Forwarding Plane Tools Commands
Forward Path Extension Commands
Show, Monitor, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Hardware Show Commands
PEQ Show Commands
APS Show Commands
Port Show Commands
Multilink Bundle Show Commands
LAG Show Commands
Monitor Commands
Clear Commands
Tools Commands
Debug Commands
3. Standards and Protocol Support
Customer Document and Product Support
Layer 2 Services and EVPN Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
VLL Services
2.1. In This Chapter
2.2. ATM VLL (Apipe) Services
2.2.1. ATM VLL For End-to-End ATM Service
2.2.2. ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
2.2.3. Traffic Management Support
2.2.3.1. Ingress Network Classification
2.2.3.2. Ingress Queuing and Shaping on the IOM
2.2.3.3. Egress Queuing and Shaping on the IOM
2.2.3.4. Egress Shaping/Scheduling
2.3. Circuit Emulation Services (Cpipe)
2.3.1. Mobile Infrastructure
2.3.2. Circuit Emulation Modes
2.3.3. Circuit Emulation Parameters
2.3.3.1. Circuit Emulation Modes
2.3.3.2. Absolute Mode Option
2.3.3.3. Payload Size
2.3.3.4. Jitter Buffer
2.3.3.5. CES Circuit Operation
2.3.4. Services for Transporting CES Circuits
2.3.5. Network Synchronization Considerations
2.3.6. Cpipe Payload
2.4. Ethernet Pipe (Epipe) Services
2.4.1. Epipe Service Overview
2.4.2. Epipe Service Pseudo-wire VLAN Tag Processing
2.4.3. Epipe Up Operational State Configuration Option
2.4.4. Epipe with PBB
2.4.5. Epipe over L2TPv3
2.4.6. Ethernet Interworking VLL
2.4.7. VLL CAC
2.4.8. MC-Ring and VLL
2.5. Frame Relay VLL (Fpipe) Services
2.5.1. Frame Relay VLL
2.5.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.5.3. Traffic Management Support
2.5.3.1. Frame Relay Traffic Management
2.5.3.2. Ingress SAP Classification and Marking
2.5.3.3. Egress Network EXP Marking
2.5.3.4. Ingress Network Classification
2.6. IP Interworking VLL (Ipipe) Services
2.6.1. Ipipe VLL
2.6.2. IP Interworking VLL Datapath
2.6.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.6.3.1. VLL Ethernet SAP Procedures
2.6.3.1.1. VLL FR SAP Procedures
2.6.3.1.2. VLL ATM SAP Procedures
2.6.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.6.4. IPv6 Support on IP Interworking VLL
2.6.4.1. IPv6 Datapath Operation
2.6.4.2. IPv6 Stack Capability Signaling
2.7. Services Configuration for MPLS-TP
2.7.1. MPLS-TP SDPs
2.7.2. VLL Spoke SDP Configuration
2.7.2.1. Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
2.7.3. Configuring MPLS-TP Lock Instruct and Loopback
2.7.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.7.3.2. Lock PW End-Point Model
2.7.3.3. PW Redundancy and Lock Instruct and Loopback
2.7.3.4. Configuring a Test SAP for an MPLS-TP PW
2.7.3.5. Configuring an Administrative Lock
2.7.3.6. Configuring a Loopback
2.8. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.8.1. VCCV BVD Support
2.8.2. VCCV BFD Encapsulation on a Pseudo-wire
2.8.3. BFD Session Operation
2.8.4. Configuring VCCV BFD
2.9. Pseudo-wire Switching
2.9.1. Pseudo-wire Switching with Protection
2.9.2. Pseudo-wire Switching Behavior
2.9.3. Static-to-Dynamic Pseudo-wire Switching
2.9.4. Ingress VLAN Swapping
2.9.4.1. Ingress VLAN Translation
2.9.5. Pseudo-wire Redundancy
2.9.6. Dynamic Multi-Segment Pseudo-wire Routing
2.9.6.1. Overview
2.9.6.2. Pseudo-wire Routing
2.9.6.2.1. Static Routing
2.9.6.2.2. Explicit Paths
2.9.6.3. Configuring VLLs using Dynamic MS-PWs
2.9.6.3.1. Active/Passive T-PE Selection
2.9.6.3.2. Automatic Endpoint Configuration
2.9.6.3.3. Selecting a Path for an MS-PW
2.9.6.3.4. Pseudo-wire Templates
2.9.6.4. Pseudo-wire Redundancy
2.9.6.5. VCCV OAM for Dynamic MS-PWs
2.9.6.6. VCCV-Ping on Dynamic MS-PWs
2.9.6.7. VCCV-Trace on Dynamic MS-PWs
2.9.7. Example Dynamic MS-PW Configuration
2.9.8. VLL Resilience with Two Destination PE Nodes
2.9.8.1. Master-Slave Operation
2.9.8.1.1. Interaction with SAP-Specific OAM
2.9.8.1.2. Local Rules at Slave VLL PE
2.9.8.1.3. Operation of Master-Slave Pseudo-wire Redundancy with Existing Scenarios
2.9.8.1.4. VLL Resilience for a Switched Pseudo-wire Path
2.9.9. Pseudo-wire SAPs
2.9.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.9.10.1. Operational Overview
2.9.10.2. Detailed Operation
2.9.10.2.1. Sample Operation of G.8031 BGP-MH
2.9.10.3. BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
2.9.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.9.10.5. PW Redundancy for BGP MH Site Support for Ethernet Tunnels
2.9.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.9.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.9.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.9.10.6.3. Operation for BGP MH Site Support for Ethernet Tunnels
2.9.11. Access Node Resilience Using MC-LAG and Pseudo-wire Redundancy
2.9.12. VLL Resilience for a Switched Pseudo-wire Path
2.10. Pseudo-wire Redundancy Service Models
2.10.1. Redundant VLL Service Model
2.10.2. T-LDP Status Notification Handling Rules
2.10.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.10.2.2. Processing and Merging
2.11. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.11.1. Primary Spoke-SDP Fallback to Secondary SAP
2.11.2. Reversion to Primary Spoke SDP Path
2.11.3. MC-APS and MC-LAG
2.11.3.1. Failure Scenarios
2.12. VLL Using G.8031 Protected Ethernet Tunnels
2.13. MPLS Entropy Label and Hash Label
2.14. BGP Virtual Private Wire Service (VPWS)
2.14.1. Single-Homed BGP VPWS
2.14.2. Dual-Homed BGP VPWS
2.14.3. BGP VPWS Pseudo-wire Switching
2.14.3.1. Pseudo-wire Signaling
2.14.3.2. BGP VPWS Configuration Procedure
2.14.3.3. Use of Pseudo-wire Template for BGP VPWS
2.14.3.4. Use of Endpoint for BGP VPWS
2.15. VLL Service Considerations
2.15.1. SDPs
2.15.1.1. SDP Statistics for VPLS and VLL Services
2.15.2. SAP Encapsulations and Pseudo-wire Types
2.15.2.1. PWE3 N-to-1 Cell Mode
2.15.2.2. PWE3 AAL5 SDU Mode
2.15.2.3. QoS Policies
2.15.2.4. Filter Policies
2.15.2.5. MAC Resources
Configuring a VLL Service with CLI
Basic Configurations
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring Cpipe SAPs and Spoke SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Distributed Epipe SAPs
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke SDP Control Words
Same Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-Enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-Enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
VLL Service Configuration Command Reference
Command Hierarchies
Apipe Service Configuration Commands
Related Apipe Commands
Connection Profile Commands
Cpipe Service Configuration Commands
Epipe Service Configuration Commands
Epipe Global Commands
Epipe SAP Configuration Commands
Epipe Spoke SDP Configuration Commands
Template Commands
Fpipe Service Configuration Commands
Ipipe Service Configuration Commands
Command Descriptions
Generic Commands
Service Commands
VLL Global Commands
VLL SAP Commands
Circuit Emulation Commands
ETH-CFM Service Commands
Service Filter and QoS Policy Commands
VLL Frame Relay Commands
VLL SDP Commands
ATM Commands
OAM Commands
Cpipe Commands
VLL SAP Commands
CPipe SDP Commands
Epipe SAP Template Commands
VLL Show Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VLL Show Commands
VLL Clear Commands
VLL Debug Commands
VLL Tools Commands
3.
Virtual Private LAN Service
3.1. In This Chapter
3.2. VPLS Service Overview
3.2.1. VPLS Packet Walkthrough
3.3. VPLS Features
3.3.1. VPLS Enhancements
3.3.2. VPLS over MPLS
3.3.3. VPLS Service Pseudo-wire VLAN Tag Processing
3.3.4. VPLS MAC Learning and Packet Forwarding
3.3.4.1. MAC Learning Protection
3.3.4.2. DEI in IEEE 802.1ad
3.3.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.3.6. Pseudo-wire Control Word
3.3.7. Table Management
3.3.7.1. FIB Size
3.3.7.2. FIB Size Alarms
3.3.7.3. Local and Remote Aging Timers
3.3.7.4. Disable MAC Aging
3.3.7.5. Disable MAC Learning
3.3.7.6. Unknown MAC Discard
3.3.7.7. VPLS and Rate Limiting
3.3.7.8. MAC Move
3.3.7.9. Auto-Learn MAC Protect
3.3.7.9.1. Operation
3.3.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.3.9. VPLS and Spanning Tree Protocol
3.3.9.1. Spanning Tree Operating Modes
3.3.9.2. Multiple Spanning Tree
3.3.9.2.1. Redundancy Access to VPLS
3.3.9.3. MSTP for QinQ SAPs
3.3.9.4. Provider MSTP
3.3.9.4.1. MSTP General Principles
3.3.9.4.2. MSTP in the SR-Series Platform
3.3.9.5. Enhancements to the Spanning Tree Protocol
3.3.9.5.1. L2PT Termination
3.3.9.5.2. BPDU Translation
3.3.9.5.3. L2PT and BPDU Translation
3.3.10. Egress Multicast Groups
3.3.10.1. Egress Multicast Group Provisioning
3.3.10.1.1. Required Common SAP Parameters
3.3.10.1.2. SAP Egress QoS Policy
3.3.10.1.3. Efficient Multicast Egress SAP Chaining
3.3.10.1.4. Mirroring and Efficient Multicast Replication
3.3.10.1.5. IOM or XCM Chain Management
3.3.10.1.6. IOM Mode B Capability
3.3.11. VPLS Redundancy
3.3.11.1. Spoke SDP Redundancy for Metro Interconnection
3.3.11.2. Spoke SDP Based Redundant Access
3.3.11.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.3.11.3.1. Fast Detection of Peer Failure using BFD
3.3.11.3.2. MC-EP Passive Mode
3.3.11.4. Support for Single Chassis Endpoint Mechanisms
3.3.11.4.1. MAC Flush Support in MC-EP
3.3.11.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.3.11.4.3. Support for Force Spoke SDP in MC-EP
3.3.11.4.4. Revertive Behavior for Primary Pseudo-wire(s) in a MC-EP
3.3.11.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.3.11.6. MAC Flush Additions for PBB VPLS
3.3.12. VPLS Access Redundancy
3.3.12.1. STP-Based Redundant Access to VPLS
3.3.12.2. Redundant Access to VPLS Without STP
3.3.13. Object Grouping and State Monitoring
3.3.13.1. VPLS Applicability — Block on VPLS a Failure
3.3.14. MAC Flush Message Processing
3.3.14.1. Dual Homing to a VPLS Service
3.3.14.2. MC-Ring and VPLS
3.3.15. ACL Next-Hop for VPLS
3.3.16. SDP Statistics for VPLS and VLL Services
3.3.17. BGP Auto-Discovery for LDP VPLS
3.3.17.1. BGP AD Overview
3.3.17.2. Information Model
3.3.17.3. FEC Element for T-LDP Signaling
3.3.17.4. BGP-AD and Target LDP (T-LDP) Interaction
3.3.17.5. SDP Usage
3.3.17.6. Automatic Creation of SDPs
3.3.17.7. Manually Provisioned SDP
3.3.17.8. Automatic Instantiation of Pseudo-wires (SDP Bindings)
3.3.17.9. Mixing Statically Configured and Auto-Discovered Pseudo-wires in a VPLS
3.3.17.10. Resiliency Schemes
3.3.18. BGP VPLS
3.3.18.1. Pseudo-wire Signaling Details
3.3.18.2. Supported VPLS Features
3.3.19. VCCV BFD Support for VPLS Services
3.3.20. BGP Multi-Homing for VPLS
3.3.20.1. Information Model and Required Extensions to L2VPN NLRI
3.3.20.2. Supported Services and Multi-Homing Objects
3.3.20.3. Blackhole Avoidance
3.3.20.3.1. MAC Flush to the Core PEs
3.3.20.3.2. Indicating non-DF status towards the access PE or CE
3.3.20.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.3.21. Multicast-Aware VPLS
3.3.21.1. IGMP Snooping for VPLS
3.3.21.2. MLD Snooping for VPLS
3.3.21.3. PIM Snooping for VPLS
3.3.21.3.1. Plain PIM Snooping
3.3.21.3.2. PIM Proxy
3.3.21.4. MAC-Based IPv6 Multicast Forwarding
3.3.21.5. PIM and IGMP/MLD Snooping Interaction
3.3.21.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.3.21.6.1. IGMP Snooping Synchronization
3.3.21.6.2. MLD Snooping Synchronization
3.3.21.6.3. PIM Snooping for IPv4 Synchronization
3.3.21.7. VPLS Multicast-Aware High Availability Features
3.3.22. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.3.23. MPLS Entropy Label and Hash Label
3.4. Routed VPLS and I-VPLS
3.4.1. IES or VPRN IP Interface Binding
3.4.1.1. Assigning a Service Name to a VPLS Service
3.4.1.2. Service Binding Requirements
3.4.1.3. Bound Service Name Assignment
3.4.1.4. Binding a Service Name to an IP Interface
3.4.1.5. Bound Service Deletion or Service Name Removal
3.4.1.6. IP Interface Attached VPLS Service Constraints
3.4.1.7. IP Interface and VPLS Operational State Coordination
3.4.2. IP Interface MTU and Fragmentation
3.4.2.1. Unicast IP Routing into a VPLS Service
3.4.3. ARP and VPLS FIB Interactions
3.4.3.1. Routed VPLS Specific ARP Cache Behavior
3.4.4. The allow-ip-int-bind VPLS Flag
3.4.4.1. Routed VPLS SAPs Only Supported on Standard Ethernet Ports
3.4.4.2. Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
3.4.4.3. Network Ports Restricted to FP2-Based Systems or IOMs
3.4.4.4. LAG Port Membership Constraints
3.4.4.5. Routed VPLS Feature Restrictions
3.4.4.6. Routed I-VPLS Feature Restrictions
3.4.5. IES IP Interface VPLS Binding and Chassis Mode Interaction
3.4.6. VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
3.4.7. Route Leaking Between Routing Contexts
3.4.7.1. Ingress LAG and FP1 to Routed VPLS Discards
3.4.8. IPv4 and IPv6 Multicast Routing Support
3.4.9. BGP Auto Discovery (BGP-AD) for Routed VPLS Support
3.4.10. Routed VPLS Caveats
3.4.10.1. VPLS SAP Ingress IP Filter Override
3.4.10.2. IP Interface Defined Egress QoS Reclassification
3.4.10.3. Remarking for VPLS and Routed Packets
3.4.10.4. 7450 Mixed Mode Chassis
3.4.10.5. IPv4 Multicast Routing
3.4.10.6. Routed VPLS Supported Routing Related Protocols
3.4.10.7. Spanning Tree and Split Horizon
3.5. VPLS Service Considerations
3.5.1. SAP Encapsulations
3.5.2. VLAN Processing
3.5.3. Ingress VLAN Swapping
3.5.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.5.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.5.4.2. Instantiate Related VLAN FIBs and Trunks in MVRP Scope
3.5.4.3. MVRP Activation of Service Connectivity
3.5.4.4. MVRP Control Plane
3.5.4.5. STP-MVRP Interaction
3.5.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.5.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.5.5. VPLS E-Tree Services
3.5.5.1. VPLS E-Tree Services Overview
3.5.5.2. Leaf-ac and Root-ac SAPs
3.5.5.3. Leaf-ac and Root-ac SDP Binds
3.5.5.4. Root-leaf-tag SAPs
3.5.5.5. Root-leaf-tag SDP Binds
3.5.5.6. Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Configuring Egress Multicast Groups
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
STP SAP Operational States
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Applying an Egress Multicast Group to a VPLS Service SAP
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke SDP Specific STP Parameters
Spoke SDP STP Operational States
Configuring VPLS Spoke SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-Enabling a VPLS Service
VPLS Service Configuration Command Reference
Command Hierarchies
Global Commands
Oper Group Commands
SAP Commands
Template Commands
Mesh SDP Commands
Spoke SDP Commands
Provider Tunnel Commands
Egress Multicast Group Commands
Routed VPLS Commands
Multi-Chassis Redundancy Commands
Command Descriptions
Generic Commands
VPLS Service Commands
VPLS Interface Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
ETH-CFM Service Commands
VPLS SAP ATM Commands
VPLS Filter and QoS Policy Commands
VPLS Template Commands
Provider Tunnel Commands
VPLS SDP Commands
SAP Subscriber Management Commands
VPLS Multicast Commands
VPLS DHCP and Anti-Spoofing Commands
Egress Multicast Group Commands
BGP Auto-Discovery Commands
Redundancy Commands
VPLS Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Show Multi-Chassis Endpoint Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VPLS Show Commands
IGMP Snooping Show Commands
IGMP Commands
Show Multi-Chassis Endpoint Commands
VPLS Clear Commands
VPLS Debug Commands
4.
IEEE 802.1ah Provider Backbone Bridging
4.1. In This Chapter
4.2. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.3. PBB Features
4.3.1. Integrated PBB-VPLS Solution
4.3.2. PBB Technology
4.3.3. PBB Mapping to Existing VPLS Configurations
4.3.4. SAP and SDP Support
4.3.4.1. PBB B-VPLS
4.3.4.2. PBB I-VPLS
4.3.5. PBB Packet Walkthrough
4.3.5.1. PBB Control Planes
4.3.6. Shortest Path Bridging MAC Mode (SPBM)
4.3.6.1. Flooding and Learning Versus Link State
4.3.6.2. SPB for B-VPLS
4.3.6.3. Control B-VPLS and User B-VPLS
4.3.6.4. Shortest Path and Single Tree
4.3.6.5. Data Path and Forwarding
4.3.6.6. SPB Ethernet OAM
4.3.6.7. SPB Levels
4.3.7. SPBM to Non-SPBM Interworking
4.3.7.1. Static MACs and Static ISIDs
4.3.7.2. Epipe Static Configuration
4.3.7.2.1. I-VPLS Static Config
4.3.7.3. SPBM ISID Policies
4.3.8. ISID Policy Control
4.3.8.1. Static ISID Advertisement
4.3.8.2. I-VPLS for Unicast Service
4.3.9. Default Behaviors
4.3.10. Example Network Configuration
4.3.10.1. Sample Configuration for Dut-A
4.3.10.1.1. Show Commands Outputs
4.3.10.1.2. Debug Commands
4.3.10.1.3. Tools Commands
4.3.10.1.4. Clear Commands
4.3.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.3.12. MMRP Support Over B-VPLS SAPs and SDPs
4.3.12.1. I-VPLS Changes and Related MMRP Behavior
4.3.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.3.12.3. Optimization for Improved Convergence Time
4.3.12.4. Controlling MRP Scope using MRP Policies
4.3.13. PBB and BGP-AD
4.3.14. PBB ELINE Service
4.3.14.1. Non-Redundant PBB Epipe Spoke Termination
4.3.15. PBB Using G.8031-Protected Ethernet Tunnels
4.3.15.1. Solution Overview
4.3.15.2. Detailed Solution Description
4.3.15.3. Detailed PBB Emulated LAG Solution Description
4.3.15.4. Support Service and Solution Combinations
4.3.16. Periodic MAC Notification
4.3.17. MAC Flush
4.3.17.1. PBB Resiliency for B-VPLS Over Pseudo-wire Infrastructure
4.3.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.3.17.1.2. PBB Blackholing Issue
4.3.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.3.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.3.18.1. Solution Description for I-VPLS Over Native PBB Core
4.3.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.3.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.3.19. BGP Multi-homing for I-VPLS
4.3.20. Access Multi-Homing over MPLS for PBB Epipes
4.3.21. PBB and IGMP/MLD Snooping
4.3.22. PBB and PIM Snooping
4.3.23. PBB QoS
4.3.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.3.23.1.1. Configuration Examples
4.3.23.1.2. Details Solution Description
4.3.24. Egress B-SAP per ISID Shaping
4.3.24.1. B-SAP Egress ISID Shaping Configuration
4.3.24.2. Provisioning Model
4.3.24.3. Egress Queue Scheduling
4.3.24.4. B-SAP per-ISID Shaping Configuration Example
4.3.25. PBB OAM
4.3.25.1. Mirroring
4.3.25.2. OAM Commands
4.3.25.3. CFM Support
4.4. Configuration Examples
4.4.1. PBB using G.8031 Protected Ethernet Tunnels
4.4.2. MC-LAG Multihoming for Native PBB
4.4.3. Access Multi-Homing over MPLS for PBB Epipes
PBB Configuration Command Reference
Command Hierarchies
Global Commands
SAP Commands
Mesh SDP Commands
Spoke SDP Commands
BGP-MH for I-VPLS Commands
Command Descriptions
VPLS Service Commands
PBB Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
PBB Show Commands
PBB Clear Commands
PBB Debug Commands
5.
Ethernet Virtual Private Networks (EVPNs)
5.1. In This Chapter
5.2. Overview
5.3. EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
5.4. EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.5. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.6. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.7. EVPN for MPLS Tunnels in ELAN Services
5.8. EVPN for MPLS Tunnels in ELINE Services
5.9. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.10. VXLAN
5.10.1. VXLAN ECMP and LAG
5.10.2. VXLAN VPLS Tag Handling
5.10.3. VXLAN MTU Considerations
5.10.4. VXLAN QoS
5.10.4.1. Ingress
5.10.4.2. Egress
5.10.5. VXLAN Ping
5.10.6. IGMP Snooping on VXLAN
5.10.7. Non-System IPv4 and IPv6 VXLAN Termination in VPLS and R-VPLS Services
5.11. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.12. EVPN for VXLAN in VPLS Services
5.12.1. Resiliency and BGP Multi-Homing
5.12.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
5.12.3. Use of the unknown-mac-route
5.13. EVPN for VXLAN in R-VPLS Services
5.14. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.15. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.16. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.16.1. XMPP Interface on the DC GW
5.16.2. Overview of the Static-Dynamic VSD Integration Model
5.16.2.1. Step 1
5.16.2.2. Step 2
5.16.2.3. Step 3
5.16.2.4. Step 4
5.16.2.5. Step 5
5.16.3. VSD-Domains and Association to Static-Dynamic Services
5.16.3.1. VSD-Domain Type L2-DOMAIN
5.16.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.16.3.3. VSD-Domain Type VRF-GRE
5.16.3.4. VSD-Domain Type VRF-VXLAN
5.17. Fully-Dynamic VSD Integration Model
5.17.1. Step 1
5.17.2. Step 2
5.17.3. Step 3
5.17.4. Step 4
5.17.5. Step 5
5.17.6. Python Script Implementation Details
5.17.7. Provisioning Filters using the VSD Fully Dynamic Model
5.18. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.18.1. Replicator (AR-R) Procedures
5.18.2. Leaf (AR-L) procedures
5.18.3. Assisted-Replication Interaction with Other VPLS Features
5.19. BGP-EVPN Control Plane for MPLS Tunnels
5.20. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.20.1. EVPN and VPLS Integration
5.20.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.20.3. EVPN Multi-Homing in VPLS Services
5.20.4. EVPN All-Active Multi-Homing
5.20.5. All-Active Multi-Homing Service Model
5.20.6. ES Discovery and DF Election Procedures
5.20.7. Aliasing
5.20.8. Network Failures and Convergence for All-Active Multi-Homing
5.20.8.1. Logical Failures on Ethernet Segments and Black-Holes
5.20.8.2. Transient Issues Due to MAC Route Delays
5.20.9. EVPN Single-Active Multi-Homing
5.20.9.1. Single-Active Multi-Homing Service Model
5.20.9.2. ES and DF Election Procedures
5.20.9.3. Backup PE Function
5.20.9.4. Network Failures and Convergence for Single-Active Multi-Homing
5.20.9.4.1. Logical Failures on Ethernet Segments and Black-Holes
5.21. BGP-EVPN Control Plane for EVPN-VPWS
5.22. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.22.1. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
5.23. EVPN Multi-homing for EVPN-VPWS Services
5.24. EVPN for MPLS Tunnels in Routed VPLS Services
5.24.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.25. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
5.26. BGP-EVPN Control Plane for PBB-EVPN
5.26.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.26.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
5.26.3. EVPN Route Type 4 - Ethernet Segment Route
5.27. PBB-EVPN for I-VPLS and PBB Epipe Services
5.27.1. Flood Containment for I-VPLS Services
5.27.2. PBB-EVPN and PBB-VPLS Integration
5.27.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.27.3.1. System BMAC Assignment in PBB-EVPN
5.27.3.2. PBB-EVPN all-active multi-homing service model
5.27.3.2.1. Network failures and convergence for all-active multi-homing
5.27.3.3. PBB-EVPN Single-Active Multi-Homing Service Model
5.27.3.3.1. Network Failures and Convergence for Single-Active Multihoming
5.27.3.4. PBB-Epipes and EVPN Multi-Homing
5.27.3.5. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.27.3.6. PBB-EVPN ISID-Based CMAC Flush
5.28. ARP/ND Snooping and Proxy Support
5.28.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.28.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
5.28.2.1. Procedure to Add the R Flag to a Specified Entry
5.29. BGP-EVPN MAC-Mobility
5.30. BGP-EVPN MAC-Duplication
5.31. Conditional Static MAC and Protection
5.32. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.33. Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.34. CFM Interaction with EVPN Services
5.35. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
5.35.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.35.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.36. IGMP Snooping in EVPN-MPLS Services
5.37. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
5.37.1. BGP-EVPN Routes in Services Configured With Two BGP Instances
5.37.2. Anycast Redundant Solution for Dual BGP Instance Services
5.37.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.38. BGP and EVPN Route Selection for EVPN Routes
5.39. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.40. Interaction of PBB-EVPN with Existing VPLS Features
5.41. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
5.42. Routing Policies for BGP EVPN IP Prefixes
5.43. MPLS Entropy Label and Hash Label
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-active Multi-homing Example
EVPN Command Reference
Command Hierarchies
EVPN Configuration Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
EVPN Configuration Commands
Show Configuration Commands
Clear Commands
Debug Commands
Tools Commands
6. Pseudowire Ports
6.1. In This Chapter
6.2. Overview
6.3. PW-Port Bound to a Physical Port
6.4. FPE-Based PW-Port
6.4.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.4.2. PXC-Based PW-Port — Building the Cross-Connect
6.4.2.1. Building the Internal Transport Tunnel
6.4.2.2. Mapping the External PW to the PW-Port
6.4.2.3. Terminating the Service on PW-SAP
6.4.3. Operational State of the PXC Based PW-Port
6.4.4. QoS
6.4.4.1. Preservation of Forwarding Class Across PXC
6.4.5. Statistics on the FPE based PW-Port
6.4.6. Intra-Chassis Redundancy Models for PXC Based PW-Port
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
VLL Services
2.1. In This Chapter
2.2. ATM VLL (Apipe) Services
2.2.1. ATM VLL For End-to-End ATM Service
2.2.2. ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
2.2.3. Traffic Management Support
2.2.3.1. Ingress Network Classification
2.2.3.2. Ingress Queuing and Shaping on the IOM
2.2.3.3. Egress Queuing and Shaping on the IOM
2.2.3.4. Egress Shaping/Scheduling
2.3. Circuit Emulation Services (Cpipe)
2.3.1. Mobile Infrastructure
2.3.2. Circuit Emulation Modes
2.3.3. Circuit Emulation Parameters
2.3.3.1. Circuit Emulation Modes
2.3.3.2. Absolute Mode Option
2.3.3.3. Payload Size
2.3.3.4. Jitter Buffer
2.3.3.5. CES Circuit Operation
2.3.4. Services for Transporting CES Circuits
2.3.5. Network Synchronization Considerations
2.3.6. Cpipe Payload
2.4. Ethernet Pipe (Epipe) Services
2.4.1. Epipe Service Overview
2.4.2. Epipe Service Pseudo-wire VLAN Tag Processing
2.4.3. Epipe Up Operational State Configuration Option
2.4.4. Epipe with PBB
2.4.5. Epipe over L2TPv3
2.4.6. Ethernet Interworking VLL
2.4.7. VLL CAC
2.4.8. MC-Ring and VLL
2.5. Frame Relay VLL (Fpipe) Services
2.5.1. Frame Relay VLL
2.5.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
2.5.3. Traffic Management Support
2.5.3.1. Frame Relay Traffic Management
2.5.3.2. Ingress SAP Classification and Marking
2.5.3.3. Egress Network EXP Marking
2.5.3.4. Ingress Network Classification
2.6. IP Interworking VLL (Ipipe) Services
2.6.1. Ipipe VLL
2.6.2. IP Interworking VLL Datapath
2.6.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
2.6.3.1. VLL Ethernet SAP Procedures
2.6.3.1.1. VLL FR SAP Procedures
2.6.3.1.2. VLL ATM SAP Procedures
2.6.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
2.6.4. IPv6 Support on IP Interworking VLL
2.6.4.1. IPv6 Datapath Operation
2.6.4.2. IPv6 Stack Capability Signaling
2.7. Services Configuration for MPLS-TP
2.7.1. MPLS-TP SDPs
2.7.2. VLL Spoke SDP Configuration
2.7.2.1. Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
2.7.3. Configuring MPLS-TP Lock Instruct and Loopback
2.7.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
2.7.3.2. Lock PW End-Point Model
2.7.3.3. PW Redundancy and Lock Instruct and Loopback
2.7.3.4. Configuring a Test SAP for an MPLS-TP PW
2.7.3.5. Configuring an Administrative Lock
2.7.3.6. Configuring a Loopback
2.8. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
2.8.1. VCCV BVD Support
2.8.2. VCCV BFD Encapsulation on a Pseudo-wire
2.8.3. BFD Session Operation
2.8.4. Configuring VCCV BFD
2.9. Pseudo-wire Switching
2.9.1. Pseudo-wire Switching with Protection
2.9.2. Pseudo-wire Switching Behavior
2.9.3. Static-to-Dynamic Pseudo-wire Switching
2.9.4. Ingress VLAN Swapping
2.9.4.1. Ingress VLAN Translation
2.9.5. Pseudo-wire Redundancy
2.9.6. Dynamic Multi-Segment Pseudo-wire Routing
2.9.6.1. Overview
2.9.6.2. Pseudo-wire Routing
2.9.6.2.1. Static Routing
2.9.6.2.2. Explicit Paths
2.9.6.3. Configuring VLLs using Dynamic MS-PWs
2.9.6.3.1. Active/Passive T-PE Selection
2.9.6.3.2. Automatic Endpoint Configuration
2.9.6.3.3. Selecting a Path for an MS-PW
2.9.6.3.4. Pseudo-wire Templates
2.9.6.4. Pseudo-wire Redundancy
2.9.6.5. VCCV OAM for Dynamic MS-PWs
2.9.6.6. VCCV-Ping on Dynamic MS-PWs
2.9.6.7. VCCV-Trace on Dynamic MS-PWs
2.9.7. Example Dynamic MS-PW Configuration
2.9.8. VLL Resilience with Two Destination PE Nodes
2.9.8.1. Master-Slave Operation
2.9.8.1.1. Interaction with SAP-Specific OAM
2.9.8.1.2. Local Rules at Slave VLL PE
2.9.8.1.3. Operation of Master-Slave Pseudo-wire Redundancy with Existing Scenarios
2.9.8.1.4. VLL Resilience for a Switched Pseudo-wire Path
2.9.9. Pseudo-wire SAPs
2.9.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
2.9.10.1. Operational Overview
2.9.10.2. Detailed Operation
2.9.10.2.1. Sample Operation of G.8031 BGP-MH
2.9.10.3. BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
2.9.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
2.9.10.5. PW Redundancy for BGP MH Site Support for Ethernet Tunnels
2.9.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
2.9.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
2.9.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
2.9.10.6.3. Operation for BGP MH Site Support for Ethernet Tunnels
2.9.11. Access Node Resilience Using MC-LAG and Pseudo-wire Redundancy
2.9.12. VLL Resilience for a Switched Pseudo-wire Path
2.10. Pseudo-wire Redundancy Service Models
2.10.1. Redundant VLL Service Model
2.10.2. T-LDP Status Notification Handling Rules
2.10.2.1. Processing Endpoint SAP Active/Standby Status Bits
2.10.2.2. Processing and Merging
2.11. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
2.11.1. Primary Spoke-SDP Fallback to Secondary SAP
2.11.2. Reversion to Primary Spoke SDP Path
2.11.3. MC-APS and MC-LAG
2.11.3.1. Failure Scenarios
2.12. VLL Using G.8031 Protected Ethernet Tunnels
2.13. MPLS Entropy Label and Hash Label
2.14. BGP Virtual Private Wire Service (VPWS)
2.14.1. Single-Homed BGP VPWS
2.14.2. Dual-Homed BGP VPWS
2.14.3. BGP VPWS Pseudo-wire Switching
2.14.3.1. Pseudo-wire Signaling
2.14.3.2. BGP VPWS Configuration Procedure
2.14.3.3. Use of Pseudo-wire Template for BGP VPWS
2.14.3.4. Use of Endpoint for BGP VPWS
2.15. VLL Service Considerations
2.15.1. SDPs
2.15.1.1. SDP Statistics for VPLS and VLL Services
2.15.2. SAP Encapsulations and Pseudo-wire Types
2.15.2.1. PWE3 N-to-1 Cell Mode
2.15.2.2. PWE3 AAL5 SDU Mode
2.15.2.3. QoS Policies
2.15.2.4. Filter Policies
2.15.2.5. MAC Resources
Configuring a VLL Service with CLI
Basic Configurations
Common Configuration Tasks
Configuring VLL Components
Creating an Apipe Service
Configuring Basic Apipe SAP Parameters
Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
Configuring Apipe SDP Bindings
Creating a Cpipe Service
Basic Configuration
Configuration Requirements
Configuring Cpipe SAPs and Spoke SDPs
Creating an Epipe Service
Configuring Epipe SAP Parameters
Distributed Epipe SAPs
Configuring SDP Bindings
Creating an Fpipe Service
Configuring Fpipe SAP Parameters
Configuring Fpipe SDP Bindings
Creating an Ipipe Service
Configuring Ipipe SAP Parameters
Configuring Ipipe SDP Bindings
Using Spoke SDP Control Words
Same Fate Epipe VLANs Access Protection
Pseudowire Configuration Notes
Configuring Two VLL Paths Terminating on T-PE2
Configuring VLL Resilience
Configuring VLL Resilience for a Switched Pseudowire Path
Configuring BGP Virtual Private Wire Service (VPWS)
Single-Homed BGP VPWS
Dual-Homed BGP VPWS
Service Management Tasks
Modifying Apipe Service Parameters
Disabling an Apipe Service
Re-Enabling an Apipe Service
Deleting an Apipe Service
Modifying a Cpipe Service
Deleting a Cpipe Service
Modifying Epipe Service Parameters
Disabling an Epipe Service
Re-Enabling an Epipe Service
Deleting an Epipe Service
Modifying Fpipe Service Parameters
Disabling an Fpipe Service
Re-enabling an Fpipe Service
Deleting an Fpipe Service
Modifying Ipipe Service Parameters
Disabling an Ipipe Service
Re-enabling an Ipipe Service
Deleting an Ipipe Service
VLL Service Configuration Command Reference
Command Hierarchies
Apipe Service Configuration Commands
Related Apipe Commands
Connection Profile Commands
Cpipe Service Configuration Commands
Epipe Service Configuration Commands
Epipe Global Commands
Epipe SAP Configuration Commands
Epipe Spoke SDP Configuration Commands
Template Commands
Fpipe Service Configuration Commands
Ipipe Service Configuration Commands
Command Descriptions
Generic Commands
Service Commands
VLL Global Commands
VLL SAP Commands
Circuit Emulation Commands
ETH-CFM Service Commands
Service Filter and QoS Policy Commands
VLL Frame Relay Commands
VLL SDP Commands
ATM Commands
OAM Commands
Cpipe Commands
VLL SAP Commands
CPipe SDP Commands
Epipe SAP Template Commands
VLL Show Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VLL Show Commands
VLL Clear Commands
VLL Debug Commands
VLL Tools Commands
3.
Virtual Private LAN Service
3.1. In This Chapter
3.2. VPLS Service Overview
3.2.1. VPLS Packet Walkthrough
3.3. VPLS Features
3.3.1. VPLS Enhancements
3.3.2. VPLS over MPLS
3.3.3. VPLS Service Pseudo-wire VLAN Tag Processing
3.3.4. VPLS MAC Learning and Packet Forwarding
3.3.4.1. MAC Learning Protection
3.3.4.2. DEI in IEEE 802.1ad
3.3.5. VPLS Using G.8031 Protected Ethernet Tunnels
3.3.6. Pseudo-wire Control Word
3.3.7. Table Management
3.3.7.1. FIB Size
3.3.7.2. FIB Size Alarms
3.3.7.3. Local and Remote Aging Timers
3.3.7.4. Disable MAC Aging
3.3.7.5. Disable MAC Learning
3.3.7.6. Unknown MAC Discard
3.3.7.7. VPLS and Rate Limiting
3.3.7.8. MAC Move
3.3.7.9. Auto-Learn MAC Protect
3.3.7.9.1. Operation
3.3.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
3.3.9. VPLS and Spanning Tree Protocol
3.3.9.1. Spanning Tree Operating Modes
3.3.9.2. Multiple Spanning Tree
3.3.9.2.1. Redundancy Access to VPLS
3.3.9.3. MSTP for QinQ SAPs
3.3.9.4. Provider MSTP
3.3.9.4.1. MSTP General Principles
3.3.9.4.2. MSTP in the SR-Series Platform
3.3.9.5. Enhancements to the Spanning Tree Protocol
3.3.9.5.1. L2PT Termination
3.3.9.5.2. BPDU Translation
3.3.9.5.3. L2PT and BPDU Translation
3.3.10. Egress Multicast Groups
3.3.10.1. Egress Multicast Group Provisioning
3.3.10.1.1. Required Common SAP Parameters
3.3.10.1.2. SAP Egress QoS Policy
3.3.10.1.3. Efficient Multicast Egress SAP Chaining
3.3.10.1.4. Mirroring and Efficient Multicast Replication
3.3.10.1.5. IOM or XCM Chain Management
3.3.10.1.6. IOM Mode B Capability
3.3.11. VPLS Redundancy
3.3.11.1. Spoke SDP Redundancy for Metro Interconnection
3.3.11.2. Spoke SDP Based Redundant Access
3.3.11.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
3.3.11.3.1. Fast Detection of Peer Failure using BFD
3.3.11.3.2. MC-EP Passive Mode
3.3.11.4. Support for Single Chassis Endpoint Mechanisms
3.3.11.4.1. MAC Flush Support in MC-EP
3.3.11.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
3.3.11.4.3. Support for Force Spoke SDP in MC-EP
3.3.11.4.4. Revertive Behavior for Primary Pseudo-wire(s) in a MC-EP
3.3.11.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
3.3.11.6. MAC Flush Additions for PBB VPLS
3.3.12. VPLS Access Redundancy
3.3.12.1. STP-Based Redundant Access to VPLS
3.3.12.2. Redundant Access to VPLS Without STP
3.3.13. Object Grouping and State Monitoring
3.3.13.1. VPLS Applicability — Block on VPLS a Failure
3.3.14. MAC Flush Message Processing
3.3.14.1. Dual Homing to a VPLS Service
3.3.14.2. MC-Ring and VPLS
3.3.15. ACL Next-Hop for VPLS
3.3.16. SDP Statistics for VPLS and VLL Services
3.3.17. BGP Auto-Discovery for LDP VPLS
3.3.17.1. BGP AD Overview
3.3.17.2. Information Model
3.3.17.3. FEC Element for T-LDP Signaling
3.3.17.4. BGP-AD and Target LDP (T-LDP) Interaction
3.3.17.5. SDP Usage
3.3.17.6. Automatic Creation of SDPs
3.3.17.7. Manually Provisioned SDP
3.3.17.8. Automatic Instantiation of Pseudo-wires (SDP Bindings)
3.3.17.9. Mixing Statically Configured and Auto-Discovered Pseudo-wires in a VPLS
3.3.17.10. Resiliency Schemes
3.3.18. BGP VPLS
3.3.18.1. Pseudo-wire Signaling Details
3.3.18.2. Supported VPLS Features
3.3.19. VCCV BFD Support for VPLS Services
3.3.20. BGP Multi-Homing for VPLS
3.3.20.1. Information Model and Required Extensions to L2VPN NLRI
3.3.20.2. Supported Services and Multi-Homing Objects
3.3.20.3. Blackhole Avoidance
3.3.20.3.1. MAC Flush to the Core PEs
3.3.20.3.2. Indicating non-DF status towards the access PE or CE
3.3.20.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
3.3.21. Multicast-Aware VPLS
3.3.21.1. IGMP Snooping for VPLS
3.3.21.2. MLD Snooping for VPLS
3.3.21.3. PIM Snooping for VPLS
3.3.21.3.1. Plain PIM Snooping
3.3.21.3.2. PIM Proxy
3.3.21.4. MAC-Based IPv6 Multicast Forwarding
3.3.21.5. PIM and IGMP/MLD Snooping Interaction
3.3.21.6. Multi-Chassis Synchronization for Layer 2 Snooping States
3.3.21.6.1. IGMP Snooping Synchronization
3.3.21.6.2. MLD Snooping Synchronization
3.3.21.6.3. PIM Snooping for IPv4 Synchronization
3.3.21.7. VPLS Multicast-Aware High Availability Features
3.3.22. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
3.3.23. MPLS Entropy Label and Hash Label
3.4. Routed VPLS and I-VPLS
3.4.1. IES or VPRN IP Interface Binding
3.4.1.1. Assigning a Service Name to a VPLS Service
3.4.1.2. Service Binding Requirements
3.4.1.3. Bound Service Name Assignment
3.4.1.4. Binding a Service Name to an IP Interface
3.4.1.5. Bound Service Deletion or Service Name Removal
3.4.1.6. IP Interface Attached VPLS Service Constraints
3.4.1.7. IP Interface and VPLS Operational State Coordination
3.4.2. IP Interface MTU and Fragmentation
3.4.2.1. Unicast IP Routing into a VPLS Service
3.4.3. ARP and VPLS FIB Interactions
3.4.3.1. Routed VPLS Specific ARP Cache Behavior
3.4.4. The allow-ip-int-bind VPLS Flag
3.4.4.1. Routed VPLS SAPs Only Supported on Standard Ethernet Ports
3.4.4.2. Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
3.4.4.3. Network Ports Restricted to FP2-Based Systems or IOMs
3.4.4.4. LAG Port Membership Constraints
3.4.4.5. Routed VPLS Feature Restrictions
3.4.4.6. Routed I-VPLS Feature Restrictions
3.4.5. IES IP Interface VPLS Binding and Chassis Mode Interaction
3.4.6. VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
3.4.7. Route Leaking Between Routing Contexts
3.4.7.1. Ingress LAG and FP1 to Routed VPLS Discards
3.4.8. IPv4 and IPv6 Multicast Routing Support
3.4.9. BGP Auto Discovery (BGP-AD) for Routed VPLS Support
3.4.10. Routed VPLS Caveats
3.4.10.1. VPLS SAP Ingress IP Filter Override
3.4.10.2. IP Interface Defined Egress QoS Reclassification
3.4.10.3. Remarking for VPLS and Routed Packets
3.4.10.4. 7450 Mixed Mode Chassis
3.4.10.5. IPv4 Multicast Routing
3.4.10.6. Routed VPLS Supported Routing Related Protocols
3.4.10.7. Spanning Tree and Split Horizon
3.5. VPLS Service Considerations
3.5.1. SAP Encapsulations
3.5.2. VLAN Processing
3.5.3. Ingress VLAN Swapping
3.5.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
3.5.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
3.5.4.2. Instantiate Related VLAN FIBs and Trunks in MVRP Scope
3.5.4.3. MVRP Activation of Service Connectivity
3.5.4.4. MVRP Control Plane
3.5.4.5. STP-MVRP Interaction
3.5.4.5.1. Interaction Between MVRP and Instantiated SAP Status
3.5.4.5.2. Using Temporary Flooding to Optimize Failover Times
3.5.5. VPLS E-Tree Services
3.5.5.1. VPLS E-Tree Services Overview
3.5.5.2. Leaf-ac and Root-ac SAPs
3.5.5.3. Leaf-ac and Root-ac SDP Binds
3.5.5.4. Root-leaf-tag SAPs
3.5.5.5. Root-leaf-tag SDP Binds
3.5.5.6. Interaction between VPLS E-Tree Services and Other Features
Configuring a VPLS Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPLS Components
Configuring Egress Multicast Groups
Creating a VPLS Service
Enabling Multiple MAC Registration Protocol (MMRP)
Enabling MAC Move
Configuring STP Bridge Parameters in a VPLS
Configuring GSMP Parameters
Configuring a VPLS SAP
Local VPLS SAPs
Distributed VPLS SAPs
Configuring SAP-Specific STP Parameters
STP SAP Operational States
Configuring VPLS SAPs with Split Horizon
Configuring MAC Learning Protection
Applying an Egress Multicast Group to a VPLS Service SAP
Configuring SAP Subscriber Management Parameters
MSTP Control over Ethernet Tunnels
Configuring SDP Bindings
Configuring Overrides on Service SAPs
Configuring Spoke SDP Specific STP Parameters
Spoke SDP STP Operational States
Configuring VPLS Spoke SDPs with Split Horizon
Configuring VPLS Redundancy
Creating a Management VPLS for SAP Protection
Creating a Management VPLS for Spoke SDP Protection
Configuring Load Balancing with Management VPLS
Configuring Selective MAC Flush
Configuring Multi-Chassis Endpoints
ATM/Frame Relay PVC Access and Termination on a VPLS Service
Configuring BGP Auto-Discovery
Configuration Steps
LDP Signaling
Pseudowire Template
Configuring BGP VPLS
Configuring a VPLS Management Interface
Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
Configuring VPLS E-Tree Services
Service Management Tasks
Modifying VPLS Service Parameters
Modifying Management VPLS Parameters
Deleting a Management VPLS
Disabling a Management VPLS
Deleting a VPLS Service
Disabling a VPLS Service
Re-Enabling a VPLS Service
VPLS Service Configuration Command Reference
Command Hierarchies
Global Commands
Oper Group Commands
SAP Commands
Template Commands
Mesh SDP Commands
Spoke SDP Commands
Provider Tunnel Commands
Egress Multicast Group Commands
Routed VPLS Commands
Multi-Chassis Redundancy Commands
Command Descriptions
Generic Commands
VPLS Service Commands
VPLS Interface Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
General Switch Management Protocol Commands
VPLS DHCP Commands
VPLS STP Commands
VPLS SAP Commands
ETH-CFM Service Commands
VPLS SAP ATM Commands
VPLS Filter and QoS Policy Commands
VPLS Template Commands
Provider Tunnel Commands
VPLS SDP Commands
SAP Subscriber Management Commands
VPLS Multicast Commands
VPLS DHCP and Anti-Spoofing Commands
Egress Multicast Group Commands
BGP Auto-Discovery Commands
Redundancy Commands
VPLS Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Show Multi-Chassis Endpoint Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
VPLS Show Commands
IGMP Snooping Show Commands
IGMP Commands
Show Multi-Chassis Endpoint Commands
VPLS Clear Commands
VPLS Debug Commands
4.
IEEE 802.1ah Provider Backbone Bridging
4.1. In This Chapter
4.2. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
4.3. PBB Features
4.3.1. Integrated PBB-VPLS Solution
4.3.2. PBB Technology
4.3.3. PBB Mapping to Existing VPLS Configurations
4.3.4. SAP and SDP Support
4.3.4.1. PBB B-VPLS
4.3.4.2. PBB I-VPLS
4.3.5. PBB Packet Walkthrough
4.3.5.1. PBB Control Planes
4.3.6. Shortest Path Bridging MAC Mode (SPBM)
4.3.6.1. Flooding and Learning Versus Link State
4.3.6.2. SPB for B-VPLS
4.3.6.3. Control B-VPLS and User B-VPLS
4.3.6.4. Shortest Path and Single Tree
4.3.6.5. Data Path and Forwarding
4.3.6.6. SPB Ethernet OAM
4.3.6.7. SPB Levels
4.3.7. SPBM to Non-SPBM Interworking
4.3.7.1. Static MACs and Static ISIDs
4.3.7.2. Epipe Static Configuration
4.3.7.2.1. I-VPLS Static Config
4.3.7.3. SPBM ISID Policies
4.3.8. ISID Policy Control
4.3.8.1. Static ISID Advertisement
4.3.8.2. I-VPLS for Unicast Service
4.3.9. Default Behaviors
4.3.10. Example Network Configuration
4.3.10.1. Sample Configuration for Dut-A
4.3.10.1.1. Show Commands Outputs
4.3.10.1.2. Debug Commands
4.3.10.1.3. Tools Commands
4.3.10.1.4. Clear Commands
4.3.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
4.3.12. MMRP Support Over B-VPLS SAPs and SDPs
4.3.12.1. I-VPLS Changes and Related MMRP Behavior
4.3.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
4.3.12.3. Optimization for Improved Convergence Time
4.3.12.4. Controlling MRP Scope using MRP Policies
4.3.13. PBB and BGP-AD
4.3.14. PBB ELINE Service
4.3.14.1. Non-Redundant PBB Epipe Spoke Termination
4.3.15. PBB Using G.8031-Protected Ethernet Tunnels
4.3.15.1. Solution Overview
4.3.15.2. Detailed Solution Description
4.3.15.3. Detailed PBB Emulated LAG Solution Description
4.3.15.4. Support Service and Solution Combinations
4.3.16. Periodic MAC Notification
4.3.17. MAC Flush
4.3.17.1. PBB Resiliency for B-VPLS Over Pseudo-wire Infrastructure
4.3.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
4.3.17.1.2. PBB Blackholing Issue
4.3.17.1.3. LDP MAC Flush Solution for PBB Blackholing
4.3.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
4.3.18.1. Solution Description for I-VPLS Over Native PBB Core
4.3.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
4.3.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
4.3.19. BGP Multi-homing for I-VPLS
4.3.20. Access Multi-Homing over MPLS for PBB Epipes
4.3.21. PBB and IGMP/MLD Snooping
4.3.22. PBB and PIM Snooping
4.3.23. PBB QoS
4.3.23.1. Transparency of Customer QoS Indication through PBB Backbone
4.3.23.1.1. Configuration Examples
4.3.23.1.2. Details Solution Description
4.3.24. Egress B-SAP per ISID Shaping
4.3.24.1. B-SAP Egress ISID Shaping Configuration
4.3.24.2. Provisioning Model
4.3.24.3. Egress Queue Scheduling
4.3.24.4. B-SAP per-ISID Shaping Configuration Example
4.3.25. PBB OAM
4.3.25.1. Mirroring
4.3.25.2. OAM Commands
4.3.25.3. CFM Support
4.4. Configuration Examples
4.4.1. PBB using G.8031 Protected Ethernet Tunnels
4.4.2. MC-LAG Multihoming for Native PBB
4.4.3. Access Multi-Homing over MPLS for PBB Epipes
PBB Configuration Command Reference
Command Hierarchies
Global Commands
SAP Commands
Mesh SDP Commands
Spoke SDP Commands
BGP-MH for I-VPLS Commands
Command Descriptions
VPLS Service Commands
PBB Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
PBB Show Commands
PBB Clear Commands
PBB Debug Commands
5.
Ethernet Virtual Private Networks (EVPNs)
5.1. In This Chapter
5.2. Overview
5.3. EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
5.4. EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
5.5. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
5.6. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
5.7. EVPN for MPLS Tunnels in ELAN Services
5.8. EVPN for MPLS Tunnels in ELINE Services
5.9. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
5.10. VXLAN
5.10.1. VXLAN ECMP and LAG
5.10.2. VXLAN VPLS Tag Handling
5.10.3. VXLAN MTU Considerations
5.10.4. VXLAN QoS
5.10.4.1. Ingress
5.10.4.2. Egress
5.10.5. VXLAN Ping
5.10.6. IGMP Snooping on VXLAN
5.10.7. Non-System IPv4 and IPv6 VXLAN Termination in VPLS and R-VPLS Services
5.11. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
5.12. EVPN for VXLAN in VPLS Services
5.12.1. Resiliency and BGP Multi-Homing
5.12.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
5.12.3. Use of the unknown-mac-route
5.13. EVPN for VXLAN in R-VPLS Services
5.14. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
5.15. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
5.16. DC GW integration with the Nuage Virtual Services Directory (VSD)
5.16.1. XMPP Interface on the DC GW
5.16.2. Overview of the Static-Dynamic VSD Integration Model
5.16.2.1. Step 1
5.16.2.2. Step 2
5.16.2.3. Step 3
5.16.2.4. Step 4
5.16.2.5. Step 5
5.16.3. VSD-Domains and Association to Static-Dynamic Services
5.16.3.1. VSD-Domain Type L2-DOMAIN
5.16.3.2. VSD-Domain Type L2-DOMAIN-IRB
5.16.3.3. VSD-Domain Type VRF-GRE
5.16.3.4. VSD-Domain Type VRF-VXLAN
5.17. Fully-Dynamic VSD Integration Model
5.17.1. Step 1
5.17.2. Step 2
5.17.3. Step 3
5.17.4. Step 4
5.17.5. Step 5
5.17.6. Python Script Implementation Details
5.17.7. Provisioning Filters using the VSD Fully Dynamic Model
5.18. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
5.18.1. Replicator (AR-R) Procedures
5.18.2. Leaf (AR-L) procedures
5.18.3. Assisted-Replication Interaction with Other VPLS Features
5.19. BGP-EVPN Control Plane for MPLS Tunnels
5.20. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
5.20.1. EVPN and VPLS Integration
5.20.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
5.20.3. EVPN Multi-Homing in VPLS Services
5.20.4. EVPN All-Active Multi-Homing
5.20.5. All-Active Multi-Homing Service Model
5.20.6. ES Discovery and DF Election Procedures
5.20.7. Aliasing
5.20.8. Network Failures and Convergence for All-Active Multi-Homing
5.20.8.1. Logical Failures on Ethernet Segments and Black-Holes
5.20.8.2. Transient Issues Due to MAC Route Delays
5.20.9. EVPN Single-Active Multi-Homing
5.20.9.1. Single-Active Multi-Homing Service Model
5.20.9.2. ES and DF Election Procedures
5.20.9.3. Backup PE Function
5.20.9.4. Network Failures and Convergence for Single-Active Multi-Homing
5.20.9.4.1. Logical Failures on Ethernet Segments and Black-Holes
5.21. BGP-EVPN Control Plane for EVPN-VPWS
5.22. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
5.22.1. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
5.23. EVPN Multi-homing for EVPN-VPWS Services
5.24. EVPN for MPLS Tunnels in Routed VPLS Services
5.24.1. EVPN-MPLS Multi-Homing and Passive VRRP
5.25. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
5.26. BGP-EVPN Control Plane for PBB-EVPN
5.26.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
5.26.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
5.26.3. EVPN Route Type 4 - Ethernet Segment Route
5.27. PBB-EVPN for I-VPLS and PBB Epipe Services
5.27.1. Flood Containment for I-VPLS Services
5.27.2. PBB-EVPN and PBB-VPLS Integration
5.27.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
5.27.3.1. System BMAC Assignment in PBB-EVPN
5.27.3.2. PBB-EVPN all-active multi-homing service model
5.27.3.2.1. Network failures and convergence for all-active multi-homing
5.27.3.3. PBB-EVPN Single-Active Multi-Homing Service Model
5.27.3.3.1. Network Failures and Convergence for Single-Active Multihoming
5.27.3.4. PBB-Epipes and EVPN Multi-Homing
5.27.3.5. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
5.27.3.6. PBB-EVPN ISID-Based CMAC Flush
5.28. ARP/ND Snooping and Proxy Support
5.28.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
5.28.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
5.28.2.1. Procedure to Add the R Flag to a Specified Entry
5.29. BGP-EVPN MAC-Mobility
5.30. BGP-EVPN MAC-Duplication
5.31. Conditional Static MAC and Protection
5.32. Auto-Learn MAC Protect and Restricting Protected Source MACs
5.33. Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
5.34. CFM Interaction with EVPN Services
5.35. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
5.35.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
5.35.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
5.36. IGMP Snooping in EVPN-MPLS Services
5.37. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
5.37.1. BGP-EVPN Routes in Services Configured With Two BGP Instances
5.37.2. Anycast Redundant Solution for Dual BGP Instance Services
5.37.3. Using P2MP mLDP in Redundant Anycast DC GWs
5.38. BGP and EVPN Route Selection for EVPN Routes
5.39. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
5.40. Interaction of PBB-EVPN with Existing VPLS Features
5.41. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
5.42. Routing Policies for BGP EVPN IP Prefixes
5.43. MPLS Entropy Label and Hash Label
Configuring an EVPN Service with CLI
EVPN-VXLAN Configuration Examples
Layer 2 PE Example
EVPN for VXLAN in R-VPLS Services Example
EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
EVPN-MPLS Configuration Examples
EVPN All-active Multi-homing Example
EVPN Single-active Multi-homing Example
PBB-EVPN Configuration Examples
PBB-EVPN All-active Multi-homing Example
PBB-EVPN Single-active Multi-homing Example
EVPN Command Reference
Command Hierarchies
EVPN Configuration Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
EVPN Configuration Commands
Show Configuration Commands
Clear Commands
Debug Commands
Tools Commands
6. Pseudowire Ports
6.1. In This Chapter
6.2. Overview
6.3. PW-Port Bound to a Physical Port
6.4. FPE-Based PW-Port
6.4.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
6.4.2. PXC-Based PW-Port — Building the Cross-Connect
6.4.2.1. Building the Internal Transport Tunnel
6.4.2.2. Mapping the External PW to the PW-Port
6.4.2.3. Terminating the Service on PW-SAP
6.4.3. Operational State of the PXC Based PW-Port
6.4.4. QoS
6.4.4.1. Preservation of Forwarding Class Across PXC
6.4.5. Statistics on the FPE based PW-Port
6.4.6. Intra-Chassis Redundancy Models for PXC Based PW-Port
7. Standards and Protocol Support
Customer Document and Product Support
Layer 3 Services Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
Internet Enhanced Service
2.1. In This Chapter
2.2. IES Service Overview
2.3. IES Features
2.3.1. IP Interfaces
2.3.1.1. QoS Policy Propagation Using BGP (QPPB)
2.3.1.1.1. QPPB Applications
2.3.1.1.2. Inter-AS Coordination of QoS Policies
2.3.1.1.3. Traffic Differentiation Based on Route Characteristics
2.3.1.2. QPPB
2.3.1.2.1. Associating an FC and Priority with a Route
2.3.1.2.2. Displaying QoS Information Associated with Routes
2.3.1.2.3. Enabling QPPB on an IP Interface
2.3.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.3.1.2.5. QPPB and Multiple Paths to a Destination
2.3.1.2.6. QPPB and Policy-Based Routing
2.3.1.3. QPPB and GRT Lookup
2.3.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.3.1.4. Object Grouping and State Monitoring
2.3.1.4.1. IES IP Interface Applicability
2.3.2. Subscriber Interfaces
2.3.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.3.2.2. RADIUS Accounting
2.3.3. SAPs
2.3.3.1. Encapsulations
2.3.3.2. ATM SAP Encapsulations for IES
2.3.3.3. Pseudowire SAPs
2.3.3.4. Encapsulation
2.3.3.5. Pseudowire SAP Configuration
2.3.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.3.3.7. Shaping and Bandwidth Control
2.3.3.8. Lag Considerations
2.3.3.9. Last Mile Packet Size Adjustment
2.3.3.10. Redundancy with Pseudowire SAPs
2.3.3.11. Operational Group Support for PW Ports
2.3.4. Routing Protocols
2.3.4.1. CPE Connectivity Check
2.3.5. QoS Policies
2.3.6. Filter Policies
2.3.7. MPLS Entropy Label and Hash Label
2.3.8. Spoke SDPs
2.3.9. SRRP
2.3.9.1. SRRP Messaging
2.3.9.2. SRRP and Multi-Chassis Synchronization
2.3.9.3. SRRP Instance
2.3.9.3.1. SRRP Instance MCS Key
2.3.9.3.2. Containing Service Type and ID
2.3.9.3.3. Containing Subscriber IP Interface Name
2.3.9.3.4. Subscriber Subnet Information
2.3.9.3.5. Containing Group IP Interface Information
2.3.9.3.6. Remote Redundant IP Interface Mismatch
2.3.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.3.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.3.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.3.9.3.10. Local and Remote Dual Master Detected
2.3.9.4. Subscriber Subnet Owned IP Address Connectivity
2.3.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.3.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.3.9.7. BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPSec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
IES Services Command Reference
Command Hierarchies
IES Service Configuration Commands
Global Commands
Interface Commands
Routed VPLS Commands
Redundant Interface Commands
Interface SAP Commands
Interface SAP Tunnel Commands
VRRP Commands
Spoke SDP Commands
Subscriber Interface Commands
Group Interface SAP Commands
Threat Management Service Interface Commands
Command Descriptions
Generic Commands
IES Global Commands
Redundant Interface Commands
IES Subscriber Interface Commands
IES Interface Commands
IES Interface DHCP Commands
PPPoE Commands
IES Interface ICMP Commands
IES Interface IPv6 Commands
IES Spoke SDP Commands
IES SAP Commands
SAP Subscriber Management Commands
ETH-CFM Service Commands
IES Filter and QoS Policy Commands
ATM Commands
IES Interface VRRP Commands
IPSec Gateway Commands
Threat Management Service Interface Commands
IES Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Monitor Commands
Command Descriptions
IES Show Commands
IES Clear Commands
IES Debug Commands
IES Monitor Commands
3.
Virtual Private Routed Network Service
3.1. In This Chapter
3.2. VPRN Service Overview
3.2.1. Routing Prerequisites
3.2.2. Core MP-BGP Support
3.2.3. Route Distinguishers
3.2.3.1. eiBGP Load Balancing
3.2.4. Route Reflector
3.2.5. CE to PE Route Exchange
3.2.5.1. Route Redistribution
3.2.5.2. CPE Connectivity Check
3.2.6. Constrained Route Distribution (RT Constraint)
3.2.6.1. Constrained VPN Route Distribution Based on Route Targets
3.2.6.2. Configuring the Route Target Address Family
3.2.6.3. Originating RT Constraint Routes
3.2.6.4. Receiving and Re-Advertising RT Constraint Routes
3.2.6.5. Using RT Constraint Routes
3.2.7. BGP Fast Reroute in a VPRN
3.2.7.1. BGP Fast Reroute in a VPRN Configuration
3.2.8. BGP Best-External in a VPRN Context
3.3. VPRN Features
3.3.1. IP Interfaces
3.3.1.1. QoS Policy Propagation Using BGP (QPPB)
3.3.1.2. QPPB Applications
3.3.1.3. Inter-AS Coordination of QoS Policies
3.3.1.4. Traffic Differentiation Based on Route Characteristics
3.3.1.5. QPPB
3.3.1.6. Associating an FC and Priority with a Route
3.3.1.7. Displaying QoS Information Associated with Routes
3.3.1.8. Enabling QPPB on an IP interface
3.3.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.3.1.10. QPPB and Multiple Paths to a Destination
3.3.1.11. QPPB and Policy-Based Routing
3.3.1.12. QPPB and GRT Lookup
3.3.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.3.1.14. Object Grouping and State Monitoring
3.3.1.15. VPRN IP Interface Applicability
3.3.2. Subscriber Interfaces
3.3.3. SAPs
3.3.3.1. Encapsulations
3.3.3.2. ATM SAP Encapsulations for VPRN Services
3.3.3.3. Pseudowire SAPs
3.3.4. QoS Policies
3.3.5. Filter Policies
3.3.6. DSCP Marking
3.3.6.1. Default DSCP Mapping Table
3.3.7. Configuration of TTL Propagation for VPRN Routes
3.3.8. CE to PE Routing Protocols
3.3.8.1. PE to PE Tunneling Mechanisms
3.3.8.2. Per VRF Route Limiting
3.3.9. Spoke SDPs
3.3.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.3.9.2. Spoke SDP Redundancy into IES/VPRN
3.3.10. IP-VPNs
3.3.10.1. Using OSPF in IP-VPNs
3.3.11. IPCP Subnet Negotiation
3.3.12. Cflowd for IP-VPNs
3.3.13. Inter-AS VPRNs
3.3.14. Carrier Supporting Carrier (CsC)
3.3.14.1. Terminology
3.3.14.2. CSC Connectivity Models
3.3.14.3. CSC-PE Configuration and Operation
3.3.14.4. CSC Interface
3.3.14.5. QoS
3.3.14.6. MPLS
3.3.14.7. CSC VPRN Service Configuration
3.3.15. Traffic Leaking to GRT
3.3.16. Traffic Leaking from VPRN to GRT for IPv6
3.3.17. RIP Metric Propagation in VPRNs
3.3.18. NTP Within a VPRN Service
3.3.19. PTP Within a VPRN Service
3.3.20. VPN Route Label Allocation
3.3.20.1. Configuring the Service Label Mode
3.3.20.2. Restrictions and Usage Notes
3.3.21. VPRN Support for BGP Flowspec
3.3.22. MPLS Entropy Label and Hash Label
3.4. QoS on Ingress Bindings
3.5. Multicast in IP-VPN Applications
3.5.1. Use of Data MDTs
3.5.2. Multicast Protocols Supported in the Provider Network
3.5.3. MVPN Membership Auto-discovery using BGP
3.5.4. PE-PE Transmission of C-Multicast Routing using BGP
3.5.5. VRF Route Import Extended Community
3.5.6. Provider Tunnel Support
3.5.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.5.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.5.6.3. P2MP LDP I-PMSI and S-PMSI
3.5.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.5.6.5. P2MP LSP S-PMSI
3.5.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.5.6.7. MVPN Sender-only/Receiver-only
3.5.6.8. S-PMSI Trigger Thresholds
3.5.6.9. Migration from Existing Rosen Implementation
3.5.6.10. Policy-based S-PMSI
3.5.6.10.1. Supported MPLS Tunnels
3.5.6.10.2. Supported Multicast Features
3.5.6.10.3. In-service Changes to Multi-stream S-PMSI
3.5.6.10.4. Configuration example
3.5.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.5.8. Multicast VPN Extranet
3.5.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.5.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.5.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.5.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.5.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.5.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.5.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.5.11. IPv6 MVPN Support
3.5.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.5.13. NG-MVPN Multicast Source Geo-Redundancy
3.5.14. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.5.15. Inter-AS MVPN
3.5.15.1. BGP Connector Attribute
3.5.15.2. PIM RPF Vector
3.5.15.3. Inter-AS MVPN Option B
3.5.15.4. Inter-AS MVPN Option C
3.5.15.5. NG-MVPN Non-segmented Inter-AS Solution
3.5.15.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.5.15.5.2. Configuration Example
3.5.15.5.3. Inter-AS Non-segmented MLDP
3.5.15.5.4. ECMP
3.6. VPRN Off-Ramp
3.6.1. DDoS Off-Ramping Through Flowspec
3.7. FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN Protocols - RIP
Configuring VPRN Protocols - OSPF
Configuring TMS Parameters
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Configuring IPSec Parameters
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
VPRN Service Configuration Commands
Command Hierarchies
VPRN Service Configuration Commands
L2TP Commands
DHCP Commands
GSMP Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
NTP Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface Spoke SDP Commands
Interface VRRP Commands
Interface SAP Commands
Interface SAP Tunnel Commands
Routed VPLS Commands
Oper Group Commands
Network Ingress Commands
BGP Configuration Commands
IS-IS Configuration Commands
OSPF Configuration Commands
PIM Configuration Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Configuration Commands
Threat Management Service Interface Commands
RADIUS Commands
Web Portal Protocol Configuration Commands
Command Descriptions
Generic Commands
Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router DHCP Configuration Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
Network Time Protocol Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface DHCP Commands
Interface ICMP Commands
Interface SAP ATM Commands
Interface Anti-Spoofing Commands
Interface SAP Filter and QoS Policy Commands
Interface VRRP Commands
Interface SAP Commands
Routed VPLS Commands
Network Ingress Commands
SAP Subscriber Management Commands
BGP Commands
ETH-CFM Service Commands
IS-IS Commands
OSPF Commands
PIM Commands
PPPoE Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Commands
SDP Commands
Threat Management Service Interface Commands
RADIUS Proxy Commands
VPRN Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
VPRN Show Commands
VPRN Clear Commands
VPRN Debug Commands
Tools Command Reference
Command Hierarchies
Tools Commands
Command Descriptions
Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
Internet Enhanced Service
2.1. In This Chapter
2.2. IES Service Overview
2.3. IES Features
2.3.1. IP Interfaces
2.3.1.1. QoS Policy Propagation Using BGP (QPPB)
2.3.1.1.1. QPPB Applications
2.3.1.1.2. Inter-AS Coordination of QoS Policies
2.3.1.1.3. Traffic Differentiation Based on Route Characteristics
2.3.1.2. QPPB
2.3.1.2.1. Associating an FC and Priority with a Route
2.3.1.2.2. Displaying QoS Information Associated with Routes
2.3.1.2.3. Enabling QPPB on an IP Interface
2.3.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.3.1.2.5. QPPB and Multiple Paths to a Destination
2.3.1.2.6. QPPB and Policy-Based Routing
2.3.1.3. QPPB and GRT Lookup
2.3.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
2.3.1.4. Object Grouping and State Monitoring
2.3.1.4.1. IES IP Interface Applicability
2.3.2. Subscriber Interfaces
2.3.2.1. IPv6 Enhanced Subscriber Management (ESM)
2.3.2.2. RADIUS Accounting
2.3.3. SAPs
2.3.3.1. Encapsulations
2.3.3.2. ATM SAP Encapsulations for IES
2.3.3.3. Pseudowire SAPs
2.3.3.4. Encapsulation
2.3.3.5. Pseudowire SAP Configuration
2.3.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
2.3.3.7. Shaping and Bandwidth Control
2.3.3.8. Lag Considerations
2.3.3.9. Last Mile Packet Size Adjustment
2.3.3.10. Redundancy with Pseudowire SAPs
2.3.3.11. Operational Group Support for PW Ports
2.3.4. Routing Protocols
2.3.4.1. CPE Connectivity Check
2.3.5. QoS Policies
2.3.6. Filter Policies
2.3.7. MPLS Entropy Label and Hash Label
2.3.8. Spoke SDPs
2.3.9. SRRP
2.3.9.1. SRRP Messaging
2.3.9.2. SRRP and Multi-Chassis Synchronization
2.3.9.3. SRRP Instance
2.3.9.3.1. SRRP Instance MCS Key
2.3.9.3.2. Containing Service Type and ID
2.3.9.3.3. Containing Subscriber IP Interface Name
2.3.9.3.4. Subscriber Subnet Information
2.3.9.3.5. Containing Group IP Interface Information
2.3.9.3.6. Remote Redundant IP Interface Mismatch
2.3.9.3.7. Remote Sending Redundant IP Interface Unavailable
2.3.9.3.8. Remote SRRP Advertisement SAP Non-existent
2.3.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
2.3.9.3.10. Local and Remote Dual Master Detected
2.3.9.4. Subscriber Subnet Owned IP Address Connectivity
2.3.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
2.3.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
2.3.9.7. BFD with SRRP/VRRP
Configuring an IES Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring IES Components
Configuring an IES Service
Configuring IES Subscriber Interface Parameters
Configuring IES Interface Parameters
Configuring Spoke-SDP Parameters
Configuring SAP Parameters
Configuring IES SAP ATM Parameters
Configuring VRRP
Configuring IPSec Parameters
IGMP Host Tracking
Service Management Tasks
Modifying IES Service Parameters
Deleting a Spoke-SDP
Deleting an IES Service
Disabling an IES Service
Re-Enabling an IES Service
IES Services Command Reference
Command Hierarchies
IES Service Configuration Commands
Global Commands
Interface Commands
Routed VPLS Commands
Redundant Interface Commands
Interface SAP Commands
Interface SAP Tunnel Commands
VRRP Commands
Spoke SDP Commands
Subscriber Interface Commands
Group Interface SAP Commands
Threat Management Service Interface Commands
Command Descriptions
Generic Commands
IES Global Commands
Redundant Interface Commands
IES Subscriber Interface Commands
IES Interface Commands
IES Interface DHCP Commands
PPPoE Commands
IES Interface ICMP Commands
IES Interface IPv6 Commands
IES Spoke SDP Commands
IES SAP Commands
SAP Subscriber Management Commands
ETH-CFM Service Commands
IES Filter and QoS Policy Commands
ATM Commands
IES Interface VRRP Commands
IPSec Gateway Commands
Threat Management Service Interface Commands
IES Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Monitor Commands
Command Descriptions
IES Show Commands
IES Clear Commands
IES Debug Commands
IES Monitor Commands
3.
Virtual Private Routed Network Service
3.1. In This Chapter
3.2. VPRN Service Overview
3.2.1. Routing Prerequisites
3.2.2. Core MP-BGP Support
3.2.3. Route Distinguishers
3.2.3.1. eiBGP Load Balancing
3.2.4. Route Reflector
3.2.5. CE to PE Route Exchange
3.2.5.1. Route Redistribution
3.2.5.2. CPE Connectivity Check
3.2.6. Constrained Route Distribution (RT Constraint)
3.2.6.1. Constrained VPN Route Distribution Based on Route Targets
3.2.6.2. Configuring the Route Target Address Family
3.2.6.3. Originating RT Constraint Routes
3.2.6.4. Receiving and Re-Advertising RT Constraint Routes
3.2.6.5. Using RT Constraint Routes
3.2.7. BGP Fast Reroute in a VPRN
3.2.7.1. BGP Fast Reroute in a VPRN Configuration
3.2.8. BGP Best-External in a VPRN Context
3.3. VPRN Features
3.3.1. IP Interfaces
3.3.1.1. QoS Policy Propagation Using BGP (QPPB)
3.3.1.2. QPPB Applications
3.3.1.3. Inter-AS Coordination of QoS Policies
3.3.1.4. Traffic Differentiation Based on Route Characteristics
3.3.1.5. QPPB
3.3.1.6. Associating an FC and Priority with a Route
3.3.1.7. Displaying QoS Information Associated with Routes
3.3.1.8. Enabling QPPB on an IP interface
3.3.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
3.3.1.10. QPPB and Multiple Paths to a Destination
3.3.1.11. QPPB and Policy-Based Routing
3.3.1.12. QPPB and GRT Lookup
3.3.1.13. QPPB Interaction with SAP Ingress QoS Policy
3.3.1.14. Object Grouping and State Monitoring
3.3.1.15. VPRN IP Interface Applicability
3.3.2. Subscriber Interfaces
3.3.3. SAPs
3.3.3.1. Encapsulations
3.3.3.2. ATM SAP Encapsulations for VPRN Services
3.3.3.3. Pseudowire SAPs
3.3.4. QoS Policies
3.3.5. Filter Policies
3.3.6. DSCP Marking
3.3.6.1. Default DSCP Mapping Table
3.3.7. Configuration of TTL Propagation for VPRN Routes
3.3.8. CE to PE Routing Protocols
3.3.8.1. PE to PE Tunneling Mechanisms
3.3.8.2. Per VRF Route Limiting
3.3.9. Spoke SDPs
3.3.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
3.3.9.2. Spoke SDP Redundancy into IES/VPRN
3.3.10. IP-VPNs
3.3.10.1. Using OSPF in IP-VPNs
3.3.11. IPCP Subnet Negotiation
3.3.12. Cflowd for IP-VPNs
3.3.13. Inter-AS VPRNs
3.3.14. Carrier Supporting Carrier (CsC)
3.3.14.1. Terminology
3.3.14.2. CSC Connectivity Models
3.3.14.3. CSC-PE Configuration and Operation
3.3.14.4. CSC Interface
3.3.14.5. QoS
3.3.14.6. MPLS
3.3.14.7. CSC VPRN Service Configuration
3.3.15. Traffic Leaking to GRT
3.3.16. Traffic Leaking from VPRN to GRT for IPv6
3.3.17. RIP Metric Propagation in VPRNs
3.3.18. NTP Within a VPRN Service
3.3.19. PTP Within a VPRN Service
3.3.20. VPN Route Label Allocation
3.3.20.1. Configuring the Service Label Mode
3.3.20.2. Restrictions and Usage Notes
3.3.21. VPRN Support for BGP Flowspec
3.3.22. MPLS Entropy Label and Hash Label
3.4. QoS on Ingress Bindings
3.5. Multicast in IP-VPN Applications
3.5.1. Use of Data MDTs
3.5.2. Multicast Protocols Supported in the Provider Network
3.5.3. MVPN Membership Auto-discovery using BGP
3.5.4. PE-PE Transmission of C-Multicast Routing using BGP
3.5.5. VRF Route Import Extended Community
3.5.6. Provider Tunnel Support
3.5.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
3.5.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
3.5.6.3. P2MP LDP I-PMSI and S-PMSI
3.5.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
3.5.6.5. P2MP LSP S-PMSI
3.5.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
3.5.6.7. MVPN Sender-only/Receiver-only
3.5.6.8. S-PMSI Trigger Thresholds
3.5.6.9. Migration from Existing Rosen Implementation
3.5.6.10. Policy-based S-PMSI
3.5.6.10.1. Supported MPLS Tunnels
3.5.6.10.2. Supported Multicast Features
3.5.6.10.3. In-service Changes to Multi-stream S-PMSI
3.5.6.10.4. Configuration example
3.5.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
3.5.8. Multicast VPN Extranet
3.5.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
3.5.8.2. Multicast Extranet for NG-MVPN for PIM SSM
3.5.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
3.5.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
3.5.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
3.5.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
3.5.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
3.5.11. IPv6 MVPN Support
3.5.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
3.5.13. NG-MVPN Multicast Source Geo-Redundancy
3.5.14. Multicast Core Diversity for Rosen MDT SAFI MVPNs
3.5.15. Inter-AS MVPN
3.5.15.1. BGP Connector Attribute
3.5.15.2. PIM RPF Vector
3.5.15.3. Inter-AS MVPN Option B
3.5.15.4. Inter-AS MVPN Option C
3.5.15.5. NG-MVPN Non-segmented Inter-AS Solution
3.5.15.5.1. Non-Segmented d-mLDP and Inter-AS VPN
3.5.15.5.2. Configuration Example
3.5.15.5.3. Inter-AS Non-segmented MLDP
3.5.15.5.4. ECMP
3.6. VPRN Off-Ramp
3.6.1. DDoS Off-Ramping Through Flowspec
3.7. FIB Prioritization
Configuring a VPRN Service with CLI
Basic Configuration
Common Configuration Tasks
Configuring VPRN Components
Creating a VPRN Service
Configuring Global VPRN Parameters
Configuring VPRN Log Parameters
Configuring a Spoke-SDP
Configuring VPRN Protocols - PIM
Configuring Router Interfaces
Configuring VPRN Protocols - BGP
Configuring VPRN Protocols - RIP
Configuring VPRN Protocols - OSPF
Configuring TMS Parameters
Configuring a VPRN Interface
Configuring Overload State on a Single SFM
Configuring a VPRN Interface SAP
Configuring IPSec Parameters
Service Management Tasks
Modifying VPRN Service Parameters
Deleting a VPRN Service
Disabling a VPRN Service
Re-enabling a VPRN Service
VPRN Service Configuration Commands
Command Hierarchies
VPRN Service Configuration Commands
L2TP Commands
DHCP Commands
GSMP Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
NTP Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface Spoke SDP Commands
Interface VRRP Commands
Interface SAP Commands
Interface SAP Tunnel Commands
Routed VPLS Commands
Oper Group Commands
Network Ingress Commands
BGP Configuration Commands
IS-IS Configuration Commands
OSPF Configuration Commands
PIM Configuration Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Configuration Commands
Threat Management Service Interface Commands
RADIUS Commands
Web Portal Protocol Configuration Commands
Command Descriptions
Generic Commands
Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router DHCP Configuration Commands
IGMP Commands
IPSec Configuration Commands
Log Commands
Multicast VPN Commands
Redundant Interface Commands
Router Advertisement Commands
Network Time Protocol Commands
NAT Commands
Subscriber Interface Commands
Interface Commands
Network Interface Commands
Interface DHCP Commands
Interface ICMP Commands
Interface SAP ATM Commands
Interface Anti-Spoofing Commands
Interface SAP Filter and QoS Policy Commands
Interface VRRP Commands
Interface SAP Commands
Routed VPLS Commands
Network Ingress Commands
SAP Subscriber Management Commands
BGP Commands
ETH-CFM Service Commands
IS-IS Commands
OSPF Commands
PIM Commands
PPPoE Commands
MSDP Configuration Commands
MLD Configuration Commands
RIP Commands
SDP Commands
Threat Management Service Interface Commands
RADIUS Proxy Commands
VPRN Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
VPRN Show Commands
VPRN Clear Commands
VPRN Debug Commands
Tools Command Reference
Command Hierarchies
Tools Commands
Command Descriptions
Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Log Events Guide R14.0.R4
1. Log Events
1.1. In This Chapter
1.2. Log Events
1.3. Sample Log Event
2. SR Log Events
2.1. APPLICATION_ASSURANCE
2.1.1. tmnxBsxAarpInstOperStateChanged
2.1.2. tmnxBsxAarpInstStateChanged
2.1.3. tmnxBsxAaSubPolResExceeded
2.1.4. tmnxBsxAaSubPolResExceededClear
2.1.5. tmnxBsxAaSubscriberAcctDataLoss
2.1.6. tmnxBsxAaSubscribersUnassigned
2.1.7. tmnxBsxDatapathCpuUsage
2.1.8. tmnxBsxDatapathCpuUsageClear
2.1.9. tmnxBsxDnsIpCacheFull
2.1.10. tmnxBsxDnsIpCacheFullClear
2.1.11. tmnxBsxHttpUrlParamLimitExceeded
2.1.12. tmnxBsxIsaAaGrpBitRate
2.1.13. tmnxBsxIsaAaGrpBitRateClear
2.1.14. tmnxBsxIsaAaGrpCapCostThres
2.1.15. tmnxBsxIsaAaGrpCapCostThresClear
2.1.16. tmnxBsxIsaAaGrpFailureClearV2
2.1.17. tmnxBsxIsaAaGrpFailureV2
2.1.18. tmnxBsxIsaAaGrpFlowFull
2.1.19. tmnxBsxIsaAaGrpFlowFullClear
2.1.20. tmnxBsxIsaAaGrpFlowSetup
2.1.21. tmnxBsxIsaAaGrpFlowSetupClear
2.1.22. tmnxBsxIsaAaGrpFmSbWaSBufOvld
2.1.23. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
2.1.24. tmnxBsxIsaAaGrpNonRedundantV2
2.1.25. tmnxBsxIsaAaGrpOvrldCutthru
2.1.26. tmnxBsxIsaAaGrpOvrldCutthruClr
2.1.27. tmnxBsxIsaAaGrpPacketRate
2.1.28. tmnxBsxIsaAaGrpPacketRateClear
2.1.29. tmnxBsxIsaAaGrpSwitchover
2.1.30. tmnxBsxIsaAaGrpToSbWaSBufOvld
2.1.31. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
2.1.32. tmnxBsxIsaAaSubLoadBalance
2.1.33. tmnxBsxIsaAaTimFileProcFailure
2.1.34. tmnxBsxMobileSubModifyFailure
2.1.35. tmnxBsxRadApFailure
2.1.36. tmnxBsxRadApIntrmUpdateSkipped
2.1.37. tmnxBsxRadApServOperStateChange
2.1.38. tmnxBsxStatFtrEnTcaThreshCrClear
2.1.39. tmnxBsxStatFtrEnTcaThreshCrossed
2.1.40. tmnxBsxStatFtrTcaThreshCrClear
2.1.41. tmnxBsxStatFtrTcaThreshCrossed
2.1.42. tmnxBsxStatPolcrTcaThreshCrClear
2.1.43. tmnxBsxStatPolcrTcaThreshCrossed
2.1.44. tmnxBsxStatTcaThreshCrossed
2.1.45. tmnxBsxStatTcaThreshCrossedClear
2.1.46. tmnxBsxSubModifyFailure
2.1.47. tmnxBsxTcpValTcaCrossed
2.1.48. tmnxBsxTcpValTcaCrossedClear
2.1.49. tmnxBsxTransIpPolAaSubCreated
2.1.50. tmnxBsxTransIpPolAaSubDeleted
2.1.51. tmnxBsxTransIpPolDhcpAddWarning
2.1.52. tmnxBsxTransIpPolDhcpDelWarning
2.1.53. tmnxBsxTransIpPolDiamGxError
2.1.54. tmnxBsxTransIpPolRadCoAAudit
2.1.55. tmnxBsxTransIpPolRadCoAError
2.1.56. tmnxBsxTransIpPolRadDiscError
2.1.57. tmnxBsxTransitIpPersistenceWarn
2.1.58. tmnxBsxUrlFilterOperStateChange
2.1.59. tmnxBsxUrlListFailure
2.1.60. tmnxBsxUrlListUpdate
2.2. APS
2.2.1. apsEventChannelMismatch
2.2.2. apsEventFEPLF
2.2.3. apsEventModeMismatch
2.2.4. apsEventPSBF
2.2.5. apsEventSwitchover
2.2.6. tApsChannelMismatchClear
2.2.7. tApsChanTxLaisStateChange
2.2.8. tApsFEPLFClear
2.2.9. tApsLocalSwitchCommandClear
2.2.10. tApsLocalSwitchCommandSet
2.2.11. tApsMcApsCtlLinkStateChange
2.2.12. tApsModeMismatchClear
2.2.13. tApsPrimaryChannelChange
2.2.14. tApsPSBFClear
2.2.15. tApsRemoteSwitchCommandClear
2.2.16. tApsRemoteSwitchCommandSet
2.3. ATM
2.3.1. atmIfcStatusChange
2.3.2. atmIlmiPeerVclStatusChange
2.3.3. atmIlmiPeerVplStatusChange
2.3.4. atmVclStatusChange
2.3.5. atmVplStatusChange
2.3.6. atmVtlStatusChange
2.3.7. tAtmEpOutOfPeerVpiOrVciRange
2.3.8. tAtmIlmiLinkStatusChange
2.3.9. tAtmMaxPeerVccsExceeded
2.3.10. tAtmMaxPeerVpcsExceeded
2.3.11. tAtmPlcpSubLayerClear
2.3.12. tAtmPlcpSubLayerDown
2.3.13. tAtmTcSubLayerClear
2.3.14. tAtmTcSubLayerDown
2.4. BFD
2.4.1. tmnxBfdOnLspSessDeleted
2.4.2. tmnxBfdOnLspSessDown
2.4.3. tmnxBfdOnLspSessNoCpmNpResources
2.4.4. tmnxBfdOnLspSessProtChange
2.4.5. tmnxBfdOnLspSessUp
2.5. BGP
2.5.1. bgpBackwardTransNotification
2.5.2. bgpCfgViol
2.5.3. bgpConnMgrTerminated
2.5.4. bgpConnNoKA
2.5.5. bgpConnNoOpenRcvd
2.5.6. bgpEstablishedNotification
2.5.7. bgpInterfaceDown
2.5.8. bgpNoMemoryPeer
2.5.9. bgpPeerNotFound
2.5.10. bgpRejectConnBadLocAddr
2.5.11. bgpRemoteEndClosedConn
2.5.12. bgpTerminated
2.5.13. bgpVariableRangeViolation
2.5.14. receiveNotification
2.5.15. sendNotification
2.5.16. tBgp4PathAttrInvalid
2.5.17. tBgp4RouteInvalid
2.5.18. tBgp4UpdateInvalid
2.5.19. tBgp4WithdrawnRtFromUpdateError
2.5.20. tBgpFibResourceFailPeer
2.5.21. tBgpFlowRouteInvalid
2.5.22. tBgpFlowspecUnsupportdComAction
2.5.23. tBgpGeneral
2.5.24. tBgpInstanceDynamicPeerLmtReachd
2.5.25. tBgpMaxNgPfxLmt
2.5.26. tBgpMaxNgPfxLmtThresholdReached
2.5.27. tBgpNgBackwardTransition
2.5.28. tBgpNgEstablished
2.5.29. tBgpPeerGRStatusChange
2.5.30. tBgpPeerNgHoldTimeInconsistent
2.5.31. tBgpPGDynamicPeerLmtReached
2.5.32. tBgpReceivedInvalidNlri
2.6. CALLTRACE
2.6.1. tmnxCallTraceLocSizeLimitReached
2.6.2. tmnxCallTraceMaxFilesNumReached
2.7. CFLOWD
2.7.1. tmnxCflowdCreateFailure
2.7.2. tmnxCflowdFlowCreateFailure
2.7.3. tmnxCflowdPacketTxFailure
2.7.4. tmnxCflowdStateChange
2.8. CHASSIS
2.8.1. CpmIcPortSFFStatusDDMCorrupt
2.8.2. CpmIcPortSFFStatusFailure
2.8.3. CpmIcPortSFFStatusReadError
2.8.4. CpmIcPortSFFStatusUnsupported
2.8.5. SfmIcPortSFFStatusDDMCorrupt
2.8.6. SfmIcPortSFFStatusFailure
2.8.7. SfmIcPortSFFStatusReadError
2.8.8. SfmIcPortSFFStatusUnsupported
2.8.9. tIPsecIsaMemHighWatermark
2.8.10. tIPsecIsaMemLowWatermark
2.8.11. tIPsecIsaMemMax
2.8.12. tmnxAlarmInputVoltageFailure
2.8.13. tmnxChassisHiBwMcastAlarm
2.8.14. tmnxChassisNotificationClear
2.8.15. tmnxChassisUpgradeComplete
2.8.16. tmnxChassisUpgradeInProgress
2.8.17. tmnxCpmALocalIcPortAvail
2.8.18. tmnxCpmANoLocalIcPort
2.8.19. tmnxCpmBLocalIcPortAvail
2.8.20. tmnxCpmBNoLocalIcPort
2.8.21. tmnxCpmCardSyncFileNotPresent
2.8.22. tmnxCpmIcPortDDMClear
2.8.23. tmnxCpmIcPortDDMFailure
2.8.24. tmnxCpmIcPortDown
2.8.25. tmnxCpmIcPortSFFInserted
2.8.26. tmnxCpmIcPortSFFRemoved
2.8.27. tmnxCpmIcPortUp
2.8.28. tmnxCpmMemSizeMismatch
2.8.29. tmnxCpmMemSizeMismatchClear
2.8.30. tmnxDcpCardFpEventOvrflw
2.8.31. tmnxDcpCardFpEventOvrflwClr
2.8.32. tmnxDcpCardSapEventOvrflw
2.8.33. tmnxDcpCardSapEventOvrflwClr
2.8.34. tmnxDcpCardVrtrIfEventOvrflw
2.8.35. tmnxDcpCardVrtrIfEventOvrflwClr
2.8.36. tmnxDcpFpDynPoolUsageHiAlmClear
2.8.37. tmnxDcpFpDynPoolUsageHiAlmRaise
2.8.38. tmnxEnvTempTooHigh
2.8.39. tmnxEqCardChipIfCellEvent
2.8.40. tmnxEqCardChipIfDownEvent
2.8.41. tmnxEqCardFailure
2.8.42. tmnxEqCardFirmwareUpgraded
2.8.43. tmnxEqCardInserted
2.8.44. tmnxEqCardPChipCamEvent
2.8.45. tmnxEqCardPChipError
2.8.46. tmnxEqCardPChipMemoryEvent
2.8.47. tmnxEqCardQChipBufMemoryEvent
2.8.48. tmnxEqCardQChipIntMemoryEvent
2.8.49. tmnxEqCardQChipStatsMemoryEvent
2.8.50. tmnxEqCardRemoved
2.8.51. tmnxEqCardSoftResetAlarm
2.8.52. tmnxEqCardTChipParityEvent
2.8.53. tmnxEqDataPathFailureProtImpact
2.8.54. tmnxEqFanFailure
2.8.55. tmnxEqFlashDataLoss
2.8.56. tmnxEqFlashDiskFull
2.8.57. tmnxEqHwEnhancedCapability
2.8.58. tmnxEqLowSwitchFabricCap
2.8.59. tmnxEqLowSwitchFabricCapClear
2.8.60. tmnxEqMdaCfgNotCompatible
2.8.61. tmnxEqMdaIngrXplError
2.8.62. tmnxEqMdaSyncENotCompatible
2.8.63. tmnxEqMdaXplError
2.8.64. tmnxEqMgmtEthRedStandbyClear
2.8.65. tmnxEqMgmtEthRedStandbyRaise
2.8.66. tmnxEqPhysChassisFanFailure
2.8.67. tmnxEqPhysChassisFanFailureClear
2.8.68. tmnxEqPhysChassPowerSupAcFail
2.8.69. tmnxEqPhysChassPowerSupAcFailClr
2.8.70. tmnxEqPhysChassPowerSupDcFail
2.8.71. tmnxEqPhysChassPowerSupDcFailClr
2.8.72. tmnxEqPhysChassPowerSupInFail
2.8.73. tmnxEqPhysChassPowerSupInFailClr
2.8.74. tmnxEqPhysChassPowerSupOutFail
2.8.75. tmnxEqPhysChassPowerSupOutFailCl
2.8.76. tmnxEqPhysChassPowerSupOvrTmp
2.8.77. tmnxEqPhysChassPowerSupOvrTmpClr
2.8.78. tmnxEqPowerCapacityExceeded
2.8.79. tmnxEqPowerCapacityExceededClear
2.8.80. tmnxEqPowerLostCapacity
2.8.81. tmnxEqPowerLostCapacityClear
2.8.82. tmnxEqPowerOverloadState
2.8.83. tmnxEqPowerOverloadStateClear
2.8.84. tmnxEqPowerSafetyAlertClear
2.8.85. tmnxEqPowerSafetyAlertThreshold
2.8.86. tmnxEqPowerSafetyLevelClear
2.8.87. tmnxEqPowerSafetyLevelThreshold
2.8.88. tmnxEqPowerSupplyFailureAc
2.8.89. tmnxEqPowerSupplyFailureDc
2.8.90. tmnxEqPowerSupplyFailureInput
2.8.91. tmnxEqPowerSupplyFailureOutput
2.8.92. tmnxEqPowerSupplyFailureOvt
2.8.93. tmnxEqPowerSupplyInputFeedAlm
2.8.94. tmnxEqPowerSupplyInputFeedAlmClr
2.8.95. tmnxEqPowerSupplyInserted
2.8.96. tmnxEqPowerSupplyPemACRectAlm
2.8.97. tmnxEqPowerSupplyPemACRectAlmClr
2.8.98. tmnxEqPowerSupplyRemoved
2.8.99. tmnxEqProvPowerCapacityAlm
2.8.100. tmnxEqProvPowerCapacityAlmClr
2.8.101. tmnxEqSyncIfTimingBITS2Alarm
2.8.102. tmnxEqSyncIfTimingBITS2AlarmClr
2.8.103. tmnxEqSyncIfTimingBITS2Quality
2.8.104. tmnxEqSyncIfTimingBITSAlarm
2.8.105. tmnxEqSyncIfTimingBITSAlarmClear
2.8.106. tmnxEqSyncIfTimingBITSOutRefChg
2.8.107. tmnxEqSyncIfTimingBITSQuality
2.8.108. tmnxEqSyncIfTimingHoldover
2.8.109. tmnxEqSyncIfTimingHoldoverClear
2.8.110. tmnxEqSyncIfTimingPTPAlarm
2.8.111. tmnxEqSyncIfTimingPTPAlarmClr
2.8.112. tmnxEqSyncIfTimingPTPQuality
2.8.113. tmnxEqSyncIfTimingRef1Alarm
2.8.114. tmnxEqSyncIfTimingRef1AlarmClear
2.8.115. tmnxEqSyncIfTimingRef1Quality
2.8.116. tmnxEqSyncIfTimingRef2Alarm
2.8.117. tmnxEqSyncIfTimingRef2AlarmClear
2.8.118. tmnxEqSyncIfTimingRef2Quality
2.8.119. tmnxEqSyncIfTimingRefSwitch
2.8.120. tmnxEqSyncIfTimingSystemQuality
2.8.121. tmnxEqWrongCard
2.8.122. tmnxExtStandbyCpmReboot
2.8.123. tmnxExtStandbyCpmRebootFail
2.8.124. tmnxInterChassisCommsDown
2.8.125. tmnxInterChassisCommsUp
2.8.126. tmnxIomEventOverflow
2.8.127. tmnxIomEventOverflowClr
2.8.128. tmnxIomResExhausted
2.8.129. tmnxIomResHighLimitReached
2.8.130. tmnxIomResStateClr
2.8.131. tmnxIPsecIsaGrpActiveIsaChgd
2.8.132. tmnxIPsecIsaGrpTnlHighWMark
2.8.133. tmnxIPsecIsaGrpTnlLowWMark
2.8.134. tmnxIPsecIsaGrpTnlMax
2.8.135. tmnxIPsecIsaGrpUnableToSwitch
2.8.136. tmnxMDAIsaTunnelGroupChange
2.8.137. tmnxOesCardDegraded
2.8.138. tmnxOesCardFirmwareErr
2.8.139. tmnxOesCfgBlocked
2.8.140. tmnxOesCfgFailNoMemory
2.8.141. tmnxOesCtlCardActivityChange
2.8.142. tmnxOesCtlCardPortDown
2.8.143. tmnxOesCtlCardPortUp
2.8.144. tmnxOesCtlCommsDown
2.8.145. tmnxOesCtlCommsUp
2.8.146. tmnxOesDbInvalid
2.8.147. tmnxOesDbInvalidClear
2.8.148. tmnxOesDbSyncFailure
2.8.149. tmnxOesDbSyncFailureClear
2.8.150. tmnxOesDbUnsync
2.8.151. tmnxOesDbUnsyncClear
2.8.152. tmnxOesFan32HReqd
2.8.153. tmnxOesFan32HReqdClear
2.8.154. tmnxOesFanFailure
2.8.155. tmnxOesFanFailureClear
2.8.156. tmnxOesFanInserted
2.8.157. tmnxOesFanRemoved
2.8.158. tmnxOesFanSpeedHigh
2.8.159. tmnxOesFanSpeedHighClear
2.8.160. tmnxOesFanSpeedLow
2.8.161. tmnxOesFanSpeedLowClear
2.8.162. tmnxOesFirmwareCondition
2.8.163. tmnxOesFpgaFail
2.8.164. tmnxOesFpgaFailClear
2.8.165. tmnxOesFpgaTimeout
2.8.166. tmnxOesFpgaTimeoutClear
2.8.167. tmnxOesNtpOutOfSync
2.8.168. tmnxOesNtpSync
2.8.169. tmnxOesOptTrnspndrMiscFail
2.8.170. tmnxOesPowerSupplyFailure
2.8.171. tmnxOesPowerSupplyFailureClear
2.8.172. tmnxOesPowerSupplyInserted
2.8.173. tmnxOesPowerSupplyRemoved
2.8.174. tmnxOesRedundancyFail
2.8.175. tmnxOesRedundancyReady
2.8.176. tmnxOesSwBelowMinRev
2.8.177. tmnxOesSwUpgdCleanupFailed
2.8.178. tmnxOesSwUpgdFailed
2.8.179. tmnxOesTempLow
2.8.180. tmnxOesTempLowClear
2.8.181. tmnxOesUsrpnlPortDown
2.8.182. tmnxOesUsrpnlPortUp
2.8.183. tmnxPeBootloaderVersionMismatch
2.8.184. tmnxPeBootromVersionMismatch
2.8.185. tmnxPeFirmwareVersionWarning
2.8.186. tmnxPeFPGAVersionMismatch
2.8.187. tmnxPeSoftwareLoadFailed
2.8.188. tmnxPeSoftwareVersionMismatch
2.8.189. tmnxPlcyAcctStatsEventOvrflw
2.8.190. tmnxPlcyAcctStatsEventOvrflwClr
2.8.191. tmnxPlcyAcctStatsPoolExcResource
2.8.192. tmnxPlcyAcctStatsPoolLowResource
2.8.193. tmnxPowerSupplyWrongFanDir
2.8.194. tmnxPowerSupplyWrongFanDirClear
2.8.195. tmnxRedPrimaryCPMFail
2.8.196. tmnxSasAlarminput1StateChanged
2.8.197. tmnxSasAlarminput2StateChanged
2.8.198. tmnxSasAlarminput3StateChanged
2.8.199. tmnxSasAlarminput4StateChanged
2.8.200. tmnxSfmIcPortDDMClear
2.8.201. tmnxSfmIcPortDDMFailure
2.8.202. tmnxSfmIcPortDegraded
2.8.203. tmnxSfmIcPortDegradedClear
2.8.204. tmnxSfmIcPortDown
2.8.205. tmnxSfmIcPortSFFInserted
2.8.206. tmnxSfmIcPortSFFRemoved
2.8.207. tmnxSfmIcPortUp
2.8.208. tmnxSyncIfTimBITS2048khzUnsup
2.8.209. tmnxSyncIfTimBITS2048khzUnsupClr
2.9. DEBUG
2.9.1. traceEvent
2.10. DHCP
2.10.1. sapDHCPLeaseEntriesExceeded
2.10.2. sapDHCPLseStateMobilityError
2.10.3. sapDHCPLseStateOverride
2.10.4. sapDHCPLseStatePopulateErr
2.10.5. sapDHCPProxyServerError
2.10.6. sapDHCPSuspiciousPcktRcvd
2.10.7. sapStatHost6DynMacConflict
2.10.8. sapStaticHostDynMacConflict
2.10.9. sdpBindDHCPLeaseEntriesExceeded
2.10.10. sdpBindDHCPLseStateMobilityErr
2.10.11. sdpBindDHCPLseStateOverride
2.10.12. sdpBindDHCPLseStatePopulateErr
2.10.13. sdpBindDHCPProxyServerError
2.10.14. sdpBindDHCPSuspiciousPcktRcvd
2.10.15. svcDHCPLseStateRestoreProblem
2.10.16. svcDHCPMiscellaneousProblem
2.10.17. tmnxVRtrDHCP6AssignedIllegSubnet
2.10.18. tmnxVRtrDHCP6ClientMacUnresolved
2.10.19. tmnxVRtrDHCP6IllegalClientAddr
2.10.20. tmnxVRtrDHCP6LseStateOverride
2.10.21. tmnxVRtrDHCP6RelayLseStExceeded
2.10.22. tmnxVRtrDHCP6RelayReplyStripUni
2.10.23. tmnxVRtrDHCP6ServerLseStExceeded
2.10.24. tmnxVRtrDHCPIfLseStatesExceeded
2.10.25. tmnxVRtrDHCPSuspiciousPcktRcvd
2.11. DHCPS
2.11.1. tmnxDhcpsAddrAllocationFailure
2.11.2. tmnxDhcpsFoLeaseUpdateFailed
2.11.3. tmnxDhcpsFoStateChange
2.11.4. tmnxDhcpsLeaseOfferedExpired
2.11.5. tmnxDhcpsPacketDropped
2.11.6. tmnxDhcpsPoolFoLeaseUpdateFailed
2.11.7. tmnxDhcpsPoolFoStateChange
2.11.8. tmnxDhcpSvrDeclineStaticAddr
2.11.9. tmnxDhcpSvrHostConflict
2.11.10. tmnxDhcpSvrIntLseConflict
2.11.11. tmnxDhcpSvrLeaseCreate
2.11.12. tmnxDhcpSvrLeaseDefaultTimers
2.11.13. tmnxDhcpSvrLeaseDelete
2.11.14. tmnxDhcpSvrLeaseModify
2.11.15. tmnxDhcpSvrLeaseNotOwner
2.11.16. tmnxDhcpSvrMaxLeasesReached
2.11.17. tmnxDhcpSvrMsgTooLong
2.11.18. tmnxDhcpSvrNoContFreeBlocks
2.11.19. tmnxDhcpSvrNoSubnetFixAddr
2.11.20. tmnxDhcpSvrPfxThDepletedV6
2.11.21. tmnxDhcpSvrPfxThTooLowV6
2.11.22. tmnxDhcpSvrPlThDepletedV6
2.11.23. tmnxDhcpSvrPlThTooLowV6
2.11.24. tmnxDhcpSvrPoolDepleted
2.11.25. tmnxDhcpSvrPoolMinFreeExc
2.11.26. tmnxDhcpSvrPoolUnknown
2.11.27. tmnxDhcpSvrSubnetDepleted
2.11.28. tmnxDhcpSvrSubnetMinFreeExc
2.11.29. tmnxDhcpSvrUserDbUnknown
2.12. DIAMETER
2.12.1. tmnxDiamAppSessionFailure
2.12.2. tmnxDiamMessageDropped
2.12.3. tmnxDiamPolicyPeerStateChange
2.12.4. tmnxDiamPpPrxMcLocStateChanged
2.12.5. tmnxDiamSessionEvent
2.13. DYNSVC
2.13.1. tmnxDynSvcSapFailed
2.14. EFM_OAM
2.14.1. dot3OamNonThresholdEvent
2.14.2. dot3OamThresholdEvent
2.14.3. tmnxDot3OamLoopCleared
2.14.4. tmnxDot3OamLoopDetected
2.14.5. tmnxDot3OamNonThresholdEventClr
2.14.6. tmnxDot3OamPeerChanged
2.14.7. tmnxDot3OamSdThresholdEvent
2.14.8. tmnxDot3OamThresholdEventClr
2.15. ELMI
2.15.1. tmnxElmiEVCStatusChangeEvent
2.15.2. tmnxElmiIfStatusChangeEvent
2.16. ERING
2.16.1. tmnxEthRingApsPrvsnClearAlarm
2.16.2. tmnxEthRingApsPrvsnRaiseAlarm
2.16.3. tmnxEthRingPathFwdStateChange
2.17. ETH_CFM
2.17.1. dot1agCfmFaultAlarm
2.17.2. tmnxDot1agCfmMepAisStateChanged
2.17.3. tmnxDot1agCfmMepCsfStateChanged
2.17.4. tmnxDot1agCfmMepDMTestComplete
2.17.5. tmnxDot1agCfmMepEthTestComplete
2.17.6. tmnxDot1agCfmMepFcltyFaultClear
2.17.7. tmnxDot1agCfmMepFcltyFaultRaise
2.17.8. tmnxDot1agCfmMepLbmTestComplete
2.17.9. tmnxDot1agCfmMepLtmTestComplete
2.17.10. tmnxDot1agCfmMepSLMTestComplete
2.17.11. tmnxDot1agCfmMipEvaluation
2.18. ETUN
2.18.1. tmnxEthTunnelApsCfgClearAlarm
2.18.2. tmnxEthTunnelApsCfgRaiseAlarm
2.18.3. tmnxEthTunnelApsNoRspClearAlarm
2.18.4. tmnxEthTunnelApsNoRspRaiseAlarm
2.18.5. tmnxEthTunnelApsPrvsnClearAlarm
2.18.6. tmnxEthTunnelApsPrvsnRaiseAlarm
2.18.7. tmnxEthTunnelApsSwitchoverAlarm
2.19. FILTER
2.19.1. tFilterApplyPathProblem
2.19.2. tFilterBgpFlowSpecProblem
2.19.3. tFilterEmbeddingOperStateChange
2.19.4. tFilterEmbedFlowspecOperStateChg
2.19.5. tFilterEmbedOpenflowOperStateChg
2.19.6. tFilterEmbedVsdOperStateChg
2.19.7. tFilterOpenflowRequestRejected
2.19.8. tFilterRadSharedFltrAlarmClear
2.19.9. tFilterRadSharedFltrAlarmRaised
2.19.10. tFilterSubInsFltrEntryDropped
2.19.11. tFilterSubInsSpaceAlarmCleared
2.19.12. tFilterSubInsSpaceAlarmRaised
2.19.13. tFilterTmsEvent
2.19.14. tIPFilterPBRPacketsDrop
2.20. GMPLS
2.20.1. vRtrGmplsLspPathStateChange
2.21. GSMP
2.21.1. tmnxAncpEgrRateMonitorEvent
2.21.2. tmnxAncpEgrRateMonitorEventL
2.21.3. tmnxAncpIngRateMonitorEvent
2.21.4. tmnxAncpIngRateMonitorEventL
2.21.5. tmnxAncpSesRejected
2.21.6. tmnxAncpShcvDisabledEvent
2.21.7. tmnxAncpShcvDisabledEventL
2.21.8. tmnxAncpStringRejected
2.22. IGH
2.22.1. tmnxIfGroupHandlerProtoOprChange
2.22.2. tmnxIfGroupHdlrMbrProtoOprChange
2.23. IGMP
2.23.1. vRtrIgmpGrpIfSapCModeRxQueryMism
2.23.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
2.23.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
2.23.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
2.23.5. vRtrIgmpGrpIfSapMcacPlcyDropped
2.23.6. vRtrIgmpGrpIfSapRxQueryVerMism
2.23.7. vRtrIgmpHostCModeRxQueryMismatch
2.23.8. vRtrIgmpHostInstantiationFail
2.23.9. vRtrIgmpHostMaxGrpsLimitExceeded
2.23.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
2.23.11. vRtrIgmpHostMaxSrcsLimitExceeded
2.23.12. vRtrIgmpHostMcacPlcyDropped
2.23.13. vRtrIgmpHostQryIntervalConflict
2.23.14. vRtrIgmpHostRxQueryVerMismatch
2.23.15. vRtrIgmpIfCModeRxQueryMismatch
2.23.16. vRtrIgmpIfRxQueryVerMismatch
2.23.17. vRtrIgmpMaxGrpsLimitExceeded
2.23.18. vRtrIgmpMaxGrpSrcsLimitExceeded
2.23.19. vRtrIgmpMaxSrcsLimitExceeded
2.23.20. vRtrIgmpMcacPlcyDropped
2.24. IGMP_SNOOPING
2.24.1. sapIgmpSnpgGrpLimitExceeded
2.24.2. sapIgmpSnpgGrpSrcLimitExceeded
2.24.3. sapIgmpSnpgMcacPlcyDropped
2.24.4. sapIgmpSnpgMcsFailure
2.24.5. sapIgmpSnpgSrcLimitExceeded
2.24.6. sdpBndIgmpSnpgGrpLimitExceeded
2.24.7. sdpBndIgmpSnpgGrpSrcLimitExceed
2.24.8. sdpBndIgmpSnpgMcacPlcyDropped
2.24.9. sdpBndIgmpSnpgSrcLimitExceeded
2.25. IP
2.25.1. clearRTMError
2.25.2. fibAddFailed
2.25.3. ipAnyDuplicateAddress
2.25.4. ipArpBadInterface
2.25.5. ipArpDuplicateIpAddress
2.25.6. ipArpDuplicateMacAddress
2.25.7. ipArpInfoOverwritten
2.25.8. ipDuplicateAddress
2.25.9. ipEtherBroadcast
2.25.10. qosNetworkPolicyMallocFailed
2.26. IPSEC
2.26.1. tIPsecBfdIntfSessStateChgd
2.26.2. tIPsecRadAcctPlcyFailure
2.26.3. tIPsecRUSAFailToAddRoute
2.26.4. tIPsecRuTnlEncapIpMtuTooSmall
2.26.5. tIPsecRUTnlFailToCreate
2.26.6. tIPsecRUTnlRemoved
2.26.7. tIPSecTrustAnchorPrfOprChg
2.26.8. tIPsecTunnelEncapIpMtuTooSmall
2.26.9. tmnxIPsecGWOperStateChange
2.26.10. tmnxIPsecTunnelOperStateChange
2.26.11. tmnxSecNotifCmptedCertChnChngd
2.26.12. tmnxSecNotifCmptedCertHashChngd
2.26.13. tmnxSecNotifSendChnNotInCmptChn
2.27. ISIS
2.27.1. tmnxIsisAdjacencyChange
2.27.2. tmnxIsisAdjBfdSessionSetupFail
2.27.3. tmnxIsisAdjRestartStatusChange
2.27.4. tmnxIsisAreaMismatch
2.27.5. tmnxIsisAuthFail
2.27.6. tmnxIsisAutTypeFail
2.27.7. tmnxIsisCircIdExhausted
2.27.8. tmnxIsisCorruptedLSPDetected
2.27.9. tmnxIsisDatabaseOverload
2.27.10. tmnxIsisExportLimitReached
2.27.11. tmnxIsisExportLimitWarning
2.27.12. tmnxIsisFailureDisabled
2.27.13. tmnxIsisIDLenMismatch
2.27.14. tmnxIsisLdpSyncExit
2.27.15. tmnxIsisLdpSyncTimerStarted
2.27.16. tmnxIsisLSPPurge
2.27.17. tmnxIsisLSPTooLargeToPropagate
2.27.18. tmnxIsisManualAddressDrops
2.27.19. tmnxIsisMaxAreaAddrsMismatch
2.27.20. tmnxIsisMaxSeqExceedAttempt
2.27.21. tmnxIsisOrigLSPBufSizeMismatch
2.27.22. tmnxIsisOwnLSPPurge
2.27.23. tmnxIsisPfxLimitOverloadWarning
2.27.24. tmnxIsisProtoSuppMismatch
2.27.25. tmnxIsisRejectedAdjacency
2.27.26. tmnxIsisRejectedAdjacencySid
2.27.27. tmnxIsisRoutesExpLmtDropped
2.27.28. tmnxIsisSequenceNumberSkip
2.27.29. tmnxIsisSidError
2.27.30. tmnxIsisSidNotInLabelRange
2.27.31. tmnxIsisSpbEctFidCfgChg
2.27.32. tmnxIsisSpbNbrMultAdjExists
2.27.33. tmnxIsisSpbNbrMultAdjExistsClear
2.27.34. tmnxIsisSrgbBadLabelRange
2.27.35. tmnxIsisVersionSkew
2.27.36. vRtrIsisSpbNbrMultAdjExists
2.27.37. vRtrIsisSpbNbrMultAdjExistsClear
2.27.38. vRtrSpbEctFidCfgChg
2.28. L2TP
2.28.1. tmnxL2tpApFailure
2.28.2. tmnxL2tpIsaMdaVRtrStateChange
2.28.3. tmnxL2tpLnsPppNcpFailure
2.28.4. tmnxL2tpLnsSePppSessionFailure
2.28.5. tmnxL2tpPeerUnreachable
2.28.6. tmnxL2tpTunnelBlacklisted
2.28.7. tmnxL2tpTunnelSelBlacklistFull
2.29. LAG
2.29.1. DynamicCostOff
2.29.2. DynamicCostOn
2.29.3. LagPortAddFailed
2.29.4. LagPortAddFailureCleared
2.29.5. LagStateEvent
2.29.6. LagSubGroupSelected
2.29.7. tLagMemberStateEvent
2.29.8. tmnxLagBfdMemStateChanged
2.30. LDAP
2.30.1. tmnxLdapOperStateChange
2.30.2. tmnxLdapServerOperStateChange
2.31. LDP
2.31.1. vRtrLdpGroupIdMismatch
2.31.2. vRtrLdpNgIfStateChange
2.31.3. vRtrLdpNgInetIfStateChange
2.31.4. vRtrLdpNgIpv4InstStateChange
2.31.5. vRtrLdpNgIpv6InstStateChange
2.31.6. vRtrLdpNgResourceExhaustion
2.31.7. vRtrLdpNgSessionStateChange
2.31.8. vRtrLdpNgSessMaxFecLimitReached
2.31.9. vRtrLdpNgSessMaxFecThresChanged
2.31.10. vRtrLdpNgTargPeerStateChange
2.31.11. vRtrLdpStateChange
2.32. LI
2.32.1. cli_config_io
2.32.2. cli_unauth_config_io
2.32.3. cli_unauth_user_io
2.32.4. cli_user_io
2.32.5. cli_user_login
2.32.6. cli_user_login_failed
2.32.7. cli_user_login_max_attempts
2.32.8. cli_user_logout
2.32.9. destinationDisabled
2.32.10. destinationEnabled
2.32.11. ftp_user_login
2.32.12. ftp_user_login_failed
2.32.13. ftp_user_login_max_attempts
2.32.14. ftp_user_logout
2.32.15. host_snmp_attempts
2.32.16. radiusFailed
2.32.17. sbiBootLiConfig
2.32.18. snmp_user_set
2.32.19. sourceDisabled
2.32.20. sourceEnabled
2.32.21. sourceSapChange
2.32.22. sourceSubscriberChange
2.32.23. ssh_user_login
2.32.24. ssh_user_login_failed
2.32.25. ssh_user_login_max_attempts
2.32.26. ssh_user_logout
2.32.27. ssiSaveConfigFailed
2.32.28. ssiSaveConfigSucceeded
2.32.29. ssiSyncConfigFailed
2.32.30. ssiSyncConfigOK
2.32.31. tMirrorDestinationChangeReject
2.32.32. tMirrorFilterAssignToItfWarn
2.32.33. tMirrorFilterAssignToSapWarn
2.32.34. tMirrorFilterAssignToSdpWarn
2.32.35. tMirrorLiNat64SubOperStateCh
2.32.36. tMirrorLiNatL2awSubOperStateCh
2.32.37. tMirrorLiNatLsnSubOperStateCh
2.32.38. tMirrorSourceFilterAssignReject
2.32.39. tMirrorSourceFilterAssignWarn
2.32.40. tMirrorSourceFilterOverruled
2.32.41. tMirrorSourceIPFltrChangeReject
2.32.42. tMirrorSourceIPv6FltrChangeRej
2.32.43. tMirrorSourceLiFilterChanged
2.32.44. tMirrorSourceLiSubProblem
2.32.45. tMirrorSourceMacFltrChangeReject
2.32.46. tmnxClear
2.32.47. tmnxConfigCreate
2.32.48. tmnxConfigDelete
2.32.49. tmnxConfigModify
2.32.50. tmnxStateChange
2.33. LLDP
2.33.1. lldpRemTablesChange
2.34. LMP
2.34.1. tmnxLmpVRtrControlChannelState
2.34.2. tmnxLmpVRtrDbLinkPropMismatch
2.34.3. tmnxLmpVRtrDbLinkPropMismatchClr
2.34.4. tmnxLmpVRtrTeLinkPropMismatch
2.34.5. tmnxLmpVRtrTeLinkPropMismatchClr
2.34.6. tmnxLmpVRtrTeLinkState
2.35. LOGGER
2.35.1. STARTED
2.35.2. tmnxClear
2.35.3. tmnxLogAccountingDataLoss
2.35.4. tmnxLogAdminLocFailed
2.35.5. tmnxLogBackupLocFailed
2.35.6. tmnxLogEventOverrun
2.35.7. tmnxLogEventThrottled
2.35.8. tmnxLogFileDeleted
2.35.9. tmnxLogFileRollover
2.35.10. tmnxLogOnlyEventOverrun
2.35.11. tmnxLogOnlyEventThrottled
2.35.12. tmnxLogSpaceContention
2.35.13. tmnxLogTraceError
2.35.14. tmnxStdEventsReplayed
2.35.15. tmnxSysLogTargetProblem
2.35.16. tmnxTestEvent
2.36. MC_REDUNDANCY
2.36.1. srrpPacketDiscarded
2.36.2. tMcPeerIPsecTnlGrpMasterStateChg
2.36.3. tMcPeerIPsecTnlGrpProtStatusChg
2.36.4. tmnxMCEPSessionPsvModeDisabled
2.36.5. tmnxMCEPSessionPsvModeEnabled
2.36.6. tmnxMcLagInfoLagChanged
2.36.7. tmnxMcOmcrClientNumEntriesHigh
2.36.8. tmnxMcOmcrStatFailedChanged
2.36.9. tmnxMcPeerEPBfdSessionClose
2.36.10. tmnxMcPeerEPBfdSessionDown
2.36.11. tmnxMcPeerEPBfdSessionOpen
2.36.12. tmnxMcPeerEPBfdSessionUp
2.36.13. tmnxMcPeerEPOperDown
2.36.14. tmnxMcPeerEPOperUp
2.36.15. tmnxMcPeerRingsOperStateChanged
2.36.16. tmnxMcPeerSyncStatusChanged
2.36.17. tmnxMcRedundancyMismatchDetected
2.36.18. tmnxMcRedundancyMismatchResolved
2.36.19. tmnxMcRedundancyPeerStateChanged
2.36.20. tmnxMcRingInbCtrlOperStateChgd
2.36.21. tmnxMcRingNodeLocOperStateChgd
2.36.22. tmnxMcRingOperStateChanged
2.36.23. tmnxMcSyncClientAlarmCleared
2.36.24. tmnxMcSyncClientAlarmRaised
2.36.25. tmnxMcSyncClockSkewCleared
2.36.26. tmnxMcSyncClockSkewRaised
2.36.27. tmnxSrrpBecameBackup
2.36.28. tmnxSrrpBfdIntfSessStateChgd
2.36.29. tmnxSrrpDualMaster
2.36.30. tmnxSrrpDuplicateSubIfAddress
2.36.31. tmnxSrrpInstanceIdMismatch
2.36.32. tmnxSrrpOperDownInvalidMac
2.36.33. tmnxSrrpOperDownInvalidMacClear
2.36.34. tmnxSrrpRedIfMismatch
2.36.35. tmnxSrrpSapMismatch
2.36.36. tmnxSrrpSapTagMismatch
2.36.37. tmnxSrrpSubnetMismatch
2.36.38. tmnxSrrpSubnetMismatchCleared
2.36.39. tmnxSrrpSystemIpNotSet
2.36.40. tmnxSrrpTrapNewMaster
2.37. MCPATH
2.37.1. tmnxMcPathAvailBwLimitReached
2.37.2. tmnxMcPathAvailBwValWithinRange
2.37.3. tmnxMcPathSrcGrpBlkHole
2.37.4. tmnxMcPathSrcGrpBlkHoleClear
2.38. MIRROR
2.38.1. destinationDisabled
2.38.2. destinationEnabled
2.38.3. sourceDisabled
2.38.4. sourceEnabled
2.38.5. sourceIpFilterChange
2.38.6. sourceMacFilterChange
2.38.7. sourceSapChange
2.38.8. sourceSubscriberChange
2.38.9. tMirrorSourceIpv6FilterChange
2.39. MLD
2.39.1. vRtrMldGrpIfSapCModeRxQueryMism
2.39.2. vRtrMldGrpIfSapMaxGrpsLimExceed
2.39.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
2.39.4. vRtrMldGrpIfSapMaxSrcsLimExceed
2.39.5. vRtrMldGrpIfSapMcacPlcyDropped
2.39.6. vRtrMldGrpIfSapRxQueryVerMism
2.39.7. vRtrMldHostCModeRxQueryMismatch
2.39.8. vRtrMldHostInstantiationFail
2.39.9. vRtrMldHostMaxGrpsLimitExceeded
2.39.10. vRtrMldHostMaxGrpSrcsLimitExcd
2.39.11. vRtrMldHostMaxSrcsLimitExceeded
2.39.12. vRtrMldHostMcacPlcyDropped
2.39.13. vRtrMldHostQryIntervalConflict
2.39.14. vRtrMldHostRxQueryVerMismatch
2.39.15. vRtrMldIfCModeRxQueryMismatch
2.39.16. vRtrMldIfRxQueryVerMismatch
2.39.17. vRtrMldMaxGrpsLimitExceeded
2.39.18. vRtrMldMaxGrpSrcsLimitExceeded
2.39.19. vRtrMldMaxSrcsLimitExceeded
2.39.20. vRtrMldMcacPlcyDropped
2.40. MLD_SNOOPING
2.40.1. sapMldSnpgGrpLimitExceeded
2.40.2. sapMldSnpgMcsFailure
2.40.3. sdpBndMldSnpgGrpLimitExceeded
2.41. MPLS
2.41.1. mplsTunnelDown
2.41.2. mplsTunnelReoptimized
2.41.3. mplsTunnelRerouted
2.41.4. mplsTunnelUp
2.41.5. mplsXCDown
2.41.6. mplsXCUp
2.41.7. vRtrMplsIfStateChange
2.41.8. vRtrMplsLspActivePathChanged
2.41.9. vRtrMplsLspDown
2.41.10. vRtrMplsLspPathDown
2.41.11. vRtrMplsLspPathLstFillReoptElig
2.41.12. vRtrMplsLspPathMbbStatusEvent
2.41.13. vRtrMplsLspPathRerouted
2.41.14. vRtrMplsLspPathResignaled
2.41.15. vRtrMplsLspPathSoftPreempted
2.41.16. vRtrMplsLspPathUp
2.41.17. vRtrMplsLspSwitchStbyFailure
2.41.18. vRtrMplsLspUp
2.41.19. vRtrMplsNodeInIgpOverload
2.41.20. vRtrMplsP2mpInstanceDown
2.41.21. vRtrMplsP2mpInstanceResignaled
2.41.22. vRtrMplsP2mpInstanceUp
2.41.23. vRtrMplsResignalTimerExpired
2.41.24. vRtrMplsS2lSubLspDown
2.41.25. vRtrMplsS2lSubLspRerouted
2.41.26. vRtrMplsS2lSubLspResignaled
2.41.27. vRtrMplsS2lSubLspUp
2.41.28. vRtrMplsStateChange
2.41.29. vRtrMplsXCBundleChange
2.42. MPLS_TP
2.42.1. vRtrMplsTpLspActivePathChange
2.42.2. vRtrMplsTpLspActivePathUp
2.42.3. vRtrMplsTpLspPtTypeMismatchAlarm
2.42.4. vRtrMplsTpLspPtTypeMismatchClear
2.42.5. vRtrMplsTpLspRevertMismatchAlarm
2.42.6. vRtrMplsTpLspRevertMismatchClear
2.43. MSDP
2.43.1. msdpBackwardTransition
2.43.2. msdpEstablished
2.43.3. tmnxMsdpNgActSrcLimExcd
2.43.4. tmnxMsdpNgGroupSrcActMsgsExcd
2.43.5. tmnxMsdpNgPeerActSrcLimExcd
2.43.6. tmnxMsdpNgRPFFailure
2.43.7. tmnxMsdpNgSourceSrcActMsgsExcd
2.44. NAT
2.44.1. tmnxNatDetMapOperStateChanged
2.44.2. tmnxNatDetPlcyChanged
2.44.3. tmnxNatDetPlcyOperStateChanged
2.44.4. tmnxNatFwd2EntryAdded
2.44.5. tmnxNatFwd2OperStateChanged
2.44.6. tmnxNatInAddrPrefixBlksFree
2.44.7. tmnxNatIsaGrpIsDegraded
2.44.8. tmnxNatIsaGrpOperStateChanged
2.44.9. tmnxNatIsaMemberSessionUsageHigh
2.44.10. tmnxNatL2AwSubIcmpPortUsageHigh
2.44.11. tmnxNatL2AwSubSessionUsageHigh
2.44.12. tmnxNatL2AwSubTcpPortUsageHigh
2.44.13. tmnxNatL2AwSubUdpPortUsageHigh
2.44.14. tmnxNatLsnSubBlksFree
2.44.15. tmnxNatLsnSubIcmpPortUsgHigh
2.44.16. tmnxNatLsnSubSessionUsgHigh
2.44.17. tmnxNatLsnSubTcpPortUsgHigh
2.44.18. tmnxNatLsnSubUdpPortUsgHigh
2.44.19. tmnxNatMapRuleChange
2.44.20. tmnxNatMdaActive
2.44.21. tmnxNatMdaDetectsLoadSharingErr
2.44.22. tmnxNatPcpSrvStateChanged
2.44.23. tmnxNatPlAddrFree
2.44.24. tmnxNatPlBlockAllocationL2Aw
2.44.25. tmnxNatPlBlockAllocationLsn
2.44.26. tmnxNatPlL2AwBlockUsageHigh
2.44.27. tmnxNatPlLsnMemberBlockUsageHigh
2.44.28. tmnxNatPlLsnRedActiveChanged
2.44.29. tmnxNatResourceProblemCause
2.44.30. tmnxNatResourceProblemDetected
2.44.31. tmnxNatVrtrOutDnatOnlyRoutesHigh
2.45. NTP
2.45.1. tmnxNtpAuthMismatch
2.45.2. tmnxNtpNoServersAvail
2.45.3. tmnxNtpOperChange
2.45.4. tmnxNtpServerChange
2.45.5. tmnxNtpServersAvail
2.46. OAM
2.46.1. svcIdInvalid
2.46.2. svcIdWrongType
2.46.3. tmnxAncpLoopbackTestCompleted
2.46.4. tmnxAncpLoopbackTestCompletedL
2.46.5. tmnxOamLdpTtraceAutoDiscState
2.46.6. tmnxOamLdpTtraceFecDisStatus
2.46.7. tmnxOamLdpTtraceFecPFailUpdate
2.46.8. tmnxOamLdpTtraceFecProbeState
2.46.9. tmnxOamPingProbeFailedV3
2.46.10. tmnxOamPingTestCompletedV3
2.46.11. tmnxOamPingTestFailedV3
2.46.12. tmnxOamPmThrClear
2.46.13. tmnxOamPmThrRaise
2.46.14. tmnxOamSaaThreshold
2.46.15. tmnxOamTrPathChange
2.46.16. tmnxOamTrTestCompleted
2.46.17. tmnxOamTrTestFailed
2.46.18. tmnxTwampSrvInactivityTimeout
2.46.19. tmnxTwampSrvMaxConnsExceeded
2.46.20. tmnxTwampSrvMaxSessExceeded
2.46.21. tmnxTwampSrvPfxMaxConnsExceeded
2.46.22. tmnxTwampSrvPfxMaxSessExceeded
2.47. OPEN_FLOW
2.47.1. tmnxOFFlowEntryInsertFailed
2.48. OSPF
2.48.1. tmnxOspfAdjBfdSessionSetupFail
2.48.2. tmnxOspfAreaMaxAgeLsa
2.48.3. tmnxOspfAreaOriginateLsa
2.48.4. tmnxOspfAsMaxAgeLsa
2.48.5. tmnxOspfAsOriginateLsa
2.48.6. tmnxOspfExportLimitReached
2.48.7. tmnxOspfExportLimitWarning
2.48.8. tmnxOspfFailureDisabled
2.48.9. tmnxOspfLsdbApproachingOverflow
2.48.10. tmnxOspfLsdbOverflow
2.48.11. tmnxOspfNgIfAuthFailure
2.48.12. tmnxOspfNgIfConfigError
2.48.13. tmnxOspfNgIfRxBadPacket
2.48.14. tmnxOspfNgIfStateChange
2.48.15. tmnxOspfNgIfTxRetransmit
2.48.16. tmnxOspfNgLdpSyncExit
2.48.17. tmnxOspfNgLdpSyncTimerStarted
2.48.18. tmnxOspfNgLinkMaxAgeLsa
2.48.19. tmnxOspfNgLinkOriginateLsa
2.48.20. tmnxOspfNgNbrRestartHlprStsChg
2.48.21. tmnxOspfNgNbrStateChange
2.48.22. tmnxOspfNssaTranslatorStatusChg
2.48.23. tmnxOspfOverloadEntered
2.48.24. tmnxOspfOverloadExited
2.48.25. tmnxOspfOverloadWarning
2.48.26. tmnxOspfRejectedAdjacencySid
2.48.27. tmnxOspfRestartStatusChange
2.48.28. tmnxOspfRoutesExpLmtDropped
2.48.29. tmnxOspfShamIfAuthFailure
2.48.30. tmnxOspfShamIfConfigError
2.48.31. tmnxOspfShamIfRxBadPacket
2.48.32. tmnxOspfShamIfStateChange
2.48.33. tmnxOspfShamIfTxRetransmit
2.48.34. tmnxOspfShamNbrRestartHlprStsChg
2.48.35. tmnxOspfShamNbrStateChange
2.48.36. tmnxOspfSpfRunsRestarted
2.48.37. tmnxOspfSpfRunsStopped
2.48.38. tmnxOspfSrgbBadLabelRange
2.48.39. tmnxOspfSrSidError
2.48.40. tmnxOspfSrSidNotInLabelRange
2.48.41. tmnxOspfVirtIfAuthFailure
2.48.42. tmnxOspfVirtIfConfigError
2.48.43. tmnxOspfVirtIfRxBadPacket
2.48.44. tmnxOspfVirtIfStateChange
2.48.45. tmnxOspfVirtIfTxRetransmit
2.48.46. tmnxOspfVirtNbrRestartHlprStsChg
2.48.47. tmnxOspfVirtNbrStateChange
2.49. PIM
2.49.1. vRtrPimNgBSRStateChange
2.49.2. vRtrPimNgDataMtReused
2.49.3. vRtrPimNgGrpInSSMRange
2.49.4. vRtrPimNgHelloDropped
2.49.5. vRtrPimNgIfNeighborLoss
2.49.6. vRtrPimNgIfNeighborUp
2.49.7. vRtrPimNgInvalidIPmsiTunnel
2.49.8. vRtrPimNgInvalidJoinPrune
2.49.9. vRtrPimNgInvalidRegister
2.49.10. vRtrPimNgMaxGraftRetry
2.49.11. vRtrPimNgMaxGrpsLimitExceeded
2.49.12. vRtrPimNgMcacPlcyDropped
2.49.13. vRtrPimNgMDTLimitExceeded
2.49.14. vRtrPimNgReplicationLmtExceeded
2.49.15. vRtrPimNgSGLimitExceeded
2.50. PIM_SNOOPING
2.50.1. tmnxPimSnpgIfNeighborLoss
2.50.2. tmnxPimSnpgIfNeighborUp
2.50.3. tmnxPimSnpgSGLimitExceeded
2.50.4. tmnxPimSnpgSnoopModeChanged
2.51. PORT
2.51.1. SFPStatusBlocked
2.51.2. SFPStatusCulprit
2.51.3. SFPStatusDDMCorrupt
2.51.4. SFPStatusFailure
2.51.5. SFPStatusOperational
2.51.6. SFPStatusReadError
2.51.7. SFPStatusUnsupported
2.51.8. tdcmAlarms
2.51.9. tmnxBundleMemberMlfrLoopback
2.51.10. tmnxDS1E1LoopbackStarted
2.51.11. tmnxDS1E1LoopbackStopped
2.51.12. tmnxDS3E3LoopbackStarted
2.51.13. tmnxDS3E3LoopbackStopped
2.51.14. tmnxDSXClockSyncStateChange
2.51.15. tmnxEqCohOptPortAlarm
2.51.16. tmnxEqDigitalDiagMonitorClear
2.51.17. tmnxEqDigitalDiagMonitorFailure
2.51.18. tmnxEqPortBndlBadEndPtDiscr
2.51.19. tmnxEqPortBndlRedDiffExceeded
2.51.20. tmnxEqPortBndlYellowDiffExceeded
2.51.21. tmnxEqPortDS1Alarm
2.51.22. tmnxEqPortDS1AlarmClear
2.51.23. tmnxEqPortDS3Alarm
2.51.24. tmnxEqPortDS3AlarmClear
2.51.25. tmnxEqPortDuplexCfgNotCompatible
2.51.26. tmnxEqPortError
2.51.27. tmnxEqPortEtherAlarm
2.51.28. tmnxEqPortEtherAlarmClear
2.51.29. tmnxEqPortEtherCrcAlarm
2.51.30. tmnxEqPortEtherCrcAlarmClear
2.51.31. tmnxEqPortEtherInternalAlarm
2.51.32. tmnxEqPortEtherInternalAlarmClr
2.51.33. tmnxEqPortEtherLoopCleared
2.51.34. tmnxEqPortEtherLoopDetected
2.51.35. tmnxEqPortEtherSymMonAlarm
2.51.36. tmnxEqPortEtherSymMonAlarmClear
2.51.37. tmnxEqPortIngressRateCfgNotCompatible
2.51.38. tmnxEqPortOpticalAmpAlarm
2.51.39. tmnxEqPortSFPInserted
2.51.40. tmnxEqPortSFPRemoved
2.51.41. tmnxEqPortSonetAlarm
2.51.42. tmnxEqPortSonetAlarmClear
2.51.43. tmnxEqPortSonetPathAlarm
2.51.44. tmnxEqPortSonetPathAlarmClear
2.51.45. tmnxEqPortSpeedCfgNotCompatible
2.51.46. tmnxEqPortWaveTrackerAlarm
2.51.47. tmnxEqSonetClockSrcNotCompatible
2.51.48. tmnxEqSonetFramingNotCompatible
2.51.49. tmnxEqSonetSfThreshNotCompatible
2.51.50. tmnxOesPortError
2.51.51. tmnxOesPortErrorClear
2.51.52. tmnxOtuIfAlarmNotification
2.51.53. tmnxPortUnsupportedFunction
2.51.54. tmnxResvCbsPoolThreshAmber
2.51.55. tmnxResvCbsPoolThreshGreen
2.51.56. tmnxResvCbsPoolThreshRed
2.51.57. tmnxSonetSDHLoopbackStarted
2.51.58. tmnxSonetSDHLoopbackStopped
2.51.59. tPortAccEgrQGrpHostMatchFailure
2.51.60. tPortEgrVPortHostMatchFailure
2.52. PPP
2.52.1. ipcpPeerOnDifferentSubnet
2.52.2. ipcpPeerRejectedOurIp
2.52.3. ipcpPeerSuggestedDifferentIp
2.52.4. ipcpRemoteIpUnknown
2.52.5. ipcpSameLocalAndRemoteIp
2.52.6. ipv6cpPeerOnDifferentSubnet
2.52.7. ipv6cpPeerRejectedOurIntId
2.52.8. ipv6cpPeerSuggestedDiffIntId
2.52.9. ipv6cpRemoteIntIdUnknown
2.52.10. ipv6cpSameLocalAndRemoteIntId
2.52.11. tmnxPppCpDown
2.52.12. tmnxPppCpUp
2.52.13. tmnxPppKeepaliveFailure
2.52.14. tmnxPppLoopback
2.52.15. tmnxPppLoopbackClear
2.52.16. tmnxPppLqmFailure
2.52.17. tmnxPppNcpDown
2.52.18. tmnxPppNcpUp
2.53. PPPOE
2.53.1. tmnxMlpppBundleIndicatorsChange
2.53.2. tmnxPppoeNcpFailure
2.53.3. tmnxPppoeSessionFailure
2.54. PTP
2.54.1. tmnxPtpCardNotSupported
2.54.2. tmnxPtpCardNotSupportedClear
2.54.3. tmnxPtpClockRecoveryStateChange
2.54.4. tmnxPtpDynamicChange
2.54.5. tmnxPtpMasterClockChangedEvent
2.54.6. tmnxPtpOutOfResources
2.54.7. tmnxPtpOutOfResourcesClear
2.54.8. tmnxPtpPortNoTimestamping
2.55. RADIUS
2.55.1. tmnxRadAcctOnOngoing
2.55.2. tmnxRadRouteDownloadFailed
2.55.3. tmnxRadSrvPlcySrvOperStateCh
2.56. RIP
2.56.1. ripPacketDiscarded
2.56.2. vRtrRipAuthTypeFailure
2.56.3. vRtrRipAuthTypeMismatch
2.56.4. vRtrRipInstanceExpLmtReached
2.56.5. vRtrRipInstanceExpLmtWarning
2.56.6. vRtrRipInstanceRestarted
2.56.7. vRtrRipInstanceRtsExpLmtDropped
2.56.8. vRtrRipInstanceShuttingDown
2.57. RIP_NG
2.57.1. tmnxRipNgAuthFailure
2.57.2. tmnxRipNgAuthTypeMismatch
2.57.3. tmnxRipNgIfUcastAddrNotUsed
2.57.4. tmnxRipNgInstExpLmtReached
2.57.5. tmnxRipNgInstExpLmtWarning
2.57.6. tmnxRipNgInstRestarted
2.57.7. tmnxRipNgInstRtsExpLmtDropped
2.57.8. tmnxRipNgInstShuttingDown
2.57.9. tmnxRipNgPacketDiscarded
2.58. ROUTE_POLICY
2.58.1. trigPolicyPrevEval
2.59. RPKI
2.59.1. tmnxRpkiNotifySession
2.59.2. tmnxRpkiStaleTimerExpiry
2.60. RSVP
2.60.1. vRtrRsvpIfNbrStateDown
2.60.2. vRtrRsvpIfNbrStateUp
2.60.3. vRtrRsvpIfStateChange
2.60.4. vRtrRsvpPEFailOverPriToStdBy
2.60.5. vRtrRsvpPEFailOverStdByToPri
2.60.6. vRtrRsvpStateChange
2.61. SATELLITE
2.61.1. tmnxSatelliteOperStateChange
2.61.2. tmnxSatSyncIfTimHoldover
2.61.3. tmnxSatSyncIfTimHoldoverClear
2.61.4. tmnxSatSyncIfTimRef1Alarm
2.61.5. tmnxSatSyncIfTimRef1AlarmClear
2.61.6. tmnxSatSyncIfTimRef1Quality
2.61.7. tmnxSatSyncIfTimRef2Alarm
2.61.8. tmnxSatSyncIfTimRef2AlarmClear
2.61.9. tmnxSatSyncIfTimRef2Quality
2.61.10. tmnxSatSyncIfTimRefSwitch
2.61.11. tmnxSatSyncIfTimSystemQuality
2.62. SECURITY
2.62.1. cli_user_login
2.62.2. cli_user_login_failed
2.62.3. cli_user_login_max_attempts
2.62.4. cli_user_logout
2.62.5. enable_admin
2.62.6. ftp_transfer_failed
2.62.7. ftp_transfer_successful
2.62.8. ftp_user_login
2.62.9. ftp_user_login_failed
2.62.10. ftp_user_login_max_attempts
2.62.11. ftp_user_logout
2.62.12. host_snmp_attempts
2.62.13. mafEntryMatch
2.62.14. radiusInetServerOperStatusChange
2.62.15. radiusOperStatusChange
2.62.16. radiusSystemIpAddrNotSet
2.62.17. sapDcpDynamicConform
2.62.18. sapDcpDynamicEnforceAlloc
2.62.19. sapDcpDynamicEnforceFreed
2.62.20. sapDcpDynamicExcd
2.62.21. sapDcpDynamicHoldDownEnd
2.62.22. sapDcpDynamicHoldDownStart
2.62.23. sapDcpLocMonExcd
2.62.24. sapDcpLocMonExcdAllDynAlloc
2.62.25. sapDcpLocMonExcdAllDynFreed
2.62.26. sapDcpLocMonExcdDynResource
2.62.27. sapDcpStaticConform
2.62.28. sapDcpStaticExcd
2.62.29. sapDcpStaticHoldDownEnd
2.62.30. sapDcpStaticHoldDownStart
2.62.31. SSH_server_preserve_key_fail
2.62.32. ssh_user_login
2.62.33. ssh_user_login_failed
2.62.34. ssh_user_login_max_attempts
2.62.35. ssh_user_logout
2.62.36. sysDNSSecFailedAuthentication
2.62.37. tacplusInetSrvrOperStatusChange
2.62.38. tacplusOperStatusChange
2.62.39. tmnxAppPkiCertVerificationFailed
2.62.40. tmnxCAProfileStateChange
2.62.41. tmnxCAProfUpDueToRevokeChkCrlOpt
2.62.42. tmnxCliGroupSessionLimitExceeded
2.62.43. tmnxConfigCreate
2.62.44. tmnxConfigDelete
2.62.45. tmnxConfigModify
2.62.46. tmnxCpmProtDefPolModified
2.62.47. tmnxCpmProtExcdSapEcm
2.62.48. tmnxCpmProtExcdSapIp
2.62.49. tmnxCpmProtExcdSdpBind
2.62.50. tmnxCpmProtExcdSdpBindEcm
2.62.51. tmnxCpmProtExcdSdpBindIp
2.62.52. tmnxCpmProtViolIf
2.62.53. tmnxCpmProtViolIfOutProf
2.62.54. tmnxCpmProtViolMac
2.62.55. tmnxCpmProtViolPort
2.62.56. tmnxCpmProtViolPortAgg
2.62.57. tmnxCpmProtViolSap
2.62.58. tmnxCpmProtViolSapOutProf
2.62.59. tmnxCpmProtViolSdpBind
2.62.60. tmnxCpmProtViolSdpBindOutProf
2.62.61. tmnxCpmProtViolVdoSvcClient
2.62.62. tmnxCpmProtViolVdoVrtrClient
2.62.63. tmnxDcpCardFpEventOvrflw
2.62.64. tmnxDcpCardFpEventOvrflwClr
2.62.65. tmnxDcpCardSapEventOvrflw
2.62.66. tmnxDcpCardSapEventOvrflwClr
2.62.67. tmnxDcpCardVrtrIfEventOvrflw
2.62.68. tmnxDcpCardVrtrIfEventOvrflwClr
2.62.69. tmnxDcpFpDynPoolUsageHiAlmClear
2.62.70. tmnxDcpFpDynPoolUsageHiAlmRaise
2.62.71. tmnxKeyChainAuthFailure
2.62.72. tmnxMD5AuthFailure
2.62.73. tmnxPkiCAProfActnStatusChg
2.62.74. tmnxPkiCAProfCrlUpdAllUrlsFail
2.62.75. tmnxPkiCAProfCrlUpdateStart
2.62.76. tmnxPkiCAProfCrlUpdateSuccess
2.62.77. tmnxPkiCAProfCrlUpdateUrlFail
2.62.78. tmnxPkiCAProfCrlUpdLargPreUpdTm
2.62.79. tmnxPkiCAProfCrlUpdNoNxtUpdTime
2.62.80. tmnxPkiCAProfRevokeChkWarning
2.62.81. tmnxPkiCertAfterExpWarning
2.62.82. tmnxPkiCertBeforeExpWarning
2.62.83. tmnxPkiCertExpWarningCleared
2.62.84. tmnxPkiCertNotYetValid
2.62.85. tmnxPkiCertVerificationFailed
2.62.86. tmnxPkiCRLAfterExpWarning
2.62.87. tmnxPkiCRLBeforeExpWarning
2.62.88. tmnxPkiCRLExpWarningCleared
2.62.89. tmnxPkiCRLNotYetValid
2.62.90. tmnxPkiFileReadFailed
2.62.91. tmnxPkiFileWriteFailed
2.62.92. tmnxSecComputeCertChainFailure
2.62.93. tmnxSecNotifFileReloaded
2.62.94. tmnxSecNotifKeyChainExpired
2.62.95. tmnxSecPwdHistoryFileLoadFailed
2.62.96. tmnxSecPwdHistoryFileWriteFailed
2.62.97. tmnxStateChange
2.62.98. tmnxSysLicenseExpiresSoon
2.62.99. tmnxSysLicenseInvalid
2.62.100. tmnxSysLicenseValid
2.62.101. tmnxUsrProfSessionLimitExceeded
2.62.102. user_disconnect
2.62.103. vRtrIfDcpDynamicConform
2.62.104. vRtrIfDcpDynamicEnforceAlloc
2.62.105. vRtrIfDcpDynamicEnforceFreed
2.62.106. vRtrIfDcpDynamicExcd
2.62.107. vRtrIfDcpDynamicHoldDownEnd
2.62.108. vRtrIfDcpDynamicHoldDownStart
2.62.109. vRtrIfDcpLocMonExcd
2.62.110. vRtrIfDcpLocMonExcdAllDynAlloc
2.62.111. vRtrIfDcpLocMonExcdAllDynFreed
2.62.112. vRtrIfDcpLocMonExcdDynResource
2.62.113. vRtrIfDcpStaticConform
2.62.114. vRtrIfDcpStaticExcd
2.62.115. vRtrIfDcpStaticHoldDownEnd
2.62.116. vRtrIfDcpStaticHoldDownStart
2.63. SFLOW
2.63.1. tmnxSflowCpEntrySampling
2.63.2. tmnxSflowPacketTxFailure
2.64. SNMP
2.64.1. authenticationFailure
2.64.2. coldStart
2.64.3. fallingAlarm
2.64.4. linkDown
2.64.5. linkUp
2.64.6. risingAlarm
2.64.7. snmpdError
2.64.8. warmStart
2.65. STP
2.65.1. higherPriorityBridge
2.65.2. newRootBridge
2.65.3. newRootSap
2.65.4. newRootVcpState
2.65.5. pipActiveProtocolChange
2.65.6. receivedTCN
2.65.7. sapActiveProtocolChange
2.65.8. sapEncapDot1d
2.65.9. sapEncapPVST
2.65.10. tmnxNewCistRegionalRootBridge
2.65.11. tmnxNewMstiRegionalRootBridge
2.65.12. tmnxPipStpExcepCondStateChng
2.65.13. tmnxSapStpExcepCondStateChng
2.65.14. tmnxSdpBndStpExcepCondStateChng
2.65.15. tmnxStpMeshNotInMstRegion
2.65.16. tmnxStpRootGuardViolation
2.65.17. tmnxSvcNewRootSdpBind
2.65.18. tmnxSvcSdpActiveProtocolChange
2.65.19. tmnxSvcSdpBindEncapDot1d
2.65.20. tmnxSvcSdpBindEncapPVST
2.65.21. tmnxSvcSdpBindRcvdHigherBriPrio
2.65.22. tmnxSvcSdpBindRcvdTCN
2.65.23. tmnxSvcTopoChgSdpBindMajorState
2.65.24. tmnxSvcTopoChgSdpBindState
2.65.25. topologyChangePipMajorState
2.65.26. topologyChangePipState
2.65.27. topologyChangeSapMajorState
2.65.28. topologyChangeSapState
2.65.29. topologyChangeVcpState
2.65.30. unacknowledgedTCN
2.65.31. vcpActiveProtocolChange
2.66. SVCMGR
2.66.1. dynamicSdpBindConfigChanged
2.66.2. dynamicSdpBindCreationFailed
2.66.3. dynamicSdpConfigChanged
2.66.4. dynamicSdpCreationFailed
2.66.5. hostConnectivityLost
2.66.6. hostConnectivityRestored
2.66.7. iesIfStatusChanged
2.66.8. msapCreationFailure
2.66.9. msapStateChanged
2.66.10. sapAtmPppNcpFailure
2.66.11. sapAtmPppSessionFailure
2.66.12. sapCemPacketDefectAlarm
2.66.13. sapCemPacketDefectAlarmClear
2.66.14. sapEthLoopbackStarted
2.66.15. sapEthLoopbackStopped
2.66.16. sapHostBGPPeeringSetupFailed
2.66.17. sapHostRipListenerSetupFailed
2.66.18. sapIfIgnorePortStateStart
2.66.19. sapIfIgnorePortStateStop
2.66.20. sapIpipeCeIpAddrChange
2.66.21. sapPortStateChangeProcessed
2.66.22. sapReceivedProtSrcMac
2.66.23. sapStatusChanged
2.66.24. sapTlsDataSapInstStatusChgd
2.66.25. sapTlsMacAddrLimitAlarmCleared
2.66.26. sapTlsMacAddrLimitAlarmRaised
2.66.27. sapTlsMacMoveExceeded
2.66.28. sapTlsMacMoveExceedNonBlock
2.66.29. sapTunnelEncapIpMtuTooSmall
2.66.30. sapTunnelStateChange
2.66.31. sdpBandwidthOverbooked
2.66.32. sdpBindEthLoopbackStarted
2.66.33. sdpBindEthLoopbackStopped
2.66.34. sdpBindInsufficientBandwidth
2.66.35. sdpBindIpipeCeIpAddressChange
2.66.36. sdpBindPwLocalStatusBitsChanged
2.66.37. sdpBindPwPeerFaultAddrChanged
2.66.38. sdpBindPwPeerStatusBitsChanged
2.66.39. sdpBindReceivedProtSrcMac
2.66.40. sdpBindSdpStateChangeProcessed
2.66.41. sdpBindStatusChanged
2.66.42. sdpBindTlsMacMoveExceeded
2.66.43. sdpBindTlsMacMoveExceedNonBlock
2.66.44. sdpControlPwActiveStateChg
2.66.45. sdpEgrIfsNetDomInconsCntChanged
2.66.46. sdpKeepAliveLateReply
2.66.47. sdpKeepAliveProbeFailure
2.66.48. sdpKeepAliveStarted
2.66.49. sdpKeepAliveStopped
2.66.50. sdpPbbActvPwWithNonActvCtrlPwChg
2.66.51. sdpStatusChanged
2.66.52. sdpTlsMacAddrLimitAlarmCleared
2.66.53. sdpTlsMacAddrLimitAlarmRaised
2.66.54. svcArpHostOverride
2.66.55. svcArpHostPopulateErr
2.66.56. svcBgpEvpnDupMacAddrsCleared
2.66.57. svcBgpEvpnDupMacAddrsDetected
2.66.58. svcBindSysHiUsageAlarmCleared
2.66.59. svcBindSysHiUsageAlarmRaised
2.66.60. svcEndPointMacLimitAlarmCleared
2.66.61. svcEndPointMacLimitAlarmRaised
2.66.62. svcEpipePbbOperStatusChanged
2.66.63. svcEPMCEPConfigMismatch
2.66.64. svcEPMCEPConfigMismatchResolved
2.66.65. svcEPMCEPPassiveModeActive
2.66.66. svcEPMCEPPassiveModePassive
2.66.67. svcEvpnDestSysHiUsgClr
2.66.68. svcEvpnDestSysHiUsgSet
2.66.69. svcEvpnMHEsEviDFStateChgd
2.66.70. svcEvpnMHEsIsidDFStateChgd
2.66.71. svcEvpnMplsMacMoveExceedNonBlock
2.66.72. svcEvpnMplsTEPEgrBndSvcHiUsgClr
2.66.73. svcEvpnMplsTEPEgrBndSvcHiUsgSet
2.66.74. svcEvpnMplsTEPEgrBndSysHiUsgClr
2.66.75. svcEvpnMplsTEPEgrBndSysHiUsgSet
2.66.76. svcEvpnMplsTEPHiUsageCleared
2.66.77. svcEvpnMplsTEPHiUsageRaised
2.66.78. svcEvpnRcvdProtSrcMac
2.66.79. svcFdbMimDestTblFullAlrm
2.66.80. svcFdbMimDestTblFullAlrmCleared
2.66.81. svcMacFdbTblFullAlarm
2.66.82. svcMacFdbTblFullAlarmCleared
2.66.83. svcMSPwRetryExpiredNotif
2.66.84. svcMSPwRtMisconfig
2.66.85. svcOperGrpOperStatusChanged
2.66.86. svcPersistencyProblem
2.66.87. svcRestoreHostProblem
2.66.88. svcSiteMinDnTimerStateChg
2.66.89. svcStatusChanged
2.66.90. svcTlsDupVTEPEgrVNICleared
2.66.91. svcTlsDupVTEPEgrVNIDetected
2.66.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
2.66.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
2.66.94. svcTlsFdbTableFullAlarmCleared
2.66.95. svcTlsFdbTableFullAlarmRaised
2.66.96. svcTlsGroupOperStatusChanged
2.66.97. svcTlsMacPinningViolation
2.66.98. svcTlsMfibTableFullAlarmCleared
2.66.99. svcTlsMfibTableFullAlarmRaised
2.66.100. svcTlsMrpAttrRegistrationFailed
2.66.101. svcTlsMrpAttrTblFullAlarmCleared
2.66.102. svcTlsMrpAttrTblFullAlarmRaised
2.66.103. svcTlsProxyArpDupClear
2.66.104. svcTlsProxyArpDupDetect
2.66.105. svcTlsProxyArpSvcHiUsgClr
2.66.106. svcTlsProxyArpSvcHiUsgSet
2.66.107. svcTlsProxyArpSysHiUsgClr
2.66.108. svcTlsProxyArpSysHiUsgSet
2.66.109. svcTlsProxyNdDupClear
2.66.110. svcTlsProxyNdDupDetect
2.66.111. svcTlsProxyNdSvcHiUsgClr
2.66.112. svcTlsProxyNdSvcHiUsgSet
2.66.113. svcTlsProxyNdSysHiUsgClr
2.66.114. svcTlsProxyNdSysHiUsgSet
2.66.115. svcTlsSiteDesigFwdrChg
2.66.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
2.66.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
2.66.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
2.66.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
2.66.120. svcTlsVTEPHiUsageAlarmCleared
2.66.121. svcTlsVTEPHiUsageAlarmRaised
2.66.122. svcTlsVxlanReplicatorChgd
2.66.123. svcVllSiteDesigFwdrChg
2.66.124. tmnxEndPointTxActiveChanged
2.66.125. tmnxIpTunnelOperRemIpChg
2.66.126. tmnxIpTunnelOperStateChange
2.66.127. tmnxSapStpExcepCondStateChng
2.66.128. tmnxStpRootGuardViolation
2.66.129. tmnxSubAcctPlcyFailure
2.66.130. tmnxSubAcctPlcyRadSerOperStatChg
2.66.131. tmnxSubAuthPlcyRadSerOperStatChg
2.66.132. tmnxSubBrgCreated
2.66.133. tmnxSubBrgCvInitFailed
2.66.134. tmnxSubBrgDeleted
2.66.135. tmnxSubBrgRadiusAuthError
2.66.136. tmnxSubBrgRadiusCoaError
2.66.137. tmnxSubBrgRadiusUpdateIpoeSeFail
2.66.138. tmnxSubBrgSessionLimitReached
2.66.139. tmnxSubHostInconsistentAtmTdOvr
2.66.140. tmnxSubHostInfoConflict
2.66.141. tmnxSubHostLcktLimitReached
2.66.142. tmnxSubHostLcktSapLimitReached
2.66.143. tmnxSubIpoeInvalidCidRidChange
2.66.144. tmnxSubIpoeInvalidSessionKey
2.66.145. tmnxSubIpoeMigrHostDeleted
2.66.146. tmnxSubIpoePersistenceRecovery
2.66.147. tmnxSubIpoeSessionLimitReached
2.66.148. tmnxSubMcsRelatedProblem
2.66.149. tmnxSubMngdHostCreationFail
2.66.150. tmnxSubMngdHostOverride
2.66.151. tmnxSubPlBndFailed
2.66.152. tmnxSubRadSapCoAError
2.66.153. tmnxSubRadSapDisconnectError
2.66.154. tmnxSubRadSapSubAuthError
2.66.155. tmnxSubRadSdpBndCoAError
2.66.156. tmnxSubRadSdpBndDisconnectError
2.66.157. tmnxSubRadSdpBndSubAuthError
2.66.158. tmnxSubscriberCreated
2.66.159. tmnxSubscriberDeleted
2.66.160. tmnxSubscriberRenamed
2.66.161. tmnxSubSlaacOverride
2.66.162. tmnxSubSlaacSetupFailure
2.66.163. tmnxSubSysChassMemoryUsageHi
2.66.164. tmnxSubUserCategoryError
2.66.165. tmnxSubUserCategoryOutOfCredit
2.66.166. tmnxSubUserCategoryRefreshCredit
2.66.167. tmnxSubVSubnetHostsDeleted
2.67. SYSTEM
2.67.1. persistenceRestoreProblem
2.67.2. persistencyClosedAlarmCleared
2.67.3. persistencyClosedAlarmRaised
2.67.4. persistencyEventReport
2.67.5. persistencyFileSysThresCleared
2.67.6. persistencyFileSysThresRaised
2.67.7. sbiBootConfig
2.67.8. sbiBootConfigFailFileError
2.67.9. sbiBootConfigOKFileError
2.67.10. sbiBootSnmpd
2.67.11. schedActionFailure
2.67.12. smScriptAbort
2.67.13. smScriptException
2.67.14. smScriptResult
2.67.15. sntpTimeDiffExceedsThreshold
2.67.16. socket_bind_failed
2.67.17. socket_conn_accept_failed
2.67.18. ssiSaveConfigFailed
2.67.19. ssiSaveConfigSucceeded
2.67.20. ssiSyncBootEnvFailed
2.67.21. ssiSyncBootEnvOK
2.67.22. ssiSyncCertFailed
2.67.23. ssiSyncCertOK
2.67.24. ssiSyncConfigFailed
2.67.25. ssiSyncConfigOK
2.67.26. ssiSyncRollbackFailed
2.67.27. ssiSyncRollbackOK
2.67.28. stiDateAndTimeChanged
2.67.29. tmnxConfigConflict
2.67.30. tmnxConfigCreate
2.67.31. tmnxConfigDelete
2.67.32. tmnxConfigModify
2.67.33. tmnxEhsDroppedByMinDelay
2.67.34. tmnxEhsHandlerInvoked
2.67.35. tmnxFtpClientFailure
2.67.36. tmnxModuleMallocFailed
2.67.37. tmnxRedCpmActive
2.67.38. tmnxRedSingleCpm
2.67.39. tmnxRedStandbyReady
2.67.40. tmnxRedStandbySyncing
2.67.41. tmnxRedStandbySyncLost
2.67.42. tmnxRedSwitchover
2.67.43. tmnxSmLaunchStartFailed
2.67.44. tmnxSnmpdStateChange
2.67.45. tmnxSntpOperChange
2.67.46. tmnxSssiMismatch
2.67.47. tmnxStateChange
2.67.48. tmnxSysBaseMacAddressNotSet
2.67.49. tmnxSysExecFinished
2.67.50. tmnxSysExecStarted
2.67.51. tmnxSysNvsysFileError
2.67.52. tmnxSysRollbackDeleteStarted
2.67.53. tmnxSysRollbackFileDeleteStatus
2.67.54. tmnxSysRollbackSaveStarted
2.67.55. tmnxSysRollbackSaveStatusChange
2.67.56. tmnxSysRollbackStarted
2.67.57. tmnxSysRollbackStatusChange
2.67.58. tmnxSysVsdServerAvailable
2.67.59. tmnxSysVsdServerUnavailable
2.67.60. tmnxSysXmppServerFunctional
2.67.61. tmnxSysXmppServerNotFunctional
2.67.62. tmnxTrapDropped
2.68. USER
2.68.1. cli_config_io
2.68.2. cli_unauth_config_io
2.68.3. cli_unauth_user_io
2.68.4. cli_user_io
2.68.5. cli_user_login
2.68.6. cli_user_login_failed
2.68.7. cli_user_login_max_attempts
2.68.8. cli_user_logout
2.68.9. ftp_user_login
2.68.10. ftp_user_login_failed
2.68.11. ftp_user_login_max_attempts
2.68.12. ftp_user_logout
2.68.13. snmp_user_set
2.69. VIDEO
2.69.1. tmnxVdoAdSpliceAbort
2.69.2. tmnxVdoClientSessionsLmtCleared
2.69.3. tmnxVdoClientSessionsLmtExceeded
2.69.4. tmnxVdoDuplicateSsrcId
2.69.5. tmnxVdoGrpSrcAnlyzrErrState
2.69.6. tmnxVdoGrpSrcAnlyzrStClear
2.69.7. tmnxVdoMdaSessionsLimitCleared
2.69.8. tmnxVdoMdaSessionsLimitExceeded
2.69.9. tmnxVdoMdaSGLimitCleared
2.69.10. tmnxVdoMdaSGLimitExceeded
2.70. VRRP
2.70.1. tmnxVrrpBecameBackup
2.70.2. tmnxVrrpBfdIntfSessStateChgd
2.70.3. tmnxVrrpIPListMismatch
2.70.4. tmnxVrrpIPListMismatchClear
2.70.5. tmnxVrrpMultipleOwners
2.70.6. tmnxVrrpOperDownInvalidMac
2.70.7. tmnxVrrpOperDownInvalidMacClear
2.70.8. tVrrpBecameBackup
2.70.9. tVrrpIPListMismatch
2.70.10. tVrrpIPListMismatchClear
2.70.11. tVrrpMultipleOwners
2.70.12. tVrrpOperDownInvalidMac
2.70.13. tVrrpOperDownInvalidMacClear
2.70.14. tVrrpPacketDiscarded
2.70.15. tVrrpRouterAdvNotActivated
2.70.16. tVrrpRouterAdvNotActivatedClear
2.70.17. tVrrpTrapNewMaster
2.70.18. vrrpPacketDiscarded
2.70.19. vrrpTrapAuthFailure
2.70.20. vrrpTrapNewMaster
2.70.21. vrrpTrapProtoError
2.71. VRTR
2.71.1. tmnxVRtrArpLmt
2.71.2. tmnxVRtrArpThresholdExceeded
2.71.3. tmnxVRtrBfdExtNoCpmNpResources
2.71.4. tmnxVRtrBfdMaxSessionOnSlot
2.71.5. tmnxVRtrBfdPortTypeNotSupported
2.71.6. tmnxVRtrBfdSessExtDeleted
2.71.7. tmnxVRtrBfdSessExtDown
2.71.8. tmnxVRtrBfdSessExtProtChange
2.71.9. tmnxVRtrBfdSessExtUp
2.71.10. tmnxVRtrDnsFault
2.71.11. tmnxVRtrFibOccupancyThreshold
2.71.12. tmnxVRtrGrtExportLimitReached
2.71.13. tmnxVRtrGrtRoutesExpLimitDropped
2.71.14. tmnxVRtrGrtV6ExportLimitReached
2.71.15. tmnxVRtrGrtV6RoutesExpLimDropped
2.71.16. tmnxVRtrHighRouteCleared
2.71.17. tmnxVRtrHighRouteTCA
2.71.18. tmnxVRtrIfIgnorePortState
2.71.19. tmnxVRtrIfLdpSyncTimerStart
2.71.20. tmnxVRtrIfLdpSyncTimerStop
2.71.21. tmnxVRtrInetAddressAttachFailed
2.71.22. tmnxVRtrIPv6HighRouteCleared
2.71.23. tmnxVRtrIPv6HighRouteTCA
2.71.24. tmnxVRtrIPv6MidRouteTCA
2.71.25. tmnxVRtrIpv6NbrLmt
2.71.26. tmnxVRtrIpv6NbrThresholdExceeded
2.71.27. tmnxVRtrMacAcctLimitCleared
2.71.28. tmnxVRtrMacAcctLimitReached
2.71.29. tmnxVRtrManagedRouteAddFailed
2.71.30. tmnxVRtrMaxArpEntriesCleared
2.71.31. tmnxVRtrMaxArpEntriesTCA
2.71.32. tmnxVRtrMaxRoutes
2.71.33. tmnxVRtrMcastMaxRoutesCleared
2.71.34. tmnxVRtrMcastMaxRoutesTCA
2.71.35. tmnxVRtrMcastMidRouteTCA
2.71.36. tmnxVRtrMidRouteTCA
2.71.37. tmnxVRtrNgBfdNoCpmNpResources
2.71.38. tmnxVRtrNgBfdSessDeleted
2.71.39. tmnxVRtrNgBfdSessDown
2.71.40. tmnxVRtrNgBfdSessProtChange
2.71.41. tmnxVRtrNgBfdSessUp
2.71.42. tmnxVRtrNHRvplsARPExhaust
2.71.43. tmnxVRtrNHRvplsARPHighUsage
2.71.44. tmnxVRtrNHRvplsARPHighUsageClr
2.71.45. tmnxVRtrSingleSfmOverloadStateCh
2.71.46. tmnxVRtrStaticRouteCPEStatus
2.71.47. tmnxVRtrStaticRouteStatusChanged
2.72. WLAN_GW
2.72.1. tmnxWlanGwDsmGtpTunnelSetupFail
2.72.2. tmnxWlanGwGrpOperStateChanged
2.72.3. tmnxWlanGwGtpMessageDropped
2.72.4. tmnxWlanGwIomActive
2.72.5. tmnxWlanGwMgwConnected
2.72.6. tmnxWlanGwMgwRestarted
2.72.7. tmnxWlanGwMgwStateChanged
2.72.8. tmnxWlanGwNumMgwHi
2.72.9. tmnxWlanGwQosRadiusGtpMismatch
2.72.10. tmnxWlanGwResrcProblemCause
2.72.11. tmnxWlanGwResrcProblemDetected
2.72.12. tmnxWlanGwSubIfPmAddNewPlFailed
2.72.13. tmnxWlanGwSubIfPmCrIntObjFailed
2.72.14. tmnxWlanGwSubIfPmLsQryRtryFailed
2.72.15. tmnxWlanGwSubIfPmNewPlReqFailed
2.72.16. tmnxWlanGwSubIfPmPoolTimeout
2.72.17. tmnxWlanGwSubIfPmPoolUsageLow
2.72.18. tmnxWlanGwSubIfPmStartD6cFailed
2.72.19. tmnxWlanGwSubIfRedActiveChanged
2.72.20. tmnxWlanGwTuQosProblem
2.73. WPP
2.73.1. tmnxWppHostAuthenticationFailed
2.73.2. tmnxWppPortalStatChanged
2.73.3. tmnxWppPortalUnreachable
Customer Document and Product Support
1. Log Events
1.1. In This Chapter
1.2. Log Events
1.3. Sample Log Event
2. SR Log Events
2.1. APPLICATION_ASSURANCE
2.1.1. tmnxBsxAarpInstOperStateChanged
2.1.2. tmnxBsxAarpInstStateChanged
2.1.3. tmnxBsxAaSubPolResExceeded
2.1.4. tmnxBsxAaSubPolResExceededClear
2.1.5. tmnxBsxAaSubscriberAcctDataLoss
2.1.6. tmnxBsxAaSubscribersUnassigned
2.1.7. tmnxBsxDatapathCpuUsage
2.1.8. tmnxBsxDatapathCpuUsageClear
2.1.9. tmnxBsxDnsIpCacheFull
2.1.10. tmnxBsxDnsIpCacheFullClear
2.1.11. tmnxBsxHttpUrlParamLimitExceeded
2.1.12. tmnxBsxIsaAaGrpBitRate
2.1.13. tmnxBsxIsaAaGrpBitRateClear
2.1.14. tmnxBsxIsaAaGrpCapCostThres
2.1.15. tmnxBsxIsaAaGrpCapCostThresClear
2.1.16. tmnxBsxIsaAaGrpFailureClearV2
2.1.17. tmnxBsxIsaAaGrpFailureV2
2.1.18. tmnxBsxIsaAaGrpFlowFull
2.1.19. tmnxBsxIsaAaGrpFlowFullClear
2.1.20. tmnxBsxIsaAaGrpFlowSetup
2.1.21. tmnxBsxIsaAaGrpFlowSetupClear
2.1.22. tmnxBsxIsaAaGrpFmSbWaSBufOvld
2.1.23. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
2.1.24. tmnxBsxIsaAaGrpNonRedundantV2
2.1.25. tmnxBsxIsaAaGrpOvrldCutthru
2.1.26. tmnxBsxIsaAaGrpOvrldCutthruClr
2.1.27. tmnxBsxIsaAaGrpPacketRate
2.1.28. tmnxBsxIsaAaGrpPacketRateClear
2.1.29. tmnxBsxIsaAaGrpSwitchover
2.1.30. tmnxBsxIsaAaGrpToSbWaSBufOvld
2.1.31. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
2.1.32. tmnxBsxIsaAaSubLoadBalance
2.1.33. tmnxBsxIsaAaTimFileProcFailure
2.1.34. tmnxBsxMobileSubModifyFailure
2.1.35. tmnxBsxRadApFailure
2.1.36. tmnxBsxRadApIntrmUpdateSkipped
2.1.37. tmnxBsxRadApServOperStateChange
2.1.38. tmnxBsxStatFtrEnTcaThreshCrClear
2.1.39. tmnxBsxStatFtrEnTcaThreshCrossed
2.1.40. tmnxBsxStatFtrTcaThreshCrClear
2.1.41. tmnxBsxStatFtrTcaThreshCrossed
2.1.42. tmnxBsxStatPolcrTcaThreshCrClear
2.1.43. tmnxBsxStatPolcrTcaThreshCrossed
2.1.44. tmnxBsxStatTcaThreshCrossed
2.1.45. tmnxBsxStatTcaThreshCrossedClear
2.1.46. tmnxBsxSubModifyFailure
2.1.47. tmnxBsxTcpValTcaCrossed
2.1.48. tmnxBsxTcpValTcaCrossedClear
2.1.49. tmnxBsxTransIpPolAaSubCreated
2.1.50. tmnxBsxTransIpPolAaSubDeleted
2.1.51. tmnxBsxTransIpPolDhcpAddWarning
2.1.52. tmnxBsxTransIpPolDhcpDelWarning
2.1.53. tmnxBsxTransIpPolDiamGxError
2.1.54. tmnxBsxTransIpPolRadCoAAudit
2.1.55. tmnxBsxTransIpPolRadCoAError
2.1.56. tmnxBsxTransIpPolRadDiscError
2.1.57. tmnxBsxTransitIpPersistenceWarn
2.1.58. tmnxBsxUrlFilterOperStateChange
2.1.59. tmnxBsxUrlListFailure
2.1.60. tmnxBsxUrlListUpdate
2.2. APS
2.2.1. apsEventChannelMismatch
2.2.2. apsEventFEPLF
2.2.3. apsEventModeMismatch
2.2.4. apsEventPSBF
2.2.5. apsEventSwitchover
2.2.6. tApsChannelMismatchClear
2.2.7. tApsChanTxLaisStateChange
2.2.8. tApsFEPLFClear
2.2.9. tApsLocalSwitchCommandClear
2.2.10. tApsLocalSwitchCommandSet
2.2.11. tApsMcApsCtlLinkStateChange
2.2.12. tApsModeMismatchClear
2.2.13. tApsPrimaryChannelChange
2.2.14. tApsPSBFClear
2.2.15. tApsRemoteSwitchCommandClear
2.2.16. tApsRemoteSwitchCommandSet
2.3. ATM
2.3.1. atmIfcStatusChange
2.3.2. atmIlmiPeerVclStatusChange
2.3.3. atmIlmiPeerVplStatusChange
2.3.4. atmVclStatusChange
2.3.5. atmVplStatusChange
2.3.6. atmVtlStatusChange
2.3.7. tAtmEpOutOfPeerVpiOrVciRange
2.3.8. tAtmIlmiLinkStatusChange
2.3.9. tAtmMaxPeerVccsExceeded
2.3.10. tAtmMaxPeerVpcsExceeded
2.3.11. tAtmPlcpSubLayerClear
2.3.12. tAtmPlcpSubLayerDown
2.3.13. tAtmTcSubLayerClear
2.3.14. tAtmTcSubLayerDown
2.4. BFD
2.4.1. tmnxBfdOnLspSessDeleted
2.4.2. tmnxBfdOnLspSessDown
2.4.3. tmnxBfdOnLspSessNoCpmNpResources
2.4.4. tmnxBfdOnLspSessProtChange
2.4.5. tmnxBfdOnLspSessUp
2.5. BGP
2.5.1. bgpBackwardTransNotification
2.5.2. bgpCfgViol
2.5.3. bgpConnMgrTerminated
2.5.4. bgpConnNoKA
2.5.5. bgpConnNoOpenRcvd
2.5.6. bgpEstablishedNotification
2.5.7. bgpInterfaceDown
2.5.8. bgpNoMemoryPeer
2.5.9. bgpPeerNotFound
2.5.10. bgpRejectConnBadLocAddr
2.5.11. bgpRemoteEndClosedConn
2.5.12. bgpTerminated
2.5.13. bgpVariableRangeViolation
2.5.14. receiveNotification
2.5.15. sendNotification
2.5.16. tBgp4PathAttrInvalid
2.5.17. tBgp4RouteInvalid
2.5.18. tBgp4UpdateInvalid
2.5.19. tBgp4WithdrawnRtFromUpdateError
2.5.20. tBgpFibResourceFailPeer
2.5.21. tBgpFlowRouteInvalid
2.5.22. tBgpFlowspecUnsupportdComAction
2.5.23. tBgpGeneral
2.5.24. tBgpInstanceDynamicPeerLmtReachd
2.5.25. tBgpMaxNgPfxLmt
2.5.26. tBgpMaxNgPfxLmtThresholdReached
2.5.27. tBgpNgBackwardTransition
2.5.28. tBgpNgEstablished
2.5.29. tBgpPeerGRStatusChange
2.5.30. tBgpPeerNgHoldTimeInconsistent
2.5.31. tBgpPGDynamicPeerLmtReached
2.5.32. tBgpReceivedInvalidNlri
2.6. CALLTRACE
2.6.1. tmnxCallTraceLocSizeLimitReached
2.6.2. tmnxCallTraceMaxFilesNumReached
2.7. CFLOWD
2.7.1. tmnxCflowdCreateFailure
2.7.2. tmnxCflowdFlowCreateFailure
2.7.3. tmnxCflowdPacketTxFailure
2.7.4. tmnxCflowdStateChange
2.8. CHASSIS
2.8.1. CpmIcPortSFFStatusDDMCorrupt
2.8.2. CpmIcPortSFFStatusFailure
2.8.3. CpmIcPortSFFStatusReadError
2.8.4. CpmIcPortSFFStatusUnsupported
2.8.5. SfmIcPortSFFStatusDDMCorrupt
2.8.6. SfmIcPortSFFStatusFailure
2.8.7. SfmIcPortSFFStatusReadError
2.8.8. SfmIcPortSFFStatusUnsupported
2.8.9. tIPsecIsaMemHighWatermark
2.8.10. tIPsecIsaMemLowWatermark
2.8.11. tIPsecIsaMemMax
2.8.12. tmnxAlarmInputVoltageFailure
2.8.13. tmnxChassisHiBwMcastAlarm
2.8.14. tmnxChassisNotificationClear
2.8.15. tmnxChassisUpgradeComplete
2.8.16. tmnxChassisUpgradeInProgress
2.8.17. tmnxCpmALocalIcPortAvail
2.8.18. tmnxCpmANoLocalIcPort
2.8.19. tmnxCpmBLocalIcPortAvail
2.8.20. tmnxCpmBNoLocalIcPort
2.8.21. tmnxCpmCardSyncFileNotPresent
2.8.22. tmnxCpmIcPortDDMClear
2.8.23. tmnxCpmIcPortDDMFailure
2.8.24. tmnxCpmIcPortDown
2.8.25. tmnxCpmIcPortSFFInserted
2.8.26. tmnxCpmIcPortSFFRemoved
2.8.27. tmnxCpmIcPortUp
2.8.28. tmnxCpmMemSizeMismatch
2.8.29. tmnxCpmMemSizeMismatchClear
2.8.30. tmnxDcpCardFpEventOvrflw
2.8.31. tmnxDcpCardFpEventOvrflwClr
2.8.32. tmnxDcpCardSapEventOvrflw
2.8.33. tmnxDcpCardSapEventOvrflwClr
2.8.34. tmnxDcpCardVrtrIfEventOvrflw
2.8.35. tmnxDcpCardVrtrIfEventOvrflwClr
2.8.36. tmnxDcpFpDynPoolUsageHiAlmClear
2.8.37. tmnxDcpFpDynPoolUsageHiAlmRaise
2.8.38. tmnxEnvTempTooHigh
2.8.39. tmnxEqCardChipIfCellEvent
2.8.40. tmnxEqCardChipIfDownEvent
2.8.41. tmnxEqCardFailure
2.8.42. tmnxEqCardFirmwareUpgraded
2.8.43. tmnxEqCardInserted
2.8.44. tmnxEqCardPChipCamEvent
2.8.45. tmnxEqCardPChipError
2.8.46. tmnxEqCardPChipMemoryEvent
2.8.47. tmnxEqCardQChipBufMemoryEvent
2.8.48. tmnxEqCardQChipIntMemoryEvent
2.8.49. tmnxEqCardQChipStatsMemoryEvent
2.8.50. tmnxEqCardRemoved
2.8.51. tmnxEqCardSoftResetAlarm
2.8.52. tmnxEqCardTChipParityEvent
2.8.53. tmnxEqDataPathFailureProtImpact
2.8.54. tmnxEqFanFailure
2.8.55. tmnxEqFlashDataLoss
2.8.56. tmnxEqFlashDiskFull
2.8.57. tmnxEqHwEnhancedCapability
2.8.58. tmnxEqLowSwitchFabricCap
2.8.59. tmnxEqLowSwitchFabricCapClear
2.8.60. tmnxEqMdaCfgNotCompatible
2.8.61. tmnxEqMdaIngrXplError
2.8.62. tmnxEqMdaSyncENotCompatible
2.8.63. tmnxEqMdaXplError
2.8.64. tmnxEqMgmtEthRedStandbyClear
2.8.65. tmnxEqMgmtEthRedStandbyRaise
2.8.66. tmnxEqPhysChassisFanFailure
2.8.67. tmnxEqPhysChassisFanFailureClear
2.8.68. tmnxEqPhysChassPowerSupAcFail
2.8.69. tmnxEqPhysChassPowerSupAcFailClr
2.8.70. tmnxEqPhysChassPowerSupDcFail
2.8.71. tmnxEqPhysChassPowerSupDcFailClr
2.8.72. tmnxEqPhysChassPowerSupInFail
2.8.73. tmnxEqPhysChassPowerSupInFailClr
2.8.74. tmnxEqPhysChassPowerSupOutFail
2.8.75. tmnxEqPhysChassPowerSupOutFailCl
2.8.76. tmnxEqPhysChassPowerSupOvrTmp
2.8.77. tmnxEqPhysChassPowerSupOvrTmpClr
2.8.78. tmnxEqPowerCapacityExceeded
2.8.79. tmnxEqPowerCapacityExceededClear
2.8.80. tmnxEqPowerLostCapacity
2.8.81. tmnxEqPowerLostCapacityClear
2.8.82. tmnxEqPowerOverloadState
2.8.83. tmnxEqPowerOverloadStateClear
2.8.84. tmnxEqPowerSafetyAlertClear
2.8.85. tmnxEqPowerSafetyAlertThreshold
2.8.86. tmnxEqPowerSafetyLevelClear
2.8.87. tmnxEqPowerSafetyLevelThreshold
2.8.88. tmnxEqPowerSupplyFailureAc
2.8.89. tmnxEqPowerSupplyFailureDc
2.8.90. tmnxEqPowerSupplyFailureInput
2.8.91. tmnxEqPowerSupplyFailureOutput
2.8.92. tmnxEqPowerSupplyFailureOvt
2.8.93. tmnxEqPowerSupplyInputFeedAlm
2.8.94. tmnxEqPowerSupplyInputFeedAlmClr
2.8.95. tmnxEqPowerSupplyInserted
2.8.96. tmnxEqPowerSupplyPemACRectAlm
2.8.97. tmnxEqPowerSupplyPemACRectAlmClr
2.8.98. tmnxEqPowerSupplyRemoved
2.8.99. tmnxEqProvPowerCapacityAlm
2.8.100. tmnxEqProvPowerCapacityAlmClr
2.8.101. tmnxEqSyncIfTimingBITS2Alarm
2.8.102. tmnxEqSyncIfTimingBITS2AlarmClr
2.8.103. tmnxEqSyncIfTimingBITS2Quality
2.8.104. tmnxEqSyncIfTimingBITSAlarm
2.8.105. tmnxEqSyncIfTimingBITSAlarmClear
2.8.106. tmnxEqSyncIfTimingBITSOutRefChg
2.8.107. tmnxEqSyncIfTimingBITSQuality
2.8.108. tmnxEqSyncIfTimingHoldover
2.8.109. tmnxEqSyncIfTimingHoldoverClear
2.8.110. tmnxEqSyncIfTimingPTPAlarm
2.8.111. tmnxEqSyncIfTimingPTPAlarmClr
2.8.112. tmnxEqSyncIfTimingPTPQuality
2.8.113. tmnxEqSyncIfTimingRef1Alarm
2.8.114. tmnxEqSyncIfTimingRef1AlarmClear
2.8.115. tmnxEqSyncIfTimingRef1Quality
2.8.116. tmnxEqSyncIfTimingRef2Alarm
2.8.117. tmnxEqSyncIfTimingRef2AlarmClear
2.8.118. tmnxEqSyncIfTimingRef2Quality
2.8.119. tmnxEqSyncIfTimingRefSwitch
2.8.120. tmnxEqSyncIfTimingSystemQuality
2.8.121. tmnxEqWrongCard
2.8.122. tmnxExtStandbyCpmReboot
2.8.123. tmnxExtStandbyCpmRebootFail
2.8.124. tmnxInterChassisCommsDown
2.8.125. tmnxInterChassisCommsUp
2.8.126. tmnxIomEventOverflow
2.8.127. tmnxIomEventOverflowClr
2.8.128. tmnxIomResExhausted
2.8.129. tmnxIomResHighLimitReached
2.8.130. tmnxIomResStateClr
2.8.131. tmnxIPsecIsaGrpActiveIsaChgd
2.8.132. tmnxIPsecIsaGrpTnlHighWMark
2.8.133. tmnxIPsecIsaGrpTnlLowWMark
2.8.134. tmnxIPsecIsaGrpTnlMax
2.8.135. tmnxIPsecIsaGrpUnableToSwitch
2.8.136. tmnxMDAIsaTunnelGroupChange
2.8.137. tmnxOesCardDegraded
2.8.138. tmnxOesCardFirmwareErr
2.8.139. tmnxOesCfgBlocked
2.8.140. tmnxOesCfgFailNoMemory
2.8.141. tmnxOesCtlCardActivityChange
2.8.142. tmnxOesCtlCardPortDown
2.8.143. tmnxOesCtlCardPortUp
2.8.144. tmnxOesCtlCommsDown
2.8.145. tmnxOesCtlCommsUp
2.8.146. tmnxOesDbInvalid
2.8.147. tmnxOesDbInvalidClear
2.8.148. tmnxOesDbSyncFailure
2.8.149. tmnxOesDbSyncFailureClear
2.8.150. tmnxOesDbUnsync
2.8.151. tmnxOesDbUnsyncClear
2.8.152. tmnxOesFan32HReqd
2.8.153. tmnxOesFan32HReqdClear
2.8.154. tmnxOesFanFailure
2.8.155. tmnxOesFanFailureClear
2.8.156. tmnxOesFanInserted
2.8.157. tmnxOesFanRemoved
2.8.158. tmnxOesFanSpeedHigh
2.8.159. tmnxOesFanSpeedHighClear
2.8.160. tmnxOesFanSpeedLow
2.8.161. tmnxOesFanSpeedLowClear
2.8.162. tmnxOesFirmwareCondition
2.8.163. tmnxOesFpgaFail
2.8.164. tmnxOesFpgaFailClear
2.8.165. tmnxOesFpgaTimeout
2.8.166. tmnxOesFpgaTimeoutClear
2.8.167. tmnxOesNtpOutOfSync
2.8.168. tmnxOesNtpSync
2.8.169. tmnxOesOptTrnspndrMiscFail
2.8.170. tmnxOesPowerSupplyFailure
2.8.171. tmnxOesPowerSupplyFailureClear
2.8.172. tmnxOesPowerSupplyInserted
2.8.173. tmnxOesPowerSupplyRemoved
2.8.174. tmnxOesRedundancyFail
2.8.175. tmnxOesRedundancyReady
2.8.176. tmnxOesSwBelowMinRev
2.8.177. tmnxOesSwUpgdCleanupFailed
2.8.178. tmnxOesSwUpgdFailed
2.8.179. tmnxOesTempLow
2.8.180. tmnxOesTempLowClear
2.8.181. tmnxOesUsrpnlPortDown
2.8.182. tmnxOesUsrpnlPortUp
2.8.183. tmnxPeBootloaderVersionMismatch
2.8.184. tmnxPeBootromVersionMismatch
2.8.185. tmnxPeFirmwareVersionWarning
2.8.186. tmnxPeFPGAVersionMismatch
2.8.187. tmnxPeSoftwareLoadFailed
2.8.188. tmnxPeSoftwareVersionMismatch
2.8.189. tmnxPlcyAcctStatsEventOvrflw
2.8.190. tmnxPlcyAcctStatsEventOvrflwClr
2.8.191. tmnxPlcyAcctStatsPoolExcResource
2.8.192. tmnxPlcyAcctStatsPoolLowResource
2.8.193. tmnxPowerSupplyWrongFanDir
2.8.194. tmnxPowerSupplyWrongFanDirClear
2.8.195. tmnxRedPrimaryCPMFail
2.8.196. tmnxSasAlarminput1StateChanged
2.8.197. tmnxSasAlarminput2StateChanged
2.8.198. tmnxSasAlarminput3StateChanged
2.8.199. tmnxSasAlarminput4StateChanged
2.8.200. tmnxSfmIcPortDDMClear
2.8.201. tmnxSfmIcPortDDMFailure
2.8.202. tmnxSfmIcPortDegraded
2.8.203. tmnxSfmIcPortDegradedClear
2.8.204. tmnxSfmIcPortDown
2.8.205. tmnxSfmIcPortSFFInserted
2.8.206. tmnxSfmIcPortSFFRemoved
2.8.207. tmnxSfmIcPortUp
2.8.208. tmnxSyncIfTimBITS2048khzUnsup
2.8.209. tmnxSyncIfTimBITS2048khzUnsupClr
2.9. DEBUG
2.9.1. traceEvent
2.10. DHCP
2.10.1. sapDHCPLeaseEntriesExceeded
2.10.2. sapDHCPLseStateMobilityError
2.10.3. sapDHCPLseStateOverride
2.10.4. sapDHCPLseStatePopulateErr
2.10.5. sapDHCPProxyServerError
2.10.6. sapDHCPSuspiciousPcktRcvd
2.10.7. sapStatHost6DynMacConflict
2.10.8. sapStaticHostDynMacConflict
2.10.9. sdpBindDHCPLeaseEntriesExceeded
2.10.10. sdpBindDHCPLseStateMobilityErr
2.10.11. sdpBindDHCPLseStateOverride
2.10.12. sdpBindDHCPLseStatePopulateErr
2.10.13. sdpBindDHCPProxyServerError
2.10.14. sdpBindDHCPSuspiciousPcktRcvd
2.10.15. svcDHCPLseStateRestoreProblem
2.10.16. svcDHCPMiscellaneousProblem
2.10.17. tmnxVRtrDHCP6AssignedIllegSubnet
2.10.18. tmnxVRtrDHCP6ClientMacUnresolved
2.10.19. tmnxVRtrDHCP6IllegalClientAddr
2.10.20. tmnxVRtrDHCP6LseStateOverride
2.10.21. tmnxVRtrDHCP6RelayLseStExceeded
2.10.22. tmnxVRtrDHCP6RelayReplyStripUni
2.10.23. tmnxVRtrDHCP6ServerLseStExceeded
2.10.24. tmnxVRtrDHCPIfLseStatesExceeded
2.10.25. tmnxVRtrDHCPSuspiciousPcktRcvd
2.11. DHCPS
2.11.1. tmnxDhcpsAddrAllocationFailure
2.11.2. tmnxDhcpsFoLeaseUpdateFailed
2.11.3. tmnxDhcpsFoStateChange
2.11.4. tmnxDhcpsLeaseOfferedExpired
2.11.5. tmnxDhcpsPacketDropped
2.11.6. tmnxDhcpsPoolFoLeaseUpdateFailed
2.11.7. tmnxDhcpsPoolFoStateChange
2.11.8. tmnxDhcpSvrDeclineStaticAddr
2.11.9. tmnxDhcpSvrHostConflict
2.11.10. tmnxDhcpSvrIntLseConflict
2.11.11. tmnxDhcpSvrLeaseCreate
2.11.12. tmnxDhcpSvrLeaseDefaultTimers
2.11.13. tmnxDhcpSvrLeaseDelete
2.11.14. tmnxDhcpSvrLeaseModify
2.11.15. tmnxDhcpSvrLeaseNotOwner
2.11.16. tmnxDhcpSvrMaxLeasesReached
2.11.17. tmnxDhcpSvrMsgTooLong
2.11.18. tmnxDhcpSvrNoContFreeBlocks
2.11.19. tmnxDhcpSvrNoSubnetFixAddr
2.11.20. tmnxDhcpSvrPfxThDepletedV6
2.11.21. tmnxDhcpSvrPfxThTooLowV6
2.11.22. tmnxDhcpSvrPlThDepletedV6
2.11.23. tmnxDhcpSvrPlThTooLowV6
2.11.24. tmnxDhcpSvrPoolDepleted
2.11.25. tmnxDhcpSvrPoolMinFreeExc
2.11.26. tmnxDhcpSvrPoolUnknown
2.11.27. tmnxDhcpSvrSubnetDepleted
2.11.28. tmnxDhcpSvrSubnetMinFreeExc
2.11.29. tmnxDhcpSvrUserDbUnknown
2.12. DIAMETER
2.12.1. tmnxDiamAppSessionFailure
2.12.2. tmnxDiamMessageDropped
2.12.3. tmnxDiamPolicyPeerStateChange
2.12.4. tmnxDiamPpPrxMcLocStateChanged
2.12.5. tmnxDiamSessionEvent
2.13. DYNSVC
2.13.1. tmnxDynSvcSapFailed
2.14. EFM_OAM
2.14.1. dot3OamNonThresholdEvent
2.14.2. dot3OamThresholdEvent
2.14.3. tmnxDot3OamLoopCleared
2.14.4. tmnxDot3OamLoopDetected
2.14.5. tmnxDot3OamNonThresholdEventClr
2.14.6. tmnxDot3OamPeerChanged
2.14.7. tmnxDot3OamSdThresholdEvent
2.14.8. tmnxDot3OamThresholdEventClr
2.15. ELMI
2.15.1. tmnxElmiEVCStatusChangeEvent
2.15.2. tmnxElmiIfStatusChangeEvent
2.16. ERING
2.16.1. tmnxEthRingApsPrvsnClearAlarm
2.16.2. tmnxEthRingApsPrvsnRaiseAlarm
2.16.3. tmnxEthRingPathFwdStateChange
2.17. ETH_CFM
2.17.1. dot1agCfmFaultAlarm
2.17.2. tmnxDot1agCfmMepAisStateChanged
2.17.3. tmnxDot1agCfmMepCsfStateChanged
2.17.4. tmnxDot1agCfmMepDMTestComplete
2.17.5. tmnxDot1agCfmMepEthTestComplete
2.17.6. tmnxDot1agCfmMepFcltyFaultClear
2.17.7. tmnxDot1agCfmMepFcltyFaultRaise
2.17.8. tmnxDot1agCfmMepLbmTestComplete
2.17.9. tmnxDot1agCfmMepLtmTestComplete
2.17.10. tmnxDot1agCfmMepSLMTestComplete
2.17.11. tmnxDot1agCfmMipEvaluation
2.18. ETUN
2.18.1. tmnxEthTunnelApsCfgClearAlarm
2.18.2. tmnxEthTunnelApsCfgRaiseAlarm
2.18.3. tmnxEthTunnelApsNoRspClearAlarm
2.18.4. tmnxEthTunnelApsNoRspRaiseAlarm
2.18.5. tmnxEthTunnelApsPrvsnClearAlarm
2.18.6. tmnxEthTunnelApsPrvsnRaiseAlarm
2.18.7. tmnxEthTunnelApsSwitchoverAlarm
2.19. FILTER
2.19.1. tFilterApplyPathProblem
2.19.2. tFilterBgpFlowSpecProblem
2.19.3. tFilterEmbeddingOperStateChange
2.19.4. tFilterEmbedFlowspecOperStateChg
2.19.5. tFilterEmbedOpenflowOperStateChg
2.19.6. tFilterEmbedVsdOperStateChg
2.19.7. tFilterOpenflowRequestRejected
2.19.8. tFilterRadSharedFltrAlarmClear
2.19.9. tFilterRadSharedFltrAlarmRaised
2.19.10. tFilterSubInsFltrEntryDropped
2.19.11. tFilterSubInsSpaceAlarmCleared
2.19.12. tFilterSubInsSpaceAlarmRaised
2.19.13. tFilterTmsEvent
2.19.14. tIPFilterPBRPacketsDrop
2.20. GMPLS
2.20.1. vRtrGmplsLspPathStateChange
2.21. GSMP
2.21.1. tmnxAncpEgrRateMonitorEvent
2.21.2. tmnxAncpEgrRateMonitorEventL
2.21.3. tmnxAncpIngRateMonitorEvent
2.21.4. tmnxAncpIngRateMonitorEventL
2.21.5. tmnxAncpSesRejected
2.21.6. tmnxAncpShcvDisabledEvent
2.21.7. tmnxAncpShcvDisabledEventL
2.21.8. tmnxAncpStringRejected
2.22. IGH
2.22.1. tmnxIfGroupHandlerProtoOprChange
2.22.2. tmnxIfGroupHdlrMbrProtoOprChange
2.23. IGMP
2.23.1. vRtrIgmpGrpIfSapCModeRxQueryMism
2.23.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
2.23.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
2.23.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
2.23.5. vRtrIgmpGrpIfSapMcacPlcyDropped
2.23.6. vRtrIgmpGrpIfSapRxQueryVerMism
2.23.7. vRtrIgmpHostCModeRxQueryMismatch
2.23.8. vRtrIgmpHostInstantiationFail
2.23.9. vRtrIgmpHostMaxGrpsLimitExceeded
2.23.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
2.23.11. vRtrIgmpHostMaxSrcsLimitExceeded
2.23.12. vRtrIgmpHostMcacPlcyDropped
2.23.13. vRtrIgmpHostQryIntervalConflict
2.23.14. vRtrIgmpHostRxQueryVerMismatch
2.23.15. vRtrIgmpIfCModeRxQueryMismatch
2.23.16. vRtrIgmpIfRxQueryVerMismatch
2.23.17. vRtrIgmpMaxGrpsLimitExceeded
2.23.18. vRtrIgmpMaxGrpSrcsLimitExceeded
2.23.19. vRtrIgmpMaxSrcsLimitExceeded
2.23.20. vRtrIgmpMcacPlcyDropped
2.24. IGMP_SNOOPING
2.24.1. sapIgmpSnpgGrpLimitExceeded
2.24.2. sapIgmpSnpgGrpSrcLimitExceeded
2.24.3. sapIgmpSnpgMcacPlcyDropped
2.24.4. sapIgmpSnpgMcsFailure
2.24.5. sapIgmpSnpgSrcLimitExceeded
2.24.6. sdpBndIgmpSnpgGrpLimitExceeded
2.24.7. sdpBndIgmpSnpgGrpSrcLimitExceed
2.24.8. sdpBndIgmpSnpgMcacPlcyDropped
2.24.9. sdpBndIgmpSnpgSrcLimitExceeded
2.25. IP
2.25.1. clearRTMError
2.25.2. fibAddFailed
2.25.3. ipAnyDuplicateAddress
2.25.4. ipArpBadInterface
2.25.5. ipArpDuplicateIpAddress
2.25.6. ipArpDuplicateMacAddress
2.25.7. ipArpInfoOverwritten
2.25.8. ipDuplicateAddress
2.25.9. ipEtherBroadcast
2.25.10. qosNetworkPolicyMallocFailed
2.26. IPSEC
2.26.1. tIPsecBfdIntfSessStateChgd
2.26.2. tIPsecRadAcctPlcyFailure
2.26.3. tIPsecRUSAFailToAddRoute
2.26.4. tIPsecRuTnlEncapIpMtuTooSmall
2.26.5. tIPsecRUTnlFailToCreate
2.26.6. tIPsecRUTnlRemoved
2.26.7. tIPSecTrustAnchorPrfOprChg
2.26.8. tIPsecTunnelEncapIpMtuTooSmall
2.26.9. tmnxIPsecGWOperStateChange
2.26.10. tmnxIPsecTunnelOperStateChange
2.26.11. tmnxSecNotifCmptedCertChnChngd
2.26.12. tmnxSecNotifCmptedCertHashChngd
2.26.13. tmnxSecNotifSendChnNotInCmptChn
2.27. ISIS
2.27.1. tmnxIsisAdjacencyChange
2.27.2. tmnxIsisAdjBfdSessionSetupFail
2.27.3. tmnxIsisAdjRestartStatusChange
2.27.4. tmnxIsisAreaMismatch
2.27.5. tmnxIsisAuthFail
2.27.6. tmnxIsisAutTypeFail
2.27.7. tmnxIsisCircIdExhausted
2.27.8. tmnxIsisCorruptedLSPDetected
2.27.9. tmnxIsisDatabaseOverload
2.27.10. tmnxIsisExportLimitReached
2.27.11. tmnxIsisExportLimitWarning
2.27.12. tmnxIsisFailureDisabled
2.27.13. tmnxIsisIDLenMismatch
2.27.14. tmnxIsisLdpSyncExit
2.27.15. tmnxIsisLdpSyncTimerStarted
2.27.16. tmnxIsisLSPPurge
2.27.17. tmnxIsisLSPTooLargeToPropagate
2.27.18. tmnxIsisManualAddressDrops
2.27.19. tmnxIsisMaxAreaAddrsMismatch
2.27.20. tmnxIsisMaxSeqExceedAttempt
2.27.21. tmnxIsisOrigLSPBufSizeMismatch
2.27.22. tmnxIsisOwnLSPPurge
2.27.23. tmnxIsisPfxLimitOverloadWarning
2.27.24. tmnxIsisProtoSuppMismatch
2.27.25. tmnxIsisRejectedAdjacency
2.27.26. tmnxIsisRejectedAdjacencySid
2.27.27. tmnxIsisRoutesExpLmtDropped
2.27.28. tmnxIsisSequenceNumberSkip
2.27.29. tmnxIsisSidError
2.27.30. tmnxIsisSidNotInLabelRange
2.27.31. tmnxIsisSpbEctFidCfgChg
2.27.32. tmnxIsisSpbNbrMultAdjExists
2.27.33. tmnxIsisSpbNbrMultAdjExistsClear
2.27.34. tmnxIsisSrgbBadLabelRange
2.27.35. tmnxIsisVersionSkew
2.27.36. vRtrIsisSpbNbrMultAdjExists
2.27.37. vRtrIsisSpbNbrMultAdjExistsClear
2.27.38. vRtrSpbEctFidCfgChg
2.28. L2TP
2.28.1. tmnxL2tpApFailure
2.28.2. tmnxL2tpIsaMdaVRtrStateChange
2.28.3. tmnxL2tpLnsPppNcpFailure
2.28.4. tmnxL2tpLnsSePppSessionFailure
2.28.5. tmnxL2tpPeerUnreachable
2.28.6. tmnxL2tpTunnelBlacklisted
2.28.7. tmnxL2tpTunnelSelBlacklistFull
2.29. LAG
2.29.1. DynamicCostOff
2.29.2. DynamicCostOn
2.29.3. LagPortAddFailed
2.29.4. LagPortAddFailureCleared
2.29.5. LagStateEvent
2.29.6. LagSubGroupSelected
2.29.7. tLagMemberStateEvent
2.29.8. tmnxLagBfdMemStateChanged
2.30. LDAP
2.30.1. tmnxLdapOperStateChange
2.30.2. tmnxLdapServerOperStateChange
2.31. LDP
2.31.1. vRtrLdpGroupIdMismatch
2.31.2. vRtrLdpNgIfStateChange
2.31.3. vRtrLdpNgInetIfStateChange
2.31.4. vRtrLdpNgIpv4InstStateChange
2.31.5. vRtrLdpNgIpv6InstStateChange
2.31.6. vRtrLdpNgResourceExhaustion
2.31.7. vRtrLdpNgSessionStateChange
2.31.8. vRtrLdpNgSessMaxFecLimitReached
2.31.9. vRtrLdpNgSessMaxFecThresChanged
2.31.10. vRtrLdpNgTargPeerStateChange
2.31.11. vRtrLdpStateChange
2.32. LI
2.32.1. cli_config_io
2.32.2. cli_unauth_config_io
2.32.3. cli_unauth_user_io
2.32.4. cli_user_io
2.32.5. cli_user_login
2.32.6. cli_user_login_failed
2.32.7. cli_user_login_max_attempts
2.32.8. cli_user_logout
2.32.9. destinationDisabled
2.32.10. destinationEnabled
2.32.11. ftp_user_login
2.32.12. ftp_user_login_failed
2.32.13. ftp_user_login_max_attempts
2.32.14. ftp_user_logout
2.32.15. host_snmp_attempts
2.32.16. radiusFailed
2.32.17. sbiBootLiConfig
2.32.18. snmp_user_set
2.32.19. sourceDisabled
2.32.20. sourceEnabled
2.32.21. sourceSapChange
2.32.22. sourceSubscriberChange
2.32.23. ssh_user_login
2.32.24. ssh_user_login_failed
2.32.25. ssh_user_login_max_attempts
2.32.26. ssh_user_logout
2.32.27. ssiSaveConfigFailed
2.32.28. ssiSaveConfigSucceeded
2.32.29. ssiSyncConfigFailed
2.32.30. ssiSyncConfigOK
2.32.31. tMirrorDestinationChangeReject
2.32.32. tMirrorFilterAssignToItfWarn
2.32.33. tMirrorFilterAssignToSapWarn
2.32.34. tMirrorFilterAssignToSdpWarn
2.32.35. tMirrorLiNat64SubOperStateCh
2.32.36. tMirrorLiNatL2awSubOperStateCh
2.32.37. tMirrorLiNatLsnSubOperStateCh
2.32.38. tMirrorSourceFilterAssignReject
2.32.39. tMirrorSourceFilterAssignWarn
2.32.40. tMirrorSourceFilterOverruled
2.32.41. tMirrorSourceIPFltrChangeReject
2.32.42. tMirrorSourceIPv6FltrChangeRej
2.32.43. tMirrorSourceLiFilterChanged
2.32.44. tMirrorSourceLiSubProblem
2.32.45. tMirrorSourceMacFltrChangeReject
2.32.46. tmnxClear
2.32.47. tmnxConfigCreate
2.32.48. tmnxConfigDelete
2.32.49. tmnxConfigModify
2.32.50. tmnxStateChange
2.33. LLDP
2.33.1. lldpRemTablesChange
2.34. LMP
2.34.1. tmnxLmpVRtrControlChannelState
2.34.2. tmnxLmpVRtrDbLinkPropMismatch
2.34.3. tmnxLmpVRtrDbLinkPropMismatchClr
2.34.4. tmnxLmpVRtrTeLinkPropMismatch
2.34.5. tmnxLmpVRtrTeLinkPropMismatchClr
2.34.6. tmnxLmpVRtrTeLinkState
2.35. LOGGER
2.35.1. STARTED
2.35.2. tmnxClear
2.35.3. tmnxLogAccountingDataLoss
2.35.4. tmnxLogAdminLocFailed
2.35.5. tmnxLogBackupLocFailed
2.35.6. tmnxLogEventOverrun
2.35.7. tmnxLogEventThrottled
2.35.8. tmnxLogFileDeleted
2.35.9. tmnxLogFileRollover
2.35.10. tmnxLogOnlyEventOverrun
2.35.11. tmnxLogOnlyEventThrottled
2.35.12. tmnxLogSpaceContention
2.35.13. tmnxLogTraceError
2.35.14. tmnxStdEventsReplayed
2.35.15. tmnxSysLogTargetProblem
2.35.16. tmnxTestEvent
2.36. MC_REDUNDANCY
2.36.1. srrpPacketDiscarded
2.36.2. tMcPeerIPsecTnlGrpMasterStateChg
2.36.3. tMcPeerIPsecTnlGrpProtStatusChg
2.36.4. tmnxMCEPSessionPsvModeDisabled
2.36.5. tmnxMCEPSessionPsvModeEnabled
2.36.6. tmnxMcLagInfoLagChanged
2.36.7. tmnxMcOmcrClientNumEntriesHigh
2.36.8. tmnxMcOmcrStatFailedChanged
2.36.9. tmnxMcPeerEPBfdSessionClose
2.36.10. tmnxMcPeerEPBfdSessionDown
2.36.11. tmnxMcPeerEPBfdSessionOpen
2.36.12. tmnxMcPeerEPBfdSessionUp
2.36.13. tmnxMcPeerEPOperDown
2.36.14. tmnxMcPeerEPOperUp
2.36.15. tmnxMcPeerRingsOperStateChanged
2.36.16. tmnxMcPeerSyncStatusChanged
2.36.17. tmnxMcRedundancyMismatchDetected
2.36.18. tmnxMcRedundancyMismatchResolved
2.36.19. tmnxMcRedundancyPeerStateChanged
2.36.20. tmnxMcRingInbCtrlOperStateChgd
2.36.21. tmnxMcRingNodeLocOperStateChgd
2.36.22. tmnxMcRingOperStateChanged
2.36.23. tmnxMcSyncClientAlarmCleared
2.36.24. tmnxMcSyncClientAlarmRaised
2.36.25. tmnxMcSyncClockSkewCleared
2.36.26. tmnxMcSyncClockSkewRaised
2.36.27. tmnxSrrpBecameBackup
2.36.28. tmnxSrrpBfdIntfSessStateChgd
2.36.29. tmnxSrrpDualMaster
2.36.30. tmnxSrrpDuplicateSubIfAddress
2.36.31. tmnxSrrpInstanceIdMismatch
2.36.32. tmnxSrrpOperDownInvalidMac
2.36.33. tmnxSrrpOperDownInvalidMacClear
2.36.34. tmnxSrrpRedIfMismatch
2.36.35. tmnxSrrpSapMismatch
2.36.36. tmnxSrrpSapTagMismatch
2.36.37. tmnxSrrpSubnetMismatch
2.36.38. tmnxSrrpSubnetMismatchCleared
2.36.39. tmnxSrrpSystemIpNotSet
2.36.40. tmnxSrrpTrapNewMaster
2.37. MCPATH
2.37.1. tmnxMcPathAvailBwLimitReached
2.37.2. tmnxMcPathAvailBwValWithinRange
2.37.3. tmnxMcPathSrcGrpBlkHole
2.37.4. tmnxMcPathSrcGrpBlkHoleClear
2.38. MIRROR
2.38.1. destinationDisabled
2.38.2. destinationEnabled
2.38.3. sourceDisabled
2.38.4. sourceEnabled
2.38.5. sourceIpFilterChange
2.38.6. sourceMacFilterChange
2.38.7. sourceSapChange
2.38.8. sourceSubscriberChange
2.38.9. tMirrorSourceIpv6FilterChange
2.39. MLD
2.39.1. vRtrMldGrpIfSapCModeRxQueryMism
2.39.2. vRtrMldGrpIfSapMaxGrpsLimExceed
2.39.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
2.39.4. vRtrMldGrpIfSapMaxSrcsLimExceed
2.39.5. vRtrMldGrpIfSapMcacPlcyDropped
2.39.6. vRtrMldGrpIfSapRxQueryVerMism
2.39.7. vRtrMldHostCModeRxQueryMismatch
2.39.8. vRtrMldHostInstantiationFail
2.39.9. vRtrMldHostMaxGrpsLimitExceeded
2.39.10. vRtrMldHostMaxGrpSrcsLimitExcd
2.39.11. vRtrMldHostMaxSrcsLimitExceeded
2.39.12. vRtrMldHostMcacPlcyDropped
2.39.13. vRtrMldHostQryIntervalConflict
2.39.14. vRtrMldHostRxQueryVerMismatch
2.39.15. vRtrMldIfCModeRxQueryMismatch
2.39.16. vRtrMldIfRxQueryVerMismatch
2.39.17. vRtrMldMaxGrpsLimitExceeded
2.39.18. vRtrMldMaxGrpSrcsLimitExceeded
2.39.19. vRtrMldMaxSrcsLimitExceeded
2.39.20. vRtrMldMcacPlcyDropped
2.40. MLD_SNOOPING
2.40.1. sapMldSnpgGrpLimitExceeded
2.40.2. sapMldSnpgMcsFailure
2.40.3. sdpBndMldSnpgGrpLimitExceeded
2.41. MPLS
2.41.1. mplsTunnelDown
2.41.2. mplsTunnelReoptimized
2.41.3. mplsTunnelRerouted
2.41.4. mplsTunnelUp
2.41.5. mplsXCDown
2.41.6. mplsXCUp
2.41.7. vRtrMplsIfStateChange
2.41.8. vRtrMplsLspActivePathChanged
2.41.9. vRtrMplsLspDown
2.41.10. vRtrMplsLspPathDown
2.41.11. vRtrMplsLspPathLstFillReoptElig
2.41.12. vRtrMplsLspPathMbbStatusEvent
2.41.13. vRtrMplsLspPathRerouted
2.41.14. vRtrMplsLspPathResignaled
2.41.15. vRtrMplsLspPathSoftPreempted
2.41.16. vRtrMplsLspPathUp
2.41.17. vRtrMplsLspSwitchStbyFailure
2.41.18. vRtrMplsLspUp
2.41.19. vRtrMplsNodeInIgpOverload
2.41.20. vRtrMplsP2mpInstanceDown
2.41.21. vRtrMplsP2mpInstanceResignaled
2.41.22. vRtrMplsP2mpInstanceUp
2.41.23. vRtrMplsResignalTimerExpired
2.41.24. vRtrMplsS2lSubLspDown
2.41.25. vRtrMplsS2lSubLspRerouted
2.41.26. vRtrMplsS2lSubLspResignaled
2.41.27. vRtrMplsS2lSubLspUp
2.41.28. vRtrMplsStateChange
2.41.29. vRtrMplsXCBundleChange
2.42. MPLS_TP
2.42.1. vRtrMplsTpLspActivePathChange
2.42.2. vRtrMplsTpLspActivePathUp
2.42.3. vRtrMplsTpLspPtTypeMismatchAlarm
2.42.4. vRtrMplsTpLspPtTypeMismatchClear
2.42.5. vRtrMplsTpLspRevertMismatchAlarm
2.42.6. vRtrMplsTpLspRevertMismatchClear
2.43. MSDP
2.43.1. msdpBackwardTransition
2.43.2. msdpEstablished
2.43.3. tmnxMsdpNgActSrcLimExcd
2.43.4. tmnxMsdpNgGroupSrcActMsgsExcd
2.43.5. tmnxMsdpNgPeerActSrcLimExcd
2.43.6. tmnxMsdpNgRPFFailure
2.43.7. tmnxMsdpNgSourceSrcActMsgsExcd
2.44. NAT
2.44.1. tmnxNatDetMapOperStateChanged
2.44.2. tmnxNatDetPlcyChanged
2.44.3. tmnxNatDetPlcyOperStateChanged
2.44.4. tmnxNatFwd2EntryAdded
2.44.5. tmnxNatFwd2OperStateChanged
2.44.6. tmnxNatInAddrPrefixBlksFree
2.44.7. tmnxNatIsaGrpIsDegraded
2.44.8. tmnxNatIsaGrpOperStateChanged
2.44.9. tmnxNatIsaMemberSessionUsageHigh
2.44.10. tmnxNatL2AwSubIcmpPortUsageHigh
2.44.11. tmnxNatL2AwSubSessionUsageHigh
2.44.12. tmnxNatL2AwSubTcpPortUsageHigh
2.44.13. tmnxNatL2AwSubUdpPortUsageHigh
2.44.14. tmnxNatLsnSubBlksFree
2.44.15. tmnxNatLsnSubIcmpPortUsgHigh
2.44.16. tmnxNatLsnSubSessionUsgHigh
2.44.17. tmnxNatLsnSubTcpPortUsgHigh
2.44.18. tmnxNatLsnSubUdpPortUsgHigh
2.44.19. tmnxNatMapRuleChange
2.44.20. tmnxNatMdaActive
2.44.21. tmnxNatMdaDetectsLoadSharingErr
2.44.22. tmnxNatPcpSrvStateChanged
2.44.23. tmnxNatPlAddrFree
2.44.24. tmnxNatPlBlockAllocationL2Aw
2.44.25. tmnxNatPlBlockAllocationLsn
2.44.26. tmnxNatPlL2AwBlockUsageHigh
2.44.27. tmnxNatPlLsnMemberBlockUsageHigh
2.44.28. tmnxNatPlLsnRedActiveChanged
2.44.29. tmnxNatResourceProblemCause
2.44.30. tmnxNatResourceProblemDetected
2.44.31. tmnxNatVrtrOutDnatOnlyRoutesHigh
2.45. NTP
2.45.1. tmnxNtpAuthMismatch
2.45.2. tmnxNtpNoServersAvail
2.45.3. tmnxNtpOperChange
2.45.4. tmnxNtpServerChange
2.45.5. tmnxNtpServersAvail
2.46. OAM
2.46.1. svcIdInvalid
2.46.2. svcIdWrongType
2.46.3. tmnxAncpLoopbackTestCompleted
2.46.4. tmnxAncpLoopbackTestCompletedL
2.46.5. tmnxOamLdpTtraceAutoDiscState
2.46.6. tmnxOamLdpTtraceFecDisStatus
2.46.7. tmnxOamLdpTtraceFecPFailUpdate
2.46.8. tmnxOamLdpTtraceFecProbeState
2.46.9. tmnxOamPingProbeFailedV3
2.46.10. tmnxOamPingTestCompletedV3
2.46.11. tmnxOamPingTestFailedV3
2.46.12. tmnxOamPmThrClear
2.46.13. tmnxOamPmThrRaise
2.46.14. tmnxOamSaaThreshold
2.46.15. tmnxOamTrPathChange
2.46.16. tmnxOamTrTestCompleted
2.46.17. tmnxOamTrTestFailed
2.46.18. tmnxTwampSrvInactivityTimeout
2.46.19. tmnxTwampSrvMaxConnsExceeded
2.46.20. tmnxTwampSrvMaxSessExceeded
2.46.21. tmnxTwampSrvPfxMaxConnsExceeded
2.46.22. tmnxTwampSrvPfxMaxSessExceeded
2.47. OPEN_FLOW
2.47.1. tmnxOFFlowEntryInsertFailed
2.48. OSPF
2.48.1. tmnxOspfAdjBfdSessionSetupFail
2.48.2. tmnxOspfAreaMaxAgeLsa
2.48.3. tmnxOspfAreaOriginateLsa
2.48.4. tmnxOspfAsMaxAgeLsa
2.48.5. tmnxOspfAsOriginateLsa
2.48.6. tmnxOspfExportLimitReached
2.48.7. tmnxOspfExportLimitWarning
2.48.8. tmnxOspfFailureDisabled
2.48.9. tmnxOspfLsdbApproachingOverflow
2.48.10. tmnxOspfLsdbOverflow
2.48.11. tmnxOspfNgIfAuthFailure
2.48.12. tmnxOspfNgIfConfigError
2.48.13. tmnxOspfNgIfRxBadPacket
2.48.14. tmnxOspfNgIfStateChange
2.48.15. tmnxOspfNgIfTxRetransmit
2.48.16. tmnxOspfNgLdpSyncExit
2.48.17. tmnxOspfNgLdpSyncTimerStarted
2.48.18. tmnxOspfNgLinkMaxAgeLsa
2.48.19. tmnxOspfNgLinkOriginateLsa
2.48.20. tmnxOspfNgNbrRestartHlprStsChg
2.48.21. tmnxOspfNgNbrStateChange
2.48.22. tmnxOspfNssaTranslatorStatusChg
2.48.23. tmnxOspfOverloadEntered
2.48.24. tmnxOspfOverloadExited
2.48.25. tmnxOspfOverloadWarning
2.48.26. tmnxOspfRejectedAdjacencySid
2.48.27. tmnxOspfRestartStatusChange
2.48.28. tmnxOspfRoutesExpLmtDropped
2.48.29. tmnxOspfShamIfAuthFailure
2.48.30. tmnxOspfShamIfConfigError
2.48.31. tmnxOspfShamIfRxBadPacket
2.48.32. tmnxOspfShamIfStateChange
2.48.33. tmnxOspfShamIfTxRetransmit
2.48.34. tmnxOspfShamNbrRestartHlprStsChg
2.48.35. tmnxOspfShamNbrStateChange
2.48.36. tmnxOspfSpfRunsRestarted
2.48.37. tmnxOspfSpfRunsStopped
2.48.38. tmnxOspfSrgbBadLabelRange
2.48.39. tmnxOspfSrSidError
2.48.40. tmnxOspfSrSidNotInLabelRange
2.48.41. tmnxOspfVirtIfAuthFailure
2.48.42. tmnxOspfVirtIfConfigError
2.48.43. tmnxOspfVirtIfRxBadPacket
2.48.44. tmnxOspfVirtIfStateChange
2.48.45. tmnxOspfVirtIfTxRetransmit
2.48.46. tmnxOspfVirtNbrRestartHlprStsChg
2.48.47. tmnxOspfVirtNbrStateChange
2.49. PIM
2.49.1. vRtrPimNgBSRStateChange
2.49.2. vRtrPimNgDataMtReused
2.49.3. vRtrPimNgGrpInSSMRange
2.49.4. vRtrPimNgHelloDropped
2.49.5. vRtrPimNgIfNeighborLoss
2.49.6. vRtrPimNgIfNeighborUp
2.49.7. vRtrPimNgInvalidIPmsiTunnel
2.49.8. vRtrPimNgInvalidJoinPrune
2.49.9. vRtrPimNgInvalidRegister
2.49.10. vRtrPimNgMaxGraftRetry
2.49.11. vRtrPimNgMaxGrpsLimitExceeded
2.49.12. vRtrPimNgMcacPlcyDropped
2.49.13. vRtrPimNgMDTLimitExceeded
2.49.14. vRtrPimNgReplicationLmtExceeded
2.49.15. vRtrPimNgSGLimitExceeded
2.50. PIM_SNOOPING
2.50.1. tmnxPimSnpgIfNeighborLoss
2.50.2. tmnxPimSnpgIfNeighborUp
2.50.3. tmnxPimSnpgSGLimitExceeded
2.50.4. tmnxPimSnpgSnoopModeChanged
2.51. PORT
2.51.1. SFPStatusBlocked
2.51.2. SFPStatusCulprit
2.51.3. SFPStatusDDMCorrupt
2.51.4. SFPStatusFailure
2.51.5. SFPStatusOperational
2.51.6. SFPStatusReadError
2.51.7. SFPStatusUnsupported
2.51.8. tdcmAlarms
2.51.9. tmnxBundleMemberMlfrLoopback
2.51.10. tmnxDS1E1LoopbackStarted
2.51.11. tmnxDS1E1LoopbackStopped
2.51.12. tmnxDS3E3LoopbackStarted
2.51.13. tmnxDS3E3LoopbackStopped
2.51.14. tmnxDSXClockSyncStateChange
2.51.15. tmnxEqCohOptPortAlarm
2.51.16. tmnxEqDigitalDiagMonitorClear
2.51.17. tmnxEqDigitalDiagMonitorFailure
2.51.18. tmnxEqPortBndlBadEndPtDiscr
2.51.19. tmnxEqPortBndlRedDiffExceeded
2.51.20. tmnxEqPortBndlYellowDiffExceeded
2.51.21. tmnxEqPortDS1Alarm
2.51.22. tmnxEqPortDS1AlarmClear
2.51.23. tmnxEqPortDS3Alarm
2.51.24. tmnxEqPortDS3AlarmClear
2.51.25. tmnxEqPortDuplexCfgNotCompatible
2.51.26. tmnxEqPortError
2.51.27. tmnxEqPortEtherAlarm
2.51.28. tmnxEqPortEtherAlarmClear
2.51.29. tmnxEqPortEtherCrcAlarm
2.51.30. tmnxEqPortEtherCrcAlarmClear
2.51.31. tmnxEqPortEtherInternalAlarm
2.51.32. tmnxEqPortEtherInternalAlarmClr
2.51.33. tmnxEqPortEtherLoopCleared
2.51.34. tmnxEqPortEtherLoopDetected
2.51.35. tmnxEqPortEtherSymMonAlarm
2.51.36. tmnxEqPortEtherSymMonAlarmClear
2.51.37. tmnxEqPortIngressRateCfgNotCompatible
2.51.38. tmnxEqPortOpticalAmpAlarm
2.51.39. tmnxEqPortSFPInserted
2.51.40. tmnxEqPortSFPRemoved
2.51.41. tmnxEqPortSonetAlarm
2.51.42. tmnxEqPortSonetAlarmClear
2.51.43. tmnxEqPortSonetPathAlarm
2.51.44. tmnxEqPortSonetPathAlarmClear
2.51.45. tmnxEqPortSpeedCfgNotCompatible
2.51.46. tmnxEqPortWaveTrackerAlarm
2.51.47. tmnxEqSonetClockSrcNotCompatible
2.51.48. tmnxEqSonetFramingNotCompatible
2.51.49. tmnxEqSonetSfThreshNotCompatible
2.51.50. tmnxOesPortError
2.51.51. tmnxOesPortErrorClear
2.51.52. tmnxOtuIfAlarmNotification
2.51.53. tmnxPortUnsupportedFunction
2.51.54. tmnxResvCbsPoolThreshAmber
2.51.55. tmnxResvCbsPoolThreshGreen
2.51.56. tmnxResvCbsPoolThreshRed
2.51.57. tmnxSonetSDHLoopbackStarted
2.51.58. tmnxSonetSDHLoopbackStopped
2.51.59. tPortAccEgrQGrpHostMatchFailure
2.51.60. tPortEgrVPortHostMatchFailure
2.52. PPP
2.52.1. ipcpPeerOnDifferentSubnet
2.52.2. ipcpPeerRejectedOurIp
2.52.3. ipcpPeerSuggestedDifferentIp
2.52.4. ipcpRemoteIpUnknown
2.52.5. ipcpSameLocalAndRemoteIp
2.52.6. ipv6cpPeerOnDifferentSubnet
2.52.7. ipv6cpPeerRejectedOurIntId
2.52.8. ipv6cpPeerSuggestedDiffIntId
2.52.9. ipv6cpRemoteIntIdUnknown
2.52.10. ipv6cpSameLocalAndRemoteIntId
2.52.11. tmnxPppCpDown
2.52.12. tmnxPppCpUp
2.52.13. tmnxPppKeepaliveFailure
2.52.14. tmnxPppLoopback
2.52.15. tmnxPppLoopbackClear
2.52.16. tmnxPppLqmFailure
2.52.17. tmnxPppNcpDown
2.52.18. tmnxPppNcpUp
2.53. PPPOE
2.53.1. tmnxMlpppBundleIndicatorsChange
2.53.2. tmnxPppoeNcpFailure
2.53.3. tmnxPppoeSessionFailure
2.54. PTP
2.54.1. tmnxPtpCardNotSupported
2.54.2. tmnxPtpCardNotSupportedClear
2.54.3. tmnxPtpClockRecoveryStateChange
2.54.4. tmnxPtpDynamicChange
2.54.5. tmnxPtpMasterClockChangedEvent
2.54.6. tmnxPtpOutOfResources
2.54.7. tmnxPtpOutOfResourcesClear
2.54.8. tmnxPtpPortNoTimestamping
2.55. RADIUS
2.55.1. tmnxRadAcctOnOngoing
2.55.2. tmnxRadRouteDownloadFailed
2.55.3. tmnxRadSrvPlcySrvOperStateCh
2.56. RIP
2.56.1. ripPacketDiscarded
2.56.2. vRtrRipAuthTypeFailure
2.56.3. vRtrRipAuthTypeMismatch
2.56.4. vRtrRipInstanceExpLmtReached
2.56.5. vRtrRipInstanceExpLmtWarning
2.56.6. vRtrRipInstanceRestarted
2.56.7. vRtrRipInstanceRtsExpLmtDropped
2.56.8. vRtrRipInstanceShuttingDown
2.57. RIP_NG
2.57.1. tmnxRipNgAuthFailure
2.57.2. tmnxRipNgAuthTypeMismatch
2.57.3. tmnxRipNgIfUcastAddrNotUsed
2.57.4. tmnxRipNgInstExpLmtReached
2.57.5. tmnxRipNgInstExpLmtWarning
2.57.6. tmnxRipNgInstRestarted
2.57.7. tmnxRipNgInstRtsExpLmtDropped
2.57.8. tmnxRipNgInstShuttingDown
2.57.9. tmnxRipNgPacketDiscarded
2.58. ROUTE_POLICY
2.58.1. trigPolicyPrevEval
2.59. RPKI
2.59.1. tmnxRpkiNotifySession
2.59.2. tmnxRpkiStaleTimerExpiry
2.60. RSVP
2.60.1. vRtrRsvpIfNbrStateDown
2.60.2. vRtrRsvpIfNbrStateUp
2.60.3. vRtrRsvpIfStateChange
2.60.4. vRtrRsvpPEFailOverPriToStdBy
2.60.5. vRtrRsvpPEFailOverStdByToPri
2.60.6. vRtrRsvpStateChange
2.61. SATELLITE
2.61.1. tmnxSatelliteOperStateChange
2.61.2. tmnxSatSyncIfTimHoldover
2.61.3. tmnxSatSyncIfTimHoldoverClear
2.61.4. tmnxSatSyncIfTimRef1Alarm
2.61.5. tmnxSatSyncIfTimRef1AlarmClear
2.61.6. tmnxSatSyncIfTimRef1Quality
2.61.7. tmnxSatSyncIfTimRef2Alarm
2.61.8. tmnxSatSyncIfTimRef2AlarmClear
2.61.9. tmnxSatSyncIfTimRef2Quality
2.61.10. tmnxSatSyncIfTimRefSwitch
2.61.11. tmnxSatSyncIfTimSystemQuality
2.62. SECURITY
2.62.1. cli_user_login
2.62.2. cli_user_login_failed
2.62.3. cli_user_login_max_attempts
2.62.4. cli_user_logout
2.62.5. enable_admin
2.62.6. ftp_transfer_failed
2.62.7. ftp_transfer_successful
2.62.8. ftp_user_login
2.62.9. ftp_user_login_failed
2.62.10. ftp_user_login_max_attempts
2.62.11. ftp_user_logout
2.62.12. host_snmp_attempts
2.62.13. mafEntryMatch
2.62.14. radiusInetServerOperStatusChange
2.62.15. radiusOperStatusChange
2.62.16. radiusSystemIpAddrNotSet
2.62.17. sapDcpDynamicConform
2.62.18. sapDcpDynamicEnforceAlloc
2.62.19. sapDcpDynamicEnforceFreed
2.62.20. sapDcpDynamicExcd
2.62.21. sapDcpDynamicHoldDownEnd
2.62.22. sapDcpDynamicHoldDownStart
2.62.23. sapDcpLocMonExcd
2.62.24. sapDcpLocMonExcdAllDynAlloc
2.62.25. sapDcpLocMonExcdAllDynFreed
2.62.26. sapDcpLocMonExcdDynResource
2.62.27. sapDcpStaticConform
2.62.28. sapDcpStaticExcd
2.62.29. sapDcpStaticHoldDownEnd
2.62.30. sapDcpStaticHoldDownStart
2.62.31. SSH_server_preserve_key_fail
2.62.32. ssh_user_login
2.62.33. ssh_user_login_failed
2.62.34. ssh_user_login_max_attempts
2.62.35. ssh_user_logout
2.62.36. sysDNSSecFailedAuthentication
2.62.37. tacplusInetSrvrOperStatusChange
2.62.38. tacplusOperStatusChange
2.62.39. tmnxAppPkiCertVerificationFailed
2.62.40. tmnxCAProfileStateChange
2.62.41. tmnxCAProfUpDueToRevokeChkCrlOpt
2.62.42. tmnxCliGroupSessionLimitExceeded
2.62.43. tmnxConfigCreate
2.62.44. tmnxConfigDelete
2.62.45. tmnxConfigModify
2.62.46. tmnxCpmProtDefPolModified
2.62.47. tmnxCpmProtExcdSapEcm
2.62.48. tmnxCpmProtExcdSapIp
2.62.49. tmnxCpmProtExcdSdpBind
2.62.50. tmnxCpmProtExcdSdpBindEcm
2.62.51. tmnxCpmProtExcdSdpBindIp
2.62.52. tmnxCpmProtViolIf
2.62.53. tmnxCpmProtViolIfOutProf
2.62.54. tmnxCpmProtViolMac
2.62.55. tmnxCpmProtViolPort
2.62.56. tmnxCpmProtViolPortAgg
2.62.57. tmnxCpmProtViolSap
2.62.58. tmnxCpmProtViolSapOutProf
2.62.59. tmnxCpmProtViolSdpBind
2.62.60. tmnxCpmProtViolSdpBindOutProf
2.62.61. tmnxCpmProtViolVdoSvcClient
2.62.62. tmnxCpmProtViolVdoVrtrClient
2.62.63. tmnxDcpCardFpEventOvrflw
2.62.64. tmnxDcpCardFpEventOvrflwClr
2.62.65. tmnxDcpCardSapEventOvrflw
2.62.66. tmnxDcpCardSapEventOvrflwClr
2.62.67. tmnxDcpCardVrtrIfEventOvrflw
2.62.68. tmnxDcpCardVrtrIfEventOvrflwClr
2.62.69. tmnxDcpFpDynPoolUsageHiAlmClear
2.62.70. tmnxDcpFpDynPoolUsageHiAlmRaise
2.62.71. tmnxKeyChainAuthFailure
2.62.72. tmnxMD5AuthFailure
2.62.73. tmnxPkiCAProfActnStatusChg
2.62.74. tmnxPkiCAProfCrlUpdAllUrlsFail
2.62.75. tmnxPkiCAProfCrlUpdateStart
2.62.76. tmnxPkiCAProfCrlUpdateSuccess
2.62.77. tmnxPkiCAProfCrlUpdateUrlFail
2.62.78. tmnxPkiCAProfCrlUpdLargPreUpdTm
2.62.79. tmnxPkiCAProfCrlUpdNoNxtUpdTime
2.62.80. tmnxPkiCAProfRevokeChkWarning
2.62.81. tmnxPkiCertAfterExpWarning
2.62.82. tmnxPkiCertBeforeExpWarning
2.62.83. tmnxPkiCertExpWarningCleared
2.62.84. tmnxPkiCertNotYetValid
2.62.85. tmnxPkiCertVerificationFailed
2.62.86. tmnxPkiCRLAfterExpWarning
2.62.87. tmnxPkiCRLBeforeExpWarning
2.62.88. tmnxPkiCRLExpWarningCleared
2.62.89. tmnxPkiCRLNotYetValid
2.62.90. tmnxPkiFileReadFailed
2.62.91. tmnxPkiFileWriteFailed
2.62.92. tmnxSecComputeCertChainFailure
2.62.93. tmnxSecNotifFileReloaded
2.62.94. tmnxSecNotifKeyChainExpired
2.62.95. tmnxSecPwdHistoryFileLoadFailed
2.62.96. tmnxSecPwdHistoryFileWriteFailed
2.62.97. tmnxStateChange
2.62.98. tmnxSysLicenseExpiresSoon
2.62.99. tmnxSysLicenseInvalid
2.62.100. tmnxSysLicenseValid
2.62.101. tmnxUsrProfSessionLimitExceeded
2.62.102. user_disconnect
2.62.103. vRtrIfDcpDynamicConform
2.62.104. vRtrIfDcpDynamicEnforceAlloc
2.62.105. vRtrIfDcpDynamicEnforceFreed
2.62.106. vRtrIfDcpDynamicExcd
2.62.107. vRtrIfDcpDynamicHoldDownEnd
2.62.108. vRtrIfDcpDynamicHoldDownStart
2.62.109. vRtrIfDcpLocMonExcd
2.62.110. vRtrIfDcpLocMonExcdAllDynAlloc
2.62.111. vRtrIfDcpLocMonExcdAllDynFreed
2.62.112. vRtrIfDcpLocMonExcdDynResource
2.62.113. vRtrIfDcpStaticConform
2.62.114. vRtrIfDcpStaticExcd
2.62.115. vRtrIfDcpStaticHoldDownEnd
2.62.116. vRtrIfDcpStaticHoldDownStart
2.63. SFLOW
2.63.1. tmnxSflowCpEntrySampling
2.63.2. tmnxSflowPacketTxFailure
2.64. SNMP
2.64.1. authenticationFailure
2.64.2. coldStart
2.64.3. fallingAlarm
2.64.4. linkDown
2.64.5. linkUp
2.64.6. risingAlarm
2.64.7. snmpdError
2.64.8. warmStart
2.65. STP
2.65.1. higherPriorityBridge
2.65.2. newRootBridge
2.65.3. newRootSap
2.65.4. newRootVcpState
2.65.5. pipActiveProtocolChange
2.65.6. receivedTCN
2.65.7. sapActiveProtocolChange
2.65.8. sapEncapDot1d
2.65.9. sapEncapPVST
2.65.10. tmnxNewCistRegionalRootBridge
2.65.11. tmnxNewMstiRegionalRootBridge
2.65.12. tmnxPipStpExcepCondStateChng
2.65.13. tmnxSapStpExcepCondStateChng
2.65.14. tmnxSdpBndStpExcepCondStateChng
2.65.15. tmnxStpMeshNotInMstRegion
2.65.16. tmnxStpRootGuardViolation
2.65.17. tmnxSvcNewRootSdpBind
2.65.18. tmnxSvcSdpActiveProtocolChange
2.65.19. tmnxSvcSdpBindEncapDot1d
2.65.20. tmnxSvcSdpBindEncapPVST
2.65.21. tmnxSvcSdpBindRcvdHigherBriPrio
2.65.22. tmnxSvcSdpBindRcvdTCN
2.65.23. tmnxSvcTopoChgSdpBindMajorState
2.65.24. tmnxSvcTopoChgSdpBindState
2.65.25. topologyChangePipMajorState
2.65.26. topologyChangePipState
2.65.27. topologyChangeSapMajorState
2.65.28. topologyChangeSapState
2.65.29. topologyChangeVcpState
2.65.30. unacknowledgedTCN
2.65.31. vcpActiveProtocolChange
2.66. SVCMGR
2.66.1. dynamicSdpBindConfigChanged
2.66.2. dynamicSdpBindCreationFailed
2.66.3. dynamicSdpConfigChanged
2.66.4. dynamicSdpCreationFailed
2.66.5. hostConnectivityLost
2.66.6. hostConnectivityRestored
2.66.7. iesIfStatusChanged
2.66.8. msapCreationFailure
2.66.9. msapStateChanged
2.66.10. sapAtmPppNcpFailure
2.66.11. sapAtmPppSessionFailure
2.66.12. sapCemPacketDefectAlarm
2.66.13. sapCemPacketDefectAlarmClear
2.66.14. sapEthLoopbackStarted
2.66.15. sapEthLoopbackStopped
2.66.16. sapHostBGPPeeringSetupFailed
2.66.17. sapHostRipListenerSetupFailed
2.66.18. sapIfIgnorePortStateStart
2.66.19. sapIfIgnorePortStateStop
2.66.20. sapIpipeCeIpAddrChange
2.66.21. sapPortStateChangeProcessed
2.66.22. sapReceivedProtSrcMac
2.66.23. sapStatusChanged
2.66.24. sapTlsDataSapInstStatusChgd
2.66.25. sapTlsMacAddrLimitAlarmCleared
2.66.26. sapTlsMacAddrLimitAlarmRaised
2.66.27. sapTlsMacMoveExceeded
2.66.28. sapTlsMacMoveExceedNonBlock
2.66.29. sapTunnelEncapIpMtuTooSmall
2.66.30. sapTunnelStateChange
2.66.31. sdpBandwidthOverbooked
2.66.32. sdpBindEthLoopbackStarted
2.66.33. sdpBindEthLoopbackStopped
2.66.34. sdpBindInsufficientBandwidth
2.66.35. sdpBindIpipeCeIpAddressChange
2.66.36. sdpBindPwLocalStatusBitsChanged
2.66.37. sdpBindPwPeerFaultAddrChanged
2.66.38. sdpBindPwPeerStatusBitsChanged
2.66.39. sdpBindReceivedProtSrcMac
2.66.40. sdpBindSdpStateChangeProcessed
2.66.41. sdpBindStatusChanged
2.66.42. sdpBindTlsMacMoveExceeded
2.66.43. sdpBindTlsMacMoveExceedNonBlock
2.66.44. sdpControlPwActiveStateChg
2.66.45. sdpEgrIfsNetDomInconsCntChanged
2.66.46. sdpKeepAliveLateReply
2.66.47. sdpKeepAliveProbeFailure
2.66.48. sdpKeepAliveStarted
2.66.49. sdpKeepAliveStopped
2.66.50. sdpPbbActvPwWithNonActvCtrlPwChg
2.66.51. sdpStatusChanged
2.66.52. sdpTlsMacAddrLimitAlarmCleared
2.66.53. sdpTlsMacAddrLimitAlarmRaised
2.66.54. svcArpHostOverride
2.66.55. svcArpHostPopulateErr
2.66.56. svcBgpEvpnDupMacAddrsCleared
2.66.57. svcBgpEvpnDupMacAddrsDetected
2.66.58. svcBindSysHiUsageAlarmCleared
2.66.59. svcBindSysHiUsageAlarmRaised
2.66.60. svcEndPointMacLimitAlarmCleared
2.66.61. svcEndPointMacLimitAlarmRaised
2.66.62. svcEpipePbbOperStatusChanged
2.66.63. svcEPMCEPConfigMismatch
2.66.64. svcEPMCEPConfigMismatchResolved
2.66.65. svcEPMCEPPassiveModeActive
2.66.66. svcEPMCEPPassiveModePassive
2.66.67. svcEvpnDestSysHiUsgClr
2.66.68. svcEvpnDestSysHiUsgSet
2.66.69. svcEvpnMHEsEviDFStateChgd
2.66.70. svcEvpnMHEsIsidDFStateChgd
2.66.71. svcEvpnMplsMacMoveExceedNonBlock
2.66.72. svcEvpnMplsTEPEgrBndSvcHiUsgClr
2.66.73. svcEvpnMplsTEPEgrBndSvcHiUsgSet
2.66.74. svcEvpnMplsTEPEgrBndSysHiUsgClr
2.66.75. svcEvpnMplsTEPEgrBndSysHiUsgSet
2.66.76. svcEvpnMplsTEPHiUsageCleared
2.66.77. svcEvpnMplsTEPHiUsageRaised
2.66.78. svcEvpnRcvdProtSrcMac
2.66.79. svcFdbMimDestTblFullAlrm
2.66.80. svcFdbMimDestTblFullAlrmCleared
2.66.81. svcMacFdbTblFullAlarm
2.66.82. svcMacFdbTblFullAlarmCleared
2.66.83. svcMSPwRetryExpiredNotif
2.66.84. svcMSPwRtMisconfig
2.66.85. svcOperGrpOperStatusChanged
2.66.86. svcPersistencyProblem
2.66.87. svcRestoreHostProblem
2.66.88. svcSiteMinDnTimerStateChg
2.66.89. svcStatusChanged
2.66.90. svcTlsDupVTEPEgrVNICleared
2.66.91. svcTlsDupVTEPEgrVNIDetected
2.66.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
2.66.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
2.66.94. svcTlsFdbTableFullAlarmCleared
2.66.95. svcTlsFdbTableFullAlarmRaised
2.66.96. svcTlsGroupOperStatusChanged
2.66.97. svcTlsMacPinningViolation
2.66.98. svcTlsMfibTableFullAlarmCleared
2.66.99. svcTlsMfibTableFullAlarmRaised
2.66.100. svcTlsMrpAttrRegistrationFailed
2.66.101. svcTlsMrpAttrTblFullAlarmCleared
2.66.102. svcTlsMrpAttrTblFullAlarmRaised
2.66.103. svcTlsProxyArpDupClear
2.66.104. svcTlsProxyArpDupDetect
2.66.105. svcTlsProxyArpSvcHiUsgClr
2.66.106. svcTlsProxyArpSvcHiUsgSet
2.66.107. svcTlsProxyArpSysHiUsgClr
2.66.108. svcTlsProxyArpSysHiUsgSet
2.66.109. svcTlsProxyNdDupClear
2.66.110. svcTlsProxyNdDupDetect
2.66.111. svcTlsProxyNdSvcHiUsgClr
2.66.112. svcTlsProxyNdSvcHiUsgSet
2.66.113. svcTlsProxyNdSysHiUsgClr
2.66.114. svcTlsProxyNdSysHiUsgSet
2.66.115. svcTlsSiteDesigFwdrChg
2.66.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
2.66.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
2.66.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
2.66.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
2.66.120. svcTlsVTEPHiUsageAlarmCleared
2.66.121. svcTlsVTEPHiUsageAlarmRaised
2.66.122. svcTlsVxlanReplicatorChgd
2.66.123. svcVllSiteDesigFwdrChg
2.66.124. tmnxEndPointTxActiveChanged
2.66.125. tmnxIpTunnelOperRemIpChg
2.66.126. tmnxIpTunnelOperStateChange
2.66.127. tmnxSapStpExcepCondStateChng
2.66.128. tmnxStpRootGuardViolation
2.66.129. tmnxSubAcctPlcyFailure
2.66.130. tmnxSubAcctPlcyRadSerOperStatChg
2.66.131. tmnxSubAuthPlcyRadSerOperStatChg
2.66.132. tmnxSubBrgCreated
2.66.133. tmnxSubBrgCvInitFailed
2.66.134. tmnxSubBrgDeleted
2.66.135. tmnxSubBrgRadiusAuthError
2.66.136. tmnxSubBrgRadiusCoaError
2.66.137. tmnxSubBrgRadiusUpdateIpoeSeFail
2.66.138. tmnxSubBrgSessionLimitReached
2.66.139. tmnxSubHostInconsistentAtmTdOvr
2.66.140. tmnxSubHostInfoConflict
2.66.141. tmnxSubHostLcktLimitReached
2.66.142. tmnxSubHostLcktSapLimitReached
2.66.143. tmnxSubIpoeInvalidCidRidChange
2.66.144. tmnxSubIpoeInvalidSessionKey
2.66.145. tmnxSubIpoeMigrHostDeleted
2.66.146. tmnxSubIpoePersistenceRecovery
2.66.147. tmnxSubIpoeSessionLimitReached
2.66.148. tmnxSubMcsRelatedProblem
2.66.149. tmnxSubMngdHostCreationFail
2.66.150. tmnxSubMngdHostOverride
2.66.151. tmnxSubPlBndFailed
2.66.152. tmnxSubRadSapCoAError
2.66.153. tmnxSubRadSapDisconnectError
2.66.154. tmnxSubRadSapSubAuthError
2.66.155. tmnxSubRadSdpBndCoAError
2.66.156. tmnxSubRadSdpBndDisconnectError
2.66.157. tmnxSubRadSdpBndSubAuthError
2.66.158. tmnxSubscriberCreated
2.66.159. tmnxSubscriberDeleted
2.66.160. tmnxSubscriberRenamed
2.66.161. tmnxSubSlaacOverride
2.66.162. tmnxSubSlaacSetupFailure
2.66.163. tmnxSubSysChassMemoryUsageHi
2.66.164. tmnxSubUserCategoryError
2.66.165. tmnxSubUserCategoryOutOfCredit
2.66.166. tmnxSubUserCategoryRefreshCredit
2.66.167. tmnxSubVSubnetHostsDeleted
2.67. SYSTEM
2.67.1. persistenceRestoreProblem
2.67.2. persistencyClosedAlarmCleared
2.67.3. persistencyClosedAlarmRaised
2.67.4. persistencyEventReport
2.67.5. persistencyFileSysThresCleared
2.67.6. persistencyFileSysThresRaised
2.67.7. sbiBootConfig
2.67.8. sbiBootConfigFailFileError
2.67.9. sbiBootConfigOKFileError
2.67.10. sbiBootSnmpd
2.67.11. schedActionFailure
2.67.12. smScriptAbort
2.67.13. smScriptException
2.67.14. smScriptResult
2.67.15. sntpTimeDiffExceedsThreshold
2.67.16. socket_bind_failed
2.67.17. socket_conn_accept_failed
2.67.18. ssiSaveConfigFailed
2.67.19. ssiSaveConfigSucceeded
2.67.20. ssiSyncBootEnvFailed
2.67.21. ssiSyncBootEnvOK
2.67.22. ssiSyncCertFailed
2.67.23. ssiSyncCertOK
2.67.24. ssiSyncConfigFailed
2.67.25. ssiSyncConfigOK
2.67.26. ssiSyncRollbackFailed
2.67.27. ssiSyncRollbackOK
2.67.28. stiDateAndTimeChanged
2.67.29. tmnxConfigConflict
2.67.30. tmnxConfigCreate
2.67.31. tmnxConfigDelete
2.67.32. tmnxConfigModify
2.67.33. tmnxEhsDroppedByMinDelay
2.67.34. tmnxEhsHandlerInvoked
2.67.35. tmnxFtpClientFailure
2.67.36. tmnxModuleMallocFailed
2.67.37. tmnxRedCpmActive
2.67.38. tmnxRedSingleCpm
2.67.39. tmnxRedStandbyReady
2.67.40. tmnxRedStandbySyncing
2.67.41. tmnxRedStandbySyncLost
2.67.42. tmnxRedSwitchover
2.67.43. tmnxSmLaunchStartFailed
2.67.44. tmnxSnmpdStateChange
2.67.45. tmnxSntpOperChange
2.67.46. tmnxSssiMismatch
2.67.47. tmnxStateChange
2.67.48. tmnxSysBaseMacAddressNotSet
2.67.49. tmnxSysExecFinished
2.67.50. tmnxSysExecStarted
2.67.51. tmnxSysNvsysFileError
2.67.52. tmnxSysRollbackDeleteStarted
2.67.53. tmnxSysRollbackFileDeleteStatus
2.67.54. tmnxSysRollbackSaveStarted
2.67.55. tmnxSysRollbackSaveStatusChange
2.67.56. tmnxSysRollbackStarted
2.67.57. tmnxSysRollbackStatusChange
2.67.58. tmnxSysVsdServerAvailable
2.67.59. tmnxSysVsdServerUnavailable
2.67.60. tmnxSysXmppServerFunctional
2.67.61. tmnxSysXmppServerNotFunctional
2.67.62. tmnxTrapDropped
2.68. USER
2.68.1. cli_config_io
2.68.2. cli_unauth_config_io
2.68.3. cli_unauth_user_io
2.68.4. cli_user_io
2.68.5. cli_user_login
2.68.6. cli_user_login_failed
2.68.7. cli_user_login_max_attempts
2.68.8. cli_user_logout
2.68.9. ftp_user_login
2.68.10. ftp_user_login_failed
2.68.11. ftp_user_login_max_attempts
2.68.12. ftp_user_logout
2.68.13. snmp_user_set
2.69. VIDEO
2.69.1. tmnxVdoAdSpliceAbort
2.69.2. tmnxVdoClientSessionsLmtCleared
2.69.3. tmnxVdoClientSessionsLmtExceeded
2.69.4. tmnxVdoDuplicateSsrcId
2.69.5. tmnxVdoGrpSrcAnlyzrErrState
2.69.6. tmnxVdoGrpSrcAnlyzrStClear
2.69.7. tmnxVdoMdaSessionsLimitCleared
2.69.8. tmnxVdoMdaSessionsLimitExceeded
2.69.9. tmnxVdoMdaSGLimitCleared
2.69.10. tmnxVdoMdaSGLimitExceeded
2.70. VRRP
2.70.1. tmnxVrrpBecameBackup
2.70.2. tmnxVrrpBfdIntfSessStateChgd
2.70.3. tmnxVrrpIPListMismatch
2.70.4. tmnxVrrpIPListMismatchClear
2.70.5. tmnxVrrpMultipleOwners
2.70.6. tmnxVrrpOperDownInvalidMac
2.70.7. tmnxVrrpOperDownInvalidMacClear
2.70.8. tVrrpBecameBackup
2.70.9. tVrrpIPListMismatch
2.70.10. tVrrpIPListMismatchClear
2.70.11. tVrrpMultipleOwners
2.70.12. tVrrpOperDownInvalidMac
2.70.13. tVrrpOperDownInvalidMacClear
2.70.14. tVrrpPacketDiscarded
2.70.15. tVrrpRouterAdvNotActivated
2.70.16. tVrrpRouterAdvNotActivatedClear
2.70.17. tVrrpTrapNewMaster
2.70.18. vrrpPacketDiscarded
2.70.19. vrrpTrapAuthFailure
2.70.20. vrrpTrapNewMaster
2.70.21. vrrpTrapProtoError
2.71. VRTR
2.71.1. tmnxVRtrArpLmt
2.71.2. tmnxVRtrArpThresholdExceeded
2.71.3. tmnxVRtrBfdExtNoCpmNpResources
2.71.4. tmnxVRtrBfdMaxSessionOnSlot
2.71.5. tmnxVRtrBfdPortTypeNotSupported
2.71.6. tmnxVRtrBfdSessExtDeleted
2.71.7. tmnxVRtrBfdSessExtDown
2.71.8. tmnxVRtrBfdSessExtProtChange
2.71.9. tmnxVRtrBfdSessExtUp
2.71.10. tmnxVRtrDnsFault
2.71.11. tmnxVRtrFibOccupancyThreshold
2.71.12. tmnxVRtrGrtExportLimitReached
2.71.13. tmnxVRtrGrtRoutesExpLimitDropped
2.71.14. tmnxVRtrGrtV6ExportLimitReached
2.71.15. tmnxVRtrGrtV6RoutesExpLimDropped
2.71.16. tmnxVRtrHighRouteCleared
2.71.17. tmnxVRtrHighRouteTCA
2.71.18. tmnxVRtrIfIgnorePortState
2.71.19. tmnxVRtrIfLdpSyncTimerStart
2.71.20. tmnxVRtrIfLdpSyncTimerStop
2.71.21. tmnxVRtrInetAddressAttachFailed
2.71.22. tmnxVRtrIPv6HighRouteCleared
2.71.23. tmnxVRtrIPv6HighRouteTCA
2.71.24. tmnxVRtrIPv6MidRouteTCA
2.71.25. tmnxVRtrIpv6NbrLmt
2.71.26. tmnxVRtrIpv6NbrThresholdExceeded
2.71.27. tmnxVRtrMacAcctLimitCleared
2.71.28. tmnxVRtrMacAcctLimitReached
2.71.29. tmnxVRtrManagedRouteAddFailed
2.71.30. tmnxVRtrMaxArpEntriesCleared
2.71.31. tmnxVRtrMaxArpEntriesTCA
2.71.32. tmnxVRtrMaxRoutes
2.71.33. tmnxVRtrMcastMaxRoutesCleared
2.71.34. tmnxVRtrMcastMaxRoutesTCA
2.71.35. tmnxVRtrMcastMidRouteTCA
2.71.36. tmnxVRtrMidRouteTCA
2.71.37. tmnxVRtrNgBfdNoCpmNpResources
2.71.38. tmnxVRtrNgBfdSessDeleted
2.71.39. tmnxVRtrNgBfdSessDown
2.71.40. tmnxVRtrNgBfdSessProtChange
2.71.41. tmnxVRtrNgBfdSessUp
2.71.42. tmnxVRtrNHRvplsARPExhaust
2.71.43. tmnxVRtrNHRvplsARPHighUsage
2.71.44. tmnxVRtrNHRvplsARPHighUsageClr
2.71.45. tmnxVRtrSingleSfmOverloadStateCh
2.71.46. tmnxVRtrStaticRouteCPEStatus
2.71.47. tmnxVRtrStaticRouteStatusChanged
2.72. WLAN_GW
2.72.1. tmnxWlanGwDsmGtpTunnelSetupFail
2.72.2. tmnxWlanGwGrpOperStateChanged
2.72.3. tmnxWlanGwGtpMessageDropped
2.72.4. tmnxWlanGwIomActive
2.72.5. tmnxWlanGwMgwConnected
2.72.6. tmnxWlanGwMgwRestarted
2.72.7. tmnxWlanGwMgwStateChanged
2.72.8. tmnxWlanGwNumMgwHi
2.72.9. tmnxWlanGwQosRadiusGtpMismatch
2.72.10. tmnxWlanGwResrcProblemCause
2.72.11. tmnxWlanGwResrcProblemDetected
2.72.12. tmnxWlanGwSubIfPmAddNewPlFailed
2.72.13. tmnxWlanGwSubIfPmCrIntObjFailed
2.72.14. tmnxWlanGwSubIfPmLsQryRtryFailed
2.72.15. tmnxWlanGwSubIfPmNewPlReqFailed
2.72.16. tmnxWlanGwSubIfPmPoolTimeout
2.72.17. tmnxWlanGwSubIfPmPoolUsageLow
2.72.18. tmnxWlanGwSubIfPmStartD6cFailed
2.72.19. tmnxWlanGwSubIfRedActiveChanged
2.72.20. tmnxWlanGwTuQosProblem
2.73. WPP
2.73.1. tmnxWppHostAuthenticationFailed
2.73.2. tmnxWppPortalStatChanged
2.73.3. tmnxWppPortalUnreachable
Customer Document and Product Support
MPLS Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2.
MPLS and RSVP
2.1. In This Chapter
2.2. MPLS
2.2.1. MPLS Label Stack
2.2.1.1. Label Values
2.2.2. MPLS Entropy Label and Hash Label
2.2.2.1. Inserting and Processing the Entropy Label
2.2.2.1.1. Ingress LER
2.2.2.1.2. LSR
2.2.2.2. Egress LER
2.2.2.3. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
2.2.2.4. Entropy Label on OAM Packets
2.2.3. Label Switching Routers
2.2.3.1. LSP Types
2.2.4. Bidirectional Forwarding Detection for MPLS LSPs
2.2.4.1. Bootstrapping the BFD Session
2.2.4.2. LSP BFD Configuration
2.2.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.2.4.4. BFD Configuration on RSVP-TE LSPs
2.2.4.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.2.4.6. Manual Bypass LSP
2.2.4.6.1. PLR Bypass LSP Selection Rules
2.2.4.6.2. FRR Node-Protection (Facility)
2.2.4.7. Uniform FRR Failover Time
2.2.4.8. MPLS/RSVP on Broadcast Interface
2.2.4.9. Automatic Bandwidth Allocation for RSVP LSPs
2.2.4.9.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.2.4.9.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.2.4.9.3. Measurement of LSP Bandwidth
2.2.4.9.4. Passive Monitoring of LSP Bandwidth
2.2.4.9.5. Periodic Automatic Bandwidth Adjustment
2.2.4.9.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.2.4.9.7. Manually-Triggered Auto-Bandwidth Adjustment
2.3. RSVP
2.3.1. Using RSVP for MPLS
2.3.1.1. RSVP Traffic Engineering Extensions for MPLS
2.3.1.2. Hello Protocol
2.3.1.3. MD5 Authentication of RSVP Interface
2.3.1.4. Configuring Authentication using Keychains
2.3.2. Reservation Styles
2.3.2.1. RSVP Message Pacing
2.3.3. RSVP Overhead Refresh Reduction
2.3.4. RSVP Graceful Restart Helper
2.3.5. Enhancements to RSVP Control Plane Congestion Control
2.3.6. RSVP LSP Statistics
2.3.7. P2MP RSVP-TE LSP Statistics
2.3.7.1. Configuring RSVP P2MP LSP Egress Statistics
2.3.7.2. Configuring RSVP P2MP LSP Ingress Statistics
2.3.7.3. Configuring Implicit Null
2.3.8. Using Unnumbered Point-to-Point Interface in RSVP
2.3.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.4. MPLS Transport Profile
2.4.1. MPLS-TP Model
2.4.2. MPLS-TP Provider Edge and Gateway
2.4.2.1. VLL Services
2.4.2.2. Spoke-SDP Termination
2.4.3. MPLS-TP LSR
2.4.4. Detailed Descriptions of MPLS-TP
2.4.4.1. MPLS-TP LSPs
2.4.4.2. MPLS-TP on Pseudowires
2.4.5. MPLS-TP Maintenance Identifiers
2.4.5.1. Generic Associated Channel
2.4.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.4.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.4.5.2.2. Proactive CC, CV and RDI
2.4.5.2.3. BFD-based RDI
2.4.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.4.5.4. PW Control Channel Status Request Mechanism
2.4.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.4.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.4.5.7. MPLS-TP LSP Protection
2.4.6. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.4.7. Alarm Indication Signal (AIS)
2.4.8. Configuring MPLS-TP
2.4.8.1. Configuration Overview
2.4.8.2. Node-Wide MPLS-TP Parameter Configuration
2.4.8.3. Node-Wide MPLS-TP Identifier Configuration
2.4.8.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.4.8.5. Interface Configuration for MPLS-TP
2.4.8.6. LER Configuration for MPLS-TP
2.4.8.6.1. LSP and Path Configuration
2.4.8.6.2. Support for Downstream Mapping Information
2.4.8.6.3. Proactive CC/CV (using BFD) Configuration
2.4.8.6.4. Protection templates and Linear Protection Configuration
2.4.8.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.4.9. MPLS-TP Show Commands
2.4.9.1. Static MPLS Labels
2.4.9.2. MPLS-TP Tunnel Configuration
2.4.9.3. MPLS-TP Path configuration
2.4.9.4. MPLS-TP Protection
2.4.9.5. MPLS TP Node Configuration
2.4.9.6. MPLS-TP Interfaces
2.4.10. MPLS-TP Debug Commands
2.5. Traffic Engineering
2.5.1. TE Metric (IS-IS and OSPF)
2.5.2. Admin Group Support on Facility Bypass Backup LSP
2.5.2.1. Procedures at Head-End Node
2.5.2.2. Procedures at PLR Node
2.5.3. Diff-Serv Traffic Engineering
2.5.3.1. Mapping of Traffic to a Diff-Serv LSP
2.5.3.2. Admission Control of Classes
2.5.3.2.1. Maximum Allocation Model
2.5.3.2.2. Russian Doll Model
2.5.3.3. RSVP Control Plane Extensions
2.5.3.4. IGP Extensions
2.5.3.5. Diff-Serv TE Configuration and Operation
2.5.3.5.1. RSVP Protocol Level
2.5.3.5.2. RSVP Interface Level
2.5.3.5.3. LSP and LSP Path Levels
2.5.4. Diff-Serv TE LSP Class Type Change under Failure
2.5.4.1. LSP Primary Path Retry Procedures
2.5.4.2. Bandwidth Sharing Across Class Types
2.5.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.5.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.6. Advanced MPLS/RSVP Features
2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.6.2. LSP Path Change
2.6.3. Manual LSP Path Switch
2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.6.5. Automatic Creation of RSVP-TE LSP Mesh
2.6.6. RSVP-TE LSP Shortcut for IGP Resolution
2.6.6.1. Using LSP Relative Metric with IGP Shortcut
2.6.6.2. ECMP Considerations
2.6.6.3. Handling of Control Packets
2.6.6.4. Forwarding Adjacency
2.6.6.5. LDP Forwarding over IGP Shortcut
2.6.6.6. Handling of Multicast Packets
2.6.6.6.1. Disabling TTL Propagation in an LSP Shortcut
2.6.7. RSVP-TE LSP Signaling using LSP Template
2.6.8. Shared Risk Link Groups
2.6.8.1. Enabling Disjoint Backup Paths
2.6.8.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.6.8.3. Static Configurations of SRLG Memberships
2.6.9. TE Graceful Shutdown
2.6.10. Soft Preemption of Diff-Serv RSVP LSP
2.6.11. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.6.12. Inter-Area TE LSP (ERO Expansion Method)
2.6.12.1. Area Border Node FRR Protection for Inter-Area LSP
2.6.12.1.1. Rerouting of Inter-Area LSP
2.6.12.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.12.2. Inter-Area LSP support of OSPF Virtual Links
2.6.12.3. Area Border Node FRR Protection for Inter-Area LSP
2.6.13. Automatic Creation of a RSVP Mesh LSP
2.6.13.1. Feature Configuration
2.6.13.2. Feature Behavior
2.6.13.3. Multi-Area and Multi-Instance Support
2.6.13.4. Mesh LSP Name Encoding and Statistics
2.6.14. Timer-based Reversion for RSVP-TE LSPs
2.6.15. Automatic Creation of an RSVP One-Hop LSP
2.6.15.1. Feature Configuration
2.6.15.2. Feature Behavior
2.6.16. MPLS Entropy Label
2.7. Point-to-Multipoint (P2MP) RSVP LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. Ingress Path Management for P2MP LSP Packets
2.7.3.1. Ingress P2MP Path Management on XCM/IOM-3/IMMs
2.7.3.2. Ingress P2MP Path Management on IOM-2
2.7.4. RSVP Control Plane in a P2MP LSP
2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.5.1. Procedures at Ingress LER Node
2.7.5.2. Procedures at Egress LER Node
2.7.5.2.1. Procedures with a Primary Tunnel Interface
2.8. Segment Routing With Traffic Engineering (SR-TE)
2.8.1. SR-TE Support
2.8.2. SR-TE LSP Instantiation
2.8.2.1. PCC-Initiated and PCC-Controlled LSP
2.8.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
2.8.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
2.8.3. SR-TE LSP Path Computation
2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.8.4. SR-TE LSP Protection
2.8.5. Static Route Resolution using SR-TE LSP
2.8.6. BGP Shortcuts Using SR-TE LSP
2.8.7. BGP Label Route Resolution Using SR-TE LSP
2.8.8. Service Packet Forwarding using SR-TE LSP
2.8.9. Data Path Support
2.8.9.1. SR-TE LSP Metric and MTU Settings
2.8.9.2. Hash Label and Entropy Label Support
2.9. MPLS Service Usage
2.9.1. Service Distribution Paths
2.10. MPLS/RSVP Configuration Process Overview
2.11. Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSP
Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
Configuring RSVP Parameters
Configuring RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
MPLS/RSVP Configuration Command Reference
Command Hierarchies
MPLS Commands
MPLS-TP Commands
LSP Commands
lsp-bfd Commands
MPLS Path Commands
RSVP Commands
Command Descriptions
MPLS Commands
Generic Commands
MPLS Commands
Point-to-Multipoint MPLS (P2MP) Commands
RSVP Commands
Generic Commands
RSVP Commands
Interface Commands
MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Router Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show Router BFD session Commands
Show RSVP Commands
Tools Commands
Clear Commands
Debug Commands
3.
GMPLS
3.1. In This Chapter
3.2. GMPLS
3.2.1. Example Applications
3.2.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.2.1.2. Use Case 2: Multi-Layer Resiliency
3.3. GMPLS UNI Architecture
3.3.1. Addressing and End-to-End gLSP Architecture
3.4. 1830 PSS Identifiers
3.5. Recovery Reference Models
3.5.1. End to End Recovery (IP-layer)
3.5.2. End to End ECMP
3.5.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.5.4. End to End Recovery (GMPLS Layer)
3.5.4.1. Unprotected gLSP
3.5.4.2. Full LSP Rerouting
3.5.4.3. 1: N Protection
3.5.4.4. Optical Segment Recovery
Configuring GMPLS with CLI
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
GMPLS Configuration Command Reference
Command Hierarchies
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Command Descriptions
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Tools Commands
4. PCEP
4.1. In This Chapter
4.2. Introduction to the Path Computation Element Protocol (PCEP)
4.2.1. PCC and PCE Configuration
4.2.2. Base Implementation of Path Computation Elements (PCE)
4.2.3. PCEP Session Establishment and Maintenance
4.2.4. PCEP Parameters
4.2.4.1. Stateful PCE
4.2.4.2. PCEP Extensions in Support of SR-TE LSPs
4.2.4.3. LSP Initiation
4.2.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
4.2.4.3.2. LSP Path Diversity and Bi-Directionality Constraints
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Command Descriptions
PCEP Commands
5.
Label Distribution Protocol
5.1. In This Chapter
5.2. Label Distribution Protocol
5.2.1. LDP and MPLS
5.2.2. LDP Architecture
5.2.3. Subsystem Interrelationships
5.2.3.1. Memory Manager and LDP
5.2.3.2. Label Manager
5.2.3.3. LDP Configuration
5.2.3.4. Logger
5.2.3.5. Service Manager
5.2.4. Execution Flow
5.2.4.1. Initialization
5.2.4.2. Session Lifetime
5.2.4.2.1. Adjacency Establishment
5.2.4.2.2. Session Establishment
5.2.5. Label Exchange
5.2.5.1. Other Reasons for Label Actions
5.2.5.2. Cleanup
5.2.5.3. Configuring Implicit Null Label
5.2.6. Global LDP Filters
5.2.6.1. Per LDP Peer FEC Import and Export Policies
5.2.7. Configuring Multiple LDP LSR ID
5.2.8. T-LDP hello reduction
5.2.9. Tracking a T-LDP Peer with BFD
5.2.10. Link LDP Hello Adjacency Tracking with BFD
5.2.11. LDP LSP Statistics
5.2.12. MPLS Entropy Label
5.3. TTL Security for BGP and LDP
5.4. ECMP Support for LDP
5.4.1. Label Operations
5.5. Unnumbered Interface Support in LDP
5.5.1. Feature Configuration
5.5.2. Operation of LDP over an Unnumbered IP Interface
5.5.2.1. Link LDP
5.5.2.2. Targeted LDP
5.5.2.3. FEC Resolution
5.6. LDP over RSVP Tunnels
5.6.1. Signaling and Operation
5.6.1.1. LDP Label Distribution and FEC Resolution
5.6.1.2. Default FEC Resolution Procedure
5.6.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
5.6.2. Rerouting Around Failures
5.6.2.1. LDP-over-RSVP Tunnel Protection
5.6.2.2. ABR Protection
5.7. LDP over RSVP Without Area Boundary
5.7.1. LDP over RSVP and ECMP
5.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
5.8.1. Configuration and Operation
5.9. LDP ECMP Uniform Failover
5.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
5.10.1. LDP FRR Configuration
5.10.1.1. Reducing the Scope of the LFA Calculation by SPF
5.10.2. LDP FRR Procedures
5.10.2.1. ECMP Considerations
5.10.2.2. LDP FRR and LDP Shortcut
5.10.2.3. LDP FRR and LDP-over-RSVP
5.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
5.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
5.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
5.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
5.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
5.11. mLDP Fast Upstream Switchover
5.12. LDP FEC to BGP Label Route Stitching
5.12.1. Configuration
5.12.2. Detailed LDP FEC Resolution
5.12.3. Detailed BGP Labeled Route Resolution
5.12.4. Data Plane Forwarding
5.13. LDP-SR Stitching for IPv4 prefixes (IS-IS)
5.13.1. LDP-SR Stitching Configuration
5.13.2. Stitching in the LDP-to-SR Direction
5.13.3. Stitching in the SR-to-LDP Direction
5.14. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
5.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
5.15.1. Feature Configuration
5.15.2. Feature Behavior
5.16. Multicast P2MP LDP for GRT
5.17. LDP P2MP Support
5.17.1. LDP P2MP Configuration
5.17.2. LDP P2MP Protocol
5.17.3. Make Before Break (MBB)
5.17.4. ECMP Support
5.17.5. Inter-AS Non-segmented mLDP
5.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
5.17.5.2. LDP Recursive FEC Process
5.17.5.3. Supported Recursive Opaque Values
5.17.5.4. Redundancy and Resiliency
5.17.5.5. ASBR Physical Connection
5.17.5.6. OAM
5.17.5.7. ECMP Support
5.17.5.7.1. ECMP Hash Algorithm
5.17.5.8. Dynamic mLDP and Static mLDP Co-existing on the Same Node
5.18. Multicast LDP Fast Upstream Switchover
5.18.1. Feature Configuration
5.18.2. Feature Behavior
5.18.3. Uniform Failover from Primary to Backup ILM
5.19. Multi-Area and Multi-Instance Extensions to LDP
5.19.1. LDP Shortcut for BGP Next-Hop Resolution
5.19.2. LDP Shortcut for IGP Routes
5.19.2.1. LDP Shortcut Configuration
5.19.2.2. IGP Route Resolution
5.19.2.3. LDP Shortcut Forwarding Plane
5.19.3. ECMP Considerations
5.19.4. Disabling TTL Propagation in an LSP Shortcut
5.20. LDP Graceful Handling of Resource Exhaustion
5.20.1. LDP Base Graceful Handling of Resources
5.21. LDP Enhanced Graceful Handling of Resources
5.21.1. LSR Overload Notification
5.21.2. LSR Overload Protection Capability
5.21.3. Procedures for LSR overload protection
5.22. User Guidelines and Troubleshooting Procedures
5.22.1. Common Procedures
5.22.2. Base Resource Handling Procedures
5.22.3. Enhanced Resource Handling Procedures
5.23. LDP IPv6 Control and Data Planes
5.23.1. LDP Operation in an IPv6 Network
5.23.2. Link LDP
5.23.3. Targeted LDP
5.23.4. FEC Resolution
5.23.5. LDP Session Capabilities
5.23.6. LDP Adjacency Capabilities
5.23.7. Address and FEC Distribution
5.23.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
5.23.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
5.23.10. IGP and Static Route Synchronization with LDP
5.23.11. BFD Operation
5.23.12. Services Using SDP with an LDP IPv6 FEC
5.23.13. Mirror Services and Lawful Intercept
5.23.13.1. Configuration at mirror source node
5.23.13.2. Configuration at mirror destination node
5.23.14. Static Route Resolution to a LDP IPv6 FEC
5.23.15. IGP Route Resolution to a LDP IPv6 FEC
5.23.16. OAM Support with LDP IPv6
5.23.17. LDP IPv6 Interoperability Considerations
5.23.17.1. Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
5.23.17.2. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
5.24. LDP Process Overview
5.25. LDP-IGP Synchronization
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Command Descriptions
Generic Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
TCP Session Parameters Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show LDP Commands
Clear Commands
Debug Commands
Tools Commands
6. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia Router Configuration Process
2.
MPLS and RSVP
2.1. In This Chapter
2.2. MPLS
2.2.1. MPLS Label Stack
2.2.1.1. Label Values
2.2.2. MPLS Entropy Label and Hash Label
2.2.2.1. Inserting and Processing the Entropy Label
2.2.2.1.1. Ingress LER
2.2.2.1.2. LSR
2.2.2.2. Egress LER
2.2.2.3. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
2.2.2.4. Entropy Label on OAM Packets
2.2.3. Label Switching Routers
2.2.3.1. LSP Types
2.2.4. Bidirectional Forwarding Detection for MPLS LSPs
2.2.4.1. Bootstrapping the BFD Session
2.2.4.2. LSP BFD Configuration
2.2.4.3. Enabling and Implementing Limits for LSP BFD on a Node
2.2.4.4. BFD Configuration on RSVP-TE LSPs
2.2.4.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
2.2.4.6. Manual Bypass LSP
2.2.4.6.1. PLR Bypass LSP Selection Rules
2.2.4.6.2. FRR Node-Protection (Facility)
2.2.4.7. Uniform FRR Failover Time
2.2.4.8. MPLS/RSVP on Broadcast Interface
2.2.4.9. Automatic Bandwidth Allocation for RSVP LSPs
2.2.4.9.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
2.2.4.9.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
2.2.4.9.3. Measurement of LSP Bandwidth
2.2.4.9.4. Passive Monitoring of LSP Bandwidth
2.2.4.9.5. Periodic Automatic Bandwidth Adjustment
2.2.4.9.6. Overflow-Triggered Auto-Bandwidth Adjustment
2.2.4.9.7. Manually-Triggered Auto-Bandwidth Adjustment
2.3. RSVP
2.3.1. Using RSVP for MPLS
2.3.1.1. RSVP Traffic Engineering Extensions for MPLS
2.3.1.2. Hello Protocol
2.3.1.3. MD5 Authentication of RSVP Interface
2.3.1.4. Configuring Authentication using Keychains
2.3.2. Reservation Styles
2.3.2.1. RSVP Message Pacing
2.3.3. RSVP Overhead Refresh Reduction
2.3.4. RSVP Graceful Restart Helper
2.3.5. Enhancements to RSVP Control Plane Congestion Control
2.3.6. RSVP LSP Statistics
2.3.7. P2MP RSVP-TE LSP Statistics
2.3.7.1. Configuring RSVP P2MP LSP Egress Statistics
2.3.7.2. Configuring RSVP P2MP LSP Ingress Statistics
2.3.7.3. Configuring Implicit Null
2.3.8. Using Unnumbered Point-to-Point Interface in RSVP
2.3.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
2.4. MPLS Transport Profile
2.4.1. MPLS-TP Model
2.4.2. MPLS-TP Provider Edge and Gateway
2.4.2.1. VLL Services
2.4.2.2. Spoke-SDP Termination
2.4.3. MPLS-TP LSR
2.4.4. Detailed Descriptions of MPLS-TP
2.4.4.1. MPLS-TP LSPs
2.4.4.2. MPLS-TP on Pseudowires
2.4.5. MPLS-TP Maintenance Identifiers
2.4.5.1. Generic Associated Channel
2.4.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
2.4.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
2.4.5.2.2. Proactive CC, CV and RDI
2.4.5.2.3. BFD-based RDI
2.4.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
2.4.5.4. PW Control Channel Status Request Mechanism
2.4.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
2.4.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
2.4.5.7. MPLS-TP LSP Protection
2.4.6. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
2.4.7. Alarm Indication Signal (AIS)
2.4.8. Configuring MPLS-TP
2.4.8.1. Configuration Overview
2.4.8.2. Node-Wide MPLS-TP Parameter Configuration
2.4.8.3. Node-Wide MPLS-TP Identifier Configuration
2.4.8.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
2.4.8.5. Interface Configuration for MPLS-TP
2.4.8.6. LER Configuration for MPLS-TP
2.4.8.6.1. LSP and Path Configuration
2.4.8.6.2. Support for Downstream Mapping Information
2.4.8.6.3. Proactive CC/CV (using BFD) Configuration
2.4.8.6.4. Protection templates and Linear Protection Configuration
2.4.8.7. Intermediate LSR Configuration for MPLS-TP LSPs
2.4.9. MPLS-TP Show Commands
2.4.9.1. Static MPLS Labels
2.4.9.2. MPLS-TP Tunnel Configuration
2.4.9.3. MPLS-TP Path configuration
2.4.9.4. MPLS-TP Protection
2.4.9.5. MPLS TP Node Configuration
2.4.9.6. MPLS-TP Interfaces
2.4.10. MPLS-TP Debug Commands
2.5. Traffic Engineering
2.5.1. TE Metric (IS-IS and OSPF)
2.5.2. Admin Group Support on Facility Bypass Backup LSP
2.5.2.1. Procedures at Head-End Node
2.5.2.2. Procedures at PLR Node
2.5.3. Diff-Serv Traffic Engineering
2.5.3.1. Mapping of Traffic to a Diff-Serv LSP
2.5.3.2. Admission Control of Classes
2.5.3.2.1. Maximum Allocation Model
2.5.3.2.2. Russian Doll Model
2.5.3.3. RSVP Control Plane Extensions
2.5.3.4. IGP Extensions
2.5.3.5. Diff-Serv TE Configuration and Operation
2.5.3.5.1. RSVP Protocol Level
2.5.3.5.2. RSVP Interface Level
2.5.3.5.3. LSP and LSP Path Levels
2.5.4. Diff-Serv TE LSP Class Type Change under Failure
2.5.4.1. LSP Primary Path Retry Procedures
2.5.4.2. Bandwidth Sharing Across Class Types
2.5.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
2.5.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
2.6. Advanced MPLS/RSVP Features
2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
2.6.2. LSP Path Change
2.6.3. Manual LSP Path Switch
2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
2.6.5. Automatic Creation of RSVP-TE LSP Mesh
2.6.6. RSVP-TE LSP Shortcut for IGP Resolution
2.6.6.1. Using LSP Relative Metric with IGP Shortcut
2.6.6.2. ECMP Considerations
2.6.6.3. Handling of Control Packets
2.6.6.4. Forwarding Adjacency
2.6.6.5. LDP Forwarding over IGP Shortcut
2.6.6.6. Handling of Multicast Packets
2.6.6.6.1. Disabling TTL Propagation in an LSP Shortcut
2.6.7. RSVP-TE LSP Signaling using LSP Template
2.6.8. Shared Risk Link Groups
2.6.8.1. Enabling Disjoint Backup Paths
2.6.8.2. SRLG Penalty Weights for Detour and Bypass LSPs
2.6.8.3. Static Configurations of SRLG Memberships
2.6.9. TE Graceful Shutdown
2.6.10. Soft Preemption of Diff-Serv RSVP LSP
2.6.11. Least-Fill Bandwidth Rule in CSPF ECMP Selection
2.6.12. Inter-Area TE LSP (ERO Expansion Method)
2.6.12.1. Area Border Node FRR Protection for Inter-Area LSP
2.6.12.1.1. Rerouting of Inter-Area LSP
2.6.12.1.2. Behavior of MPLS Options in Inter-Area LSP
2.6.12.2. Inter-Area LSP support of OSPF Virtual Links
2.6.12.3. Area Border Node FRR Protection for Inter-Area LSP
2.6.13. Automatic Creation of a RSVP Mesh LSP
2.6.13.1. Feature Configuration
2.6.13.2. Feature Behavior
2.6.13.3. Multi-Area and Multi-Instance Support
2.6.13.4. Mesh LSP Name Encoding and Statistics
2.6.14. Timer-based Reversion for RSVP-TE LSPs
2.6.15. Automatic Creation of an RSVP One-Hop LSP
2.6.15.1. Feature Configuration
2.6.15.2. Feature Behavior
2.6.16. MPLS Entropy Label
2.7. Point-to-Multipoint (P2MP) RSVP LSP
2.7.1. Application in Video Broadcast
2.7.2. P2MP LSP Data Plane
2.7.2.1. Procedures at Ingress LER Node
2.7.2.2. Procedures at LSR Node
2.7.2.3. Procedures at Branch LSR Node
2.7.2.4. Procedures at Egress LER Node
2.7.2.5. Procedures at BUD LSR Node
2.7.3. Ingress Path Management for P2MP LSP Packets
2.7.3.1. Ingress P2MP Path Management on XCM/IOM-3/IMMs
2.7.3.2. Ingress P2MP Path Management on IOM-2
2.7.4. RSVP Control Plane in a P2MP LSP
2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
2.7.5.1. Procedures at Ingress LER Node
2.7.5.2. Procedures at Egress LER Node
2.7.5.2.1. Procedures with a Primary Tunnel Interface
2.8. Segment Routing With Traffic Engineering (SR-TE)
2.8.1. SR-TE Support
2.8.2. SR-TE LSP Instantiation
2.8.2.1. PCC-Initiated and PCC-Controlled LSP
2.8.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
2.8.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
2.8.3. SR-TE LSP Path Computation
2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
2.8.4. SR-TE LSP Protection
2.8.5. Static Route Resolution using SR-TE LSP
2.8.6. BGP Shortcuts Using SR-TE LSP
2.8.7. BGP Label Route Resolution Using SR-TE LSP
2.8.8. Service Packet Forwarding using SR-TE LSP
2.8.9. Data Path Support
2.8.9.1. SR-TE LSP Metric and MTU Settings
2.8.9.2. Hash Label and Entropy Label Support
2.9. MPLS Service Usage
2.9.1. Service Distribution Paths
2.10. MPLS/RSVP Configuration Process Overview
2.11. Configuration Notes
Configuring MPLS and RSVP with CLI
MPLS Configuration Overview
LSPs
Paths
Router Interface
Choosing the Signaling Protocol
Basic MPLS Configuration
Common Configuration Tasks
Configuring MPLS Components
Configuring Global MPLS Parameters
Configuring an MPLS Interface
Configuring MPLS Paths
Configuring an MPLS LSP
Configuring a Static LSP
Configuring Manual Bypass Tunnels
Configuring and Operating SR-TE
SR-TE Configuration Prerequisites
SR-TE LSP Configuration Overview
Configuring Path Computation and Control for SR-TE LSP
Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
Configuring SR-TE LSP Label Stack Size
Configuring Adjacency SID Parameters
Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
Configuring RSVP Parameters
Configuring RSVP Message Pacing Parameters
Configuring Graceful Shutdown
MPLS Configuration Management Tasks
Deleting MPLS
Modifying MPLS Parameters
Modifying an MPLS LSP
Modifying MPLS Path Parameters
Modifying MPLS Static LSP Parameters
Deleting an MPLS Interface
RSVP Configuration Management Tasks
Modifying RSVP Parameters
Modifying RSVP Message Pacing Parameters
Deleting an Interface from RSVP
MPLS/RSVP Configuration Command Reference
Command Hierarchies
MPLS Commands
MPLS-TP Commands
LSP Commands
lsp-bfd Commands
MPLS Path Commands
RSVP Commands
Command Descriptions
MPLS Commands
Generic Commands
MPLS Commands
Point-to-Multipoint MPLS (P2MP) Commands
RSVP Commands
Generic Commands
RSVP Commands
Interface Commands
MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Router Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Show Router BFD session Commands
Show RSVP Commands
Tools Commands
Clear Commands
Debug Commands
3.
GMPLS
3.1. In This Chapter
3.2. GMPLS
3.2.1. Example Applications
3.2.1.1. Use Case 1: Dynamic Connection Setup with Constraints
3.2.1.2. Use Case 2: Multi-Layer Resiliency
3.3. GMPLS UNI Architecture
3.3.1. Addressing and End-to-End gLSP Architecture
3.4. 1830 PSS Identifiers
3.5. Recovery Reference Models
3.5.1. End to End Recovery (IP-layer)
3.5.2. End to End ECMP
3.5.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
3.5.4. End to End Recovery (GMPLS Layer)
3.5.4.1. Unprotected gLSP
3.5.4.2. Full LSP Rerouting
3.5.4.3. 1: N Protection
3.5.4.4. Optical Segment Recovery
Configuring GMPLS with CLI
GMPLS Configuration Overview
LMP and IPCC Configuration
Configuration of IP Communication Channels for LMP and RSVP
Configuring LMP
Configuring Traffic Engineering Links and Data Bearers
Configuring MPLS Paths for GMPLS
Configuring RSVP in GMPLS
Configuring a GMPLS LSP on the UNI
gLSP Constraints
Bandwidth
Shared Risk Link Groups
Optical Network Segment Recovery
Configuration of End-to-End GMPLS Recovery
GMPLS Tunnel Groups
Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
Configuration Notes
GMPLS Configuration Command Reference
Command Hierarchies
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Command Descriptions
LMP Commands
GMPLS Commands
GMPLS Tunnel Group Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
Tools Commands
4. PCEP
4.1. In This Chapter
4.2. Introduction to the Path Computation Element Protocol (PCEP)
4.2.1. PCC and PCE Configuration
4.2.2. Base Implementation of Path Computation Elements (PCE)
4.2.3. PCEP Session Establishment and Maintenance
4.2.4. PCEP Parameters
4.2.4.1. Stateful PCE
4.2.4.2. PCEP Extensions in Support of SR-TE LSPs
4.2.4.3. LSP Initiation
4.2.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
4.2.4.3.2. LSP Path Diversity and Bi-Directionality Constraints
PCEP Configuration Command Reference
Command Hierarchies
PCEP Commands
Command Descriptions
PCEP Commands
5.
Label Distribution Protocol
5.1. In This Chapter
5.2. Label Distribution Protocol
5.2.1. LDP and MPLS
5.2.2. LDP Architecture
5.2.3. Subsystem Interrelationships
5.2.3.1. Memory Manager and LDP
5.2.3.2. Label Manager
5.2.3.3. LDP Configuration
5.2.3.4. Logger
5.2.3.5. Service Manager
5.2.4. Execution Flow
5.2.4.1. Initialization
5.2.4.2. Session Lifetime
5.2.4.2.1. Adjacency Establishment
5.2.4.2.2. Session Establishment
5.2.5. Label Exchange
5.2.5.1. Other Reasons for Label Actions
5.2.5.2. Cleanup
5.2.5.3. Configuring Implicit Null Label
5.2.6. Global LDP Filters
5.2.6.1. Per LDP Peer FEC Import and Export Policies
5.2.7. Configuring Multiple LDP LSR ID
5.2.8. T-LDP hello reduction
5.2.9. Tracking a T-LDP Peer with BFD
5.2.10. Link LDP Hello Adjacency Tracking with BFD
5.2.11. LDP LSP Statistics
5.2.12. MPLS Entropy Label
5.3. TTL Security for BGP and LDP
5.4. ECMP Support for LDP
5.4.1. Label Operations
5.5. Unnumbered Interface Support in LDP
5.5.1. Feature Configuration
5.5.2. Operation of LDP over an Unnumbered IP Interface
5.5.2.1. Link LDP
5.5.2.2. Targeted LDP
5.5.2.3. FEC Resolution
5.6. LDP over RSVP Tunnels
5.6.1. Signaling and Operation
5.6.1.1. LDP Label Distribution and FEC Resolution
5.6.1.2. Default FEC Resolution Procedure
5.6.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
5.6.2. Rerouting Around Failures
5.6.2.1. LDP-over-RSVP Tunnel Protection
5.6.2.2. ABR Protection
5.7. LDP over RSVP Without Area Boundary
5.7.1. LDP over RSVP and ECMP
5.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
5.8.1. Configuration and Operation
5.9. LDP ECMP Uniform Failover
5.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
5.10.1. LDP FRR Configuration
5.10.1.1. Reducing the Scope of the LFA Calculation by SPF
5.10.2. LDP FRR Procedures
5.10.2.1. ECMP Considerations
5.10.2.2. LDP FRR and LDP Shortcut
5.10.2.3. LDP FRR and LDP-over-RSVP
5.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
5.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
5.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
5.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
5.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
5.11. mLDP Fast Upstream Switchover
5.12. LDP FEC to BGP Label Route Stitching
5.12.1. Configuration
5.12.2. Detailed LDP FEC Resolution
5.12.3. Detailed BGP Labeled Route Resolution
5.12.4. Data Plane Forwarding
5.13. LDP-SR Stitching for IPv4 prefixes (IS-IS)
5.13.1. LDP-SR Stitching Configuration
5.13.2. Stitching in the LDP-to-SR Direction
5.13.3. Stitching in the SR-to-LDP Direction
5.14. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
5.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
5.15.1. Feature Configuration
5.15.2. Feature Behavior
5.16. Multicast P2MP LDP for GRT
5.17. LDP P2MP Support
5.17.1. LDP P2MP Configuration
5.17.2. LDP P2MP Protocol
5.17.3. Make Before Break (MBB)
5.17.4. ECMP Support
5.17.5. Inter-AS Non-segmented mLDP
5.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
5.17.5.2. LDP Recursive FEC Process
5.17.5.3. Supported Recursive Opaque Values
5.17.5.4. Redundancy and Resiliency
5.17.5.5. ASBR Physical Connection
5.17.5.6. OAM
5.17.5.7. ECMP Support
5.17.5.7.1. ECMP Hash Algorithm
5.17.5.8. Dynamic mLDP and Static mLDP Co-existing on the Same Node
5.18. Multicast LDP Fast Upstream Switchover
5.18.1. Feature Configuration
5.18.2. Feature Behavior
5.18.3. Uniform Failover from Primary to Backup ILM
5.19. Multi-Area and Multi-Instance Extensions to LDP
5.19.1. LDP Shortcut for BGP Next-Hop Resolution
5.19.2. LDP Shortcut for IGP Routes
5.19.2.1. LDP Shortcut Configuration
5.19.2.2. IGP Route Resolution
5.19.2.3. LDP Shortcut Forwarding Plane
5.19.3. ECMP Considerations
5.19.4. Disabling TTL Propagation in an LSP Shortcut
5.20. LDP Graceful Handling of Resource Exhaustion
5.20.1. LDP Base Graceful Handling of Resources
5.21. LDP Enhanced Graceful Handling of Resources
5.21.1. LSR Overload Notification
5.21.2. LSR Overload Protection Capability
5.21.3. Procedures for LSR overload protection
5.22. User Guidelines and Troubleshooting Procedures
5.22.1. Common Procedures
5.22.2. Base Resource Handling Procedures
5.22.3. Enhanced Resource Handling Procedures
5.23. LDP IPv6 Control and Data Planes
5.23.1. LDP Operation in an IPv6 Network
5.23.2. Link LDP
5.23.3. Targeted LDP
5.23.4. FEC Resolution
5.23.5. LDP Session Capabilities
5.23.6. LDP Adjacency Capabilities
5.23.7. Address and FEC Distribution
5.23.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
5.23.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
5.23.10. IGP and Static Route Synchronization with LDP
5.23.11. BFD Operation
5.23.12. Services Using SDP with an LDP IPv6 FEC
5.23.13. Mirror Services and Lawful Intercept
5.23.13.1. Configuration at mirror source node
5.23.13.2. Configuration at mirror destination node
5.23.14. Static Route Resolution to a LDP IPv6 FEC
5.23.15. IGP Route Resolution to a LDP IPv6 FEC
5.23.16. OAM Support with LDP IPv6
5.23.17. LDP IPv6 Interoperability Considerations
5.23.17.1. Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
5.23.17.2. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
5.24. LDP Process Overview
5.25. LDP-IGP Synchronization
Configuring LDP with CLI
LDP Configuration Overview
Basic LDP Configuration
Common Configuration Tasks
Enabling LDP
Configuring FEC Originate Parameters
Configuring Graceful-Restart Helper Parameters
Applying Export and Import Policies
Targeted Session Parameters
Interface Parameters
Session Parameters
LDP Signaling and Services
LDP Configuration Management Tasks
Disabling LDP
Modifying Targeted Session Parameters
Modifying Interface Parameters
LDP Command Reference
Command Hierarchies
LDP Commands
Command Descriptions
Generic Commands
Interface Parameters Commands
Session Parameters Commands
Targeted Session Commands
TCP Session Parameters Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show LDP Commands
Clear Commands
Debug Commands
Tools Commands
6. Standards and Protocol Support
Customer Document and Product Support
Multicast Routing Protocols Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. In This Chapter
2.2. Multicast Overview
2.3. Multicast Models
2.3.1. Any-Source Multicast (ASM)
2.3.2. Source Specific Multicast (SSM)
2.3.3. Multicast in IP-VPN Networks
3. IGMP
3.1. In This Chapter
3.2. IGMP Overview
3.2.1. IGMP Versions and Interoperability Requirements
3.2.2. IGMP Version Transition
3.2.3. Source-Specific Multicast Groups
3.2.4. Query Messages
Configuring IGMP with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling IGMP
IGMP Configuration Command Reference
Command Hierarchies
IGMP Configuration Commands
Command Descriptions
Router IGMP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
4. MLD
4.1. In This Chapter
4.2. MLD Overview
4.2.1. MLDv1
4.2.2. MLDv2
Configuring MLD with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling MLD
MLD Configuration Command Reference
Command Hierarchies
MLD Configuration Commands
Command Descriptions
MLD Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Clear Commands
Command Descriptions
Clear Commands
5. PIM
5.1. In This Chapter
5.2. PIM Overview
5.2.1. PIM-SM Functions
5.2.1.1. Phase One
5.2.1.2. Phase Two
5.2.1.3. Phase Three
5.2.2. Encapsulating Data Packets in the Register Tunnel
5.2.3. PIM Bootstrap Router Mechanism
5.2.4. PIM-SM Routing Policies
5.2.5. Reverse Path Forwarding Checks
5.2.6. Anycast RP for PIM-SM
5.2.6.1. Implementation
5.2.7. Distributing PIM Joins over Multiple ECMP Paths
5.2.8. PIM Interface on IES Subscriber Group Interfaces
5.2.9. Multicast Only Fast Reroute (MoFRR)
5.2.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.3. IPv6 PIM models
5.3.1. PIM SSM
5.3.2. PIM ASM
5.3.3. Embedded RP
Configuring PIM with CLI
PIM Configuration Overview
Basic PIM Configuration
Configuring PIM Parameters
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Disabling PIM
PIM Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Router PIM Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
6. MSDP
6.1. In This Chapter
6.2. Multicast Source Discovery Protocol
6.2.1. Anycast RP for MSDP
6.2.2. MSDP Procedure
6.2.2.1. MSDP Peering Scenarios
6.2.3. MSDP Peer Groups
6.2.4. MSDP Mesh Groups
6.2.5. MSDP Routing Policies
6.2.6. Multicast in Virtual Private Networks
6.2.6.1. Draft Rosen
Configuring MSDP with CLI
Basic MSDP Configuration
Configuring MSDP Parameters
Disabling MSDP
MSDP Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
MSDP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
7. MLDP
7.1. In This Chapter
7.2. Dynamic Multicast Signaling over P2MP in GRT Instance
7.3. Inter-AS Non-segmented MLDP
7.3.1. d-MLDP Inter-AS Trees in GRT
7.3.1.1. Routing
7.3.1.2. Join Processing
7.3.2. ASBR Support of PE Functionality
8. Multicast Extensions to BGP
8.1. In This Chapter
8.2. Multicast Extensions to BGP
8.2.1. MBGP Multicast Topology Support
8.2.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. In This Chapter
9.2. MCAC Overview
9.2.1. MCAC Bundle Policy Overview
9.2.2. MCAC Algorithm
9.2.2.1. Interface-level MCAC details
9.2.2.1.1. MCAC-interface-policy-level MCAC details
9.2.2.2. Bundle-level MCAC details
9.2.3. MCAC on Link Aggregation Group Interfaces
Configuring MCAC with CLI
Basic MCAC Configuration
Configuring MCAC Parameters
MCAC Configuration Command Reference
Command Hierarchies
MCAC Configuration Commands
MCAC Policy Commands
Command Descriptions
MCAC Configuration Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Show MCAC Commands
10. Troubleshooting Tools
10.1. In This Chapter
10.2. Mtrace
10.2.1. Finding the Last Hop Router
10.2.2. Directing the Response
10.3. Mstat
10.4. Mrinfo
Troubleshooting Configuration Command Reference
Command Hierarchies
Operational Commands
Command Descriptions
Operational Commands
Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Multicast Configuration Process
2. Introduction to Multicast
2.1. In This Chapter
2.2. Multicast Overview
2.3. Multicast Models
2.3.1. Any-Source Multicast (ASM)
2.3.2. Source Specific Multicast (SSM)
2.3.3. Multicast in IP-VPN Networks
3. IGMP
3.1. In This Chapter
3.2. IGMP Overview
3.2.1. IGMP Versions and Interoperability Requirements
3.2.2. IGMP Version Transition
3.2.3. Source-Specific Multicast Groups
3.2.4. Query Messages
Configuring IGMP with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling IGMP
IGMP Configuration Command Reference
Command Hierarchies
IGMP Configuration Commands
Command Descriptions
Router IGMP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
4. MLD
4.1. In This Chapter
4.2. MLD Overview
4.2.1. MLDv1
4.2.2. MLDv2
Configuring MLD with CLI
IGMP Configuration Overview
Basic IGMP Configuration
Configuring IGMP Parameters
Enabling IGMP
Configuring an IGMP Interface
Configuring Static Parameters
Configuring SSM Translation
Disabling MLD
MLD Configuration Command Reference
Command Hierarchies
MLD Configuration Commands
Command Descriptions
MLD Commands
Generic Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Clear Commands
Command Descriptions
Clear Commands
5. PIM
5.1. In This Chapter
5.2. PIM Overview
5.2.1. PIM-SM Functions
5.2.1.1. Phase One
5.2.1.2. Phase Two
5.2.1.3. Phase Three
5.2.2. Encapsulating Data Packets in the Register Tunnel
5.2.3. PIM Bootstrap Router Mechanism
5.2.4. PIM-SM Routing Policies
5.2.5. Reverse Path Forwarding Checks
5.2.6. Anycast RP for PIM-SM
5.2.6.1. Implementation
5.2.7. Distributing PIM Joins over Multiple ECMP Paths
5.2.8. PIM Interface on IES Subscriber Group Interfaces
5.2.9. Multicast Only Fast Reroute (MoFRR)
5.2.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
5.3. IPv6 PIM models
5.3.1. PIM SSM
5.3.2. PIM ASM
5.3.3. Embedded RP
Configuring PIM with CLI
PIM Configuration Overview
Basic PIM Configuration
Configuring PIM Parameters
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Disabling PIM
PIM Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Router PIM Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
6. MSDP
6.1. In This Chapter
6.2. Multicast Source Discovery Protocol
6.2.1. Anycast RP for MSDP
6.2.2. MSDP Procedure
6.2.2.1. MSDP Peering Scenarios
6.2.3. MSDP Peer Groups
6.2.4. MSDP Mesh Groups
6.2.5. MSDP Routing Policies
6.2.6. Multicast in Virtual Private Networks
6.2.6.1. Draft Rosen
Configuring MSDP with CLI
Basic MSDP Configuration
Configuring MSDP Parameters
Disabling MSDP
MSDP Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
MSDP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
7. MLDP
7.1. In This Chapter
7.2. Dynamic Multicast Signaling over P2MP in GRT Instance
7.3. Inter-AS Non-segmented MLDP
7.3.1. d-MLDP Inter-AS Trees in GRT
7.3.1.1. Routing
7.3.1.2. Join Processing
7.3.2. ASBR Support of PE Functionality
8. Multicast Extensions to BGP
8.1. In This Chapter
8.2. Multicast Extensions to BGP
8.2.1. MBGP Multicast Topology Support
8.2.1.1. Recursive Lookup for BGP Next Hops
9. MCAC
9.1. In This Chapter
9.2. MCAC Overview
9.2.1. MCAC Bundle Policy Overview
9.2.2. MCAC Algorithm
9.2.2.1. Interface-level MCAC details
9.2.2.1.1. MCAC-interface-policy-level MCAC details
9.2.2.2. Bundle-level MCAC details
9.2.3. MCAC on Link Aggregation Group Interfaces
Configuring MCAC with CLI
Basic MCAC Configuration
Configuring MCAC Parameters
MCAC Configuration Command Reference
Command Hierarchies
MCAC Configuration Commands
MCAC Policy Commands
Command Descriptions
MCAC Configuration Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
Show MCAC Commands
10. Troubleshooting Tools
10.1. In This Chapter
10.2. Mtrace
10.2.1. Finding the Last Hop Router
10.2.2. Directing the Response
10.3. Mstat
10.4. Mrinfo
Troubleshooting Configuration Command Reference
Command Hierarchies
Operational Commands
Command Descriptions
Operational Commands
Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
11. Standards and Protocol Support
Customer Document and Product Support
Multiservice Integrated Service Adapter Guide R14.0.R6
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2. ISA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
3. Application Assurance
3.1. In This Section
3.2. Application Assurance (AA) Overview
3.2.1. Application Assurance: Inline Policy Enforcement
3.2.2. AA Integration in Subscriber Edge Gateways
3.2.3. Fixed Residential Broadband Services
3.2.3.1. Dual-Stack Lite – DS-Lite
3.2.3.2. 6to4 /6RD
3.2.4. Wireless LAN Gateway Broadband Services
3.2.5. Application-Aware Business VPN Services
3.2.6. Business Mobile Backhaul
3.2.7. SeGW Firewall Service
3.3. Application Assurance System Architecture
3.3.1. AA ISA Resource Configuration
3.3.1.1. AA ISA Groups
3.3.1.1.1. AA ISA Groups
3.3.1.1.2. AA Group Partitions
3.3.1.1.3. Bypass Modes
3.3.1.2. Redundancy
3.3.1.2.1. No AA ISA Group Redundancy
3.3.1.2.2. Failure to Fabric
3.3.1.2.3. N+1 AA ISA Card Warm Redundancy
3.3.1.3. ISA Load Balancing
3.3.1.4. Asymmetry Removal
3.3.1.4.1. Asymmetry Removal Overview
3.3.1.4.2. Failure Modes
3.3.1.4.3. AARP Peered Node/Instance Configuration
3.3.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.3.1.4.5. Multi-Chassis Datapath Shunts
3.3.1.5. ISA Overload Detection
3.3.2. AA Packet Processing
3.3.2.1. Divert of Traffic and Subscribers
3.3.2.1.1. Services and AA Subscribers
3.3.2.1.2. Spoke SDPs
3.3.2.1.3. Transit AA Subs
3.3.2.1.4. AA Subscriber Application Service Definition
3.3.2.2. Application Identification
3.3.2.2.1. Application Assurance Identification Components
3.3.2.2.2. Protocol Signatures
3.3.2.2.3. Custom Protocols
3.3.2.2.4. Protocol Shutdown
3.3.2.2.5. Supported Protocol Signatures
3.3.2.2.6. Application Groups
3.3.2.2.7. Charging Groups
3.3.2.2.8. Applications
3.3.2.2.9. Application Filters
3.3.2.2.10. HTTP
3.3.2.2.11. AA IP Prefix Lists
3.3.2.3. Statistics and Accounting
3.3.2.3.1. Per-AA-Subscriber Special Study
3.3.2.3.2. System Aspects
3.3.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.3.2.3.4. AA Partition Traffic Type Statistics
3.3.2.3.5. Configurable AA-Subscriber Statistics Collection
3.3.2.3.6. AA-Performance Record for ISA Load
3.3.2.3.7. AA Partition Traffic Type Statistics
3.3.2.3.8. AA Partition Admit–Deny Statistics
3.3.2.3.9. RADIUS Accounting AA Records
3.3.2.3.10. AA GX Based Usage Monitoring
3.3.2.3.11. Supported AVPs
3.3.2.3.12. Cflowd AA Records
3.3.2.4. Application QoS Policy (AQP)
3.3.2.4.1. AQP Match Criteria
3.3.2.4.2. AQP Actions
3.3.2.4.3. Application Assurance Policers
3.3.2.4.4. Time of Day Policing Adjustments
3.3.2.4.5. Application Assurance HTTP Redirect
3.3.2.4.6. ICAP - Large Scale Category based URL Filtering
3.3.2.4.7. Local URL-List Filtering
3.3.2.4.8. HTTP Header Enrichment
3.3.2.4.9. HTTP In Browser Notification
3.3.2.5. Application Assurance Firewall
3.3.2.5.1. Denial of Service (DoS) Protection
3.3.2.5.2. TCP Validation
3.3.2.5.3. Policy Partitioned AA FW
3.3.2.5.4. Configuring AA FW
3.3.2.5.5. AA FW Logging
3.3.2.5.6. SeGW Firewall Protection
3.3.3. Service Monitoring and Debugging
3.3.4. CPU Utilization
3.3.5. CLI Batch: Begin, Commit and Abort Commands
Configuring Application Assurance with CLI
Provisioning AA ISA MDA
Configuring an AA ISA Group
Configuring Watermark Parameters
Configuring a Group Policy
Beginning and Committing a Policy Configuration
Aborting a Policy Configuration
Configuring an IP Prefix List
Configuring AA Session Filters
Configuring an Application Group
Configuring an Application
Configuring an Application Filter
Configuring an Application Profile
Configuring Suppressible App-Profile with SRRP
Configuring Application Service Options
Configuring a Policer
Configuring an Application QoS Policy
Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
Configuring an HTTP Error Redirect
Configuring HTTP Header Enrichment
Configuring an HTTP Redirect Policy
Configuring a Captive Redirect HTTP Redirect Policy
Captive-Redirect and HTTPS Flows Redirection
Configuring ICAP URL Filtering
Configuring Local URL-List Filtering
Configuring HTTP Notification
Configuring AA Volume Accounting and Statistics
Configuring Cflowd Collector
Configuring AA Volume, TCP and RTP Performance Reporting
Application Assurance Command Reference
Application Assurance Command Reference
Hardware Commands
Admin Commands
ISA Commands
Application Assurance Commands
AA Commands
AA Group Commands
AA Interface Commands
Persistence Commands
Command Descriptions
Generic Commands
Hardware Commands
Admin Commands
Application Assurance Commands
Group Commands
Transit Subscriber Commands
Policer Commands
Policy Commands
Statistics Commands
TCP Validation Commands
Policy Commands
System Persistence Commands
ISA Commands
Application Assurance Group Commands
Show, Tools, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Debug Commands
4. IP Tunnels
4.1. In This Section
4.2. IP Tunnels Overview
4.2.1. Tunnel ISAs
4.2.1.1. Public Tunnel SAPs
4.2.1.2. Private Tunnel SAPs
4.2.1.3. IP Interface Configuration
4.2.1.4. GRE and IP-IP Tunnel Configuration
4.2.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.2.2. Operational Conditions
4.2.3. QoS Interactions
4.2.4. OAM Interactions
4.2.5. Redundancy
4.2.6. Statistics Collection
4.2.7. Security
4.2.7.1. GRE Tunnel Multicast Support
4.2.7.2. IPv6 over IPv4 GRE Tunnel
4.2.8. IKEv2
4.2.8.1. IKEv2 Traffic Selector and TS-List
4.2.8.2. IKEv2 Fragmentation
4.2.9. SHA2 Support
4.2.10. IPsec Client Lockout
4.3. X.509v3 Certificate Overview
4.3.1. SROS X.509v3 Certificate Support
4.3.2. Local Storage
4.3.3. CA-Profile
4.3.4. CA Chain Computation
4.3.5. Certificate Enrollment
4.3.6. Certificate Revocation Check
4.3.7. Certificate/CRL Expiration Warning
4.3.8. Certificate/CRL/Key Cache
4.3.9. Auto CRL Update
4.3.10. IPsec Client Database
4.4. Using Certificates For IPsec Tunnel Authentication
4.5. Trust-Anchor-Profile
4.6. Cert-Profile
4.6.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
4.7. Certificate Management Protocol Version 2 (CMPv2)
4.8. OCSP
4.9. Video Wholesale Example
4.10. Multi-Chassis IPsec Redundancy Overview
4.10.1. Architecture
4.10.2. MC-IPsec Mastership Protocol (MIMP)
4.10.2.1. MIMP Protocol States
4.10.2.2. Election Logic
4.10.2.3. Protection Status
4.10.2.4. Other Details
4.10.3. Routing
4.10.3.1. Routing in Public Service
4.10.3.2. Routing in Private Services
4.10.3.3. Other Details About Shunting
4.10.4. MC-IPsec Aware VRRP
4.10.5. Synchronization
4.10.5.1. Automatic CHILD_SA Rekey
4.10.6. Responder Only
4.11. IPsec Deployment Requirements
4.12. IKEv2 Remote-Access Tunnel
4.12.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.12.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.12.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.12.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.12.3.1. DHCPv4 Address Assignment
4.12.3.2. DHCPv6 Address Assignment
4.12.3.3. DHCPv4/v6 Usage Notes
4.12.4. IPv6 IPsec Support
4.12.4.1. IPv6 as Payload
4.12.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.12.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.12.4.4. IPv6 as Payload: Remote-Access Tunnel
4.12.4.5. IPv6 as Encapsulation
Configuring IPsec with CLI
Provisioning a Tunnel ISA
Configuring a Tunnel Group
Configuring Router Interfaces for IPsec
Configuring IPsec Parameters
Configuring IPsec in Services
Configuring X.509v3 Certificate Parameters
Configuring MC-IPsec
Configuring MIMP
Configuring Multi-Chassis Synchronization
Configuring Routing for MC-IPsec
Configuring and Using CMPv2
Configuring OCSP
Configuring IKEv2 Remote — Access Tunnel
Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
IP Tunnel Command Reference
Command Hierarchies
Configuration Commands
Hardware Commands
ISA Commands
IPsec Commands
Service Configuration Commands
IES Commands
VPRN Commands
IPsec Mastership Election Commands
Related Commands
CMPv2 Commands
Auto-Update Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
Command Descriptions
Generic Commands
Hardware Commands
ISA Commands
Certificate Profile Commands
Client Database Commands
Internet Key Exchange (IKE) Commands
IPsec Transform Commands
IPsec Static Security Association Commands
Trust Anchor Profile/TS Commands
Tunnel Template Commands
Service Configuration Commands
Interface SAP Tunnel Commands
IPsec Gateway Commands
RADIUS Policy Commands
CMPv2 Commands
Auto-Update Command Descriptions
IPsec Mastership Election Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
5. L2TPV3 Tunnels
5.1. In This Chapter
5.2. L2TPv3 Overview
5.3. Control Plane
5.4. Public SAP
5.5. Private SAP
6. Video Services
6.1. In This Section
6.2. Video Services
6.2.1. Video Groups
6.2.2. Video SAP
6.2.3. Video Interface
6.2.4. Multicast Information Policies
6.2.5. Duplicate Stream Protection
6.2.6. Duplicate Stream Selection
6.2.6.1. Stream Identification
6.2.6.2. Initial Sequence Identification
6.2.6.3. Packet Selection
6.2.6.4. Clock Recovery
6.2.6.5. Playout
6.2.6.6. Loss of Transport
6.2.7. Video Quality Monitoring
6.2.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.2.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.3. Retransmission and Fast Channel Change
6.3.1. RET and FCC Overview
6.3.1.1. Retransmission
6.3.1.2. Fast Channel Change (FCC)
6.3.1.2.1. Retransmission Client
6.3.1.2.2. Retransmission Server
6.3.1.2.3. Fast Channel Change Server
6.3.1.2.4. Logging and Accounting for RET and FCC
6.3.1.3. RET and FCC Server Concurrency
6.3.1.3.1. Prerequisites and Restrictions
6.3.2. Multi-Service ISA Support in the IOM-3 for Video Services
6.3.2.1. Prioritization Mechanism for RET vs. FCC
6.3.2.2. RET Features
6.3.2.2.1. Statistics ALU SQM MIB Additions
6.3.2.2.2. RET Server Multicast Tuning Parameters
6.3.2.3. FCC Features
6.3.2.3.1. FCC Hybrid Mode Support
6.4. Ad Insertion
6.4.1. Local/Zoned Ad Insertion
6.4.1.1. Transport Stream Ad Splicing
6.4.1.2. Ad Zones
6.4.1.3. Local/Zoned ADI Prerequisites and Restrictions
Configuring Video Service Components with CLI
Video Services Overview
Configuring an ISA-MS Module
Configuring a Video Group
Configuring a Video SAP and Video Interface in a Service
Basic Multicast Information Policy Configuration
Sample Configurations
Configuring RET/FCC Video Components with CLI
Configuring RET/FCC Video Features in the CLI
Configuring the RET Client
Configuring the RET Server
Configuring the FCC Server
Logging and Accounting Collection for Video Statistics
Configuring ADI Components with CLI
Configuring ADI in CLI
Configuring the RET Client
Configuring a Video Group
Configuring NTP
Configuring Channel Parameters
Configuring Service Entities
Video Services Command Reference
IP-TV Command Hierarchies
Hardware Commands
Video Group Commands
Video Policy Video Commands
Bundle and Channel Commands
Service Video Interface Commands
VPLS Commands
IES Commands
VPRN Commands
Command Descriptions
Generic Commands
Hardware Commands
LNS Group Commands
Video Group Commands
Multicast Info Policy Commands
Video Policy Commands
Bundle and Channel Commands
Service Video Interface Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
7. Network Address Translation
7.1. In This Chapter
7.2. Terminology
7.3. Network Address Translation (NAT) Overview
7.3.1. Principles of NAT
7.3.2. Application Compatibility
7.4. Large Scale NAT
7.4.1. Port Range Blocks
7.4.1.1. Reserved Ports and Priority Sessions
7.4.1.2. Preventing Port Block Starvation
7.4.1.2.1. Dynamic Port Block Starvation in LSN
7.4.1.2.2. Dynamic Port Block Reservation
7.4.2. Timeouts
7.4.3. Watermarks
7.5. L2-Aware NAT
7.6. One-to-One (1:1) NAT
7.6.1. Static 1:1 NAT
7.6.1.1. Protocol Agnostic Behavior
7.6.1.2. Modification of Parameters in Static 1:1 NAT
7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.6.1.4. NAT-Policy Selection
7.6.1.5. Mapping Timeout
7.6.1.6. Logging
7.6.1.7. Restrictions
7.6.2. ICMP
7.7. Deterministic NAT
7.7.1. Overview
7.7.2. Supported Deterministic NAT Flavors
7.7.3. Number of Subscribers per Outside IP and per Pool
7.7.4. Referencing a Pool
7.7.5. Outside Pool Configuration
7.7.6. Mapping Rules and the map Command in Deterministic LSN44
7.7.7. Hashing Considerations in Deterministic LSN44
7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.7.8. Sharing of Deterministic NAT Pools
7.7.9. Simultaneous support of dynamic and deterministic NAT
7.7.10. Selecting Traffic for NAT
7.7.11. Inverse Mappings
7.7.11.1. MIB approach
7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
7.7.12. Logging
7.7.13. Deterministic DS-Lite
7.7.13.1. Hashing Considerations in DS-Lite
7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.8. Destination Based NAT (DNAT)
7.8.1. Combination of SNAPT and DNAT
7.8.2. Forwarding Model in DNAT
7.8.3. DNAT Traffic Selection via NAT Classifier
7.8.4. Configuring DNAT
7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.9. LSN – Multiple NAT Policies per Inside Routing Context
7.9.1. Restrictions
7.9.2. Multiple NAT Policies Per Inside Routing Context
7.9.3. Routing Approach for NAT Diversion
7.9.4. Filter-Based Approach
7.9.5. Multiple NAT Policies with DS-Lite and NAT64
7.9.6. Default NAT Policy
7.9.7. Scaling Considerations
7.9.8. Multiple NAT Policies and SPF Configuration Considerations
7.9.8.1. Multiple NAT Policies and Forwarding Considerations
7.9.9. Logging
7.10. L2-Aware NAT Destination-Based Multiple NAT Policies
7.10.1. Logging
7.10.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.10.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.10.2. Static Port Forwards
7.10.3. UPnP
7.11. NAT and CoA
7.11.1. CoA and NAT Policies
7.11.2. CoA and DNAT
7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.12. Port Control Protocol (PCP)
7.13. Universal Plug and Play Internet Gateway Device Service
7.13.1. Configuring UPnP IGD Service
7.14. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.14.1. PPTP Protocol
7.14.1.1. Supported Control Messages
7.14.1.2. GRE Tunnel
7.14.2. PPTP ALG Operation
7.14.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.14.4. Selection of Call IDs in NAT
7.15. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.16. NAT Logging
7.16.1. Syslog/SNMP/Local-File Logging
7.16.1.1. Filtering LSN Events to System Memory
7.16.1.2. NAT Logging to a Local File
7.16.2. SNMP Trap Logging
7.16.3. NAT Syslog
7.16.4. LSN RADIUS Logging
7.16.4.1. Periodic RADIUS Logging
7.16.4.1.1. Message Pacing
7.16.4.2. RADIUS Logging and L2-Aware NAT
7.16.5. LSN and L2-Aware NAT Flow Logging
7.16.5.1. Large Scale NAT44 Flow Logging Configuration Example
7.17. DS-Lite and NAT64 Fragmentation
7.17.1. Overview
7.17.2. IPv6 Fragmentation in DS-Lite
7.17.3. NAT64
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Stateless Dual-Homing
7.19.1. Configuration Considerations
7.19.2. Troubleshooting Commands
7.20. NAT ISA (Intra-Chassis) Redundancy
7.20.1. Active-Active ISA Redundancy Model
7.20.2. Start-up Conditions
7.20.3. Recovery
7.20.4. Adding Additional ISAs in the ISA Group
7.21. ISA Feature Interactions
7.21.1. MS-ISA Use with Service Mirrors
7.21.2. LNS, Application Assurance and NAT
7.21.3. Subscriber Aware Large Scale NAT44
7.22. Mapping of Address and Port Using Translation (MAP-T)
7.22.1. MAP-T Rules
7.22.2. A+P Mapping Algorithm
7.22.3. Routing Considerations
7.22.4. Forwarding Considerations in the BR
7.22.4.1. IPv6 Addresses
7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
7.22.4.3. Hub-And-Spoke Topology
7.22.4.4. Rule Prefix Overlap
7.22.5. BMR Rules Implementation Example
7.22.6. ICMP
7.22.7. Fragmentation
7.22.7.1. Fragmentation in the Downstream Direction
7.22.7.2. Fragmentation in the Upstream Direction
7.22.7.3. Fragmentation Statistics
7.22.8. Maximum Segment Size (MSS) Adjust
7.22.9. Statistics Collection
7.22.10. Logging
7.22.11. Licensing
7.22.12. Configuration
7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.22.13. Inter-Chassis Redundancy
Configuring NAT
ISA Redundancy
NAT Layer 2-Aware Configurations
Large Scale NAT Configuration
NAT Configuration Examples
Configuring VSR-NAT
VSR-NAT Licensing
Statistics Collection For LSN Bindings
Statistics Collection For LSN Bandwidth
Statistics Collection and HA
VSR-NAT Show Command Examples
Network Address Translation Command Reference
Command Hierarchies
ISA Configuration Commands
NAT Service Configuration Commands
IPFIX Commands
UPnP Commands
ISA RADIUS Policy Commands
VPRN Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT Router Configuration Commands
NAT DNAT Commands
NAT Admin Configuration Commands
NAT MAP Domain Configuration Commands
TCP MSS Adjustment Commands
NAT MAP-T Configuration Commands
Tools Commands
Show Commands
Clear Commands
Tools Commands
Filter Commands
Command Descriptions
Generic Commands
ISA Configuration Commands
NAT Configuration Commands
NAT Service Configuration Commands
IPFlow Information Export Protocol Commands
AAA Policy Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT DNAT Commands
NAT MAP-T Commands
NAT Show Commands
MAP-T Show Commands
NAT Clear Commands
MAP-T Clear Commands
NAT Tools Commands
NAT Filter Commands
8. TCP MSS Adjustment
8.1. In This Section
8.2. Overview
8.3. TCP MSS Adjustment for ESM Hosts
8.4. TCP MSS Adjustment for NAT Services
8.5. TCC MSS Adjustment Commands
8.5.1. Command Hierarchy
8.5.1.1. TCC MSS Adjustment Command Descriptions
9. L2TP Network Server
9.1. In This Chapter
9.2. Subscriber agg-rate-limit on LNS
9.3. LNS Reassembly
9.3.1. Overview
9.3.2. Reassembly Function
9.3.3. Load Sharing Between the ISAs
9.3.4. Inter-chassis ISA Redundancy
9.4. MLPPPoE, MLPPP(oE)oA with LFI on LNS
9.4.1. Terminology
9.4.2. LNS MLPPPoX
9.4.3. MLPPP Encapsulation
9.4.4. MLPPPoX Negotiation
9.4.5. Enabling MLPPPoX
9.4.6. Link Fragmentation and Interleaving (LFI)
9.4.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
9.4.7. LFI Functionality Implemented in LNS
9.4.7.1. Last Mile QoS Awareness in the LNS
9.4.7.2. BBB-ISA Processing
9.4.7.3. LNS-LAC Link
9.4.7.4. AN-RG Link
9.4.7.5. Home Link
9.4.7.6. Optimum Fragment Size Calculation by LNS
9.4.7.6.1. Encapsulation Based Fragment Size
9.4.7.6.2. Fragment Size Based on the Max Transmission Delay
9.4.7.6.3. Selection of the Optimum Fragment Length
9.4.8. Upstream Traffic Considerations
9.4.9. Multiple Links MLPPPoX With No Interleaving
9.4.10. MLPPPoX Session Support
9.4.11. Session Load Balancing Across Multiple BB-ISAs
9.4.12. BB-ISA Hashing Considerations
9.4.13. Last Mile Rate and Encapsulation Parameters
9.4.14. Link Failure Detection
9.4.15. CoA Support
9.4.16. Accounting
9.4.17. Filters and Mirroring
9.4.18. PTA Considerations
9.4.19. QoS Considerations
9.4.19.1. Dual-Pass
9.4.19.2. Traffic Prioritization in LFI
9.4.19.3. Shaping Based on the Last Mile Wire Rates
9.4.19.4. Downstream Bandwidth Management on Egress Port
9.4.20. Sub/Sla-Profile Considerations
9.4.21. Example of MLPPPoX Session Setup Flow
9.4.22. Other Considerations
9.5. Configuration Notes
L2TP Network Server Command Reference
Command Hierarchies
ISA Commands
MLPPP on LNS Commands
Command Descriptions
Generic Commands
LNS Commands
Network Address Translation (NAT) Commands
MLPPP on LNS Commands
10. Threat Management Service
10.1. In This Section
10.2. TMS Service Introduction
10.3. Configuration Guidelines and Example
10.3.1. TMS Image Location
10.3.2. Configuration Example For TMS Interfaces on the SR OS
10.3.3. Dynamic Control of IP Filter Entries
Threat Management Service Command Reference
Command Hierarchies
Card Commands
MDA Commands
TMS Commands
Policy Commands
Command Descriptions
Generic Commands
Card Commands
MDA Commands
Threat Management Service Interface Commands
Policy Commands
TMS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
TMS-Related Show Commands
Clear Commands
Debug Commands
11. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2. ISA Hardware
2.1. In This Section
2.2. MS-ISA2 Overview
2.3. MS-ISA Overview
2.4. MS-ISM Overview
2.5. Application Assurance Hardware Features
2.5.1. AA System Support
2.5.2. Host IOM Support for AA on ISAs
3. Application Assurance
3.1. In This Section
3.2. Application Assurance (AA) Overview
3.2.1. Application Assurance: Inline Policy Enforcement
3.2.2. AA Integration in Subscriber Edge Gateways
3.2.3. Fixed Residential Broadband Services
3.2.3.1. Dual-Stack Lite – DS-Lite
3.2.3.2. 6to4 /6RD
3.2.4. Wireless LAN Gateway Broadband Services
3.2.5. Application-Aware Business VPN Services
3.2.6. Business Mobile Backhaul
3.2.7. SeGW Firewall Service
3.3. Application Assurance System Architecture
3.3.1. AA ISA Resource Configuration
3.3.1.1. AA ISA Groups
3.3.1.1.1. AA ISA Groups
3.3.1.1.2. AA Group Partitions
3.3.1.1.3. Bypass Modes
3.3.1.2. Redundancy
3.3.1.2.1. No AA ISA Group Redundancy
3.3.1.2.2. Failure to Fabric
3.3.1.2.3. N+1 AA ISA Card Warm Redundancy
3.3.1.3. ISA Load Balancing
3.3.1.4. Asymmetry Removal
3.3.1.4.1. Asymmetry Removal Overview
3.3.1.4.2. Failure Modes
3.3.1.4.3. AARP Peered Node/Instance Configuration
3.3.1.4.4. Multi-Chassis Control Link (MC-CTL)
3.3.1.4.5. Multi-Chassis Datapath Shunts
3.3.1.5. ISA Overload Detection
3.3.2. AA Packet Processing
3.3.2.1. Divert of Traffic and Subscribers
3.3.2.1.1. Services and AA Subscribers
3.3.2.1.2. Spoke SDPs
3.3.2.1.3. Transit AA Subs
3.3.2.1.4. AA Subscriber Application Service Definition
3.3.2.2. Application Identification
3.3.2.2.1. Application Assurance Identification Components
3.3.2.2.2. Protocol Signatures
3.3.2.2.3. Custom Protocols
3.3.2.2.4. Protocol Shutdown
3.3.2.2.5. Supported Protocol Signatures
3.3.2.2.6. Application Groups
3.3.2.2.7. Charging Groups
3.3.2.2.8. Applications
3.3.2.2.9. Application Filters
3.3.2.2.10. HTTP
3.3.2.2.11. AA IP Prefix Lists
3.3.2.3. Statistics and Accounting
3.3.2.3.1. Per-AA-Subscriber Special Study
3.3.2.3.2. System Aspects
3.3.2.3.3. Application Assurance XML Volume Statistics and Accounting
3.3.2.3.4. AA Partition Traffic Type Statistics
3.3.2.3.5. Configurable AA-Subscriber Statistics Collection
3.3.2.3.6. AA-Performance Record for ISA Load
3.3.2.3.7. AA Partition Traffic Type Statistics
3.3.2.3.8. AA Partition Admit–Deny Statistics
3.3.2.3.9. RADIUS Accounting AA Records
3.3.2.3.10. AA GX Based Usage Monitoring
3.3.2.3.11. Supported AVPs
3.3.2.3.12. Cflowd AA Records
3.3.2.4. Application QoS Policy (AQP)
3.3.2.4.1. AQP Match Criteria
3.3.2.4.2. AQP Actions
3.3.2.4.3. Application Assurance Policers
3.3.2.4.4. Time of Day Policing Adjustments
3.3.2.4.5. Application Assurance HTTP Redirect
3.3.2.4.6. ICAP - Large Scale Category based URL Filtering
3.3.2.4.7. Local URL-List Filtering
3.3.2.4.8. HTTP Header Enrichment
3.3.2.4.9. HTTP In Browser Notification
3.3.2.5. Application Assurance Firewall
3.3.2.5.1. Denial of Service (DoS) Protection
3.3.2.5.2. TCP Validation
3.3.2.5.3. Policy Partitioned AA FW
3.3.2.5.4. Configuring AA FW
3.3.2.5.5. AA FW Logging
3.3.2.5.6. SeGW Firewall Protection
3.3.3. Service Monitoring and Debugging
3.3.4. CPU Utilization
3.3.5. CLI Batch: Begin, Commit and Abort Commands
Configuring Application Assurance with CLI
Provisioning AA ISA MDA
Configuring an AA ISA Group
Configuring Watermark Parameters
Configuring a Group Policy
Beginning and Committing a Policy Configuration
Aborting a Policy Configuration
Configuring an IP Prefix List
Configuring AA Session Filters
Configuring an Application Group
Configuring an Application
Configuring an Application Filter
Configuring an Application Profile
Configuring Suppressible App-Profile with SRRP
Configuring Application Service Options
Configuring a Policer
Configuring an Application QoS Policy
Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
Configuring an HTTP Error Redirect
Configuring HTTP Header Enrichment
Configuring an HTTP Redirect Policy
Configuring a Captive Redirect HTTP Redirect Policy
Captive-Redirect and HTTPS Flows Redirection
Configuring ICAP URL Filtering
Configuring Local URL-List Filtering
Configuring HTTP Notification
Configuring AA Volume Accounting and Statistics
Configuring Cflowd Collector
Configuring AA Volume, TCP and RTP Performance Reporting
Application Assurance Command Reference
Application Assurance Command Reference
Hardware Commands
Admin Commands
ISA Commands
Application Assurance Commands
AA Commands
AA Group Commands
AA Interface Commands
Persistence Commands
Command Descriptions
Generic Commands
Hardware Commands
Admin Commands
Application Assurance Commands
Group Commands
Transit Subscriber Commands
Policer Commands
Policy Commands
Statistics Commands
TCP Validation Commands
Policy Commands
System Persistence Commands
ISA Commands
Application Assurance Group Commands
Show, Tools, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
Debug Commands
4. IP Tunnels
4.1. In This Section
4.2. IP Tunnels Overview
4.2.1. Tunnel ISAs
4.2.1.1. Public Tunnel SAPs
4.2.1.2. Private Tunnel SAPs
4.2.1.3. IP Interface Configuration
4.2.1.4. GRE and IP-IP Tunnel Configuration
4.2.1.5. IP Fragmentation and Reassembly for IP Tunnels
4.2.2. Operational Conditions
4.2.3. QoS Interactions
4.2.4. OAM Interactions
4.2.5. Redundancy
4.2.6. Statistics Collection
4.2.7. Security
4.2.7.1. GRE Tunnel Multicast Support
4.2.7.2. IPv6 over IPv4 GRE Tunnel
4.2.8. IKEv2
4.2.8.1. IKEv2 Traffic Selector and TS-List
4.2.8.2. IKEv2 Fragmentation
4.2.9. SHA2 Support
4.2.10. IPsec Client Lockout
4.3. X.509v3 Certificate Overview
4.3.1. SROS X.509v3 Certificate Support
4.3.2. Local Storage
4.3.3. CA-Profile
4.3.4. CA Chain Computation
4.3.5. Certificate Enrollment
4.3.6. Certificate Revocation Check
4.3.7. Certificate/CRL Expiration Warning
4.3.8. Certificate/CRL/Key Cache
4.3.9. Auto CRL Update
4.3.10. IPsec Client Database
4.4. Using Certificates For IPsec Tunnel Authentication
4.5. Trust-Anchor-Profile
4.6. Cert-Profile
4.6.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
4.7. Certificate Management Protocol Version 2 (CMPv2)
4.8. OCSP
4.9. Video Wholesale Example
4.10. Multi-Chassis IPsec Redundancy Overview
4.10.1. Architecture
4.10.2. MC-IPsec Mastership Protocol (MIMP)
4.10.2.1. MIMP Protocol States
4.10.2.2. Election Logic
4.10.2.3. Protection Status
4.10.2.4. Other Details
4.10.3. Routing
4.10.3.1. Routing in Public Service
4.10.3.2. Routing in Private Services
4.10.3.3. Other Details About Shunting
4.10.4. MC-IPsec Aware VRRP
4.10.5. Synchronization
4.10.5.1. Automatic CHILD_SA Rekey
4.10.6. Responder Only
4.11. IPsec Deployment Requirements
4.12. IKEv2 Remote-Access Tunnel
4.12.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
4.12.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
4.12.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
4.12.3. IKEv2 Remote-Access Tunnel – Address Assignment
4.12.3.1. DHCPv4 Address Assignment
4.12.3.2. DHCPv6 Address Assignment
4.12.3.3. DHCPv4/v6 Usage Notes
4.12.4. IPv6 IPsec Support
4.12.4.1. IPv6 as Payload
4.12.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
4.12.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
4.12.4.4. IPv6 as Payload: Remote-Access Tunnel
4.12.4.5. IPv6 as Encapsulation
Configuring IPsec with CLI
Provisioning a Tunnel ISA
Configuring a Tunnel Group
Configuring Router Interfaces for IPsec
Configuring IPsec Parameters
Configuring IPsec in Services
Configuring X.509v3 Certificate Parameters
Configuring MC-IPsec
Configuring MIMP
Configuring Multi-Chassis Synchronization
Configuring Routing for MC-IPsec
Configuring and Using CMPv2
Configuring OCSP
Configuring IKEv2 Remote — Access Tunnel
Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
IP Tunnel Command Reference
Command Hierarchies
Configuration Commands
Hardware Commands
ISA Commands
IPsec Commands
Service Configuration Commands
IES Commands
VPRN Commands
IPsec Mastership Election Commands
Related Commands
CMPv2 Commands
Auto-Update Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
Command Descriptions
Generic Commands
Hardware Commands
ISA Commands
Certificate Profile Commands
Client Database Commands
Internet Key Exchange (IKE) Commands
IPsec Transform Commands
IPsec Static Security Association Commands
Trust Anchor Profile/TS Commands
Tunnel Template Commands
Service Configuration Commands
Interface SAP Tunnel Commands
IPsec Gateway Commands
RADIUS Policy Commands
CMPv2 Commands
Auto-Update Command Descriptions
IPsec Mastership Election Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
5. L2TPV3 Tunnels
5.1. In This Chapter
5.2. L2TPv3 Overview
5.3. Control Plane
5.4. Public SAP
5.5. Private SAP
6. Video Services
6.1. In This Section
6.2. Video Services
6.2.1. Video Groups
6.2.2. Video SAP
6.2.3. Video Interface
6.2.4. Multicast Information Policies
6.2.5. Duplicate Stream Protection
6.2.6. Duplicate Stream Selection
6.2.6.1. Stream Identification
6.2.6.2. Initial Sequence Identification
6.2.6.3. Packet Selection
6.2.6.4. Clock Recovery
6.2.6.5. Playout
6.2.6.6. Loss of Transport
6.2.7. Video Quality Monitoring
6.2.7.1. VoIP/Video/Teleconferencing Performance Measurements
6.2.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
6.3. Retransmission and Fast Channel Change
6.3.1. RET and FCC Overview
6.3.1.1. Retransmission
6.3.1.2. Fast Channel Change (FCC)
6.3.1.2.1. Retransmission Client
6.3.1.2.2. Retransmission Server
6.3.1.2.3. Fast Channel Change Server
6.3.1.2.4. Logging and Accounting for RET and FCC
6.3.1.3. RET and FCC Server Concurrency
6.3.1.3.1. Prerequisites and Restrictions
6.3.2. Multi-Service ISA Support in the IOM-3 for Video Services
6.3.2.1. Prioritization Mechanism for RET vs. FCC
6.3.2.2. RET Features
6.3.2.2.1. Statistics ALU SQM MIB Additions
6.3.2.2.2. RET Server Multicast Tuning Parameters
6.3.2.3. FCC Features
6.3.2.3.1. FCC Hybrid Mode Support
6.4. Ad Insertion
6.4.1. Local/Zoned Ad Insertion
6.4.1.1. Transport Stream Ad Splicing
6.4.1.2. Ad Zones
6.4.1.3. Local/Zoned ADI Prerequisites and Restrictions
Configuring Video Service Components with CLI
Video Services Overview
Configuring an ISA-MS Module
Configuring a Video Group
Configuring a Video SAP and Video Interface in a Service
Basic Multicast Information Policy Configuration
Sample Configurations
Configuring RET/FCC Video Components with CLI
Configuring RET/FCC Video Features in the CLI
Configuring the RET Client
Configuring the RET Server
Configuring the FCC Server
Logging and Accounting Collection for Video Statistics
Configuring ADI Components with CLI
Configuring ADI in CLI
Configuring the RET Client
Configuring a Video Group
Configuring NTP
Configuring Channel Parameters
Configuring Service Entities
Video Services Command Reference
IP-TV Command Hierarchies
Hardware Commands
Video Group Commands
Video Policy Video Commands
Bundle and Channel Commands
Service Video Interface Commands
VPLS Commands
IES Commands
VPRN Commands
Command Descriptions
Generic Commands
Hardware Commands
LNS Group Commands
Video Group Commands
Multicast Info Policy Commands
Video Policy Commands
Bundle and Channel Commands
Service Video Interface Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
7. Network Address Translation
7.1. In This Chapter
7.2. Terminology
7.3. Network Address Translation (NAT) Overview
7.3.1. Principles of NAT
7.3.2. Application Compatibility
7.4. Large Scale NAT
7.4.1. Port Range Blocks
7.4.1.1. Reserved Ports and Priority Sessions
7.4.1.2. Preventing Port Block Starvation
7.4.1.2.1. Dynamic Port Block Starvation in LSN
7.4.1.2.2. Dynamic Port Block Reservation
7.4.2. Timeouts
7.4.3. Watermarks
7.5. L2-Aware NAT
7.6. One-to-One (1:1) NAT
7.6.1. Static 1:1 NAT
7.6.1.1. Protocol Agnostic Behavior
7.6.1.2. Modification of Parameters in Static 1:1 NAT
7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
7.6.1.4. NAT-Policy Selection
7.6.1.5. Mapping Timeout
7.6.1.6. Logging
7.6.1.7. Restrictions
7.6.2. ICMP
7.7. Deterministic NAT
7.7.1. Overview
7.7.2. Supported Deterministic NAT Flavors
7.7.3. Number of Subscribers per Outside IP and per Pool
7.7.4. Referencing a Pool
7.7.5. Outside Pool Configuration
7.7.6. Mapping Rules and the map Command in Deterministic LSN44
7.7.7. Hashing Considerations in Deterministic LSN44
7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
7.7.8. Sharing of Deterministic NAT Pools
7.7.9. Simultaneous support of dynamic and deterministic NAT
7.7.10. Selecting Traffic for NAT
7.7.11. Inverse Mappings
7.7.11.1. MIB approach
7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
7.7.12. Logging
7.7.13. Deterministic DS-Lite
7.7.13.1. Hashing Considerations in DS-Lite
7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
7.8. Destination Based NAT (DNAT)
7.8.1. Combination of SNAPT and DNAT
7.8.2. Forwarding Model in DNAT
7.8.3. DNAT Traffic Selection via NAT Classifier
7.8.4. Configuring DNAT
7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
7.9. LSN – Multiple NAT Policies per Inside Routing Context
7.9.1. Restrictions
7.9.2. Multiple NAT Policies Per Inside Routing Context
7.9.3. Routing Approach for NAT Diversion
7.9.4. Filter-Based Approach
7.9.5. Multiple NAT Policies with DS-Lite and NAT64
7.9.6. Default NAT Policy
7.9.7. Scaling Considerations
7.9.8. Multiple NAT Policies and SPF Configuration Considerations
7.9.8.1. Multiple NAT Policies and Forwarding Considerations
7.9.9. Logging
7.10. L2-Aware NAT Destination-Based Multiple NAT Policies
7.10.1. Logging
7.10.1.1. RADIUS Logging and Nat-Policy Change via CoA
7.10.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
7.10.2. Static Port Forwards
7.10.3. UPnP
7.11. NAT and CoA
7.11.1. CoA and NAT Policies
7.11.2. CoA and DNAT
7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
7.12. Port Control Protocol (PCP)
7.13. Universal Plug and Play Internet Gateway Device Service
7.13.1. Configuring UPnP IGD Service
7.14. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
7.14.1. PPTP Protocol
7.14.1.1. Supported Control Messages
7.14.1.2. GRE Tunnel
7.14.2. PPTP ALG Operation
7.14.3. Multiple Sessions Initiated From the Same PPTP Client Node
7.14.4. Selection of Call IDs in NAT
7.15. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
7.16. NAT Logging
7.16.1. Syslog/SNMP/Local-File Logging
7.16.1.1. Filtering LSN Events to System Memory
7.16.1.2. NAT Logging to a Local File
7.16.2. SNMP Trap Logging
7.16.3. NAT Syslog
7.16.4. LSN RADIUS Logging
7.16.4.1. Periodic RADIUS Logging
7.16.4.1.1. Message Pacing
7.16.4.2. RADIUS Logging and L2-Aware NAT
7.16.5. LSN and L2-Aware NAT Flow Logging
7.16.5.1. Large Scale NAT44 Flow Logging Configuration Example
7.17. DS-Lite and NAT64 Fragmentation
7.17.1. Overview
7.17.2. IPv6 Fragmentation in DS-Lite
7.17.3. NAT64
7.18. Enhanced Statistics in NAT — Histogram
7.18.1. Configuration
7.19. NAT Stateless Dual-Homing
7.19.1. Configuration Considerations
7.19.2. Troubleshooting Commands
7.20. NAT ISA (Intra-Chassis) Redundancy
7.20.1. Active-Active ISA Redundancy Model
7.20.2. Start-up Conditions
7.20.3. Recovery
7.20.4. Adding Additional ISAs in the ISA Group
7.21. ISA Feature Interactions
7.21.1. MS-ISA Use with Service Mirrors
7.21.2. LNS, Application Assurance and NAT
7.21.3. Subscriber Aware Large Scale NAT44
7.22. Mapping of Address and Port Using Translation (MAP-T)
7.22.1. MAP-T Rules
7.22.2. A+P Mapping Algorithm
7.22.3. Routing Considerations
7.22.4. Forwarding Considerations in the BR
7.22.4.1. IPv6 Addresses
7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
7.22.4.3. Hub-And-Spoke Topology
7.22.4.4. Rule Prefix Overlap
7.22.5. BMR Rules Implementation Example
7.22.6. ICMP
7.22.7. Fragmentation
7.22.7.1. Fragmentation in the Downstream Direction
7.22.7.2. Fragmentation in the Upstream Direction
7.22.7.3. Fragmentation Statistics
7.22.8. Maximum Segment Size (MSS) Adjust
7.22.9. Statistics Collection
7.22.10. Logging
7.22.11. Licensing
7.22.12. Configuration
7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
7.22.13. Inter-Chassis Redundancy
Configuring NAT
ISA Redundancy
NAT Layer 2-Aware Configurations
Large Scale NAT Configuration
NAT Configuration Examples
Configuring VSR-NAT
VSR-NAT Licensing
Statistics Collection For LSN Bindings
Statistics Collection For LSN Bandwidth
Statistics Collection and HA
VSR-NAT Show Command Examples
Network Address Translation Command Reference
Command Hierarchies
ISA Configuration Commands
NAT Service Configuration Commands
IPFIX Commands
UPnP Commands
ISA RADIUS Policy Commands
VPRN Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT Router Configuration Commands
NAT DNAT Commands
NAT Admin Configuration Commands
NAT MAP Domain Configuration Commands
TCP MSS Adjustment Commands
NAT MAP-T Configuration Commands
Tools Commands
Show Commands
Clear Commands
Tools Commands
Filter Commands
Command Descriptions
Generic Commands
ISA Configuration Commands
NAT Configuration Commands
NAT Service Configuration Commands
IPFlow Information Export Protocol Commands
AAA Policy Commands
NAT Subscriber Management Commands
NAT Subscriber Management BRG Commands
NAT DNAT Commands
NAT MAP-T Commands
NAT Show Commands
MAP-T Show Commands
NAT Clear Commands
MAP-T Clear Commands
NAT Tools Commands
NAT Filter Commands
8. TCP MSS Adjustment
8.1. In This Section
8.2. Overview
8.3. TCP MSS Adjustment for ESM Hosts
8.4. TCP MSS Adjustment for NAT Services
8.5. TCC MSS Adjustment Commands
8.5.1. Command Hierarchy
8.5.1.1. TCC MSS Adjustment Command Descriptions
9. L2TP Network Server
9.1. In This Chapter
9.2. Subscriber agg-rate-limit on LNS
9.3. LNS Reassembly
9.3.1. Overview
9.3.2. Reassembly Function
9.3.3. Load Sharing Between the ISAs
9.3.4. Inter-chassis ISA Redundancy
9.4. MLPPPoE, MLPPP(oE)oA with LFI on LNS
9.4.1. Terminology
9.4.2. LNS MLPPPoX
9.4.3. MLPPP Encapsulation
9.4.4. MLPPPoX Negotiation
9.4.5. Enabling MLPPPoX
9.4.6. Link Fragmentation and Interleaving (LFI)
9.4.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
9.4.7. LFI Functionality Implemented in LNS
9.4.7.1. Last Mile QoS Awareness in the LNS
9.4.7.2. BBB-ISA Processing
9.4.7.3. LNS-LAC Link
9.4.7.4. AN-RG Link
9.4.7.5. Home Link
9.4.7.6. Optimum Fragment Size Calculation by LNS
9.4.7.6.1. Encapsulation Based Fragment Size
9.4.7.6.2. Fragment Size Based on the Max Transmission Delay
9.4.7.6.3. Selection of the Optimum Fragment Length
9.4.8. Upstream Traffic Considerations
9.4.9. Multiple Links MLPPPoX With No Interleaving
9.4.10. MLPPPoX Session Support
9.4.11. Session Load Balancing Across Multiple BB-ISAs
9.4.12. BB-ISA Hashing Considerations
9.4.13. Last Mile Rate and Encapsulation Parameters
9.4.14. Link Failure Detection
9.4.15. CoA Support
9.4.16. Accounting
9.4.17. Filters and Mirroring
9.4.18. PTA Considerations
9.4.19. QoS Considerations
9.4.19.1. Dual-Pass
9.4.19.2. Traffic Prioritization in LFI
9.4.19.3. Shaping Based on the Last Mile Wire Rates
9.4.19.4. Downstream Bandwidth Management on Egress Port
9.4.20. Sub/Sla-Profile Considerations
9.4.21. Example of MLPPPoX Session Setup Flow
9.4.22. Other Considerations
9.5. Configuration Notes
L2TP Network Server Command Reference
Command Hierarchies
ISA Commands
MLPPP on LNS Commands
Command Descriptions
Generic Commands
LNS Commands
Network Address Translation (NAT) Commands
MLPPP on LNS Commands
10. Threat Management Service
10.1. In This Section
10.2. TMS Service Introduction
10.3. Configuration Guidelines and Example
10.3.1. TMS Image Location
10.3.2. Configuration Example For TMS Interfaces on the SR OS
10.3.3. Dynamic Control of IP Filter Entries
Threat Management Service Command Reference
Command Hierarchies
Card Commands
MDA Commands
TMS Commands
Policy Commands
Command Descriptions
Generic Commands
Card Commands
MDA Commands
Threat Management Service Interface Commands
Policy Commands
TMS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
TMS-Related Show Commands
Clear Commands
Debug Commands
11. Standards and Protocol Support
Customer Document and Product Support
OAM and Diagnostics Guide R14.0.R4
1.
Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. In This Chapter
2.2. Service Mirroring
2.3. Mirror Implementation
2.3.1. Mirror Source and Destinations
2.3.1.1. Local and Remote Mirroring
2.3.1.2. Slicing
2.3.2. Mirroring Performance
2.3.3. Mirroring Configuration
2.3.4. ATM Mirroring
2.3.5. IP Mirroring
2.3.5.1. Remote IP Mirroring
2.3.5.2. Local IP Mirroring
2.3.5.3. Port-ID Enabled PPP Mirroring
2.4. Mirrored Traffic Transport using MPLS-TP SDPs
2.5. Subscriber Mirroring
2.6. Lawful Intercept
2.6.1. LI Activation Through RADIUS
2.6.2. Routable Lawful Intercept Encapsulation
2.7. Pseudowire Redundant Mirror Services
2.7.1. Redundant Mirror Source Notes
2.8. Carrier Grade NAT – Lawful Intercept
2.9. Configuration Process Overview
2.10. Configuration Notes
Configuring Service Mirroring with CLI
Mirror Configuration Overview
Defining Mirrored Traffic
Lawful Intercept Configuration Overview
Saving LI Data
Regulating LI Access
LI User Access
LI Source Configuration
Configurable Filter Lock for Lawful Intercept
LI MAC Filter Configuration
LI Logging
Basic Mirroring Configuration
Mirror Classification Rules
Port
SAP
MAC filter
IP filter
Ingress label
Subscriber
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirrors and LI
Configuring a Remote Mirror Service
Configuring an ATM Mirror Service
Configuring Lawful Intercept Parameters
Pseudowire Redundancy for Mirror Services Configuration Example
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Lawful Intercept Commands
Command Descriptions
Generic Commands
Mirror Destination Configuration Commands
Lawful Intercept Commands
Other LI Configuration Commands
Mirror Service Show and Debug Command Reference
Command Hierarchies
Show Commands
Debug Commands
Command Descriptions
Show Commands
Debug Commands
3.
OAM, SAA, and OAM-PM
3.1. In This Chapter
3.2. OAM Overview
3.2.1. LSP Diagnostics: LSP Ping and Trace
3.2.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.2.3. ECMP Considerations
3.2.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.2.5. Downstream Detailed Mapping (DDMAP) TLV
3.2.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.2.6.1. Responder Node Procedures
3.2.6.2. Sender Node Procedures
3.2.7. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.2.8. LDP ECMP Tree Building
3.2.9. Periodic Path Exercising
3.2.10. LSP Ping for RSVP P2MP LSP (P2MP)
3.2.11. LSP Trace for RSVP P2MP LSP
3.2.11.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.2.12. Tunneling of ICMP Reply Packets over MPLS LSP
3.2.13. QoS Handling of Tunneled ICMP Reply Packets
3.2.14. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.2.15. SDP Diagnostics
3.2.16. SDP Ping
3.2.17. SDP MTU Path Discovery
3.2.18. Service Diagnostics
3.2.19. VPLS MAC Diagnostics
3.2.20. MAC Ping
3.2.21. MAC Trace
3.2.22. CPE Ping
3.2.23. CPE Ping for PBB Epipe
3.2.23.1. Hardware Support
3.2.24. MAC Populate
3.2.25. MAC Purge
3.2.26. VLL Diagnostics
3.2.27. VCCV Ping
3.2.27.1. VCCV-Ping Application
3.2.27.2. VCCV Ping in a Multi-Segment Pseudowire
3.2.28. Automated VCCV-Trace Capability for MS-Pseudowire
3.2.28.1. VCCV for Static Pseudowire Segments
3.2.28.2. Detailed VCCV-Trace Operation
3.2.28.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.2.28.3.1. Sending a VCCV Echo Request
3.2.28.3.2. Receiving an VCCV Echo Request
3.2.28.3.3. Receiving an VCCV Echo Reply
3.2.29. IGMP Snooping Diagnostics
3.2.30. MFIB Ping
3.2.31. ATM Diagnostics
3.2.32. MPLS-TP On-Demand OAM Commands
3.2.33. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.2.33.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.2.34. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.2.35. VxLAN Ping Supporting EVPN for VxLAN
3.2.36. Show Commands
3.2.37. BFD
3.3. IP Performance Monitoring (IP PM)
3.3.1. Two-Way Active Measurement Protocol (TWAMP)
3.3.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. CCM Grace Period
3.4.8. CCM Hold Timers
3.4.9. Alarm Indication Signal (ETH-AIS Y.1731)
3.4.10. Client Signal Fail (ETH-CSF Y.1731)
3.4.11. Test (ETH-TST Y.1731)
3.4.12. One-Way Delay Measurement (ETH-1DM Y.1731)
3.4.13. Two-Way Delay Measurement (ETH-DMM Y.1731)
3.4.14. Synthetic Loss Measurement (ETH-SLM Y.1731)
3.4.14.1. Configuration Example
3.4.15. Frame Loss Measurement (ETH-LMM Y.1731)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP/SDP-binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Service Assurance Agent (SAA)
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Detectable Transmit Errors
3.10.4. Measurement Intervals
3.10.5. Data Structures and Storage
3.10.6. Bin Groups
3.10.7. Relating the Components
3.10.8. IP Performance Monitoring
3.10.8.1. Accounting Policy Configuration
3.10.8.2. Service Configuration
3.10.8.3. OAM-PM Configuration
3.10.9. Ethernet Performance Monitoring
3.10.9.1. Accounting Policy Configuration
3.10.9.2. ETH-CFM Configuration
3.10.9.3. Service Configuration
3.10.9.4. Ethernet OAM-PM Configuration
3.10.10. OAM-PM Event Monitoring
3.11. Traceroute with ICMP Tunneling In Common Applications
3.11.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11.2. VPRN Inter-AS Option B
3.11.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
Diagnostics Command Reference
Command Hierarchies
OAM Commands
Base Operational Commands
ATM Diagnostics
IGMP Snooping
LDP Diagnostics
LSP Diagnostics
SDP Diagnostics
Common Service Diagnostics
VLL Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM OAM Commands
SAA Commands
OAM Performance Monitoring and Binning Commands
IP Performance Monitoring Commands
TWAMP
TWAMP Light
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
OAM and SAA Commands
Generic Commands
OAM Commands
ATM Diagnostics
Service Diagnostics
VPLS MAC Diagnostics
IGMP Snooping Diagnostics
EFM Commands
ETH-CFM OAM Commands
Service Assurance Agent (SAA) Commands
OAM SAA Commands
OAM Performance Monitoring and Binning Commands
LDP Treetrace Commands
TWAMP Commands
TWAMP Light Commands
Show Commands
OAM Performance Monitoring and Binning Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
1.
Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Mirror Services
2.1. In This Chapter
2.2. Service Mirroring
2.3. Mirror Implementation
2.3.1. Mirror Source and Destinations
2.3.1.1. Local and Remote Mirroring
2.3.1.2. Slicing
2.3.2. Mirroring Performance
2.3.3. Mirroring Configuration
2.3.4. ATM Mirroring
2.3.5. IP Mirroring
2.3.5.1. Remote IP Mirroring
2.3.5.2. Local IP Mirroring
2.3.5.3. Port-ID Enabled PPP Mirroring
2.4. Mirrored Traffic Transport using MPLS-TP SDPs
2.5. Subscriber Mirroring
2.6. Lawful Intercept
2.6.1. LI Activation Through RADIUS
2.6.2. Routable Lawful Intercept Encapsulation
2.7. Pseudowire Redundant Mirror Services
2.7.1. Redundant Mirror Source Notes
2.8. Carrier Grade NAT – Lawful Intercept
2.9. Configuration Process Overview
2.10. Configuration Notes
Configuring Service Mirroring with CLI
Mirror Configuration Overview
Defining Mirrored Traffic
Lawful Intercept Configuration Overview
Saving LI Data
Regulating LI Access
LI User Access
LI Source Configuration
Configurable Filter Lock for Lawful Intercept
LI MAC Filter Configuration
LI Logging
Basic Mirroring Configuration
Mirror Classification Rules
Port
SAP
MAC filter
IP filter
Ingress label
Subscriber
Common Configuration Tasks
Configuring a Local Mirror Service
Configuring SDPs for Mirrors and LI
Configuring a Remote Mirror Service
Configuring an ATM Mirror Service
Configuring Lawful Intercept Parameters
Pseudowire Redundancy for Mirror Services Configuration Example
Service Management Tasks
Modifying a Local Mirrored Service
Deleting a Local Mirrored Service
Modifying a Remote Mirrored Service
Deleting a Remote Mirrored Service
Mirror Service Configuration Command Reference
Command Hierarchies
Mirror Configuration Commands
Lawful Intercept Commands
Command Descriptions
Generic Commands
Mirror Destination Configuration Commands
Lawful Intercept Commands
Other LI Configuration Commands
Mirror Service Show and Debug Command Reference
Command Hierarchies
Show Commands
Debug Commands
Command Descriptions
Show Commands
Debug Commands
3.
OAM, SAA, and OAM-PM
3.1. In This Chapter
3.2. OAM Overview
3.2.1. LSP Diagnostics: LSP Ping and Trace
3.2.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
3.2.3. ECMP Considerations
3.2.4. lsp-ping and lsp-trace over Unnumbered IP Interface
3.2.5. Downstream Detailed Mapping (DDMAP) TLV
3.2.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
3.2.6.1. Responder Node Procedures
3.2.6.2. Sender Node Procedures
3.2.7. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
3.2.8. LDP ECMP Tree Building
3.2.9. Periodic Path Exercising
3.2.10. LSP Ping for RSVP P2MP LSP (P2MP)
3.2.11. LSP Trace for RSVP P2MP LSP
3.2.11.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
3.2.12. Tunneling of ICMP Reply Packets over MPLS LSP
3.2.13. QoS Handling of Tunneled ICMP Reply Packets
3.2.14. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
3.2.15. SDP Diagnostics
3.2.16. SDP Ping
3.2.17. SDP MTU Path Discovery
3.2.18. Service Diagnostics
3.2.19. VPLS MAC Diagnostics
3.2.20. MAC Ping
3.2.21. MAC Trace
3.2.22. CPE Ping
3.2.23. CPE Ping for PBB Epipe
3.2.23.1. Hardware Support
3.2.24. MAC Populate
3.2.25. MAC Purge
3.2.26. VLL Diagnostics
3.2.27. VCCV Ping
3.2.27.1. VCCV-Ping Application
3.2.27.2. VCCV Ping in a Multi-Segment Pseudowire
3.2.28. Automated VCCV-Trace Capability for MS-Pseudowire
3.2.28.1. VCCV for Static Pseudowire Segments
3.2.28.2. Detailed VCCV-Trace Operation
3.2.28.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
3.2.28.3.1. Sending a VCCV Echo Request
3.2.28.3.2. Receiving an VCCV Echo Request
3.2.28.3.3. Receiving an VCCV Echo Reply
3.2.29. IGMP Snooping Diagnostics
3.2.30. MFIB Ping
3.2.31. ATM Diagnostics
3.2.32. MPLS-TP On-Demand OAM Commands
3.2.33. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
3.2.33.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
3.2.34. MPLS-TP LSPs: LSP-Ping/LSP Trace
3.2.35. VxLAN Ping Supporting EVPN for VxLAN
3.2.36. Show Commands
3.2.37. BFD
3.3. IP Performance Monitoring (IP PM)
3.3.1. Two-Way Active Measurement Protocol (TWAMP)
3.3.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
3.4. Ethernet Connectivity Fault Management (ETH-CFM)
3.4.1. ETH-CFM Building Blocks
3.4.2. Loopback
3.4.3. Loopback Multicast
3.4.4. Linktrace
3.4.5. Continuity Check (CC)
3.4.6. CC Remote Peer Auto-Discovery
3.4.7. CCM Grace Period
3.4.8. CCM Hold Timers
3.4.9. Alarm Indication Signal (ETH-AIS Y.1731)
3.4.10. Client Signal Fail (ETH-CSF Y.1731)
3.4.11. Test (ETH-TST Y.1731)
3.4.12. One-Way Delay Measurement (ETH-1DM Y.1731)
3.4.13. Two-Way Delay Measurement (ETH-DMM Y.1731)
3.4.14. Synthetic Loss Measurement (ETH-SLM Y.1731)
3.4.14.1. Configuration Example
3.4.15. Frame Loss Measurement (ETH-LMM Y.1731)
3.5. ETH-CFM Statistics
3.6. ETH-CFM Packet Debug
3.7. ETH-CFM CoS Considerations
3.8. OAM Mapping
3.8.1. CFM Connectivity Fault Conditions
3.8.2. CFM Fault Propagation Methods
3.8.3. Epipe Services
3.8.4. CFM Detected Fault
3.8.4.1. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.8.4.2. Service Down
3.8.4.3. Interaction with Pseudowire Redundancy
3.8.5. Ipipe Services
3.8.5.1. CFM Detected Fault
3.8.5.2. SAP/SDP-binding Failure (Including Pseudowire Status)
3.8.5.3. Service Administratively Shutdown
3.8.5.4. Interaction with Pseudowire Redundancy
3.8.6. VPLS Service
3.8.6.1. CFM Detected Fault
3.8.6.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
3.8.6.3. Service Down
3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
3.8.7. IES and VPRN Services
3.8.8. Pseudowire Switching
3.8.9. LLF and CFM Fault Propagation
3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
3.9. Service Assurance Agent (SAA)
3.10. OAM Performance Monitoring (OAM-PM)
3.10.1. Session
3.10.2. Standard PM Packets
3.10.3. Detectable Transmit Errors
3.10.4. Measurement Intervals
3.10.5. Data Structures and Storage
3.10.6. Bin Groups
3.10.7. Relating the Components
3.10.8. IP Performance Monitoring
3.10.8.1. Accounting Policy Configuration
3.10.8.2. Service Configuration
3.10.8.3. OAM-PM Configuration
3.10.9. Ethernet Performance Monitoring
3.10.9.1. Accounting Policy Configuration
3.10.9.2. ETH-CFM Configuration
3.10.9.3. Service Configuration
3.10.9.4. Ethernet OAM-PM Configuration
3.10.10. OAM-PM Event Monitoring
3.11. Traceroute with ICMP Tunneling In Common Applications
3.11.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
3.11.2. VPRN Inter-AS Option B
3.11.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
Diagnostics Command Reference
Command Hierarchies
OAM Commands
Base Operational Commands
ATM Diagnostics
IGMP Snooping
LDP Diagnostics
LSP Diagnostics
SDP Diagnostics
Common Service Diagnostics
VLL Diagnostics
Ethernet in the First Mile (EFM) Commands
ETH-CFM OAM Commands
SAA Commands
OAM Performance Monitoring and Binning Commands
IP Performance Monitoring Commands
TWAMP
TWAMP Light
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
OAM and SAA Commands
Generic Commands
OAM Commands
ATM Diagnostics
Service Diagnostics
VPLS MAC Diagnostics
IGMP Snooping Diagnostics
EFM Commands
ETH-CFM OAM Commands
Service Assurance Agent (SAA) Commands
OAM SAA Commands
OAM Performance Monitoring and Binning Commands
LDP Treetrace Commands
TWAMP Commands
TWAMP Light Commands
Show Commands
OAM Performance Monitoring and Binning Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
4. Standards and Protocol Support
Customer Document and Product Support
Quality of Service Guide R14.0.R4
1.
Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2.
QoS Policies
2.1. In This Section
2.2. QoS Overview
2.3. Forwarding Classes
2.3.1. High-Priority Classes
2.3.2. Assured Classes
2.3.3. Best-Effort Classes
2.4. Queue Parameters
2.4.1. Queue ID
2.4.2. Unicast or Multipoint Queue
2.4.3. Queue Hardware Scheduler
2.4.4. Committed Information Rate
2.4.5. Peak Information Rate
2.4.6. Adaptation Rule
2.4.7. Committed Burst Size
2.4.8. Maximum Burst Size
2.4.9. High Priority Only Buffers
2.4.10. Hi-Low Priority Only Buffers
2.4.11. WRED Per Queue
2.4.11.1. Native Queue Mode
2.4.11.2. Pool Per Queue Mode
2.4.12. Packet Markings
2.4.13. Queue Counters
2.4.14. Queue-Types
2.4.15. Color Aware Profiling
2.5. QoS Policies Overview
2.5.1. Service versus Network QoS
2.5.2. QoS Policy Entities
2.5.3. Network QoS Policies
2.5.4. Network Queue QoS Policies
2.5.5. Service Ingress QoS Policies
2.5.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.5.5.2. Egress Forwarding Class Override
2.5.6. Service Egress QoS Policies
2.5.7. Named Pool Policies
2.5.8. Slope Policies
2.5.8.1. RED Slopes
2.5.8.2. Tuning the SBAU Calculation
2.5.8.3. Slope Policy Parameters
2.5.9. Scheduler Policies
2.5.9.1. Virtual Hierarchical Scheduling
2.5.9.2. Single-Tier Scheduling
2.5.9.3. Hierarchical Scheduler Policies
2.5.9.3.1. Hierarchical Virtual Schedulers
2.5.9.4. Tiers
2.5.9.5. Scheduler Policies Applied to Applications
2.5.9.6. Scheduler Policies Applied to SAPs
2.5.9.7. Scheduler Policies Applied to Customer SLAs
2.5.9.8. Scheduler Policies Applied to Multiservice Sites
2.5.10. Shared-queue QoS Policies
2.5.11. ATM Traffic Descriptor Profiles
2.5.12. Configuration Notes
3.
Network QoS Policies
3.1. In This Section
3.2. Network QoS Policies Overview
3.3. Network Ingress Tunnel QoS Override
3.3.1. Override For Tunnel Terminated IP Routing Decisions
3.3.1.1. Normal QoS Operation
3.3.1.2. Network Ingress IP Match Criteria
3.3.1.3. Network Ingress IPv6 Match Criteria
3.3.1.4. Tunnel Termination QoS Override Operation
3.3.1.5. Enabling and Disabling Tunnel Termination QoS Override
3.3.2. QoS for Self-Generated (CPU) Traffic on Network Interfaces
3.3.2.1. Default DSCP Mapping Table
3.4. Basic Configurations
3.4.1. Creating a Network QoS Policy
3.4.2. Applying Network QoS Policies
3.4.3. Default Network QoS Policy Values
3.5. Service Management Tasks
3.5.1. Deleting QoS Policies
3.5.2. Removing a Policy from the QoS Configuration
3.5.3. Copying and Overwriting Network Policies
3.5.4. Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Multi-Class Frame Relay Profile Commands
Network QoS Policy Commands
Self-Generated Traffic Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Multi-Class Frame Relay Profile Commands
Network QoS Policy Commands
Network Ingress QoS Policy Commands
Network Egress QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-Generated Traffic Commands
Show Commands
4.
Network Queue QoS Policies
4.1. In This Section
4.2. Overview
4.3. Network Queue Parent Scheduler
4.4. Basic Configurations
4.4.1. Creating a Network Queue QoS Policy
4.4.2. Applying Network Queue QoS Policies
4.4.2.1. XMAs and MDAs
4.4.2.2. Ethernet Ports
4.4.2.3. SONET/SDH Ports
4.4.3. Default Network Queue Policy Values
4.5. Service Management Tasks
4.5.1. Deleting QoS Policies
4.5.2. Removing a Policy from the QoS Configuration
4.5.3. Copying and Overwriting QoS Policies
4.5.4. Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Network Queue QoS Policy Commands
Show Commands
5.
Service Ingress and Egress QoS Policies
5.1. In This Chapter
5.2. Overview
5.3. Basic Configurations
5.4. Service Ingress QoS Policy
5.4.1. Service Ingress QoS Queue
5.4.2. Percent-Rate Support
5.4.3. Ingress Forwarding Class (FC)
5.4.4. Ingress IP Match Criteria
5.4.5. Ingress IPv6 Match Criteria
5.4.6. Ingress MAC Match Criteria
5.4.6.1. VLAN ID Matching
5.4.7. Ingress Criteria Classification Directly to Policer
5.4.8. Virtual Network Identifier (VNI) Classification
5.4.9. FC Mapping Based on EXP Bits
5.5. Service Egress QoS Policy
5.5.1. Service Egress QoS Queue
5.5.2. Percent-Rate Support
5.5.3. Dynamic MBS for Egress Queue Group Queues
5.5.3.1. Queue Length as a Delay Value
5.5.4. Egress SAP FC and FP Overrides
5.5.5. Egress Criteria Classification Directly to Policer
5.5.6. Dot1p Egress Remarking
5.5.6.1. DEI Egress Remarking
5.5.6.1.1. DEI in IEEE 802.1ad
5.5.6.1.2. DEI in IEEE 802.1ah
5.5.6.1.3. IEEE 802.1ad Use Case
5.5.6.1.4. IEEE 802.1ah Use Case
5.5.7. DSCP/Prec Egress Remarking
5.5.8. Queue Depth Monitoring
5.6. Service Management Tasks
5.6.1. Applying Service Ingress and Egress Policies
5.6.1.1. Epipe
5.6.1.2. IES
5.6.1.3. VPLS
5.6.1.4. VPRN
5.6.2. Editing QoS Policies
5.6.3. Copying and Overwriting QoS Policies
5.6.4. Deleting QoS Policies
5.6.5. Removing a Policy from the QoS Configuration
Service Ingress and Egress QoS Policy Command Reference
Command Hierarchies
Service Ingress QoS Policy Commands
Service Egress QoS Policy Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Service Ingress QoS Policy Commands
Service Egress QoS Policy Forwarding Class Commands
Show Commands
6.
Queue Sharing and Redirection
6.1. In This Section
6.2. Queue Sharing and Redirection
6.2.1. Supported Platforms
6.2.2. Queue Group Applications
6.2.3. Access SAP Queue Group Applications
6.2.4. Ingress Access Port Queue Group Hardware Queue Allocation
6.2.5. Network Port Queue Groups for IP Interfaces
6.2.6. Pseudowire Shaping for Layer 2 and Layer 3 Services
6.2.7. QoS on Ingress Bindings
6.2.8. Queue Group Templates and Port Queue Groups
6.2.8.1. Queue Group Templates
6.2.8.2. Port Queue Groups
6.2.8.2.1. Percent-Rate Support
6.2.9. Forwarding Plane Queue Groups
6.2.10. Redirection Models
6.2.11. Access SAP Forwarding Class Based Redirection
6.2.12. Ingress and Egress SAP Forwarding Class Redirection Association Rules
6.2.12.1. Policy Based Provisioning Model
6.2.12.2. SAP-Based Provisioning Model
6.2.13. Access Queue Group Statistics
6.2.13.1. Port Queue Groups
6.2.13.2. Forwarding Plane Queue Groups
6.2.14. Network IP Interface Forwarding Class-Based Redirection
6.2.15. Egress Network Forwarding Class Redirection Association Rules
6.2.16. Egress Network IP Interface Statistics
6.2.17. Separate Ingress IPv4 and IPv6 Statistics
6.2.18. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.2.18.1. Feature Configuration
6.2.18.2. Provisioning Model
6.2.18.3. Ingress Packet Classification
6.2.19. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
6.2.19.1. Feature Configuration
6.2.19.2. Provisioning Model
6.2.19.3. Egress Marking of PW Packet Header
6.2.19.4. Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
6.2.20. Ingress Per SAP Statistics with Ingress Queue Groups
6.2.21. Ingress and Egress PW Statistics
6.2.22. Queue Group Behavior on LAG
6.2.22.1. Queue Group Queue Instantiation Per Link
6.2.22.2. Per-Link Queue Group Queue Parameters
6.2.22.3. Adding a Queue Group to an Existing LAG
6.2.22.4. Adding a Port to a LAG
6.2.22.5. Removing a Queue Group from a LAG
6.3. Basic Configurations
6.3.1. Configuring an Ingress Queue Group Template
6.3.2. Configuring Egress Queue Group Template
6.3.3. Applying Ingress Queue Group to SAP Ingress Policy
6.3.4. Applying Egress Queue Group to SAP Egress Policy
6.3.5. Configuring SAP-based Egress Queue Redirection
6.3.6. Configuring Queue Group on Ethernet Access Ingress Port
6.3.7. Configuring Overrides
6.3.8. Configuring Queue Group on Ethernet Access Egress Port
6.3.9. Configuring Queue Group for Network Egress Traffic on Port
6.3.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
6.3.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
6.3.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.3.13. Specifying QoS Policies on Service SAPs
QoS Queue Group Template Command Reference
Command Hierarchies
Configuring Ingress Queue Group Templates
Configuring Egress Queue Group Templates
Show Commands
Monitor Commands
Command Descriptions
Configuration Commands
Generic Commands
Queue Group Commands
Show Commands
Monitor Commands
7. Scheduler QoS Policies
7.1. In This Section
7.2. Scheduler Policies
7.2.1. Egress Port-Based Schedulers
7.2.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
7.2.1.2. Service or Subscriber or Multiservice site Scheduler Child to Port Scheduler Parent
7.2.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
7.2.1.3. Frame and Packet-Based Bandwidth Allocation
7.2.1.4. Parental Association Scope
7.2.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
7.2.1.6. Network Queue Parent Scheduler
7.2.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
7.2.1.8. Congestion Monitoring on Egress Port Scheduler
7.2.1.8.1. Scalability, Performance, and Operation
7.2.1.8.2. Restrictions
7.2.2. Frame-Based Accounting
7.2.2.1. Operational Modifications
7.2.2.2. Existing Egress Port Based Virtual Scheduling
7.2.2.3. Behavior Modifications for Frame-Based Accounting
7.2.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
7.2.3. Virtual Scheduling Unused Bandwidth Distribution
7.2.3.1. Default Unused Bandwidth Distribution
7.2.3.2. Limit Unused Bandwidth
7.2.4. Configuring Port Scheduler Policies
7.2.4.1. Port Scheduler Structure
7.2.4.2. Special Orphan Queue and Scheduler Behavior
7.2.4.3. Packet to Frame Bandwidth Conversion
7.2.4.4. Aggregate Rate Limits for Directly Attached Queues
7.2.4.5. SAP Egress QoS Policy Queue Parenting
7.2.4.6. Network Queue QoS Policy Queue Parenting
7.2.4.7. Egress Port Scheduler Overrides
7.2.4.8. Applying a Port Scheduler Policy to a Virtual Port
7.2.4.9. Applying Aggregate Rate Limit to a VPORT
7.2.4.10. Applying a Scheduler Policy to a VPORT
7.2.4.11. Weighted Scheduler Group in a Port Scheduler Policy
7.3. Basic Configurations
7.3.1. Creating a QoS Scheduler Policy
7.3.2. Applying Scheduler Policies
7.3.2.1. Customer
7.3.2.2. Epipe
7.3.2.3. IES
7.3.2.4. VPLS
7.3.2.5. VPRN
7.3.3. Creating a QoS Port Scheduler Policy
7.3.4. Configuring Port Parent Parameters
7.3.4.1. Within-CIR Priority Level Parameters
7.3.4.2. Above-CIR Priority Level Parameters
7.3.5. Configuring Distributed LAG Rate
7.4. Service Management Tasks
7.4.1. Deleting QoS Policies
7.4.1.1. Removing a QoS Policy from a Customer Multiservice Site
7.4.1.2. Removing a QoS Policy from SAP(s)
7.4.1.3. Removing a Policy from the QoS Configuration
7.4.2. Copying and Overwriting Scheduler Policies
7.4.3. Editing QoS Policies
QoS Scheduler Policy Command Reference
Command Hierarchies
Scheduler Policy Configuration Commands
Port Scheduler Policy Configuration Commands
Operational Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Scheduler Policy Commands
Port Scheduler Policy Commands
Show Commands
Clear Commands
8.
Slope QoS Policies
8.1. In This Section
8.2. Overview
8.3. Basic Configurations
8.3.1. Creating a Slope QoS Policy
8.3.2. Applying Slope Policies
8.3.2.1. Ports
8.3.2.2. MDA (FP1)
8.3.2.3. FP (FP2 and higher based hardware)
8.3.3. Default Slope Policy Values
8.4. Service Management Tasks
8.4.1. Deleting QoS Policies
8.4.1.1. Ports
8.4.1.2. MDA (FP1)
8.4.1.3. FP (FP2 and higher based hardware)
8.4.1.4. Removing a Policy from the QoS Configuration
8.4.2. Copying and Overwriting QoS Policies
8.4.3. Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Slope Policy QoS Commands
Slope Policy QoS Policy Commands
RED Slope Commands
Show Commands
9. Shared-Queue QoS Policies
9.1. In This Section
9.2. Overview
9.3. Multipoint Shared Queuing
9.3.1. Ingress Queuing Modes of Operation
9.3.2. Ingress Service Queuing
9.3.2.1. Ingress Shared Queuing
9.3.2.2. Ingress Multipoint Shared Queuing
9.4. Basic Configurations
9.4.1. Modifying the Default Shared-Queue Policy
9.4.1.1. Applying Shared-Queue Policies
9.4.1.1.1. Epipe Services
9.4.1.1.2. IES Services
9.4.1.1.3. VPLS Services
9.4.1.1.4. VPRN Services
9.4.2. Default Shared Queue Policy Values
Shared-Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shared Queue QoS Commands
Show Commands
10. Advanced QoS Policies
10.1. In This Section
10.2. Overview
10.3. Basic Configurations
10.3.1. Creating an Advanced QoS Policy
10.3.2. Applying Advanced Policies
10.3.2.1. Queue Group
10.3.2.2. SAP Ingress
10.3.2.3. SAP Egress
10.3.3. Default Advanced Policy Values
10.4. Service Management
10.4.1. Deleting QoS Policies
10.4.1.1. Queue Group
10.4.1.2. SAP Ingress
10.4.1.3. SAP Egress
10.4.2. Copying and Overwriting Advanced Policies
10.4.3. Editing Advanced Policies
Advanced QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Advanced Policy QoS Commands
Show Commands
11.
QoS ATM Traffic Descriptor Profiles
11.1. In This Section
11.2. Overview
11.2.1. ATM Traffic Management
11.2.2. QoS Model for ATM-Based Services
11.2.3. ATM Service Categories
11.2.4. ATM Traffic Descriptors and QoS Parameters
11.2.5. Policing
11.2.6. Shaping
11.2.7. ATM Queuing and Scheduling
11.2.8. Congestion Avoidance
11.3. Basic Configurations
11.3.1. Creating an ATM-TD-Profile QoS Policy
11.3.2. Applying ATM-TD-Profile Policies
11.3.2.1. ATM VLL (Apipe) SAPs
11.3.2.2. Epipe SAPs
11.3.2.3. IES SAPs
11.3.2.4. Ipipe SAPs
11.3.2.5. VPRN SAPs
11.3.2.6. VPLS SAPs
11.3.3. Default ATM-TD-Profile Policy Values
11.4. Service Management Tasks
11.4.1. Removing a Profile from the QoS Configuration
11.4.2. Copying and Overwriting Profile
11.4.3. Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
ATM QoS Policy Commands
Show Commands
12.
Named Pools
12.1. In This Section
12.2. Overview
12.3. Named Pool Mode for IOM3-XP Card
12.4. Basic Configurations
12.4.1. Creating a Named Pool QoS Policy
12.4.1.1. Named Pool Configuration Procedure
12.4.2. Allocation Steps
Named Pools QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Named Pool Policy Creation
Show Commands
Named Pool Show Commands
13.
High Scale Ethernet MDA Capabilities
13.1. In This Section
13.2. HSMDA QoS Model
13.2.1. Queue Scaling
13.2.2. Port-Based Scheduling
13.2.3. Dual Pass Queuing
13.2.4. Egress Intermediate Destination Secondary Shapers
13.2.5. Packet and Octet Counting
13.2.6. Above CIR Discard with PIR Bypass
13.2.6.1. HSMDA Ingress Queue Policing Mode
13.2.7. HSMDA Buffer Utilization Controls
13.2.7.1. HSMDA Buffer Pools
13.2.7.2. Identifying Queue Groups as Provisioned or System
13.2.7.3. Provisioned and System Port Class Pools
13.2.7.4. Aggregate Pools for Type and Class Separation
13.2.7.5. Use of Aggregate Control Buffer Pools
13.2.7.6. HSMDA Buffer Pool Policy
13.2.7.6.1. Default HSMDA Buffer Pool Policy
13.2.7.7. Port Class Pool Sizing
13.2.7.8. HSMDA Available Buffer Register Operation
13.2.8. HSMDA Queue Congestion and Buffer Utilization Controls
13.2.8.1. Maximum HSMDA Queue Depth
13.2.8.2. Control Plane HSMDA RED Slope Policy Management
13.2.8.3. HSMDA Slope Policy MBS Parameter
13.2.8.4. HSMDA Slope Policy Slope Parameters
13.2.8.5. HSMDA Slope Shutdown Behavior
13.2.8.6. Ingress Packet Mapping to HSMDA RED Slope
13.2.8.7. Egress Packet Mapping to HSMDA RED Slope
13.2.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
13.2.9. Egress Queue CIR Based dot1p Remarking
13.3. SAP Ingress and SAP Egress QoS Policies
13.3.1. SAP Ingress QoS Policy
13.3.2. SAP Egress QoS Policy
13.4. Subscriber Queuing Differences
13.5. Basic HSMDA Configurations
13.5.1. HSMDA Pool Policies
13.5.2. HSMDA Scheduler Policies
13.5.3. HSMDA Slope Policies
13.5.4. Egress Queue Group
13.5.5. Configuring HSMDA Queue Group Overrides
13.6. Applying HSMDA Policies
13.7. HSMDA Features
13.7.1. HSMDA LAG
13.7.2. Billing
13.7.3. Resource Management
13.7.4. HSMDA Queue Groups
13.7.4.1. Scheduling Classes
13.7.4.2. Scheduling Class Weighted Groups
13.7.4.3. Scheduler Strict Priority Levels
13.7.4.4. Strict Priority Level PIR
13.7.4.5. Scheduler Maximum Rate
13.7.4.6. HSMDA Scheduler Policy Overrides
13.7.4.7. Orphan Queues
13.7.4.8. Default HSMDA Scheduling Policy
HSMDA Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
HSMDA Pool QoS Policy Commands
HSMDA Scheduler QoS Policy Commands
HSMDA Slope QoS Policy Commands
HSMDA WRR QoS Policy Commands
Show QoS HSMDA Commands
14.
QoS in MC-MLPPP
14.1. In This Section
14.2. Overview
14.3. Ingress MLPPP Class Reassembly
14.4. Basic Configurations
14.4.1. Configuring MC-MLPPP
14.4.2. Configuring MC-MLPPP QoS Parameters
14.5. QoS in MLFR and FRF.12 Fragmentation
14.5.1. QoS in MLFR
14.5.2. QoS in FRF.12 End-to-End Fragmentation
MLPPP Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Configuration Commands
MC-MLPPP Commands
15.
Class Fair Hierarchical Policing (CFHP)
15.1. In This Section
15.2. Overview
15.3. Parent Policer Priority and Unfair Sensitive Discard Thresholds
15.4. CFHP Ingress and Egress Use Cases
15.5. Post-CFHP Queuing and Scheduling
15.5.1. Ingress CFHP Queuing
15.5.2. Egress CFHP Queuing
15.5.2.1. Policer to Local Queue Mapping
15.5.3. Egress Subscriber CFHP Queuing
15.5.3.1. Subscriber Destination String Queue Group Identification
15.5.4. SAP Default Destination String
15.6. CFHP Policer Control Policy
15.6.1. Policer Control Policy Root Arbiter
15.6.2. Tier 1 and Tier 2 Explicit Arbiters
15.6.3. Explicit Arbiter Rate Limits
15.6.4. CFHP with Child Policer Exceed PIR Enabled
15.7. CFHP Child Policer Definition and Creation
15.8. Policer Enabled SAP QoS Policy Applicability
15.9. Child Policer Parent Association
15.10. Profile-Capped Policers
15.11. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
15.11.1. Ingress ‘Undefined’ Initial Profile
15.11.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
15.11.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
15.11.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
15.11.5. Egress Explicit Profile Reclassification
15.11.6. Preserving Out of Profile State at Egress Policer
15.11.7. Egress Policer CIR Packet Handling without Profile-capped Mode
15.11.8. Egress Policer CIR Packet Handling with Profile-capped Mode
15.11.9. Forwarding Traffic Exceeding PIR in Egress Policers
15.11.10. Ingress Child Policer Stat-Mode
15.11.11. Egress Child Policer Stat-Mode
15.12. Profile-Preferred Mode Root Policers
15.13. Child Policer Hierarchical QoS Parenting
Class Fair Hierarchical Policing (CFHP) Policy Command Reference
Command Hierarchies
Class Fair Hierarchical Policing Commands
Command Descriptions
Configuration Commands
Generic Commands
16. Frequently Used QoS Terms
16.1. In This Section
16.2. Above CIR Distribution
16.3. Available Bandwidth
16.4. CBS
16.5. CIR
16.6. CIR Level
16.7. CIR Weight
16.8. Child
16.9. Level
16.10. MBS
16.11. MCR
16.12. Offered Load
16.13. Orphan
16.14. Parent
16.15. Queue
16.16. Rate
16.17. Root (Scheduler)
16.18. Scheduler Policy
16.19. Tier
16.20. Virtual Scheduler
16.21. Weight
16.22. Within CIR Distribution
17. Standards and Protocol Support
Customer Document and Product Support
1.
Getting Started
1.1. About This Guide
1.2. QoS Configuration Process
2.
QoS Policies
2.1. In This Section
2.2. QoS Overview
2.3. Forwarding Classes
2.3.1. High-Priority Classes
2.3.2. Assured Classes
2.3.3. Best-Effort Classes
2.4. Queue Parameters
2.4.1. Queue ID
2.4.2. Unicast or Multipoint Queue
2.4.3. Queue Hardware Scheduler
2.4.4. Committed Information Rate
2.4.5. Peak Information Rate
2.4.6. Adaptation Rule
2.4.7. Committed Burst Size
2.4.8. Maximum Burst Size
2.4.9. High Priority Only Buffers
2.4.10. Hi-Low Priority Only Buffers
2.4.11. WRED Per Queue
2.4.11.1. Native Queue Mode
2.4.11.2. Pool Per Queue Mode
2.4.12. Packet Markings
2.4.13. Queue Counters
2.4.14. Queue-Types
2.4.15. Color Aware Profiling
2.5. QoS Policies Overview
2.5.1. Service versus Network QoS
2.5.2. QoS Policy Entities
2.5.3. Network QoS Policies
2.5.4. Network Queue QoS Policies
2.5.5. Service Ingress QoS Policies
2.5.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
2.5.5.2. Egress Forwarding Class Override
2.5.6. Service Egress QoS Policies
2.5.7. Named Pool Policies
2.5.8. Slope Policies
2.5.8.1. RED Slopes
2.5.8.2. Tuning the SBAU Calculation
2.5.8.3. Slope Policy Parameters
2.5.9. Scheduler Policies
2.5.9.1. Virtual Hierarchical Scheduling
2.5.9.2. Single-Tier Scheduling
2.5.9.3. Hierarchical Scheduler Policies
2.5.9.3.1. Hierarchical Virtual Schedulers
2.5.9.4. Tiers
2.5.9.5. Scheduler Policies Applied to Applications
2.5.9.6. Scheduler Policies Applied to SAPs
2.5.9.7. Scheduler Policies Applied to Customer SLAs
2.5.9.8. Scheduler Policies Applied to Multiservice Sites
2.5.10. Shared-queue QoS Policies
2.5.11. ATM Traffic Descriptor Profiles
2.5.12. Configuration Notes
3.
Network QoS Policies
3.1. In This Section
3.2. Network QoS Policies Overview
3.3. Network Ingress Tunnel QoS Override
3.3.1. Override For Tunnel Terminated IP Routing Decisions
3.3.1.1. Normal QoS Operation
3.3.1.2. Network Ingress IP Match Criteria
3.3.1.3. Network Ingress IPv6 Match Criteria
3.3.1.4. Tunnel Termination QoS Override Operation
3.3.1.5. Enabling and Disabling Tunnel Termination QoS Override
3.3.2. QoS for Self-Generated (CPU) Traffic on Network Interfaces
3.3.2.1. Default DSCP Mapping Table
3.4. Basic Configurations
3.4.1. Creating a Network QoS Policy
3.4.2. Applying Network QoS Policies
3.4.3. Default Network QoS Policy Values
3.5. Service Management Tasks
3.5.1. Deleting QoS Policies
3.5.2. Removing a Policy from the QoS Configuration
3.5.3. Copying and Overwriting Network Policies
3.5.4. Editing QoS Policies
Network QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Multi-Class Frame Relay Profile Commands
Network QoS Policy Commands
Self-Generated Traffic Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Multi-Class Frame Relay Profile Commands
Network QoS Policy Commands
Network Ingress QoS Policy Commands
Network Egress QoS Policy Commands
Network Egress QoS Policy Forwarding Class Commands
Self-Generated Traffic Commands
Show Commands
4.
Network Queue QoS Policies
4.1. In This Section
4.2. Overview
4.3. Network Queue Parent Scheduler
4.4. Basic Configurations
4.4.1. Creating a Network Queue QoS Policy
4.4.2. Applying Network Queue QoS Policies
4.4.2.1. XMAs and MDAs
4.4.2.2. Ethernet Ports
4.4.2.3. SONET/SDH Ports
4.4.3. Default Network Queue Policy Values
4.5. Service Management Tasks
4.5.1. Deleting QoS Policies
4.5.2. Removing a Policy from the QoS Configuration
4.5.3. Copying and Overwriting QoS Policies
4.5.4. Editing QoS Policies
Network Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Network Queue QoS Policy Commands
Show Commands
5.
Service Ingress and Egress QoS Policies
5.1. In This Chapter
5.2. Overview
5.3. Basic Configurations
5.4. Service Ingress QoS Policy
5.4.1. Service Ingress QoS Queue
5.4.2. Percent-Rate Support
5.4.3. Ingress Forwarding Class (FC)
5.4.4. Ingress IP Match Criteria
5.4.5. Ingress IPv6 Match Criteria
5.4.6. Ingress MAC Match Criteria
5.4.6.1. VLAN ID Matching
5.4.7. Ingress Criteria Classification Directly to Policer
5.4.8. Virtual Network Identifier (VNI) Classification
5.4.9. FC Mapping Based on EXP Bits
5.5. Service Egress QoS Policy
5.5.1. Service Egress QoS Queue
5.5.2. Percent-Rate Support
5.5.3. Dynamic MBS for Egress Queue Group Queues
5.5.3.1. Queue Length as a Delay Value
5.5.4. Egress SAP FC and FP Overrides
5.5.5. Egress Criteria Classification Directly to Policer
5.5.6. Dot1p Egress Remarking
5.5.6.1. DEI Egress Remarking
5.5.6.1.1. DEI in IEEE 802.1ad
5.5.6.1.2. DEI in IEEE 802.1ah
5.5.6.1.3. IEEE 802.1ad Use Case
5.5.6.1.4. IEEE 802.1ah Use Case
5.5.7. DSCP/Prec Egress Remarking
5.5.8. Queue Depth Monitoring
5.6. Service Management Tasks
5.6.1. Applying Service Ingress and Egress Policies
5.6.1.1. Epipe
5.6.1.2. IES
5.6.1.3. VPLS
5.6.1.4. VPRN
5.6.2. Editing QoS Policies
5.6.3. Copying and Overwriting QoS Policies
5.6.4. Deleting QoS Policies
5.6.5. Removing a Policy from the QoS Configuration
Service Ingress and Egress QoS Policy Command Reference
Command Hierarchies
Service Ingress QoS Policy Commands
Service Egress QoS Policy Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Service Ingress QoS Policy Commands
Service Egress QoS Policy Forwarding Class Commands
Show Commands
6.
Queue Sharing and Redirection
6.1. In This Section
6.2. Queue Sharing and Redirection
6.2.1. Supported Platforms
6.2.2. Queue Group Applications
6.2.3. Access SAP Queue Group Applications
6.2.4. Ingress Access Port Queue Group Hardware Queue Allocation
6.2.5. Network Port Queue Groups for IP Interfaces
6.2.6. Pseudowire Shaping for Layer 2 and Layer 3 Services
6.2.7. QoS on Ingress Bindings
6.2.8. Queue Group Templates and Port Queue Groups
6.2.8.1. Queue Group Templates
6.2.8.2. Port Queue Groups
6.2.8.2.1. Percent-Rate Support
6.2.9. Forwarding Plane Queue Groups
6.2.10. Redirection Models
6.2.11. Access SAP Forwarding Class Based Redirection
6.2.12. Ingress and Egress SAP Forwarding Class Redirection Association Rules
6.2.12.1. Policy Based Provisioning Model
6.2.12.2. SAP-Based Provisioning Model
6.2.13. Access Queue Group Statistics
6.2.13.1. Port Queue Groups
6.2.13.2. Forwarding Plane Queue Groups
6.2.14. Network IP Interface Forwarding Class-Based Redirection
6.2.15. Egress Network Forwarding Class Redirection Association Rules
6.2.16. Egress Network IP Interface Statistics
6.2.17. Separate Ingress IPv4 and IPv6 Statistics
6.2.18. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.2.18.1. Feature Configuration
6.2.18.2. Provisioning Model
6.2.18.3. Ingress Packet Classification
6.2.19. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
6.2.19.1. Feature Configuration
6.2.19.2. Provisioning Model
6.2.19.3. Egress Marking of PW Packet Header
6.2.19.4. Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
6.2.20. Ingress Per SAP Statistics with Ingress Queue Groups
6.2.21. Ingress and Egress PW Statistics
6.2.22. Queue Group Behavior on LAG
6.2.22.1. Queue Group Queue Instantiation Per Link
6.2.22.2. Per-Link Queue Group Queue Parameters
6.2.22.3. Adding a Queue Group to an Existing LAG
6.2.22.4. Adding a Port to a LAG
6.2.22.5. Removing a Queue Group from a LAG
6.3. Basic Configurations
6.3.1. Configuring an Ingress Queue Group Template
6.3.2. Configuring Egress Queue Group Template
6.3.3. Applying Ingress Queue Group to SAP Ingress Policy
6.3.4. Applying Egress Queue Group to SAP Egress Policy
6.3.5. Configuring SAP-based Egress Queue Redirection
6.3.6. Configuring Queue Group on Ethernet Access Ingress Port
6.3.7. Configuring Overrides
6.3.8. Configuring Queue Group on Ethernet Access Egress Port
6.3.9. Configuring Queue Group for Network Egress Traffic on Port
6.3.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
6.3.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
6.3.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
6.3.13. Specifying QoS Policies on Service SAPs
QoS Queue Group Template Command Reference
Command Hierarchies
Configuring Ingress Queue Group Templates
Configuring Egress Queue Group Templates
Show Commands
Monitor Commands
Command Descriptions
Configuration Commands
Generic Commands
Queue Group Commands
Show Commands
Monitor Commands
7. Scheduler QoS Policies
7.1. In This Section
7.2. Scheduler Policies
7.2.1. Egress Port-Based Schedulers
7.2.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
7.2.1.2. Service or Subscriber or Multiservice site Scheduler Child to Port Scheduler Parent
7.2.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
7.2.1.3. Frame and Packet-Based Bandwidth Allocation
7.2.1.4. Parental Association Scope
7.2.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
7.2.1.6. Network Queue Parent Scheduler
7.2.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
7.2.1.8. Congestion Monitoring on Egress Port Scheduler
7.2.1.8.1. Scalability, Performance, and Operation
7.2.1.8.2. Restrictions
7.2.2. Frame-Based Accounting
7.2.2.1. Operational Modifications
7.2.2.2. Existing Egress Port Based Virtual Scheduling
7.2.2.3. Behavior Modifications for Frame-Based Accounting
7.2.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
7.2.3. Virtual Scheduling Unused Bandwidth Distribution
7.2.3.1. Default Unused Bandwidth Distribution
7.2.3.2. Limit Unused Bandwidth
7.2.4. Configuring Port Scheduler Policies
7.2.4.1. Port Scheduler Structure
7.2.4.2. Special Orphan Queue and Scheduler Behavior
7.2.4.3. Packet to Frame Bandwidth Conversion
7.2.4.4. Aggregate Rate Limits for Directly Attached Queues
7.2.4.5. SAP Egress QoS Policy Queue Parenting
7.2.4.6. Network Queue QoS Policy Queue Parenting
7.2.4.7. Egress Port Scheduler Overrides
7.2.4.8. Applying a Port Scheduler Policy to a Virtual Port
7.2.4.9. Applying Aggregate Rate Limit to a VPORT
7.2.4.10. Applying a Scheduler Policy to a VPORT
7.2.4.11. Weighted Scheduler Group in a Port Scheduler Policy
7.3. Basic Configurations
7.3.1. Creating a QoS Scheduler Policy
7.3.2. Applying Scheduler Policies
7.3.2.1. Customer
7.3.2.2. Epipe
7.3.2.3. IES
7.3.2.4. VPLS
7.3.2.5. VPRN
7.3.3. Creating a QoS Port Scheduler Policy
7.3.4. Configuring Port Parent Parameters
7.3.4.1. Within-CIR Priority Level Parameters
7.3.4.2. Above-CIR Priority Level Parameters
7.3.5. Configuring Distributed LAG Rate
7.4. Service Management Tasks
7.4.1. Deleting QoS Policies
7.4.1.1. Removing a QoS Policy from a Customer Multiservice Site
7.4.1.2. Removing a QoS Policy from SAP(s)
7.4.1.3. Removing a Policy from the QoS Configuration
7.4.2. Copying and Overwriting Scheduler Policies
7.4.3. Editing QoS Policies
QoS Scheduler Policy Command Reference
Command Hierarchies
Scheduler Policy Configuration Commands
Port Scheduler Policy Configuration Commands
Operational Commands
Show Commands
Clear Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Scheduler Policy Commands
Port Scheduler Policy Commands
Show Commands
Clear Commands
8.
Slope QoS Policies
8.1. In This Section
8.2. Overview
8.3. Basic Configurations
8.3.1. Creating a Slope QoS Policy
8.3.2. Applying Slope Policies
8.3.2.1. Ports
8.3.2.2. MDA (FP1)
8.3.2.3. FP (FP2 and higher based hardware)
8.3.3. Default Slope Policy Values
8.4. Service Management Tasks
8.4.1. Deleting QoS Policies
8.4.1.1. Ports
8.4.1.2. MDA (FP1)
8.4.1.3. FP (FP2 and higher based hardware)
8.4.1.4. Removing a Policy from the QoS Configuration
8.4.2. Copying and Overwriting QoS Policies
8.4.3. Editing QoS Policies
Slope QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Slope Policy QoS Commands
Slope Policy QoS Policy Commands
RED Slope Commands
Show Commands
9. Shared-Queue QoS Policies
9.1. In This Section
9.2. Overview
9.3. Multipoint Shared Queuing
9.3.1. Ingress Queuing Modes of Operation
9.3.2. Ingress Service Queuing
9.3.2.1. Ingress Shared Queuing
9.3.2.2. Ingress Multipoint Shared Queuing
9.4. Basic Configurations
9.4.1. Modifying the Default Shared-Queue Policy
9.4.1.1. Applying Shared-Queue Policies
9.4.1.1.1. Epipe Services
9.4.1.1.2. IES Services
9.4.1.1.3. VPLS Services
9.4.1.1.4. VPRN Services
9.4.2. Default Shared Queue Policy Values
Shared-Queue QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Shared Queue QoS Commands
Show Commands
10. Advanced QoS Policies
10.1. In This Section
10.2. Overview
10.3. Basic Configurations
10.3.1. Creating an Advanced QoS Policy
10.3.2. Applying Advanced Policies
10.3.2.1. Queue Group
10.3.2.2. SAP Ingress
10.3.2.3. SAP Egress
10.3.3. Default Advanced Policy Values
10.4. Service Management
10.4.1. Deleting QoS Policies
10.4.1.1. Queue Group
10.4.1.2. SAP Ingress
10.4.1.3. SAP Egress
10.4.2. Copying and Overwriting Advanced Policies
10.4.3. Editing Advanced Policies
Advanced QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
Advanced Policy QoS Commands
Show Commands
11.
QoS ATM Traffic Descriptor Profiles
11.1. In This Section
11.2. Overview
11.2.1. ATM Traffic Management
11.2.2. QoS Model for ATM-Based Services
11.2.3. ATM Service Categories
11.2.4. ATM Traffic Descriptors and QoS Parameters
11.2.5. Policing
11.2.6. Shaping
11.2.7. ATM Queuing and Scheduling
11.2.8. Congestion Avoidance
11.3. Basic Configurations
11.3.1. Creating an ATM-TD-Profile QoS Policy
11.3.2. Applying ATM-TD-Profile Policies
11.3.2.1. ATM VLL (Apipe) SAPs
11.3.2.2. Epipe SAPs
11.3.2.3. IES SAPs
11.3.2.4. Ipipe SAPs
11.3.2.5. VPRN SAPs
11.3.2.6. VPLS SAPs
11.3.3. Default ATM-TD-Profile Policy Values
11.4. Service Management Tasks
11.4.1. Removing a Profile from the QoS Configuration
11.4.2. Copying and Overwriting Profile
11.4.3. Editing QoS Policies
ATM QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Operational Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Operational Commands
ATM QoS Policy Commands
Show Commands
12.
Named Pools
12.1. In This Section
12.2. Overview
12.3. Named Pool Mode for IOM3-XP Card
12.4. Basic Configurations
12.4.1. Creating a Named Pool QoS Policy
12.4.1.1. Named Pool Configuration Procedure
12.4.2. Allocation Steps
Named Pools QoS Policy Command Reference
Command Hierarchies
Configuration Commands
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
Named Pool Policy Creation
Show Commands
Named Pool Show Commands
13.
High Scale Ethernet MDA Capabilities
13.1. In This Section
13.2. HSMDA QoS Model
13.2.1. Queue Scaling
13.2.2. Port-Based Scheduling
13.2.3. Dual Pass Queuing
13.2.4. Egress Intermediate Destination Secondary Shapers
13.2.5. Packet and Octet Counting
13.2.6. Above CIR Discard with PIR Bypass
13.2.6.1. HSMDA Ingress Queue Policing Mode
13.2.7. HSMDA Buffer Utilization Controls
13.2.7.1. HSMDA Buffer Pools
13.2.7.2. Identifying Queue Groups as Provisioned or System
13.2.7.3. Provisioned and System Port Class Pools
13.2.7.4. Aggregate Pools for Type and Class Separation
13.2.7.5. Use of Aggregate Control Buffer Pools
13.2.7.6. HSMDA Buffer Pool Policy
13.2.7.6.1. Default HSMDA Buffer Pool Policy
13.2.7.7. Port Class Pool Sizing
13.2.7.8. HSMDA Available Buffer Register Operation
13.2.8. HSMDA Queue Congestion and Buffer Utilization Controls
13.2.8.1. Maximum HSMDA Queue Depth
13.2.8.2. Control Plane HSMDA RED Slope Policy Management
13.2.8.3. HSMDA Slope Policy MBS Parameter
13.2.8.4. HSMDA Slope Policy Slope Parameters
13.2.8.5. HSMDA Slope Shutdown Behavior
13.2.8.6. Ingress Packet Mapping to HSMDA RED Slope
13.2.8.7. Egress Packet Mapping to HSMDA RED Slope
13.2.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
13.2.9. Egress Queue CIR Based dot1p Remarking
13.3. SAP Ingress and SAP Egress QoS Policies
13.3.1. SAP Ingress QoS Policy
13.3.2. SAP Egress QoS Policy
13.4. Subscriber Queuing Differences
13.5. Basic HSMDA Configurations
13.5.1. HSMDA Pool Policies
13.5.2. HSMDA Scheduler Policies
13.5.3. HSMDA Slope Policies
13.5.4. Egress Queue Group
13.5.5. Configuring HSMDA Queue Group Overrides
13.6. Applying HSMDA Policies
13.7. HSMDA Features
13.7.1. HSMDA LAG
13.7.2. Billing
13.7.3. Resource Management
13.7.4. HSMDA Queue Groups
13.7.4.1. Scheduling Classes
13.7.4.2. Scheduling Class Weighted Groups
13.7.4.3. Scheduler Strict Priority Levels
13.7.4.4. Strict Priority Level PIR
13.7.4.5. Scheduler Maximum Rate
13.7.4.6. HSMDA Scheduler Policy Overrides
13.7.4.7. Orphan Queues
13.7.4.8. Default HSMDA Scheduling Policy
HSMDA Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Configuration Commands
Generic Commands
HSMDA Pool QoS Policy Commands
HSMDA Scheduler QoS Policy Commands
HSMDA Slope QoS Policy Commands
HSMDA WRR QoS Policy Commands
Show QoS HSMDA Commands
14.
QoS in MC-MLPPP
14.1. In This Section
14.2. Overview
14.3. Ingress MLPPP Class Reassembly
14.4. Basic Configurations
14.4.1. Configuring MC-MLPPP
14.4.2. Configuring MC-MLPPP QoS Parameters
14.5. QoS in MLFR and FRF.12 Fragmentation
14.5.1. QoS in MLFR
14.5.2. QoS in FRF.12 End-to-End Fragmentation
MLPPP Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Configuration Commands
MC-MLPPP Commands
15.
Class Fair Hierarchical Policing (CFHP)
15.1. In This Section
15.2. Overview
15.3. Parent Policer Priority and Unfair Sensitive Discard Thresholds
15.4. CFHP Ingress and Egress Use Cases
15.5. Post-CFHP Queuing and Scheduling
15.5.1. Ingress CFHP Queuing
15.5.2. Egress CFHP Queuing
15.5.2.1. Policer to Local Queue Mapping
15.5.3. Egress Subscriber CFHP Queuing
15.5.3.1. Subscriber Destination String Queue Group Identification
15.5.4. SAP Default Destination String
15.6. CFHP Policer Control Policy
15.6.1. Policer Control Policy Root Arbiter
15.6.2. Tier 1 and Tier 2 Explicit Arbiters
15.6.3. Explicit Arbiter Rate Limits
15.6.4. CFHP with Child Policer Exceed PIR Enabled
15.7. CFHP Child Policer Definition and Creation
15.8. Policer Enabled SAP QoS Policy Applicability
15.9. Child Policer Parent Association
15.10. Profile-Capped Policers
15.11. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
15.11.1. Ingress ‘Undefined’ Initial Profile
15.11.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
15.11.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
15.11.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
15.11.5. Egress Explicit Profile Reclassification
15.11.6. Preserving Out of Profile State at Egress Policer
15.11.7. Egress Policer CIR Packet Handling without Profile-capped Mode
15.11.8. Egress Policer CIR Packet Handling with Profile-capped Mode
15.11.9. Forwarding Traffic Exceeding PIR in Egress Policers
15.11.10. Ingress Child Policer Stat-Mode
15.11.11. Egress Child Policer Stat-Mode
15.12. Profile-Preferred Mode Root Policers
15.13. Child Policer Hierarchical QoS Parenting
Class Fair Hierarchical Policing (CFHP) Policy Command Reference
Command Hierarchies
Class Fair Hierarchical Policing Commands
Command Descriptions
Configuration Commands
Generic Commands
16. Frequently Used QoS Terms
16.1. In This Section
16.2. Above CIR Distribution
16.3. Available Bandwidth
16.4. CBS
16.5. CIR
16.6. CIR Level
16.7. CIR Weight
16.8. Child
16.9. Level
16.10. MBS
16.11. MCR
16.12. Offered Load
16.13. Orphan
16.14. Parent
16.15. Queue
16.16. Rate
16.17. Root (Scheduler)
16.18. Scheduler Policy
16.19. Tier
16.20. Virtual Scheduler
16.21. Weight
16.22. Within CIR Distribution
17. Standards and Protocol Support
Customer Document and Product Support
RADIUS Attributes Reference Guide R14.0.R4
1. RADIUS Attributes Reference
1.1. About this Guide
1.1.1. Audience
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.12. Dynamic Data Services
1.2.13. Lawful Intercept
1.2.14. IPSec
1.2.15. Application Assurance
1.2.16. CLI User Authentication and Authorization
1.2.17. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. Accounting Terminate Causes
1.3.10. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPSec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
2. Standards and Protocol Support
Customer Document and Product Support
1. RADIUS Attributes Reference
1.1. About this Guide
1.1.1. Audience
1.2. RADIUS Authentication Attributes
1.2.1. Subscriber Host Identification
1.2.2. Wholesale-Retail — Local Access Mode
1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
1.2.4. Business Service Access
1.2.5. Accounting On-Line Charging
1.2.6. IP and IPv6 Filters
1.2.6.1. IP Filter Attribute Details
1.2.7. Subscriber Host Creation
1.2.8. Subscriber Services
1.2.9. GTP uplink
1.2.10. WLAN Gateway
1.2.11. Virtual Residential Gateway
1.2.12. Dynamic Data Services
1.2.13. Lawful Intercept
1.2.14. IPSec
1.2.15. Application Assurance
1.2.16. CLI User Authentication and Authorization
1.2.17. AAA Route Downloader
1.3. RADIUS Accounting Attributes
1.3.1. Enhanced Subscriber Management (ESM) Accounting
1.3.2. Distributed Subscriber Management (DSM) Accounting
1.3.3. Subscriber Service Accounting
1.3.4. Large Scale NAT (LSN) Accounting
1.3.5. L2TP Tunnel Accounting
1.3.6. Application Assurance (AA) Accounting
1.3.7. Dynamic Data Service accounting
1.3.8. CLI User Access Accounting
1.3.9. Accounting Terminate Causes
1.3.10. Accounting Triggered Reason VSA Values
1.4. RADIUS CoA and Disconnect Message Attributes
1.4.1. Subscriber Host Identification Attributes
1.4.2. WLAN-GW migrant users Identification Attributes
1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
1.4.4. IPSec Tunnel Identification Attributes
1.4.5. Dynamic Data Services Identification Attributes
1.4.6. Overview of CoA Attributes
1.4.7. [101] Error-Cause Attribute Values
2. Standards and Protocol Support
Customer Document and Product Support
Router Configuration Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. In This Chapter
1.3. Router Configuration Process
2.
IP Router Configuration
2.1. In This Chapter
2.2. Configuring IP Router Parameters
2.2.1. Interfaces
2.2.1.1. Network Interface
2.2.1.2. Network Domains
2.2.1.3. System Interface
2.2.1.4. Unicast Reverse Path Forwarding Check (uRPF)
2.2.1.5. Creating an IP Address Range
2.2.1.6. QoS Policy Propagation Using BGP (QPPB)
2.2.1.6.1. QPPB Applications
2.2.1.6.2. Inter-AS Coordination of QoS Policies
2.2.1.6.3. Traffic Differentiation Based on Route Characteristics
2.2.1.7. QPPB
2.2.1.7.1. Associating an FC and Priority with a Route
2.2.1.7.2. Displaying QoS Information Associated with Routes
2.2.1.7.3. Enabling QPPB on an IP interface
2.2.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.7.5. QPPB and Multiple Paths to a Destination
2.2.1.7.6. QPPB and Policy-Based Routing
2.2.1.8. QPPB and GRT Lookup
2.2.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.2. Router ID
2.2.3. Autonomous Systems (AS)
2.2.4. Confederations
2.2.5. Proxy ARP
2.2.6. Exporting an Inactive BGP Route from a VPRN
2.2.7. DHCP Relay
2.2.8. Internet Protocol Versions
2.2.8.1. IPv6 Address Format
2.2.8.2. IPv6 Applications
2.2.8.3. DNS
2.2.8.4. Secure Neighbor Discovery (SeND)
2.2.8.5. SeND Persistent CGAs
2.2.8.5.1. Persistent RSA Key Pair
2.2.8.5.2. Persistent CGA Modifier
2.2.8.5.3. Making non-persistent CGAs persistent
2.2.8.5.4. Booting from a saved configuration file
2.2.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.2.8.6.1. 6PE Control Plane Support
2.2.8.6.2. 6PE Data Plane Support
2.2.9. Static Route Resolution Using Tunnels
2.2.9.1. Static Route ECMP Support
2.3. Weighted Load-Balancing over MPLS LSP
2.3.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.3.1.1. Feature Configuration
2.3.1.2. Feature Behavior
2.3.1.3. ECMP Considerations
2.3.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.3.1.4.1. Feature Configuration
2.3.1.4.2. Feature Behavior
2.3.2. Bi-directional Forwarding Detection
2.3.2.1. BFD Control Packet
2.3.2.2. Control Packet Format
2.3.2.3. BFD for RSVP-TE
2.3.2.4. Echo Support
2.3.2.5. BFD Support for BGP
2.3.2.6. Centralized BFD
2.3.2.6.1. IES Over Spoke SDP
2.3.2.6.2. BFD Over LAG and VSM Interfaces
2.3.2.7. Aggregate Next Hop
2.3.2.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.3.2.8.1. Invalidate Next-Hop Based on IPV4 ARP
2.3.2.8.2. Invalidate Next-Hop Based on Neighbor Cache State
2.3.2.9. LDP Shortcut for IGP Route Resolution
2.3.2.9.1. IGP Route Resolution
2.3.2.9.2. LDP-IGP Synchronization
2.3.2.9.3. LDP Shortcut Forwarding Plane
2.3.2.9.4. ECMP Considerations
2.3.2.9.5. Handling of Control Packets
2.3.2.9.6. Handling of Multicast Packets
2.3.2.9.7. Interaction with BGP Route Resolution to an LDP FEC
2.3.2.9.8. Interaction with Static Route Resolution to an LDP FEC
2.3.2.9.9. LDP Control Plane
2.4. Weighted Load-Balancing over Interface Next-hops
2.5. GRE Tunnel Overview
2.5.1. Sample GRE Tunnel Configurations
2.6. Process Overview
2.7. Configuration Notes
Configuring an IP Router with CLI
Router Configuration Overview
System Interface
Network Interface
Basic Configuration
Common Configuration Tasks
Configuring a System Name
Configuring Interfaces
Configuring a System Interface
Configuring a Network Interface
Configuring IPv6 Parameters
Configuring IPv6 Over IPv4 Parameters
Tunnel Ingress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Tunnel Egress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Router Advertisement
Configuring IPv6 Parameters
An Example of a IPv6 Over IPv4 Tunnel Configuration
Configuring Proxy ARP
Creating an IP Address Range
Deriving the Router ID
Configuring a Confederation
Configuring an Autonomous System
Configuring Overload State on a Single SFM
Service Management Tasks
Changing the System Name
Modifying Interface Parameters
Deleting a Logical IP Interface
IP Router Configuration Command Reference
Command Hierarchies
Router Commands
Router BFD commands
Router L2TP Commands
Router Interface Commands
Router Interface IPv6 Commands
Router Advertisement Commands
Command Descriptions
Generic Commands
Router Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router Interface Commands
Router Interface Filter Commands
Router Interface ICMP Commands
Router Interface IPv6 Commands
Router Interface DHCP Commands
Router Advertisement Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
L2TP Show Commands
Clear Commands
Debug Commands
Tools Commands
3.
VRRP
3.1. In This Chapter
3.2. VRRP Overview
3.3. VRRP Components
3.3.1. Virtual Router
3.3.2. IP Address Owner
3.3.3. Primary and Secondary IP Addresses
3.3.4. Virtual Router Master
3.3.5. Virtual Router Backup
3.3.6. Owner and Non-Owner VRRP
3.3.7. Configurable Parameters
3.3.7.1. Virtual Router ID (VRID)
3.3.7.2. Priority
3.3.7.3. IP Addresses
3.3.7.4. Message Interval and Master Inheritance
3.3.7.5. Skew Time
3.3.7.6. Master Down Interval
3.3.7.7. Preempt Mode
3.3.7.8. VRRP Message Authentication
3.3.7.8.1. Authentication Type 0 – No Authentication
3.3.7.8.2. Authentication Type 1 – Simple Text Password
3.3.7.8.3. Authentication Failure
3.3.7.9. Authentication Data
3.3.7.10. Virtual MAC Address
3.3.7.11. VRRP Advertisement Message IP Address List Verification
3.3.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.3.7.13. IPv6 Virtual Router Instance Operationally Up
3.3.7.14. Policies
3.4. VRRP Priority Control Policies
3.4.1. VRRP Virtual Router Policy Constraints
3.4.2. VRRP Virtual Router Instance Base Priority
3.4.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.4.4. VRRP Priority Control Policy Priority Events
3.4.4.1. Priority Event Hold-Set Timers
3.4.4.2. Port Down Priority Event
3.4.4.3. LAG Degrade Priority Event
3.4.4.4. Host Unreachable Priority Event
3.4.4.5. Route Unknown Priority Event
3.5. VRRP Non-Owner Accessibility
3.5.1. Non-Owner Access Ping Reply
3.5.2. Non-Owner Access Telnet
3.5.3. Non-Owner Access SSH
3.6. VRRP Configuration Process Overview
3.7. Configuration Notes
3.7.1. General
Configuring VRRP with CLI
VRRP Configuration Overview
Preconfiguration Requirements
Basic VRRP Configurations
VRRP Policy
VRRP IES Service Parameters
Configure VRRP for IPv6
VRRP Router Interface Parameters
Common Configuration Tasks
Creating Interface Parameters
Configuring VRRP Policy Components
Configuring Service VRRP Parameters
Non-Owner VRRP Example
Owner Service VRRP
Configuring Router Interface VRRP Parameters
Router Interface VRRP Non-Owner
Router Interface VRRP Owner
VRRP Configuration Management Tasks
Modifying a VRRP Policy
Deleting a VRRP Policy
Modifying Service and Interface VRRP Parameters
Modifying Non-Owner Parameters
Modifying Owner Parameters
Deleting VRRP on an Interface or Service
VRRP Configuration Command Reference
Command Hierarchies
IPv4 Interface VRRP Commands
Router Interface Commands
IPv6 Interface VRRP Commands
Priority Control Event Policy Commands
Command Descriptions
Interface Configuration Commands
Priority Policy Commands
Priority Policy Event Commands
Priority Policy Port Down Event Commands
Priority Policy LAG Events Commands
Priority Policy Host Unreachable Event Commands
Priority Policy Route Unknown Event Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Monitor Commands
Clear Commands
Debug Commands
4.
Filter Policies
4.1. In This Chapter
4.2. ACL Filter Policy Overview
4.2.1. Filter Policy Basics
4.2.1.1. Filter Policy Packet Match Criteria
4.2.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.2.1.3. MAC Filter Policy Entry Match Criteria
4.2.1.4. Filter Policy Actions
4.2.1.5. Filter Policy Statistics
4.2.1.6. Filter Policy Logging
4.2.1.7. Filter Policy cflowd Sampling
4.2.1.8. Filter Policy Management
4.2.1.8.1. Modifying Existing Filter Policy
4.2.1.8.2. Filter Policy Copy and Renumbering
4.2.2. Filter Policy Advanced Topics
4.2.2.1. Match-list for Filter Policies
4.2.2.1.1. Auto-generation of Filter-policy Address Prefix Match Lists
4.2.2.2. Embedded Filters
4.2.2.3. System-level IPv4/IPv6 Line Card Filter Policy
4.2.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.2.2.5. Extended Action for Performing Two Actions at a Time
4.2.2.6. Destination MAC Rewrite when Deploying Policy-Based Forwarding
4.2.2.7. Network-port VPRN Filter Policy
4.2.2.8. ISID MAC Filters
4.2.2.9. VID MAC filters
4.2.2.9.1. Arbitrary Bit Matching of VID Filters
4.2.2.9.2. Port Group Configuration Example
4.2.2.10. Redirect Policies
4.2.2.10.1. Router Instance Support for Redirect Policies
4.2.2.11. HTTP-redirect (Captive Portal)
4.2.2.11.1. Traffic Flow
4.2.2.12. Filter Policies and Dynamic Policy-Driven Interfaces
4.2.2.13. Filter Policy-based ESM Service Chaining
4.2.2.14. Policy-Based Forwarding for Deep Packet Inspection in VPLS
Filter Configuration Command Reference
Command Hierarchies
IPv4 Filter Policy Commands
IPv6 Filter Policy Commands
MAC Filter Commands
System Filter Policy Commands
Redirect Policy Configuration Commands
Match Filter List Commands
Log Filter Commands
Copy Filter Commands
Command Descriptions
Generic Commands
Global Filter Commands
Filter Log Commands
ACL Filter Policy Commands
General Filter Entry Commands
IP (v4/v6) Filter Entry Commands
Match List Configuration Commands
MAC Filter Entry Commands
MAC Filter Match Criteria
Policy and Entry Maintenance Commands
Redirect Policy Commands
Configuring Filter Policies with CLI
Common Configuration Tasks
Creating an IPv4 Filter Policy
IPv4 Filter Entry
Configuring the HTTP-Redirect Option
Cflowd Filter Sampling
Creating an IPv6 Filter Policy
Creating a MAC Filter Policy
MAC Filter Policy
MAC ISID Filter Policy
MAC VID Filter Policy
MAC Filter Entry
Creating a Match List for Filter Policies
Applying Filter Policies
Apply IP (v4/v6) and MAC Filter Policies to a Service
Applying (IPv4/v6) Filter Policies to a Network Port
Creating a Redirect Policy
Filter Management Tasks
Renumbering Filter Policy Entries
Modifying a Filter Policy
Deleting a Filter Policy
Modifying a Redirect Policy
Deleting a Redirect Policy
Copying Filter Policies
Show, Clear, Monitor, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Monitor Commands
Debug Commands
5. Hybrid OpenFlow Switch
5.1. In This Chapter
5.2. Hybrid OpenFlow Switching
5.2.1. Redundant Controllers and Multiple Switch Instances
5.2.2. GRT-only and Multi-Service H-OFS Mode of Operations
5.2.2.1. Port and VLAN ID Match in Flow Table Entries
5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.2.4. Hybrid OpenFlow Switch Statistics
5.2.5. OpenFlow Switch Auxiliary Channels
5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
5.2.6.1. SR OS H-OFS Logical Port
5.2.6.2. SR OS H-OFS Port and VLAN Encoding
5.2.6.3. Redirect to IP next-hop
5.2.6.4. Redirect to GRT Instance or VRF Instance
5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
5.2.6.6. Redirect to ESI (L2)
5.2.6.7. Redirect to ESI (L3)
5.2.6.8. Redirect to ESI IP VAS-Interface Router
5.2.6.9. Redirect to LSP
5.2.6.10. Redirect to NAT
5.2.6.11. Redirect to SAP
5.2.6.12. Redirect to SDP
5.2.6.13. Forward action
5.2.6.14. Drop action
5.2.6.15. Default no-match Action
5.2.6.16. Programming of DSCP Remark Action
5.3. Configuration Notes
OpenFlow Command Reference
Command Hierarchies
OpenFlow Commands
Show Commands
Tools Commands
Command Descriptions
Generic Commands
Show Commands
Debug Commands
6.
Cflowd
6.1. In This Chapter
6.2. Cflowd Overview
6.2.1. Operation
6.2.1.1. Version 8
6.2.1.2. Version 9
6.2.1.3. Version 10
6.2.2. Cflowd Filter Matching
6.3. Cflowd Configuration Process Overview
6.4. Configuration Notes
Configuring Cflowd with CLI
Cflowd Configuration Overview
Traffic Sampling
Collectors
Aggregation
Basic Cflowd Configuration
Common Configuration Tasks
Global Cflowd Components
Configuring Cflowd
Enabling Cflowd
Configuring Global Cflowd Parameters
Configuring Cflowd Collectors
Version 9 and Version 10 Templates
Enabling Cflowd on Interfaces and Filters
Specifying Cflowd Options on an IP Interface
Interface Configurations
Service Interfaces
Specifying Sampling Options in Filter Entries
Filter Configurations
Dependencies
Cflowd Configuration Management Tasks
Modifying Global Cflowd Components
Modifying Cflowd Collector Parameters
Cflowd Configuration Command Reference
Command Hierarchies
Command Descriptions
Global Commands
Show, Tools, and Clear Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. In This Chapter
1.3. Router Configuration Process
2.
IP Router Configuration
2.1. In This Chapter
2.2. Configuring IP Router Parameters
2.2.1. Interfaces
2.2.1.1. Network Interface
2.2.1.2. Network Domains
2.2.1.3. System Interface
2.2.1.4. Unicast Reverse Path Forwarding Check (uRPF)
2.2.1.5. Creating an IP Address Range
2.2.1.6. QoS Policy Propagation Using BGP (QPPB)
2.2.1.6.1. QPPB Applications
2.2.1.6.2. Inter-AS Coordination of QoS Policies
2.2.1.6.3. Traffic Differentiation Based on Route Characteristics
2.2.1.7. QPPB
2.2.1.7.1. Associating an FC and Priority with a Route
2.2.1.7.2. Displaying QoS Information Associated with Routes
2.2.1.7.3. Enabling QPPB on an IP interface
2.2.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
2.2.1.7.5. QPPB and Multiple Paths to a Destination
2.2.1.7.6. QPPB and Policy-Based Routing
2.2.1.8. QPPB and GRT Lookup
2.2.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
2.2.2. Router ID
2.2.3. Autonomous Systems (AS)
2.2.4. Confederations
2.2.5. Proxy ARP
2.2.6. Exporting an Inactive BGP Route from a VPRN
2.2.7. DHCP Relay
2.2.8. Internet Protocol Versions
2.2.8.1. IPv6 Address Format
2.2.8.2. IPv6 Applications
2.2.8.3. DNS
2.2.8.4. Secure Neighbor Discovery (SeND)
2.2.8.5. SeND Persistent CGAs
2.2.8.5.1. Persistent RSA Key Pair
2.2.8.5.2. Persistent CGA Modifier
2.2.8.5.3. Making non-persistent CGAs persistent
2.2.8.5.4. Booting from a saved configuration file
2.2.8.6. IPv6 Provider Edge Router over MPLS (6PE)
2.2.8.6.1. 6PE Control Plane Support
2.2.8.6.2. 6PE Data Plane Support
2.2.9. Static Route Resolution Using Tunnels
2.2.9.1. Static Route ECMP Support
2.3. Weighted Load-Balancing over MPLS LSP
2.3.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
2.3.1.1. Feature Configuration
2.3.1.2. Feature Behavior
2.3.1.3. ECMP Considerations
2.3.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
2.3.1.4.1. Feature Configuration
2.3.1.4.2. Feature Behavior
2.3.2. Bi-directional Forwarding Detection
2.3.2.1. BFD Control Packet
2.3.2.2. Control Packet Format
2.3.2.3. BFD for RSVP-TE
2.3.2.4. Echo Support
2.3.2.5. BFD Support for BGP
2.3.2.6. Centralized BFD
2.3.2.6.1. IES Over Spoke SDP
2.3.2.6.2. BFD Over LAG and VSM Interfaces
2.3.2.7. Aggregate Next Hop
2.3.2.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
2.3.2.8.1. Invalidate Next-Hop Based on IPV4 ARP
2.3.2.8.2. Invalidate Next-Hop Based on Neighbor Cache State
2.3.2.9. LDP Shortcut for IGP Route Resolution
2.3.2.9.1. IGP Route Resolution
2.3.2.9.2. LDP-IGP Synchronization
2.3.2.9.3. LDP Shortcut Forwarding Plane
2.3.2.9.4. ECMP Considerations
2.3.2.9.5. Handling of Control Packets
2.3.2.9.6. Handling of Multicast Packets
2.3.2.9.7. Interaction with BGP Route Resolution to an LDP FEC
2.3.2.9.8. Interaction with Static Route Resolution to an LDP FEC
2.3.2.9.9. LDP Control Plane
2.4. Weighted Load-Balancing over Interface Next-hops
2.5. GRE Tunnel Overview
2.5.1. Sample GRE Tunnel Configurations
2.6. Process Overview
2.7. Configuration Notes
Configuring an IP Router with CLI
Router Configuration Overview
System Interface
Network Interface
Basic Configuration
Common Configuration Tasks
Configuring a System Name
Configuring Interfaces
Configuring a System Interface
Configuring a Network Interface
Configuring IPv6 Parameters
Configuring IPv6 Over IPv4 Parameters
Tunnel Ingress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Tunnel Egress Node
Learning the Tunnel Endpoint IPv4 System Address
Configuring an IPv4 BGP Peer
An Example of a IPv6 Over IPv4 Tunnel Configuration
Router Advertisement
Configuring IPv6 Parameters
An Example of a IPv6 Over IPv4 Tunnel Configuration
Configuring Proxy ARP
Creating an IP Address Range
Deriving the Router ID
Configuring a Confederation
Configuring an Autonomous System
Configuring Overload State on a Single SFM
Service Management Tasks
Changing the System Name
Modifying Interface Parameters
Deleting a Logical IP Interface
IP Router Configuration Command Reference
Command Hierarchies
Router Commands
Router BFD commands
Router L2TP Commands
Router Interface Commands
Router Interface IPv6 Commands
Router Advertisement Commands
Command Descriptions
Generic Commands
Router Global Commands
Router L2TP Commands
Router L2TP Tunnel Commands
Router Interface Commands
Router Interface Filter Commands
Router Interface ICMP Commands
Router Interface IPv6 Commands
Router Interface DHCP Commands
Router Advertisement Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
L2TP Show Commands
Clear Commands
Debug Commands
Tools Commands
3.
VRRP
3.1. In This Chapter
3.2. VRRP Overview
3.3. VRRP Components
3.3.1. Virtual Router
3.3.2. IP Address Owner
3.3.3. Primary and Secondary IP Addresses
3.3.4. Virtual Router Master
3.3.5. Virtual Router Backup
3.3.6. Owner and Non-Owner VRRP
3.3.7. Configurable Parameters
3.3.7.1. Virtual Router ID (VRID)
3.3.7.2. Priority
3.3.7.3. IP Addresses
3.3.7.4. Message Interval and Master Inheritance
3.3.7.5. Skew Time
3.3.7.6. Master Down Interval
3.3.7.7. Preempt Mode
3.3.7.8. VRRP Message Authentication
3.3.7.8.1. Authentication Type 0 – No Authentication
3.3.7.8.2. Authentication Type 1 – Simple Text Password
3.3.7.8.3. Authentication Failure
3.3.7.9. Authentication Data
3.3.7.10. Virtual MAC Address
3.3.7.11. VRRP Advertisement Message IP Address List Verification
3.3.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
3.3.7.13. IPv6 Virtual Router Instance Operationally Up
3.3.7.14. Policies
3.4. VRRP Priority Control Policies
3.4.1. VRRP Virtual Router Policy Constraints
3.4.2. VRRP Virtual Router Instance Base Priority
3.4.3. VRRP Priority Control Policy Delta In-Use Priority Limit
3.4.4. VRRP Priority Control Policy Priority Events
3.4.4.1. Priority Event Hold-Set Timers
3.4.4.2. Port Down Priority Event
3.4.4.3. LAG Degrade Priority Event
3.4.4.4. Host Unreachable Priority Event
3.4.4.5. Route Unknown Priority Event
3.5. VRRP Non-Owner Accessibility
3.5.1. Non-Owner Access Ping Reply
3.5.2. Non-Owner Access Telnet
3.5.3. Non-Owner Access SSH
3.6. VRRP Configuration Process Overview
3.7. Configuration Notes
3.7.1. General
Configuring VRRP with CLI
VRRP Configuration Overview
Preconfiguration Requirements
Basic VRRP Configurations
VRRP Policy
VRRP IES Service Parameters
Configure VRRP for IPv6
VRRP Router Interface Parameters
Common Configuration Tasks
Creating Interface Parameters
Configuring VRRP Policy Components
Configuring Service VRRP Parameters
Non-Owner VRRP Example
Owner Service VRRP
Configuring Router Interface VRRP Parameters
Router Interface VRRP Non-Owner
Router Interface VRRP Owner
VRRP Configuration Management Tasks
Modifying a VRRP Policy
Deleting a VRRP Policy
Modifying Service and Interface VRRP Parameters
Modifying Non-Owner Parameters
Modifying Owner Parameters
Deleting VRRP on an Interface or Service
VRRP Configuration Command Reference
Command Hierarchies
IPv4 Interface VRRP Commands
Router Interface Commands
IPv6 Interface VRRP Commands
Priority Control Event Policy Commands
Command Descriptions
Interface Configuration Commands
Priority Policy Commands
Priority Policy Event Commands
Priority Policy Port Down Event Commands
Priority Policy LAG Events Commands
Priority Policy Host Unreachable Event Commands
Priority Policy Route Unknown Event Commands
Show, Monitor, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Monitor Commands
Clear Commands
Debug Commands
4.
Filter Policies
4.1. In This Chapter
4.2. ACL Filter Policy Overview
4.2.1. Filter Policy Basics
4.2.1.1. Filter Policy Packet Match Criteria
4.2.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
4.2.1.3. MAC Filter Policy Entry Match Criteria
4.2.1.4. Filter Policy Actions
4.2.1.5. Filter Policy Statistics
4.2.1.6. Filter Policy Logging
4.2.1.7. Filter Policy cflowd Sampling
4.2.1.8. Filter Policy Management
4.2.1.8.1. Modifying Existing Filter Policy
4.2.1.8.2. Filter Policy Copy and Renumbering
4.2.2. Filter Policy Advanced Topics
4.2.2.1. Match-list for Filter Policies
4.2.2.1.1. Auto-generation of Filter-policy Address Prefix Match Lists
4.2.2.2. Embedded Filters
4.2.2.3. System-level IPv4/IPv6 Line Card Filter Policy
4.2.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
4.2.2.5. Extended Action for Performing Two Actions at a Time
4.2.2.6. Destination MAC Rewrite when Deploying Policy-Based Forwarding
4.2.2.7. Network-port VPRN Filter Policy
4.2.2.8. ISID MAC Filters
4.2.2.9. VID MAC filters
4.2.2.9.1. Arbitrary Bit Matching of VID Filters
4.2.2.9.2. Port Group Configuration Example
4.2.2.10. Redirect Policies
4.2.2.10.1. Router Instance Support for Redirect Policies
4.2.2.11. HTTP-redirect (Captive Portal)
4.2.2.11.1. Traffic Flow
4.2.2.12. Filter Policies and Dynamic Policy-Driven Interfaces
4.2.2.13. Filter Policy-based ESM Service Chaining
4.2.2.14. Policy-Based Forwarding for Deep Packet Inspection in VPLS
Filter Configuration Command Reference
Command Hierarchies
IPv4 Filter Policy Commands
IPv6 Filter Policy Commands
MAC Filter Commands
System Filter Policy Commands
Redirect Policy Configuration Commands
Match Filter List Commands
Log Filter Commands
Copy Filter Commands
Command Descriptions
Generic Commands
Global Filter Commands
Filter Log Commands
ACL Filter Policy Commands
General Filter Entry Commands
IP (v4/v6) Filter Entry Commands
Match List Configuration Commands
MAC Filter Entry Commands
MAC Filter Match Criteria
Policy and Entry Maintenance Commands
Redirect Policy Commands
Configuring Filter Policies with CLI
Common Configuration Tasks
Creating an IPv4 Filter Policy
IPv4 Filter Entry
Configuring the HTTP-Redirect Option
Cflowd Filter Sampling
Creating an IPv6 Filter Policy
Creating a MAC Filter Policy
MAC Filter Policy
MAC ISID Filter Policy
MAC VID Filter Policy
MAC Filter Entry
Creating a Match List for Filter Policies
Applying Filter Policies
Apply IP (v4/v6) and MAC Filter Policies to a Service
Applying (IPv4/v6) Filter Policies to a Network Port
Creating a Redirect Policy
Filter Management Tasks
Renumbering Filter Policy Entries
Modifying a Filter Policy
Deleting a Filter Policy
Modifying a Redirect Policy
Deleting a Redirect Policy
Copying Filter Policies
Show, Clear, Monitor, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Monitor Commands
Debug Commands
Tools Commands
Command Descriptions
Show Commands
Clear Commands
Monitor Commands
Debug Commands
5. Hybrid OpenFlow Switch
5.1. In This Chapter
5.2. Hybrid OpenFlow Switching
5.2.1. Redundant Controllers and Multiple Switch Instances
5.2.2. GRT-only and Multi-Service H-OFS Mode of Operations
5.2.2.1. Port and VLAN ID Match in Flow Table Entries
5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
5.2.4. Hybrid OpenFlow Switch Statistics
5.2.5. OpenFlow Switch Auxiliary Channels
5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
5.2.6.1. SR OS H-OFS Logical Port
5.2.6.2. SR OS H-OFS Port and VLAN Encoding
5.2.6.3. Redirect to IP next-hop
5.2.6.4. Redirect to GRT Instance or VRF Instance
5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
5.2.6.6. Redirect to ESI (L2)
5.2.6.7. Redirect to ESI (L3)
5.2.6.8. Redirect to ESI IP VAS-Interface Router
5.2.6.9. Redirect to LSP
5.2.6.10. Redirect to NAT
5.2.6.11. Redirect to SAP
5.2.6.12. Redirect to SDP
5.2.6.13. Forward action
5.2.6.14. Drop action
5.2.6.15. Default no-match Action
5.2.6.16. Programming of DSCP Remark Action
5.3. Configuration Notes
OpenFlow Command Reference
Command Hierarchies
OpenFlow Commands
Show Commands
Tools Commands
Command Descriptions
Generic Commands
Show Commands
Debug Commands
6.
Cflowd
6.1. In This Chapter
6.2. Cflowd Overview
6.2.1. Operation
6.2.1.1. Version 8
6.2.1.2. Version 9
6.2.1.3. Version 10
6.2.2. Cflowd Filter Matching
6.3. Cflowd Configuration Process Overview
6.4. Configuration Notes
Configuring Cflowd with CLI
Cflowd Configuration Overview
Traffic Sampling
Collectors
Aggregation
Basic Cflowd Configuration
Common Configuration Tasks
Global Cflowd Components
Configuring Cflowd
Enabling Cflowd
Configuring Global Cflowd Parameters
Configuring Cflowd Collectors
Version 9 and Version 10 Templates
Enabling Cflowd on Interfaces and Filters
Specifying Cflowd Options on an IP Interface
Interface Configurations
Service Interfaces
Specifying Sampling Options in Filter Entries
Filter Configurations
Dependencies
Cflowd Configuration Management Tasks
Modifying Global Cflowd Components
Modifying Cflowd Collector Parameters
Cflowd Configuration Command Reference
Command Hierarchies
Command Descriptions
Global Commands
Show, Tools, and Clear Command Reference
Command Hierarchies
Show Commands
Tools Commands
Clear Commands
Command Descriptions
Show Commands
Tools Commands
Clear Commands
7. Standards and Protocol Support
Customer Document and Product Support
Services Overview Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
Services Overview
2.1. In This Chapter
2.2. Introduction
2.2.1. Service Types
2.2.2. Service Policies
2.2.2.1. Multipoint Shared Queuing
2.2.2.1.1. Ingress Queuing Modes of Operation
2.2.2.1.2. Ingress Service Queuing
2.2.2.1.3. Ingress Shared Queuing
2.2.2.1.4. Ingress Multipoint Shared Queuing
2.3. Nokia Service Model
2.4. Service Entities
2.4.1. Customers
2.4.2. Service Access Points (SAPs)
2.4.2.1. SAP Encapsulation Types and Identifiers
2.4.2.2. Ethernet Encapsulations
2.4.2.3. Default SAP on a Dot1q Port
2.4.2.4. QinQ SAPs
2.4.2.5. Services and SAP Encapsulations
2.4.2.6. SAP Configuration Considerations
2.4.2.7. G.8032 Protected Ethernet Rings
2.4.2.8. SAP Bandwidth CAC
2.4.2.8.1. CAC Enforcement
2.4.3. Connection Profile VLAN SAPs
2.4.3.1. Using connection-profile-vlan in Dot1q Ports
2.4.3.2. Using connection-profile-vlan in QinQ Ports
2.4.4. Service Distribution Points
2.4.4.1. SDP Binding
2.4.4.2. Spoke and Mesh SDPs
2.4.4.3. SDP Using BGP Route Tunnel
2.4.4.4. SDP Keepalives
2.4.4.5. SDP Administrative Groups
2.4.4.6. SDP Selection Rules
2.4.4.7. Class-Based Forwarding
2.4.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.4.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.4.5. SAP & MPLS Binding Loopback with MAC Swap
2.5. Multi-Service Sites
2.6. G.8031 Protected Ethernet Tunnels
2.6.1. OAM Considerations
2.6.2. QoS Considerations
2.6.3. Mirroring and Lawful Intercept Considerations
2.6.4. Support Service and Solution Combinations
2.6.5. LAG Emulation using Ethernet Tunnels
2.7. G.8032 Ethernet Ring Protection Switching
2.7.1. Overview of G.8032 Operation
2.7.2. Ethernet Ring Sub-Rings
2.7.2.1. Virtual and Non-Virtual Channel
2.7.2.2. Lag Support
2.7.3. OAM Considerations
2.7.4. Support Service and Solution Combinations
2.8. Internal Objects Created for L2TP and NAT
2.9. Ethernet Unnumbered Interfaces
2.10. Service Creation Process Overview
2.11. Deploying and Provisioning Services
2.11.1. Phase 1: Core Network Construction
2.11.2. Phase 2: Service Administration
2.11.3. Phase 3: Service Provisioning
2.12. Configuration Notes
2.12.1. General
Configuring Global Service Entities with CLI
Service Model Entities
Basic Configuration
Common Configuration Tasks
Configuring Customers
Customer Information
Configuring Multi-Service-Sites
Configuring an SDP
SDP Configuration Tasks
Configuring an SDP
Configuring a Mixed-LSP SDP
Ethernet Connectivity Fault Management (ETH-CFM)
Facility MEPs
Common Actionable Failures
General Detection, Processing and Reaction
Port-Based MEP
LAG Based MEP
Tunnel Based MEP
Router Interface MEP
Hardware Support
ETH-CFM and MC-LAG
ETH-CFM and MC-LAG Default Behavior
Linking ETH-CFM to MC-LAG State
ETH-CFM Features
CCM Hold Timers
CCM Interval
MEP and MIP Support
Configuring ETH-CFM Parameters
Service Management Tasks
Modifying Customer Accounts
Deleting Customers
Modifying SDPs
Deleting SDPs
Global Services Configuration Command Reference
Command Hierarchies
Customer Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire (PW) Commands
PW Port Commands
SDP Commands
SAP Commands
Ethernet Ring Commands
ETH CFM Configuration Commands
ETH Tunnel Commands
Connection Profile VLAN Commands
Command Descriptions
Generic Commands
Customer Management Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire Commands
SDP Commands
Ethernet Ring Commands
ETH CFM Configuration Commands
Port and LAG ETH CFM Commands
ETH-Tunnel Commands
Connection Profile VLAN Commands
Tools Perform Commands
Tools Dump Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Tools Perform Commands
Tools Dump Commands
Command Descriptions
Service Commands
Connection Profile VLAN Commands
ETH-CFM Show Commands
3.
Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.1.1. Audience
2.
Services Overview
2.1. In This Chapter
2.2. Introduction
2.2.1. Service Types
2.2.2. Service Policies
2.2.2.1. Multipoint Shared Queuing
2.2.2.1.1. Ingress Queuing Modes of Operation
2.2.2.1.2. Ingress Service Queuing
2.2.2.1.3. Ingress Shared Queuing
2.2.2.1.4. Ingress Multipoint Shared Queuing
2.3. Nokia Service Model
2.4. Service Entities
2.4.1. Customers
2.4.2. Service Access Points (SAPs)
2.4.2.1. SAP Encapsulation Types and Identifiers
2.4.2.2. Ethernet Encapsulations
2.4.2.3. Default SAP on a Dot1q Port
2.4.2.4. QinQ SAPs
2.4.2.5. Services and SAP Encapsulations
2.4.2.6. SAP Configuration Considerations
2.4.2.7. G.8032 Protected Ethernet Rings
2.4.2.8. SAP Bandwidth CAC
2.4.2.8.1. CAC Enforcement
2.4.3. Connection Profile VLAN SAPs
2.4.3.1. Using connection-profile-vlan in Dot1q Ports
2.4.3.2. Using connection-profile-vlan in QinQ Ports
2.4.4. Service Distribution Points
2.4.4.1. SDP Binding
2.4.4.2. Spoke and Mesh SDPs
2.4.4.3. SDP Using BGP Route Tunnel
2.4.4.4. SDP Keepalives
2.4.4.5. SDP Administrative Groups
2.4.4.6. SDP Selection Rules
2.4.4.7. Class-Based Forwarding
2.4.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
2.4.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
2.4.5. SAP & MPLS Binding Loopback with MAC Swap
2.5. Multi-Service Sites
2.6. G.8031 Protected Ethernet Tunnels
2.6.1. OAM Considerations
2.6.2. QoS Considerations
2.6.3. Mirroring and Lawful Intercept Considerations
2.6.4. Support Service and Solution Combinations
2.6.5. LAG Emulation using Ethernet Tunnels
2.7. G.8032 Ethernet Ring Protection Switching
2.7.1. Overview of G.8032 Operation
2.7.2. Ethernet Ring Sub-Rings
2.7.2.1. Virtual and Non-Virtual Channel
2.7.2.2. Lag Support
2.7.3. OAM Considerations
2.7.4. Support Service and Solution Combinations
2.8. Internal Objects Created for L2TP and NAT
2.9. Ethernet Unnumbered Interfaces
2.10. Service Creation Process Overview
2.11. Deploying and Provisioning Services
2.11.1. Phase 1: Core Network Construction
2.11.2. Phase 2: Service Administration
2.11.3. Phase 3: Service Provisioning
2.12. Configuration Notes
2.12.1. General
Configuring Global Service Entities with CLI
Service Model Entities
Basic Configuration
Common Configuration Tasks
Configuring Customers
Customer Information
Configuring Multi-Service-Sites
Configuring an SDP
SDP Configuration Tasks
Configuring an SDP
Configuring a Mixed-LSP SDP
Ethernet Connectivity Fault Management (ETH-CFM)
Facility MEPs
Common Actionable Failures
General Detection, Processing and Reaction
Port-Based MEP
LAG Based MEP
Tunnel Based MEP
Router Interface MEP
Hardware Support
ETH-CFM and MC-LAG
ETH-CFM and MC-LAG Default Behavior
Linking ETH-CFM to MC-LAG State
ETH-CFM Features
CCM Hold Timers
CCM Interval
MEP and MIP Support
Configuring ETH-CFM Parameters
Service Management Tasks
Modifying Customer Accounts
Deleting Customers
Modifying SDPs
Deleting SDPs
Global Services Configuration Command Reference
Command Hierarchies
Customer Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire (PW) Commands
PW Port Commands
SDP Commands
SAP Commands
Ethernet Ring Commands
ETH CFM Configuration Commands
ETH Tunnel Commands
Connection Profile VLAN Commands
Command Descriptions
Generic Commands
Customer Management Commands
MRP Commands
Service System Commands
Oper Group Commands
Pseudowire Commands
SDP Commands
Ethernet Ring Commands
ETH CFM Configuration Commands
Port and LAG ETH CFM Commands
ETH-Tunnel Commands
Connection Profile VLAN Commands
Tools Perform Commands
Tools Dump Commands
Show, Clear, Debug, and Tools Command Reference
Command Hierarchies
Show Commands
Tools Perform Commands
Tools Dump Commands
Command Descriptions
Service Commands
Connection Profile VLAN Commands
ETH-CFM Show Commands
3.
Common CLI Command Descriptions
3.1. In This Chapter
3.1.1. Common Service Commands
3.1.1.1. SAP Commands
4. Standards and Protocol Support
Customer Document and Product Support
System Management Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Security
2.1. In This Chapter
2.2. Authentication, Authorization, and Accounting
2.2.1. Authentication
2.2.1.1. Local Authentication
2.2.1.2. RADIUS Authentication
2.2.1.2.1. RADIUS Server Selection
2.2.1.3. TACACS+ Authentication
2.2.1.4. LDAP Authentication
2.2.1.4.1. LDAP Authentication Process
2.2.1.4.2. Authentication Order
2.2.1.4.3. LDAP Authentication via Password
2.2.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.2.1.4.5. TLS Behavior and LDAP
2.2.1.4.6. LDAP Health Check
2.2.1.4.7. LDAP Redundancy and TLS
2.2.2. Authorization
2.2.2.1. Local Authorization
2.2.2.2. RADIUS Authorization
2.2.2.3. TACACS+ Authorization
2.2.2.3.1. Examples
2.2.3. Accounting
2.2.3.1. RADIUS Accounting
2.2.3.2. TACACS+ Accounting
2.3. Security Controls
2.3.1. When a Server Does Not Respond
2.3.2. Access Request Flow
2.4. Centralized CPU Protection
2.4.1. CPU Protection Extensions for ETH-CFM
2.4.2. ETH-CFM Ingress Squelching
2.5. Distributed CPU Protection (DCP)
2.5.1. Applicability of Distributed CPU Protection
2.5.2. Log Events, Statistics, Status and SNMP support
2.5.3. DCP Policer Resource Management
2.5.4. Operational Guidelines and Tips
2.6. Classification-Based Priority for Extracted Protocol Traffic
2.7. Vendor-Specific Attributes (VSAs)
2.8. Other Security Features
2.8.1. Secure Shell (SSH)
2.8.2. SSH PKI Authentication
2.8.2.1. Key Generation
2.8.3. Per Peer CPM Queuing
2.8.4. CPM Filters and Traffic Management
2.8.5. TTL Security for BGP and LDP
2.8.6. Exponential Login Backoff
2.8.7. User Lockout
2.8.8. 802.1x Network Access Control
2.8.9. TCP Enhanced Authentication Option
2.8.9.1. Packet Formats
2.8.9.2. Keychain
2.9. Configuration Notes
2.9.1. General
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Configuration Tasks
Security Configuration Procedures
Configuring Management Access Filters
Configuring IP CPM Filters Policy
Configuring MAC CPM Filters
Configuring IPv6 CPM Filters
Configuring CPM Queues
IPSec Certificates Parameters
Configuring Profiles
Parameters
Wildcards
CLI Session Resource Management
Configuring Users
Configuring Keychains
Copying and Overwriting Users and Profiles
User
Profile
RADIUS Configurations
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
TACACS+ Configurations
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Enabling SSH
LDAP Configurations
Configuring LDAP Authentication
Configuring Redundant Servers
Enabling SSH
Configuring Login Controls
Security Configuration Command Reference
Command Hierarchies
Security Commands
LLDP Commands
Management Access Filter Commands
CLI Script Authorization Commands
CPM Filter Commands
CPM Queue Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Password Commands
Public Key Infrastructure (PKI) Commands
Profile Commands
CLI Session Commands
RADIUS Commands
SSH Commands
TACPLUS Commands
LDAP Commands
User Commands
User Template Commands
Dot1x Commands
Keychain Commands
TTL Security Commands
Login Control Commands
Command Descriptions
General Security Commands
LLDP Commands
Login, Telnet, SSH and FTP Commands
Management Access Filter Commands
Password Commands
Public Key Infrastructure (PKI) Commands
Profile Management Commands
User Management Commands
CLI Session Management Commands
RADIUS Client Commands
TACACS+ Client Commands
LDAP Client Commands
Generic 802.1x COMMANDS
Keychain Authentication
CLI Script Commands
CPM Filter Commands
CPM Queue Commands
TTL Security Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Show, Clear, Debug, Tools, and Admin Command Reference
Command Hierarchies
Show Commands
Security
Login Control
Clear Commands
Debug Commands
Tools Commands
Admin Commands
Command Descriptions
Show Commands
Security Commands
Login Control
Clear Commands
CPU Protection Commands
Debug Commands
Tools Commands
Admin Commands
3. SNMP
3.1. In This Chapter
3.2. SNMP Overview
3.2.1. SNMP Architecture
3.2.2. Management Information Base
3.2.3. SNMP Protocol Operations
3.2.4. SNMP Versions
3.2.5. Management Information Access Control
3.2.6. User-Based Security Model Community Strings
3.2.7. Views
3.2.8. Access Groups
3.2.9. Users
3.2.10. Per-VPRN Logs and SNMP Access
3.2.11. Per-SNMP Community Source IP Address Validation
3.3. Which SNMP Version to Use?
3.4. Configuration Notes
3.4.1. General
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Configuration Command Reference
Command Hierarchies
SNMP System Commands
SNMP Security Commands
Command Descriptions
SNMP System Commands
SNMP Security Commands
SNMP Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
4. NETCONF
4.1. In This Chapter
4.2. NETCONF Overview
4.3. NETCONF in the SR OS
4.3.1. YANG Data Models
4.3.2. Transport and Sessions
4.3.3. Datastores and URLs
4.3.4. NETCONF Operations and Capabilities
4.3.4.1. <get>
4.3.4.2. <get-config>
4.3.4.3. <edit-config>
4.3.4.4. <copy-config> and <delete-config>
4.3.4.5. <lock>
4.3.4.6. <unlock>
4.3.4.7. <commit>
4.3.4.8. <discard-changes>
4.3.4.9. <validate>
4.3.5. Data Model, Datastore and Operation Combinations
4.3.6. General NETCONF Behavior
4.3.6.1. System-Provisioned Configuration (SPC) Objects
4.4. Establishing a NETCONF Session
4.5. XML Content Layer
4.5.1. <get> with XML Content Layer
4.5.2. <edit-config> with XML Content Layer
4.5.3. <get-config> with XML Content Layer
4.6. XML Content Layer Examples
4.7. CLI Content Layer
4.8. CLI Content Layer Examples
NETCONF Configuration Command Reference
Command Hierarchies
NETCONF System Commands
NETCONF Security Commands
Configuration Commands
NETCONF System Commands
NETCONF Security Commands
NETCONF Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF System Commands
NETCONF Admin Command Reference
Command Hierarchies
Admin Commands
Command Descriptions
Admin Commands
5. Event and Accounting Logs
5.1. In This Chapter
5.2. Logging Overview
5.3. Log Destinations
5.3.1. Console
5.3.2. Session
5.3.3. Memory Logs
5.3.4. Log Files
5.3.5. SNMP Trap Group
5.3.6. Syslog
5.4. Event Logs
5.4.1. Event Sources
5.4.2. Event Control
5.4.3. Log Manager and Event Logs
5.4.4. Event Filter Policies
5.4.5. Event Log Entries
5.4.6. Simple Logger Event Throttling
5.4.7. Default System Log
5.4.8. Event Handling System
5.5. Accounting Logs
5.5.1. Accounting Records
5.5.2. Accounting Files
5.5.3. Design Considerations
5.5.4. Reporting and Time-Based Accounting
5.5.5. Overhead Reduction in Accounting: Custom Record
5.5.5.1. User Configurable Records
5.5.5.2. Changed Statistics Only
5.5.5.3. Configurable Accounting Records
5.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
5.5.5.3.2. RADIUS Accounting in Networks Using ESM
5.5.5.4. Significant Change Only Reporting
5.5.6. Immediate Completion of Records
5.5.6.1. Record Completion for XML Accounting
5.5.7. AA Accounting per Forwarding Class
5.6. Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Types
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control
Configuring a Log Filter
Configuring an SNMP Trap Group
Setting the Replay Parameter
Shutdown In-Band Port
No Shutdown Port
Configuring a Syslog Target
Configuring an Accounting Custom Record
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Modifying a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Configuration Command Reference
Command Hierarchies
Log Configuration Commands
Accounting Policy Commands
Custom Record Commands
File ID Commands
Event Filter Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Log ID Commands
SNMP Trap Group Commands
Syslog Commands
Command Descriptions
Generic Commands
Log Configuration Commands
File ID Commands
Log Filter Commands
Log Filter Entry Commands
Log Filter Entry Match Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Syslog Commands
SNMP Trap Groups
Accounting Policy Commands
Accounting Policy Custom Record Commands
Log Command Reference
Command Hierarchies
Show Commands
Clear Command
Command Descriptions
Show Commands
Clear Commands
6. sFlow
6.1. In This Chapter
6.2. sFlow Overview
6.3. sFlow Features
6.3.1. sFlow Counter Polling Architecture
6.3.2. sFlow Support on Logical Ethernet Ports
6.3.3. sFlow SAP Counter Map
6.3.4. sFlow Record Formats
sFlow Command Reference
Command Hierarchies
System Commands
Show Commands
sFlow Configuration Command Descriptions
Command Descriptions
System Commands
sFlow Show Command Descriptions
Command Descriptions
Show Commands
7. TLS
7.1. In This Chapter
7.2. TLS Overview
7.3. Supported TLS Ciphers
7.4. SR OS Certificate Management
7.5. Operational Guidelines
7.5.1. Server Authentication Behavior
7.5.2. Client TLS Profile and Trust Anchor Behavior and Scale
7.6. LDAP Redundancy and TLS
Configuring TLS with CLI
Basic TLS Configuration
Common Configuration Tasks
Configuring a Client TLS Profile
Configuring a TLS Client Certificate
Configuring a TLS Trust Anchor
TLS Command Reference
Command Hierarchies
Security TLS Commands
LDAP TLS Profile Commands
Admin Commands
Command Descriptions
Security TLS Commands
LDAP TLS Profile Commands
Admin Commands
TLS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
8. Facility Alarms
8.1. In This Chapter
8.2. Facility Alarms Overview
8.3. Facility Alarms vs. Log Events
8.4. Facility Alarm Severities and Alarm LED Behavior
8.5. Facility Alarm Hierarchy
8.6. Facility Alarm List
Configuring Logging with CLI
Basic Facility Alarm Configuration
Common Configuration Tasks
Configuring the Maximum Number of Alarms To Clear
Facility Alarms Configuration Command Reference
Command Hierarchies
Facility Alarm Configuration Commands
Command Descriptions
Generic Commands
Facility Alarms Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
9. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. Security
2.1. In This Chapter
2.2. Authentication, Authorization, and Accounting
2.2.1. Authentication
2.2.1.1. Local Authentication
2.2.1.2. RADIUS Authentication
2.2.1.2.1. RADIUS Server Selection
2.2.1.3. TACACS+ Authentication
2.2.1.4. LDAP Authentication
2.2.1.4.1. LDAP Authentication Process
2.2.1.4.2. Authentication Order
2.2.1.4.3. LDAP Authentication via Password
2.2.1.4.4. Timeout and Retry Configuration for the LDAP Server
2.2.1.4.5. TLS Behavior and LDAP
2.2.1.4.6. LDAP Health Check
2.2.1.4.7. LDAP Redundancy and TLS
2.2.2. Authorization
2.2.2.1. Local Authorization
2.2.2.2. RADIUS Authorization
2.2.2.3. TACACS+ Authorization
2.2.2.3.1. Examples
2.2.3. Accounting
2.2.3.1. RADIUS Accounting
2.2.3.2. TACACS+ Accounting
2.3. Security Controls
2.3.1. When a Server Does Not Respond
2.3.2. Access Request Flow
2.4. Centralized CPU Protection
2.4.1. CPU Protection Extensions for ETH-CFM
2.4.2. ETH-CFM Ingress Squelching
2.5. Distributed CPU Protection (DCP)
2.5.1. Applicability of Distributed CPU Protection
2.5.2. Log Events, Statistics, Status and SNMP support
2.5.3. DCP Policer Resource Management
2.5.4. Operational Guidelines and Tips
2.6. Classification-Based Priority for Extracted Protocol Traffic
2.7. Vendor-Specific Attributes (VSAs)
2.8. Other Security Features
2.8.1. Secure Shell (SSH)
2.8.2. SSH PKI Authentication
2.8.2.1. Key Generation
2.8.3. Per Peer CPM Queuing
2.8.4. CPM Filters and Traffic Management
2.8.5. TTL Security for BGP and LDP
2.8.6. Exponential Login Backoff
2.8.7. User Lockout
2.8.8. 802.1x Network Access Control
2.8.9. TCP Enhanced Authentication Option
2.8.9.1. Packet Formats
2.8.9.2. Keychain
2.9. Configuration Notes
2.9.1. General
Configuring Security with CLI
Setting Up Security Attributes
Configuring Authentication
Configuring Authorization
Configuring Accounting
Security Configurations
Configuration Tasks
Security Configuration Procedures
Configuring Management Access Filters
Configuring IP CPM Filters Policy
Configuring MAC CPM Filters
Configuring IPv6 CPM Filters
Configuring CPM Queues
IPSec Certificates Parameters
Configuring Profiles
Parameters
Wildcards
CLI Session Resource Management
Configuring Users
Configuring Keychains
Copying and Overwriting Users and Profiles
User
Profile
RADIUS Configurations
Configuring RADIUS Authentication
Configuring RADIUS Authorization
Configuring RADIUS Accounting
Configuring 802.1x RADIUS Policies
TACACS+ Configurations
Enabling TACACS+ Authentication
Configuring TACACS+ Authorization
Configuring TACACS+ Accounting
Enabling SSH
LDAP Configurations
Configuring LDAP Authentication
Configuring Redundant Servers
Enabling SSH
Configuring Login Controls
Security Configuration Command Reference
Command Hierarchies
Security Commands
LLDP Commands
Management Access Filter Commands
CLI Script Authorization Commands
CPM Filter Commands
CPM Queue Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Password Commands
Public Key Infrastructure (PKI) Commands
Profile Commands
CLI Session Commands
RADIUS Commands
SSH Commands
TACPLUS Commands
LDAP Commands
User Commands
User Template Commands
Dot1x Commands
Keychain Commands
TTL Security Commands
Login Control Commands
Command Descriptions
General Security Commands
LLDP Commands
Login, Telnet, SSH and FTP Commands
Management Access Filter Commands
Password Commands
Public Key Infrastructure (PKI) Commands
Profile Management Commands
User Management Commands
CLI Session Management Commands
RADIUS Client Commands
TACACS+ Client Commands
LDAP Client Commands
Generic 802.1x COMMANDS
Keychain Authentication
CLI Script Commands
CPM Filter Commands
CPM Queue Commands
TTL Security Commands
CPU Protection Commands
Distributed CPU Protection Commands
Extracted Protocol Traffic Priority Commands
Security Show, Clear, Debug, Tools, and Admin Command Reference
Command Hierarchies
Show Commands
Security
Login Control
Clear Commands
Debug Commands
Tools Commands
Admin Commands
Command Descriptions
Show Commands
Security Commands
Login Control
Clear Commands
CPU Protection Commands
Debug Commands
Tools Commands
Admin Commands
3. SNMP
3.1. In This Chapter
3.2. SNMP Overview
3.2.1. SNMP Architecture
3.2.2. Management Information Base
3.2.3. SNMP Protocol Operations
3.2.4. SNMP Versions
3.2.5. Management Information Access Control
3.2.6. User-Based Security Model Community Strings
3.2.7. Views
3.2.8. Access Groups
3.2.9. Users
3.2.10. Per-VPRN Logs and SNMP Access
3.2.11. Per-SNMP Community Source IP Address Validation
3.3. Which SNMP Version to Use?
3.4. Configuration Notes
3.4.1. General
Configuring SNMP with CLI
SNMP Configuration Overview
Configuring SNMPv1 and SNMPv2c
Configuring SNMPv3
Basic SNMP Security Configuration
Configuring SNMP Components
Configuring a Community String
Configuring View Options
Configuring Access Options
Configuring USM Community Options
Configuring Other SNMP Parameters
SNMP Configuration Command Reference
Command Hierarchies
SNMP System Commands
SNMP Security Commands
Command Descriptions
SNMP System Commands
SNMP Security Commands
SNMP Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
4. NETCONF
4.1. In This Chapter
4.2. NETCONF Overview
4.3. NETCONF in the SR OS
4.3.1. YANG Data Models
4.3.2. Transport and Sessions
4.3.3. Datastores and URLs
4.3.4. NETCONF Operations and Capabilities
4.3.4.1. <get>
4.3.4.2. <get-config>
4.3.4.3. <edit-config>
4.3.4.4. <copy-config> and <delete-config>
4.3.4.5. <lock>
4.3.4.6. <unlock>
4.3.4.7. <commit>
4.3.4.8. <discard-changes>
4.3.4.9. <validate>
4.3.5. Data Model, Datastore and Operation Combinations
4.3.6. General NETCONF Behavior
4.3.6.1. System-Provisioned Configuration (SPC) Objects
4.4. Establishing a NETCONF Session
4.5. XML Content Layer
4.5.1. <get> with XML Content Layer
4.5.2. <edit-config> with XML Content Layer
4.5.3. <get-config> with XML Content Layer
4.6. XML Content Layer Examples
4.7. CLI Content Layer
4.8. CLI Content Layer Examples
NETCONF Configuration Command Reference
Command Hierarchies
NETCONF System Commands
NETCONF Security Commands
Configuration Commands
NETCONF System Commands
NETCONF Security Commands
NETCONF Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
NETCONF System Commands
NETCONF Admin Command Reference
Command Hierarchies
Admin Commands
Command Descriptions
Admin Commands
5. Event and Accounting Logs
5.1. In This Chapter
5.2. Logging Overview
5.3. Log Destinations
5.3.1. Console
5.3.2. Session
5.3.3. Memory Logs
5.3.4. Log Files
5.3.5. SNMP Trap Group
5.3.6. Syslog
5.4. Event Logs
5.4.1. Event Sources
5.4.2. Event Control
5.4.3. Log Manager and Event Logs
5.4.4. Event Filter Policies
5.4.5. Event Log Entries
5.4.6. Simple Logger Event Throttling
5.4.7. Default System Log
5.4.8. Event Handling System
5.5. Accounting Logs
5.5.1. Accounting Records
5.5.2. Accounting Files
5.5.3. Design Considerations
5.5.4. Reporting and Time-Based Accounting
5.5.5. Overhead Reduction in Accounting: Custom Record
5.5.5.1. User Configurable Records
5.5.5.2. Changed Statistics Only
5.5.5.3. Configurable Accounting Records
5.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
5.5.5.3.2. RADIUS Accounting in Networks Using ESM
5.5.5.4. Significant Change Only Reporting
5.5.6. Immediate Completion of Records
5.5.6.1. Record Completion for XML Accounting
5.5.7. AA Accounting per Forwarding Class
5.6. Configuration Notes
Configuring Logging with CLI
Log Configuration Overview
Log Types
Basic Event Log Configuration
Common Configuration Tasks
Configuring an Event Log
Configuring a File ID
Configuring an Accounting Policy
Configuring Event Control
Configuring a Log Filter
Configuring an SNMP Trap Group
Setting the Replay Parameter
Shutdown In-Band Port
No Shutdown Port
Configuring a Syslog Target
Configuring an Accounting Custom Record
Log Management Tasks
Modifying a Log File
Deleting a Log File
Modifying a File ID
Modifying a Syslog ID
Modifying an SNMP Trap Group
Deleting an SNMP Trap Group
Modifying a Log Filter
Modifying Event Control Parameters
Returning to the Default Event Control Configuration
Log Configuration Command Reference
Command Hierarchies
Log Configuration Commands
Accounting Policy Commands
Custom Record Commands
File ID Commands
Event Filter Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Log ID Commands
SNMP Trap Group Commands
Syslog Commands
Command Descriptions
Generic Commands
Log Configuration Commands
File ID Commands
Log Filter Commands
Log Filter Entry Commands
Log Filter Entry Match Commands
Event Handling System (EHS) Commands
Event Trigger Commands
Syslog Commands
SNMP Trap Groups
Accounting Policy Commands
Accounting Policy Custom Record Commands
Log Command Reference
Command Hierarchies
Show Commands
Clear Command
Command Descriptions
Show Commands
Clear Commands
6. sFlow
6.1. In This Chapter
6.2. sFlow Overview
6.3. sFlow Features
6.3.1. sFlow Counter Polling Architecture
6.3.2. sFlow Support on Logical Ethernet Ports
6.3.3. sFlow SAP Counter Map
6.3.4. sFlow Record Formats
sFlow Command Reference
Command Hierarchies
System Commands
Show Commands
sFlow Configuration Command Descriptions
Command Descriptions
System Commands
sFlow Show Command Descriptions
Command Descriptions
Show Commands
7. TLS
7.1. In This Chapter
7.2. TLS Overview
7.3. Supported TLS Ciphers
7.4. SR OS Certificate Management
7.5. Operational Guidelines
7.5.1. Server Authentication Behavior
7.5.2. Client TLS Profile and Trust Anchor Behavior and Scale
7.6. LDAP Redundancy and TLS
Configuring TLS with CLI
Basic TLS Configuration
Common Configuration Tasks
Configuring a Client TLS Profile
Configuring a TLS Client Certificate
Configuring a TLS Trust Anchor
TLS Command Reference
Command Hierarchies
Security TLS Commands
LDAP TLS Profile Commands
Admin Commands
Command Descriptions
Security TLS Commands
LDAP TLS Profile Commands
Admin Commands
TLS Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
8. Facility Alarms
8.1. In This Chapter
8.2. Facility Alarms Overview
8.3. Facility Alarms vs. Log Events
8.4. Facility Alarm Severities and Alarm LED Behavior
8.5. Facility Alarm Hierarchy
8.6. Facility Alarm List
Configuring Logging with CLI
Basic Facility Alarm Configuration
Common Configuration Tasks
Configuring the Maximum Number of Alarms To Clear
Facility Alarms Configuration Command Reference
Command Hierarchies
Facility Alarm Configuration Commands
Command Descriptions
Generic Commands
Facility Alarms Show Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
9. Standards and Protocol Support
Customer Document and Product Support
Triple Play Service Delivery Architecture R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2.
Introduction to Triple Play
2.1. In This Section
2.2. Nokia’s Triple Play Service Delivery Architecture
2.2.1. Introduction to Triple Play
2.2.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.2.3. Architectural Foundations
2.2.4. Optimizing Triple Play Service Infrastructures
2.2.4.1. Distributed Service Edges
2.2.4.2. Service Differentiation, QoS Enablement
2.2.4.3. Virtual MAC Subnetting for VPLS
2.3. Services
2.3.1. Service Types
2.3.2. Service Policies
2.4. Nokia Service Model
2.4.1. Introduction
2.4.2. Service Entities
2.4.3. Customers
2.4.4. Service Access Points (SAPs)
2.4.4.1. SAP Encapsulation Types and Identifiers
2.4.4.2. Ethernet Encapsulations
2.4.4.3. SAP Considerations
2.4.5. Service Distribution Points (SDPs)
2.4.5.1. SDP Binding
2.4.5.2. Spoke and Mesh SDPs
2.4.5.3. SDP Encapsulation Types
2.4.5.3.1. GRE
2.4.5.3.2. MPLS
2.4.5.4. SDP Keepalives
2.5. Epipe Service Overview
2.6. VPLS Service Overview
2.6.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.6.1.1. Residential Split Horizon Groups
2.7. IES Service Overview
2.7.1. IP Interface
2.8. VPRN Service Overview
2.9. Deploying and Provisioning Services
2.9.1. Phase 1: Core Network Construction
2.9.2. Phase 2: Service Administration
2.9.3. Phase 3: Service Provisioning
2.10. Configuration Notes
2.10.1. General
Configuring Triple Play Services with CLI
Configuring VPLS Residential Split Horizon Groups
Configuring Static Hosts
BNG Learning IP-Only Static Host’s MAC Address
Static Host Learning the IPv6 Default Gateway Address
Configuring Static Hosts on an VPLS SAP
Configuring Static Hosts on an IES SAP
Configuring Static Hosts on an VPRN SAP
Triple Play Services Command Reference
Command Hierarchies
IES Triple Play Commands
VPLS Triple Play Commands
Service DHCP and Anti-Spoof Filtering Commands
Triple Play ARP Commands
Triple Play Multicast Commands
Show Commands
Clear Commands
Tools Commands
Command Descriptions
Global Commands
Service Commands
SAP Commands
SAP Subscriber Management Commands
Triple Play Multicast Commands
VPLS SAP ATM Commands
Service DHCP and Anti-Spoof Filtering Commands
Filter and QoS Policy Commands
SDP Commands
DHCP Commands
Egress Multicast Group Commands
Interface Commands
Interface IPv6 Commands
Show Commands
IGMP Snooping Show Commands
Clear Commands
Debug Commands
Tools Commands
3.
DHCP Management
3.1. In This Chapter
3.2. DHCP Principles
3.3. DHCP Features
3.3.1. DHCP Relay
3.3.2. DHCPv4 Relay Proxy
3.3.3. Subscriber Identification Using Option 82 Field
3.3.3.1. Trusted and Untrusted
3.3.4. DHCP Snooping
3.3.5. DHCP Lease State Table
3.3.6. DHCP and Layer 3 Aggregation
3.3.6.1. DHCPv4 Snooping
3.3.6.2. DHCPv6 Snooping
3.3.7. Local DHCP Servers
3.3.7.1. Overview
3.3.7.2. Local DHCP Server Support
3.3.8. DHCPv6
3.3.8.1. DHCPv6 Relay Agent
3.3.8.2. DHCPv6 Prefix Options
3.3.8.3. Neighbor Resolution via DHCPv6 Relay
3.3.8.4. DHCPv6 Lease Persistency
3.3.8.5. Local Proxy Neighbor Discovery
3.3.8.6. IPv6oE Hosts Behind Bridged CPEs
3.3.8.7. IPv6 Link-Address Based Pool Selection
3.3.8.8. IPv6 Address/Prefix Stickiness
3.3.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.3.8.10. Host Connectivity Checks for IPv6
3.3.9. Lease Query
3.3.10. DHCPv6 to Server Option
3.3.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.3.12. DHCP Caching
3.3.13. Flexible Creation of DHCPv4/6 Host Parameters
3.3.14. Python DTC Variables and API
3.3.14.1. DTC Debugging Facility
3.3.15. Virtual Subnet for DHCPv4 Hosts
3.3.16. Address Reservation for Sticky Leases
3.4. Proxy DHCP Server
3.4.1. Local DHCP Servers
3.4.1.1. Terminology
3.4.1.2. Overview
3.4.1.3. DHCP Lease Synchronization
3.4.1.4. Intercommunication Link Failure Detection
3.4.1.5. DHCP Server Failover States
3.4.1.6. Lease Time Synchronization
3.4.1.7. Maximum Client Lead Time (MCLT)
3.4.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.4.1.9. Fast-Switchover of IP Address/Prefix Delegation
3.4.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.5. Local Address Assignment
3.5.1. Stateless Address Auto-configuration
Configuring DHCP with CLI
Common Configuration Tasks
Enabling DHCP Snooping
Configuring Option 82 Handling
Enabling DHCP Relay
Configuring Local User Database Parameters
Triple Play DHCP Command Reference
Command Hierarchies
Global DHCP Commands
Router DHCP Local User Database Commands
Service Commands
IES DHCP Commands
VPLS DHCP Commands
VPRN DHCP Commands
VPRN DHCP Subscriber Interface Commands
IES/VPRN IPv6-DHCP6 Commands
Local User Database Commands
IPoE Commands
PPP Commands
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Triple Play DHCP Configuration Commands
Global Commands
Global DHCP Commands
Router DHCP Commands
Service Commands
Local User Database Commands
Show Commands
Tools Commands
Clear Commands
Debug Commands
4. SLAAC
4.1. In This Chapter
4.2. Stateless Address Auto-configuration (SLAAC) Management
4.3. SLAAC Principles
4.4. Configuration Overview
4.5. Router-Solicit Trigger
4.6. SLAAC Address Assignment
4.7. Static SLAAC Prefix Assignment
4.8. Dynamic SLAAC Prefix Assignment
5.
Point-to-Point Protocol over Ethernet Management
5.1. In This Chapter
5.2. PPPoE
5.2.1. PPPoE Authentication and Authorization
5.2.1.1. General Flow
5.2.1.2. RADIUS
5.2.1.3. Local User Database Directly Assigned to PPPoE Node
5.2.1.4. Subscriber per PPPoE Session Index
5.2.1.5. Local DHCP Server with Local User Database
5.2.2. Multiple Sessions Per MAC Address
5.2.3. Private Retail Subnets
5.2.4. IPCP Subnet Negotiation
5.2.4.1. Numbered WAN Support for Layer 3 RGs
5.2.5. IES as Retail Service for PPPoE Host
5.2.6. Unnumbered PPPoX
5.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.3.1. Terminology
5.3.2. LNS MLPPPoX
5.3.3. MLPPP Encapsulation
5.3.4. MLPPPoX Negotiation
5.3.5. Enabling MLPPPoX
5.3.6. Link Fragmentation and Interleaving (LFI)
5.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.3.7. LFI Functionality Implemented in LNS
5.3.7.1. Last Mile QoS Awareness in the LNS
5.3.7.2. BB-ISA Processing
5.3.7.3. LNS-LAC Link
5.3.7.4. AN-RG Link
5.3.7.5. Home Link
5.3.7.6. Optimum Fragment Size Calculation by LNS
5.3.7.6.1. Encapsulation Based Fragment Size
5.3.7.6.2. Fragment Size Based on the Max Transmission Delay
5.3.7.6.3. Selection of the Optimum Fragment Length
5.3.8. Upstream Traffic Considerations
5.3.9. Multiple Links MLPPPoX With No Interleaving
5.3.10. MLPPPoX Session Support
5.3.11. Session Load Balancing Across Multiple BB-ISAs
5.3.12. BB-ISA Hashing Considerations
5.3.13. Last Mile Rate and Encapsulation Parameters
5.3.14. Link Failure Detection
5.3.15. CoA Support
5.3.16. Accounting
5.3.17. Filters and Mirroring
5.3.18. PTA Considerations
5.3.19. QoS Considerations
5.3.19.1. Dual-Pass
5.3.19.2. Traffic Prioritization in LFI
5.3.19.3. Shaping Based on the Last Mile Wire Rates
5.3.19.4. Downstream Bandwidth Management on Egress Port
5.3.20. Sub/Sla-Profile Considerations
5.3.21. Example of MLPPPoX Session Setup Flow
5.3.22. Other Considerations
5.4. Configuration Notes
PPP Command Reference
Command Hierarchies
PPPoE Policy Configuration Commands
PPPoE Service Commands
PPPoE Local User Database Commands
MLPPP on LNS Commands
Show Commands
Command Descriptions
PPP Configuration Commands
MLPPP on LNS Commands
PPP/PPPoE Service Commands
RADIUS Attribute Commands
Show Commands
Clear Commands
Debug Commands
6. L2TP
6.1. In This Chapter
6.2. L2TP
6.2.1. Terminology
6.2.2. LAC DF Bit
6.2.3. Handling L2TP Tunnel/Session Initialization Failures
6.2.3.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.3.2. Peer Blacklist
6.2.3.3. Tunnel Blacklists
6.2.3.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.3.4. Tunnel Selection Mechanism
6.2.3.5. Tunnel Probing
6.2.3.6. Controlling the Size of Blacklist
6.2.3.7. Displaying the Content of a Blacklist
6.2.3.8. Generating Trap when the Blacklist is Full
6.2.3.9. Premature Removal of Blacklisted Entries
6.2.3.10. Manual Purging of Entities within the Blacklist
6.2.4. CDN Result Code Overwrite
6.2.5. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. L2TP Tunnel RADIUS Accounting
6.4.1. Accounting Packets List
6.5. RADIUS Attributes Value Considerations
6.5.1. Other Optional RADIUS Attributes
6.5.2. RADIUS VSA to Enable L2TP Tunnel Accounting
6.5.3. MLPPP on the LNS Side
6.5.4. LNS Reassembly
L2TP Command Reference
Command Hierarchies
L2TP Configuration Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
L2TP Configuration Commands
Global Commands
L2TP Tunnel Account Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Debug Commands
7.
Triple Play Security
7.1. In This Chapter
7.2. Triple Play Security Features
7.2.1. Anti-Spoofing Filters
7.2.1.1. Anti-spoofing Filter Types
7.2.1.2. Filtering Packets
7.2.2. Layer 2 Triple Play Security Features
7.2.2.1. MAC Pinning
7.2.2.2. MAC Protection
7.2.2.3. DoS Protection
7.2.2.3.1. Subscriber Aggregation Network
7.2.2.3.2. Network Control Filtering
7.2.2.4. VPLS Redirect Policy
7.2.3. ARP Handling
7.2.3.1. ARP Reply Agent
7.2.3.2. Dynamic ARP Table Population
7.2.3.3. Local Proxy ARP
7.2.4. Web Portal Redirect
Configuring Triple Play Security with CLI
Common Configuration Tasks
Configuring Anti-Spoofing Filters
Configuring Triple Play Security features
Configuring MAC Pinning
Configuring MAC Protection
Configuring VPLS Redirect Policy
Configuring ARP Handling
Configuring Proxy ARP
Configuring Local Proxy ARP
Configuring ARP Reply Agent in a VPLS Service
Configuring Remote Proxy ARP
Configuring Automatic ARP Table Population in an IES or VPRN Interface
Configuring CPU Protection
Configuring Web Portal Redirect
Triple Play Security Command Reference
Command Hierarchies
Anti-Spoofing Commands
Layer 2 Security Commands
ARP Handling Commands
Tools Commands
Command Descriptions
Triple Play Security Configuration Commands
Triple Play Anti-Spoofing Commands
Triple Play Layer 2 Security Commands
ARP Handling Commands
Show Commands
Tools Commands
8.
Triple Play Multicast
8.1. In This Chapter
8.2. Introduction to Multicast
8.3. Multicast in the Broadband Service Router
8.3.1. Internet Group Management Protocol
8.3.1.1. IGMP Versions and Interoperability Requirements
8.3.1.2. IGMP Version Transition
8.3.2. Multicast Listener Discovery
8.3.2.1. MLD Versions and Interoperability Requirements
8.3.2.2. Source Specific Multicast Groups
8.3.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.3.4. Ingress Multicast Path Management (IMPM) Enhancements
8.4. Multicast in the BSA
8.4.1. IGMP Snooping
8.4.1.1. IGMP/MLD Message Processing
8.4.1.2. IGMP Message Processing
8.4.1.3. MLD Message Processing
8.4.1.4. IGMP/MLD Filtering
8.4.2. Multicast VPLS Registration (MVR)
8.4.3. Layer 3 Multicast Load Balancing
8.4.4. IGMP State Reporter
8.4.4.1. IGMP Data Records
8.4.4.2. Transport Mechanism
8.4.4.3. HA Compliance
8.4.4.4. QoS Awareness
8.4.4.5. Hardware Support
8.4.4.6. IGMP Reporting Caveats
8.5. Multicast Support over Subscriber Interfaces in Routed CO Model
8.5.1. Hardware Support
8.5.2. Multicast Over IPoE
8.5.2.1. Per SAP Replication Mode
8.5.2.1.1. Per SAP Queue
8.5.2.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.5.2.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.5.2.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.5.2.2. Per Subscriber Host Replication Mode
8.5.2.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.5.2.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.5.3. Multicast Over PPPoE
8.5.4. IGMP Flooding Containment
8.5.5. IGMP/MLD Timers
8.5.6. IGMP/MLD Query Intervals
8.5.7. HQoS Adjustment
8.5.7.1. Host Tracking (HT) Considerations
8.5.7.2. HQoS Adjust Per Vport
8.5.7.2.1. Multi-Chassis Redundancy
8.5.7.2.2. Scalability Considerations
8.5.8. Redirection
8.5.9. Hierarchical Multicast CAC (H-MCAC)
8.5.9.1. MCAC Bundle Bandwidth Limit Considerations
8.5.10. Determining MCAC Policy in Effect
8.5.11. Multicast Filtering
8.5.12. Joining the Multicast Tree
8.5.13. Wholesale/Retail Requirements
8.5.14. QoS Considerations
8.5.15. Redundancy Considerations
8.5.15.1. Redirection Considerations
8.5.16. Query Intervals for Multicast
8.5.16.1. ESM Host-based Queries
8.5.16.2. Group Interface-based Queries
Configuring Triple Play Multicast Services with CLI
Configuring IGMP Snooping in the BSA
Enabling IGMP Snooping in a VPLS Service
With IGMPv3 Multicast Routers
With IGMPv1/2 Multicast Routers
Modifying IGMP Snooping Parameters
Modifying IGMP Snooping Parameters for a SAP or SDP
Configuring Static Multicast Groups on a SAP or SDP
Enabling IGMP Group Membership Report Filtering
Enabling IGMP Traffic Filtering
Configuring Multicast VPLS Registration (MVR)
Configuring IGMP, MKD, and PIM in the BSR
Enabling IGMP
Configuring IGMP Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Enabling MLD
Configuring MLD Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Configuring PIM
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Triple Play Multicast Command Reference
Command Hierarchies
MCAST Management Commands
Multicast Info Policy Bundle Commands
Triple Play Multicast Service Commands
Ingress Multicast Path Management Commands
Multicast Redirection
Multicast Query Timer Commands
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Multicast Management Configuration Commands
Generic Commands
Multicast Management Commands
Bandwidth Policy Commands
Multicast Info Policy Commands
Chassis Level Commands
Multicast Redirection Commands
Multicast Query Timer Commands
Forwarding Plane Commands
9. Triple Play Enhanced Subscriber Management
9.1. In This Section
9.2. Uniform RADIUS Server Configuration
9.2.1. RADIUS Server Configuration
9.2.1.1. Uniform RADIUS Server Configuration (Preferred)
9.2.1.2. Legacy RADIUS Server Configuration
9.3. RADIUS Authentication of Subscriber Sessions
9.3.1. RADIUS Authentication Extensions
9.3.1.1. Triple Play Network with RADIUS Authentication
9.3.2. RADIUS Authorization Extensions
9.3.2.1. Calling-Station-ID
9.3.2.2. Subscriber Session Timeout
9.3.2.2.1. Domain Name in Authentication
9.3.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.3.2.4. SHCV Policy
9.3.3. radius-server-policy Retry Attempt Overview
9.3.4. AAA RADIUS Server Operation Status
9.3.5. AAA RADIUS Accounting Server Stickiness
9.3.6. AAA RADIUS Authentication Fallback Action
9.3.7. AAA Test User Account
9.3.8. Troubleshooting the RADIUS Server
9.3.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.3.9.1. Provisioning IP Configuration of the Host
9.3.9.2. RADIUS Based Authentication in Wholesale Environment
9.3.9.3. Change of Authorization and Disconnect-Request
9.3.9.4. RADIUS-Based Accounting
9.3.9.5. RADIUS Accounting Terminating Cause
9.3.9.6. Accounting Modes Of Operation
9.3.9.7. Per Session Accounting
9.3.9.7.1. Caveats
9.3.9.8. RADIUS Session Accounting with PD as a Managed Route
9.3.9.9. No Host-Accounting
9.3.9.10. Host-Accounting Enabled
9.3.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.3.9.12. Accounting Interim Update Message Interval
9.3.9.13. CoA Triggered Accounting Interim Update
9.3.9.14. Class Attribute
9.3.9.15. User Name
9.3.9.16. Accounting-On and Accounting Off
9.3.9.17. RADIUS Accounting Message Buffering
9.3.9.18. Multiple Accounting Policies
9.3.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.4. Enhanced Subscriber Management Overview
9.4.1. Enhanced Subscriber Management Basics
9.4.1.1. Standard and Enhanced Subscriber Management
9.4.1.1.1. Subscriber Management Definitions
9.4.1.1.2. Subscriber Identification Policy
9.4.1.1.3. Subscriber Identification String
9.4.1.1.4. Subscriber Profile
9.4.1.1.5. SLA Profile
9.4.1.1.6. Explicit Subscriber Profile Mapping
9.4.2. ESM for IPv6
9.4.2.1. Models
9.4.2.1.1. PPPoE Host
9.4.2.1.2. PPPoE RG
9.4.2.1.3. IPoE Host/RG
9.4.2.2. Setup
9.4.2.3. Behavior
9.4.2.3.1. Dual Stack
9.4.2.3.2. Router Advertisements (RA)
9.4.2.3.3. CoA and Disconnect-Request
9.4.2.4. Delegated-Prefix-Length
9.4.2.4.1. Order of Preference for DPL
9.4.2.4.2. DHCP Server Address Utilization and Delegated Prefix Length
9.4.2.5. DHCPv6 Relay Agent
9.4.2.5.1. Configuring a DHCPv6 Relay Agent
9.4.2.6. DHCPv6 Relay to Third Party DHCPv6 External Server
9.4.2.7. DHCPv6 Local Server
9.4.3. Dynamic Subscriber Host Processing
9.4.3.1. Dynamic Tables
9.4.3.1.1. Active Subscriber Table
9.4.3.1.2. SLA Profile Instance Table
9.4.3.1.3. Subscriber Host Table
9.4.3.1.4. DHCP Lease State Table
9.4.4. Enhanced Subscriber Management Entities
9.4.4.1. Instantiating a New Host
9.4.4.2. Packet Processing for an Existing Host
9.4.5. ESM Host Lockout
9.4.5.1. Functionality
9.4.6. ANCP and GSMP
9.4.6.1. ANCP
9.4.6.1.1. Static ANCP Management
9.4.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.4.6.1.3. ANCP String
9.4.6.1.4. ANCP Persistency Support
9.4.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.4.6.3. DHCP Release Messages
9.4.6.3.1. DHCP Release
9.4.6.4. DHCP Client Mobility
9.4.6.5. DHCP Lease Control
9.4.7. Using Scripts for Dynamic Recognition of Subscribers
9.4.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.4.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.4.7.3. Determining the Subscriber Profile
9.4.7.4. Determining the SLA Profile
9.4.7.4.1. SLA-Based Egress QoS Marking
9.4.8. Auto-Sub ID
9.4.8.1. Sub-id Identifiers
9.4.8.2. Dual Stack Hosts
9.4.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
9.4.8.4. PPPoA/PPPoEoA Considerations
9.4.8.5. Deployment Considerations
9.4.8.6. Caveats
9.4.9. Limiting Subscribers and Hosts on a SAP
9.4.10. Static Subscriber Hosts
9.4.11. QoS for Subscribers and Hosts
9.4.11.1. QoS Parameters in Different Profiles
9.4.11.2. QoS Policy Overrides
9.4.12. ESM Subscriber Hierarchical Traffic Control
9.4.12.1. Subscriber HQoS
9.4.12.2. Subscriber CFHP
9.4.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.4.12.3.1. Broadband Network Gateway Application
9.4.12.3.2. Queue Determination and Scheduling
9.4.12.3.3. Weighted Scheduler Group
9.4.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.4.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.4.12.3.6. Vport Determination and Evaluation
9.4.12.3.7. Applying Aggregate Rate Limit to a Vport
9.4.12.3.8. Applying a Scheduler Policy to a Vport
9.4.12.3.9. Signaling of Last Mile Encapsulation Type
9.4.12.3.10. Configuration Example
9.4.13. Subscriber Volume Statistics
9.4.13.1. IP (Layer 3) Volume Accounting
9.4.13.2. Separate IPv4 and IPv6 Counters
9.4.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.4.14.1. IP Filter Attribute Format Details
9.4.14.2. Checking Filter Policy Details
9.4.15. ESM PPPoA/PPPoEoA
9.4.15.1. PPPoA
9.4.15.2. PPPoEoA
9.4.15.3. Hardware Support
9.4.15.4. Termination Points within 7450 ESS and 7750 SR
9.4.15.5. PPPoA Encapsulation
9.4.15.5.1. PPPoEoA Encapsulation
9.4.15.6. Encapsulation Summary
9.4.15.7. Concurrent Support for Different Service Types on the Same Port
9.4.15.8. Restrictions in Scaled ATM MDA Mode
9.4.15.9. QoS Implementation
9.4.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
9.4.15.11. Per VP Shaping
9.4.15.12. ATM/IOM QoS Integration
9.4.15.12.1. Intermediate Node Rate Limit/Shaper
9.4.15.12.2. Provisioning Aspects
9.4.15.12.3. HQoS Combinations
9.4.15.12.4. ATM Rate Adjustment
9.4.15.13. Subscriber Instantiation Use Cases
9.4.15.14. Authentication
9.4.15.15. LUDB Access via Capture SAP
9.4.15.16. Encapsulation Autosensing
9.4.15.17. SAP Autoprovisioning
9.4.15.18. PPP Nodes and ppp-policy
9.4.15.19. MTU Considerations
9.4.15.19.1. PPP(oE) Session Antispoofing
9.4.16. Multi-Chassis Synchronization
9.4.16.1. Overview
9.4.16.1.1. Loss of Synchronization and Reconciliation
9.4.17. Subscriber Routed Redundancy Protocol (SRRP)
9.4.17.1. SRRP Messaging
9.4.17.2. SRRP and Multi-Chassis Synchronization
9.4.17.3. SRRP Instance
9.4.17.3.1. SRRP Instance MCS Key
9.4.17.3.2. Containing Service Type and ID
9.4.17.3.3. Containing Subscriber IP Interface Name
9.4.17.3.4. Subscriber Subnet Information
9.4.17.3.5. Containing Group IP Interface Information
9.4.17.3.6. Remote Redundant IP Interface Mismatch
9.4.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.4.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.4.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.4.17.3.10. Local and Remote Dual Master Detected
9.4.17.4. Subscriber Subnet Owned IP Address Connectivity
9.4.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.4.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.4.18. PPPoE MC Redundancy
9.4.18.1. Hardware Support
9.4.18.2. SRRP Considerations for PPPoE
9.4.18.2.1. SRRP Fact-Checks
9.4.18.3. State Synchronization
9.4.18.3.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.4.18.4. Traffic Control and Redundant Interface
9.4.18.4.1. Subnet Assignment and Advertisement - Option ‘A’
9.4.18.4.2. Subnet Assignment and Advertisement - Option ‘B’
9.4.18.5. MSAP Considerations
9.4.18.6. Unnumbered Interface Support
9.4.18.7. Compatibility with MC-LAG
9.4.18.8. IPv6 Support
9.4.18.9. Considerations with Local DHCP Server
9.4.18.10. Redundant Interface Considerations
9.4.19. Routed Central Office (CO)
9.4.19.1. Layer 3 Subscriber Interfaces
9.4.19.1.1. DHCP Interactions
9.4.19.1.2. Routed CO for IES Service
9.4.19.1.3. Routed CO for VPRN Service
9.4.19.2. Wholesale Retail Routed CO
9.4.19.2.1. Wholesale Retail Model
9.4.19.2.2. Configuration and Applicability
9.4.19.2.3. Hub-and-Spoke Forwarding
9.4.19.3. Routed Subscriber Hosts
9.4.19.3.1. Static Configured IPv4 Managed Route
9.4.19.3.2. Static Configured IPv6 Managed Route
9.4.19.3.3. Dynamic BGP Peering
9.4.19.3.4. RIP Listener
9.4.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.4.19.3.6. GRT Lookup and Routed CO in a VPRN
9.4.20. Dual Homing
9.4.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.4.20.2. Steady-State Operation of Dual-homed Ring
9.4.20.3. Broken-Ring Operation and the Transition to this State
9.4.20.4. Transition from Broken to Closed Ring State
9.4.20.5. Provisioning Aspects and Error Cases
9.4.20.6. Dual Homing to Two BSR Nodes
9.4.20.7. MC Services
9.4.20.8. Routed CO Dual Homing
9.4.20.8.1. Redundant Interfaces
9.4.20.8.2. SRRP in Dual Homing
9.4.20.8.3. Synchronization
9.4.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.4.20.9. SRRP and Multi-Chassis Synchronization
9.4.20.10. Dual Homing and ANCP
9.4.21. SRRP Enhancement
9.4.21.1. SRRP Fate Sharing
9.4.21.2. Fate Sharing Algorithm
9.4.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.4.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.4.21.3.2. Managed Routes
9.4.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.4.21.3.4. Activating SRRP State Tracking
9.4.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.4.21.5. Group Monitor
9.4.22. Subscriber Override
9.4.23. Dual Stack Lite
9.4.23.1. IP-in-IP
9.4.23.2. Configuring Dual Stack Lite
9.4.23.3. L2TP over IPv6
9.5. L2TP Tunnel RADIUS Accounting
9.5.1. Accounting Packets List
9.5.2. RADIUS Attributes Value Considerations
9.5.3. Other Optional RADIUS Attributes
9.5.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.5.5. MLPPP on the LNS Side
9.6. RADIUS Route Download
9.7. Managed SAP (MSAP)
9.7.1. Sticky MSAP
9.7.2. ESM Identification Process
9.7.2.1. SAP-ID ESM Identifier
9.7.2.2. DSLAM-ID
9.7.3. Default-Subscriber
9.7.4. Multicast Management
9.7.5. Subscriber Mirroring
9.8. Volume and Time Based Accounting
9.8.1. Metering
9.8.1.1. Categories Map and Categories
9.8.1.2. Quota Consumption
9.8.1.3. Minimum Credit Control Quota Values
9.8.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.8.2. Credit Negotiation Mechanisms
9.8.3. Action on Credit Exhaustion
9.8.4. Action on Error-Conditions
9.8.5. Applicability of Volume and Time Based Accounting
9.9. Subscriber Host Idle Timeout
9.10. Web Authentication Protocol (WPP)
9.10.1. WPP Configurations
9.10.2. WPP Triggered Host Creation
9.10.2.1. LUDB Support For WPP
9.10.3. WPP Multi-Chassis Redundancy Support
9.11. One-time HTTP Redirection Overview
9.12. ESM over MPLS Pseudowires
9.12.1. Encapsulation
9.12.2. ESM and PW Ports
9.12.2.1. ESM on PW-Port Bound to a Physical Port
9.12.2.1.1. QoS Support
9.12.2.1.2. BNG Redundancy with ESM over Pseudowire
9.12.2.2. ESM on PXC-Based PW-Ports
9.13. Logical Link Identifier (LLID)
9.14. Open Authentication Model for DHCP and PPPoE Hosts
9.14.1. Terminology
9.14.2. LUDB and RADIUS Access Models
9.14.3. No Authentication
9.14.4. LUDB Only Access
9.14.5. LUDB Access via DHCPv4 Server
9.14.6. RADIUS Only Access
9.14.7. Consecutive Access to LUDB and RADIUS
9.14.8. RADIUS Fallback
9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.15.1. Terminology
9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
9.15.3. Default Gateway in IPv4 Flexible Addressing
9.15.4. IPv4 Subnet Sharing
9.15.5. IPv4 Subnet Mask Auto-Generation
9.15.6. Local-proxy-arp and arp-populate
9.15.7. Gi-address Configuration Consideration
9.15.8. PPPoE Considerations
9.15.9. IPoEv6 Considerations
9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
9.15.11. Caveats
9.16. uRPF for Subscriber Management
9.17. IPoE Sessions
9.17.1. Enabling IPoE Sessions
9.17.2. IPoE Session Authentication
9.17.3. IPoE Session Accounting
9.17.4. IPoE Session Mid-Session Changes
9.17.5. IPoE Session Termination
9.17.6. Limiting the Number of IPoE sessions
9.17.7. SAP Session Index
9.17.8. Resiliency
9.17.9. Notes
9.17.10. Configuration Steps
9.17.11. IPoE Session Migration
9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.18. Data-triggered Subscriber Management
9.18.1. Provisioning Data-triggered ESM
9.18.2. Authentication and Host Creation
9.18.3. DoS Protection
9.18.4. DHCP Promotion
9.18.5. Data-Triggered SLAAC Hosts
9.18.6. Stateful Multi-Chassis Redundancy (MCS)
9.18.7. Stateless Multi-Chassis Redundancy
9.18.7.1. MSAP Support
9.19. RADIUS Subscriber Services
9.19.1. Subscriber Service Building Blocks
9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.19.1.2. RADIUS Python Interface
9.19.1.3. Python Script
9.19.1.3.1. Python Script Example
9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.19.2. Subscriber Services RADIUS VSAs
9.19.3. Subscriber Service RADIUS Accounting
9.19.4. Accounting-Only Subscriber Service
9.19.5. QoS Override-based Subscriber Service
9.19.6. PCC Rule-based Subscriber Services
9.19.6.1. PCC Rule Actions
9.19.6.2. PCC Rule Instantiation
9.19.6.3. PCC Rules in a Subscriber Service
9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.19.6.5. PCC Rules on HSMDAv2�
9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
9.19.7. Combined Subscriber Services
9.19.8. Subscriber Services Python API
9.19.8.1. Common Subscriber Services Python API
9.19.8.2. Subscriber Service QoS Override Python API
9.19.8.3. Subscriber Service PCC Rules Python API
9.19.9. Operational Commands
9.19.9.1. Show Commands
9.19.9.2. Debug Commands
9.19.9.3. Resource Monitoring
9.20. Residential Gateway Replacement
9.21. ESM Troubleshooting Show Command
9.22. Hybrid Access
Configuring Enhanced Subscriber Management with CLI
Configuring RADIUS Authentication of DHCP Sessions
TCP MSS adjustment for ESM Hosts
Configuring Enhanced Subscriber Management
Basic Configurations
Subscriber Interface Configuration
Configuring Enhanced Subscriber Management Entities
Configuring a Subscriber Identification Policy
Configuring a Subscriber Profile
Configuring an SLA Profile
Configuring Explicit Mapping Entries
Routed CO with Basic Subscriber Management Features
Applying the Profiles and Policies
SLA Profile
Configuring Dual Homing
SHCV Policies
SHCV Policy
Subscriber Identification Policy
Subscriber Profile
Subscriber Management Command Reference
Command Hierarchies
ANCP Commands
GSMP Configuration Commands
Authentication Policy Commands
RADIUS Accounting Policy Commands
RADIUS Route Download Commands
Diameter Policy Commands
AAA Diameter Peer Policy Commands
Subscriber Management Diameter Application Policy Commands
Category Map and Credit Control Policy Commands
Filter Commands
BGP Peering Policy Commands
Explicit Subscriber Mapping Commands
IGMP Policy Commands
Host Lockout Commands
Host Tracking Policy Commands
PIM Policy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Auto-Generated Subscriber Identification Key Commands
Auto-Generated Subscriber Identification Key Service Commands
Subscriber MCAC Policy Commands
Subscriber Profile Commands
IPoE Session Policy Commands
Multi-Chassis Redundancy Commands
SHCV Policy Commands
Subscriber Management Service Commands
VPLS Subscriber Management Configuration Commands
Managed SAP Policy Commands
VPRN Subscriber Interface Configuration Commands
VPRN Subscriber Interface Group Interface Commands
IES Subscriber Management Configuration Commands
IES Subscriber Interface Commands
IES Subscriber Interface Group Interface Commands
Service Subscriber Interface, Group Interface IPoE Command
RIP Commands
VPort Commands
Redundant Interface Commands
Wireless Portal Protocol (WPP) Commands
Multiple PPoE Session QoS Commands
Multicast Listener Discovery (MLD) Commands
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Triple Play Subscriber Management Configuration Commands
Triple Play Subscriber Management Configuration Commands
Generic Commands
ANCP and GSMP Commands
RADIUS Policy Commands
RADIUS Route Download Commands
IGMP Policy Commands
PIM Policy Commands
Managed SAP Policy Commands
Multi-Chassis Redundancy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Subscriber Profile Commands
Explicit Subscriber Mapping Commands
Subscriber Management Service Commands
Subscriber Management Service Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. In This Section
10.2. Overview
10.2.1. Terminology and Abbreviations
10.2.2. Restrictions
10.3. Deploying Oversubscribed Multi-Chassis Redundancy
10.3.1. Resource Exhaustion Notification and Simultaneous Failures
10.3.2. Resource Monitoring
10.3.3. Warm-Standby Mode Of Operation
10.3.4. IPoE vs PPPoE
10.3.5. Persistency
10.3.6. Routing and Redundant Interface in OMCR
10.3.7. Revertive Behavior
10.3.8. Service Restoration Times
10.3.9. Processing of the SRRP Flaps
10.3.10. Accounting
10.3.11. Configuration Guidelines
10.3.12. Troubleshooting Commands
OMCR Command Reference
Command Hierarchies
OMCR Configuration Commands
OMCR Configuration Commands
11.
WIFI Aggregation and Offload
11.1. In This Section
11.2. WIFI Aggregation and Offload Overview
11.3. Layer 2 over Soft-GRE Tunnels
11.3.1. Encapsulation
11.3.2. Data Path
11.4. Tunnel Level Egress QoS
11.4.1. QoS Overrides
11.4.2. Operational Commands
11.5. Authentication
11.5.1. EAP-Based Authentication
11.5.1.1. RADIUS Proxy
11.5.1.1.1. RADIUS Proxy — Server Load-Balancing
11.5.1.1.2. RADIUS Proxy — Cache Lookup
11.5.1.1.3. RADIUS Proxy — Accounting
11.5.2. Portal Authentication
11.6. Address Assignment
11.7. WIFI Mobility Anchor
11.8. Wholesale
11.9. CGN on WLAN-GW
11.10. Lawful Intercept on WLAN-GW
11.11. WLAN Location Enhancements
11.11.1. Triggered Interim Accounting-Updates
11.11.2. Operational Support
11.12. 3G/4G Interworking
11.12.1. Signaling Call Flow
11.12.1.1. GTP Setup with EAP Authentication
11.12.2. Location Notification in S2a
11.12.2.1. WLAN Location over S2a
11.12.2.2. Cellular Location over S2a
11.12.2.3. Cellular Location over Gn Interface
11.12.2.4. Operational Support
11.13. Migrant User Support
11.13.1. Migrant User Support with Portal-Authentication
11.13.1.1. DHCP
11.13.1.2. Authentication and Forwarding
11.13.2. Migrant User Support with EAP Authentication
11.13.3. Data Triggered Subscriber Creation
11.14. Distributed Subscriber Management (DSM)
11.14.1. DHCP
11.14.2. Authentication and Accounting
11.14.2.1. DSM Data-Plane
11.14.3. IP Filtering
11.14.3.1. Policing
11.14.3.2. Lawful Intercept (LI)
11.14.3.3. Data-Triggered UE Creation
11.14.4. Idle-Timeout and Session-Timeout Management
11.14.5. Operational Commands
11.14.6. Pool Manager
11.14.7. DHCPv6 and SLAAC
11.14.8. Call Trace
11.15. Distributed RADIUS Proxy
11.15.1. Enhanced Subscriber Management
11.15.2. Distributed Subscriber Management
11.15.3. VLAN Awareness
11.15.4. Operational Commands
11.16. WLAN-GW 1:1 Active-Backup Redundancy
11.16.1. DHCP Server Redundancy
11.16.2. Subscriber Creation after Switchover
11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
11.19. IPv6-only Access
11.19.1. IPv6 GRE Tunnels
11.19.2. IPv6 Client-Side RADIUS Proxy
11.19.3. Dual-Stack UEs over WLAN-GW
11.19.3.1. SLAAC Prefix Assignment
11.19.3.2. DHCPv6 IA_NA Assignment
11.19.3.3. Migrant User Support
11.19.3.4. Accounting
11.20. Layer 2 Wholesale
11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
11.22. Soft-L2TPv3 Tunnels
WiFi Command Reference
Command Hierarchies
WLAN-GW Commands
Subscriber Management BRG Commands
DSM Call Trace Commands
WLAN-GW Service Commands
RADIUS Server and Proxy Commands
LUDB Matching for RADIUS Proxy Cache
Data Plane Related Commands
Port Policy Commands
WIFI Aggregation and Offload – Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
WIFI Aggregation and Offload Commands
WIFI Aggregation and Offload Commands
Generic Commands
WLAN-GW Commands
DSM Call Trace Commands
RADIUS Server Policy Commands
CLI Command Description for RADIUS Server
CLI Command Description for RADIUS Proxy Server
LUDB Matching of RADIUS Proxy Cache Commands
WLAN-GW-Group Commands
Port Policy Commands
WLAN-GW Group Interface Commands
Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
12. GTP
12.1. In This Chapter
12.2. GTP Uplink
12.2.1. Identification Attributes
12.2.2. P-GW/GGSN Selection
12.2.3. Configuration
12.2.4. QoS Support
12.2.5. GTP Session Hold
12.2.6. Selective Breakout
12.2.7. IPoE Support
12.2.8. PPPoE Support
12.3. GTP Peering
12.4. Operational Commands
12.4.1. show router wlan-gw mobile-gateway
12.4.2. show router 300 wlan-gw mgw-address-cache
12.4.3. show subscriber-mgmt wlan-gw gtp-session detail
12.4.4. show subscriber-mgmt wlan-gw mgw-profile "default"
12.4.5. show subscriber-mgmt wlan-gw gtp-statistics
GTP Command Reference
Command Hierarchies
GTP Commands
GTP Service Commands
GTP Command Descriptions
GTP Commands
Generic Commands
GTP Commands
13.
virtual Residential Gateway
13.1. In This Section
13.2. virtual Residential Gateway Overview
13.2.1. Access Modes
13.2.2. Home Context on the vRGW
13.2.2.1. Implicit Home Authentication
13.2.2.2. Explicit Home Authentication
13.2.2.3. Change of Configuration
13.2.2.4. Home Lifetime
13.2.3. Device Context on the vRGW
13.2.4. Dynamic Configuration Changes
13.2.5. Per-Home Pool Management and L2-Aware NAT
13.2.5.1. Sticky IP Addresses
13.2.5.2. Managed Static IPv4 Addresses
13.2.5.3. DMZ
13.2.6. IPv6
13.2.7. QoS and Filter Support
13.2.8. Data-Triggered Authentication
13.2.9. Per-Host NAT Port Ranges
13.2.10. Inter-Chassis Redundancy
13.2.10.1. Pool State Synchronization
13.2.10.2. Regular Group Interfaces
13.2.10.3. WLAN-GW Group Interfaces
13.2.11. BRG and vRG Caveats
vRGW Command Reference
Command Hierarchies
Subscriber Management BRG Profile Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Command Descriptions
Generic Commands
vRGW Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
14. Dynamic Data Services
14.1. In This Section
14.2. Introduction to Dynamic Data Services
14.3. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
14.4. Data-Triggered Dynamic Data Services
14.4.1. Data Trigger
14.4.2. Dynamic Services Data Trigger Capture SAP
14.4.3. RADIUS Authentication
14.4.4. Local Authentication
14.4.5. Data-Triggered Dynamic Service Provisioning
14.4.6. Control Plane Protection
14.4.7. Debugging
RADIUS Triggered Dynamic Data Services Command Reference
Command Hierarchies
RADIUS Triggered Dynamic Data Services Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
RADIUS Triggered Dynamic Data Services Commands
Configuration Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
15. Diameter and Diameter Applications
15.1. In This Section
15.2. Restrictions
15.3. Terminology
15.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
15.4.1. Extended Failure Handling (EFH)
15.4.1.1. Extended Failure Handling Example Call Flow
15.4.1.2. Extended Failure Handling Triggers
15.4.1.3. Assigning Interim Credit
15.4.1.4. Enabling Extended Failure Handling
15.4.1.5. Configuration Example 1 - Single Volume Interim Credit Value
15.4.1.6. Configuration Example 2 - Interim Credit Values Per Rating Group
15.4.1.7. Monitoring the Extended Failure Handling State
15.4.1.8. Additional Call Flow Examples
15.4.1.8.1. User Disconnects While EFH is Active
15.4.1.8.2. The Maximum Number of Attempts is Reached
15.4.1.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
15.5. Policy Management via Gx Interface
15.5.1. Gx Protocol
15.5.2. Policy Assignment Models
15.5.3. IP-CAN Session – Gx Session Identification
15.5.3.1. User Identification in PCRF
15.5.3.2. NAS-Port-Id as Subscription-Id
15.5.4. Gx Interface and ESM Subscriber Instantiation
15.5.4.1. Gx and Dual-Stack Hosts
15.5.4.2. Gx and PPPoEv6-DHCP
15.5.5. Gx Fallback Function
15.5.6. Gx CCR-I Replays
15.5.7. Gx CCR-t Replays
15.5.7.1. RAR and CCR-t Replay
15.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
15.5.7.3. CCR-t Replay And High Availability
15.5.8. Automatic Updates for IP Address Allocation/De-allocation
15.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
15.5.10. Gx, ESM and AA
15.5.10.1. ESM Subscriber-host vs AA Subscriber
15.5.10.2. AA Subscriber State
15.5.11. Policy Management via Gx
15.5.12. Gx-Based Overrides
15.5.12.1. Instantiation of Gx Overrides
15.5.12.2. HTTP Redirect Override
15.5.12.3. Removal of Overrides
15.5.12.4. Examples of Gx Overrides
15.5.13. PCC Rules
15.5.13.1. PCC Rule Concept
15.5.13.2. PCC Rule Instantiation
15.5.13.3. Base QoS-Policy and Base Filter
15.5.13.4. Generic Policy Sharing and Rule Sharing
15.5.13.5. PCC Rule Name and PCC Rule Removal
15.5.13.6. Gx Rule Ordering
15.5.13.7. PCC Rule Override
15.5.13.8. Aggregation of IP-Criterion
15.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
15.5.13.10. Gx Rules with Multiple Actions and Action Sharing
15.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
15.5.13.12. RADIUS and Gx Interaction
15.5.13.13. Bulk Changes via CLI while Gx Rules are Active
15.5.13.14. PCC Rule Direction
15.5.13.15. Action
15.5.13.16. Rate-Limiting Action (Ingress, Egress)
15.5.13.16.1. Dynamic Policers and Queue Mappings
15.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
15.5.13.17. Forwarding-Class Change (Ingress, Egress)
15.5.13.18. QoS Forward (Ingress and Egress)
15.5.13.19. Next-Hop Redirect (Ingress)
15.5.13.20. HTTP Redirect (Ingress)
15.5.13.21. Filter Forward/Drop (Ingress and Egress)
15.5.13.22. Service Gating Function
15.5.13.23. PCC Rule Provisioning Example
15.5.13.24. Operational Aspects
15.5.13.25. PCC Rules and Capacity Planning
15.5.13.26. PCC Rule Scaling Example
15.5.14. NAS Filter Inserts
15.5.14.1. Examples of NAS Entry Inserts
15.5.15. Error Handing and Rule Failure Reporting in ESM
15.5.15.1. AVP Decoding Failure in Gx
15.5.15.2. ESM Rule-Installation Failure
15.5.15.3. Failure Reporting in AA
15.5.15.4. Summary of Failure Reporting
15.5.16. Usage-Monitoring and Reporting
15.5.16.1. ESM Usage-Monitoring - What is Being Monitored
15.5.16.2. AA Usage-Monitoring – What is Being Monitored
15.5.16.3. Requesting Usage-Monitoring in ESM
15.5.16.4. Reporting Accumulated Usage
15.5.16.5. Disabling Usage-Monitoring
15.5.16.6. Usage-Monitoring for PCC Rules
15.5.16.7. Session Termination
15.5.16.8. Usage-Monitoring Examples
15.5.17. Event Triggers
15.5.18. Subscriber Verification
15.5.19. Subscriber Termination
15.5.20. Mobility Support in WiFi
15.5.20.1. Redundancy
15.5.21. Persistency and Origin-State-ID AVP
15.5.22. Overload Protection
15.6. Diameter NASREQ Application
15.6.1. Sample Configuration Steps
15.7. Diameter Redundancy
15.7.1. Diameter Peer Level Redundancy
15.7.2. Diameter Multi-Chassis Redundancy
15.7.2.1. Diameter Proxy Model General Operational Principles
15.7.2.2. Diameter Proxy Activity Selection
15.7.2.3. Synchronization and MCS
15.7.2.4. Retransmissions
15.7.2.5. Retransmissions and the T-bit
15.7.2.6. Diameter Proxy Role
15.7.2.7. Diameter Proxy and CC-Request-Number AVP
15.7.2.8. Stateless Diameter Proxy
15.7.2.9. Switchover Scenarios
15.7.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
15.7.2.11. Switchover Update Event (CCR-u)
15.7.2.12. Isolated Chassis
15.7.2.13. Diameter Identities
15.7.2.14. High Availability
15.7.3. Gx Specific Behavior
15.8. Diameter Debugging
16.
Python Script Support for ESM
16.1. In This Chapter
16.2. Python Script Support for ESM
16.3. Python in SR OS Overview
16.3.1. Python Policy – GTPv1-C API
16.3.2. Python Policy – GTPv2-C API
16.3.3. Python Changes
16.4. Python Support in sub-ident-policy
16.4.1. Configuration
16.4.2. Operator Debugging
16.4.3. Python Scripts
16.4.4. Sample Python Scripts
16.4.4.1. Example
16.4.4.2. Example
16.4.4.3. Example
16.4.5. Limitations
16.5. RADIUS Script Policy Overview
16.5.1. Python RADIUS API
16.5.2. Sample Script
16.6. Python Policy Overview
16.6.1. Python Policy – RADIUS API
16.6.2. Python Policy – DHCPv4 API
16.6.3. Python Policy – DHCPv6 API
16.6.4. Python Policy – Diameter API
16.6.5. Python Policy – DHCP Transaction Cache API
16.6.6. Python for PPPoE API
16.6.7. Python API for PPP Packet
16.6.8. Python API for PPP PAP
16.6.9. Python API for PPP CHAP
16.6.10. Python ESM API
16.6.11. Python Cache Support
16.6.12. Applying a Python Policy
16.6.13. Python Script Protection
16.7. Tips and Tricks
Python Command Reference
Command Hierarchies
Python Policy Commands
Python Script Commands
Services Commands
Show Commands
Tools Commands
Debug Commands
Clear Commands
Command Descriptions
Python Configuration Commands
Global Commands
Python Policy Commands
Python Script Commands
Services Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Python RADIUS Command Reference
Command Hierarchies
Command Descriptions
Generic Commands
Script Commands
17. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Nokia SR OS Services Configuration Process
2.
Introduction to Triple Play
2.1. In This Section
2.2. Nokia’s Triple Play Service Delivery Architecture
2.2.1. Introduction to Triple Play
2.2.2. Blueprint for Optimizing Triple Play Service Infrastructures
2.2.3. Architectural Foundations
2.2.4. Optimizing Triple Play Service Infrastructures
2.2.4.1. Distributed Service Edges
2.2.4.2. Service Differentiation, QoS Enablement
2.2.4.3. Virtual MAC Subnetting for VPLS
2.3. Services
2.3.1. Service Types
2.3.2. Service Policies
2.4. Nokia Service Model
2.4.1. Introduction
2.4.2. Service Entities
2.4.3. Customers
2.4.4. Service Access Points (SAPs)
2.4.4.1. SAP Encapsulation Types and Identifiers
2.4.4.2. Ethernet Encapsulations
2.4.4.3. SAP Considerations
2.4.5. Service Distribution Points (SDPs)
2.4.5.1. SDP Binding
2.4.5.2. Spoke and Mesh SDPs
2.4.5.3. SDP Encapsulation Types
2.4.5.3.1. GRE
2.4.5.3.2. MPLS
2.4.5.4. SDP Keepalives
2.5. Epipe Service Overview
2.6. VPLS Service Overview
2.6.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
2.6.1.1. Residential Split Horizon Groups
2.7. IES Service Overview
2.7.1. IP Interface
2.8. VPRN Service Overview
2.9. Deploying and Provisioning Services
2.9.1. Phase 1: Core Network Construction
2.9.2. Phase 2: Service Administration
2.9.3. Phase 3: Service Provisioning
2.10. Configuration Notes
2.10.1. General
Configuring Triple Play Services with CLI
Configuring VPLS Residential Split Horizon Groups
Configuring Static Hosts
BNG Learning IP-Only Static Host’s MAC Address
Static Host Learning the IPv6 Default Gateway Address
Configuring Static Hosts on an VPLS SAP
Configuring Static Hosts on an IES SAP
Configuring Static Hosts on an VPRN SAP
Triple Play Services Command Reference
Command Hierarchies
IES Triple Play Commands
VPLS Triple Play Commands
Service DHCP and Anti-Spoof Filtering Commands
Triple Play ARP Commands
Triple Play Multicast Commands
Show Commands
Clear Commands
Tools Commands
Command Descriptions
Global Commands
Service Commands
SAP Commands
SAP Subscriber Management Commands
Triple Play Multicast Commands
VPLS SAP ATM Commands
Service DHCP and Anti-Spoof Filtering Commands
Filter and QoS Policy Commands
SDP Commands
DHCP Commands
Egress Multicast Group Commands
Interface Commands
Interface IPv6 Commands
Show Commands
IGMP Snooping Show Commands
Clear Commands
Debug Commands
Tools Commands
3.
DHCP Management
3.1. In This Chapter
3.2. DHCP Principles
3.3. DHCP Features
3.3.1. DHCP Relay
3.3.2. DHCPv4 Relay Proxy
3.3.3. Subscriber Identification Using Option 82 Field
3.3.3.1. Trusted and Untrusted
3.3.4. DHCP Snooping
3.3.5. DHCP Lease State Table
3.3.6. DHCP and Layer 3 Aggregation
3.3.6.1. DHCPv4 Snooping
3.3.6.2. DHCPv6 Snooping
3.3.7. Local DHCP Servers
3.3.7.1. Overview
3.3.7.2. Local DHCP Server Support
3.3.8. DHCPv6
3.3.8.1. DHCPv6 Relay Agent
3.3.8.2. DHCPv6 Prefix Options
3.3.8.3. Neighbor Resolution via DHCPv6 Relay
3.3.8.4. DHCPv6 Lease Persistency
3.3.8.5. Local Proxy Neighbor Discovery
3.3.8.6. IPv6oE Hosts Behind Bridged CPEs
3.3.8.7. IPv6 Link-Address Based Pool Selection
3.3.8.8. IPv6 Address/Prefix Stickiness
3.3.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
3.3.8.10. Host Connectivity Checks for IPv6
3.3.9. Lease Query
3.3.10. DHCPv6 to Server Option
3.3.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
3.3.12. DHCP Caching
3.3.13. Flexible Creation of DHCPv4/6 Host Parameters
3.3.14. Python DTC Variables and API
3.3.14.1. DTC Debugging Facility
3.3.15. Virtual Subnet for DHCPv4 Hosts
3.3.16. Address Reservation for Sticky Leases
3.4. Proxy DHCP Server
3.4.1. Local DHCP Servers
3.4.1.1. Terminology
3.4.1.2. Overview
3.4.1.3. DHCP Lease Synchronization
3.4.1.4. Intercommunication Link Failure Detection
3.4.1.5. DHCP Server Failover States
3.4.1.6. Lease Time Synchronization
3.4.1.7. Maximum Client Lead Time (MCLT)
3.4.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
3.4.1.9. Fast-Switchover of IP Address/Prefix Delegation
3.4.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
3.5. Local Address Assignment
3.5.1. Stateless Address Auto-configuration
Configuring DHCP with CLI
Common Configuration Tasks
Enabling DHCP Snooping
Configuring Option 82 Handling
Enabling DHCP Relay
Configuring Local User Database Parameters
Triple Play DHCP Command Reference
Command Hierarchies
Global DHCP Commands
Router DHCP Local User Database Commands
Service Commands
IES DHCP Commands
VPLS DHCP Commands
VPRN DHCP Commands
VPRN DHCP Subscriber Interface Commands
IES/VPRN IPv6-DHCP6 Commands
Local User Database Commands
IPoE Commands
PPP Commands
Show Commands
Tools Commands
Clear Commands
Debug Commands
Command Descriptions
Triple Play DHCP Configuration Commands
Global Commands
Global DHCP Commands
Router DHCP Commands
Service Commands
Local User Database Commands
Show Commands
Tools Commands
Clear Commands
Debug Commands
4. SLAAC
4.1. In This Chapter
4.2. Stateless Address Auto-configuration (SLAAC) Management
4.3. SLAAC Principles
4.4. Configuration Overview
4.5. Router-Solicit Trigger
4.6. SLAAC Address Assignment
4.7. Static SLAAC Prefix Assignment
4.8. Dynamic SLAAC Prefix Assignment
5.
Point-to-Point Protocol over Ethernet Management
5.1. In This Chapter
5.2. PPPoE
5.2.1. PPPoE Authentication and Authorization
5.2.1.1. General Flow
5.2.1.2. RADIUS
5.2.1.3. Local User Database Directly Assigned to PPPoE Node
5.2.1.4. Subscriber per PPPoE Session Index
5.2.1.5. Local DHCP Server with Local User Database
5.2.2. Multiple Sessions Per MAC Address
5.2.3. Private Retail Subnets
5.2.4. IPCP Subnet Negotiation
5.2.4.1. Numbered WAN Support for Layer 3 RGs
5.2.5. IES as Retail Service for PPPoE Host
5.2.6. Unnumbered PPPoX
5.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
5.3.1. Terminology
5.3.2. LNS MLPPPoX
5.3.3. MLPPP Encapsulation
5.3.4. MLPPPoX Negotiation
5.3.5. Enabling MLPPPoX
5.3.6. Link Fragmentation and Interleaving (LFI)
5.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
5.3.7. LFI Functionality Implemented in LNS
5.3.7.1. Last Mile QoS Awareness in the LNS
5.3.7.2. BB-ISA Processing
5.3.7.3. LNS-LAC Link
5.3.7.4. AN-RG Link
5.3.7.5. Home Link
5.3.7.6. Optimum Fragment Size Calculation by LNS
5.3.7.6.1. Encapsulation Based Fragment Size
5.3.7.6.2. Fragment Size Based on the Max Transmission Delay
5.3.7.6.3. Selection of the Optimum Fragment Length
5.3.8. Upstream Traffic Considerations
5.3.9. Multiple Links MLPPPoX With No Interleaving
5.3.10. MLPPPoX Session Support
5.3.11. Session Load Balancing Across Multiple BB-ISAs
5.3.12. BB-ISA Hashing Considerations
5.3.13. Last Mile Rate and Encapsulation Parameters
5.3.14. Link Failure Detection
5.3.15. CoA Support
5.3.16. Accounting
5.3.17. Filters and Mirroring
5.3.18. PTA Considerations
5.3.19. QoS Considerations
5.3.19.1. Dual-Pass
5.3.19.2. Traffic Prioritization in LFI
5.3.19.3. Shaping Based on the Last Mile Wire Rates
5.3.19.4. Downstream Bandwidth Management on Egress Port
5.3.20. Sub/Sla-Profile Considerations
5.3.21. Example of MLPPPoX Session Setup Flow
5.3.22. Other Considerations
5.4. Configuration Notes
PPP Command Reference
Command Hierarchies
PPPoE Policy Configuration Commands
PPPoE Service Commands
PPPoE Local User Database Commands
MLPPP on LNS Commands
Show Commands
Command Descriptions
PPP Configuration Commands
MLPPP on LNS Commands
PPP/PPPoE Service Commands
RADIUS Attribute Commands
Show Commands
Clear Commands
Debug Commands
6. L2TP
6.1. In This Chapter
6.2. L2TP
6.2.1. Terminology
6.2.2. LAC DF Bit
6.2.3. Handling L2TP Tunnel/Session Initialization Failures
6.2.3.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
6.2.3.2. Peer Blacklist
6.2.3.3. Tunnel Blacklists
6.2.3.3.1. Tunnel Timeout Due to the Peer IP Address Change
6.2.3.4. Tunnel Selection Mechanism
6.2.3.5. Tunnel Probing
6.2.3.6. Controlling the Size of Blacklist
6.2.3.7. Displaying the Content of a Blacklist
6.2.3.8. Generating Trap when the Blacklist is Full
6.2.3.9. Premature Removal of Blacklisted Entries
6.2.3.10. Manual Purging of Entities within the Blacklist
6.2.4. CDN Result Code Overwrite
6.2.5. LNS Proxy
6.3. L2TP LAC VPRN
6.3.1. Per-ISP Egress L2TP DSCP Reclassification
6.4. L2TP Tunnel RADIUS Accounting
6.4.1. Accounting Packets List
6.5. RADIUS Attributes Value Considerations
6.5.1. Other Optional RADIUS Attributes
6.5.2. RADIUS VSA to Enable L2TP Tunnel Accounting
6.5.3. MLPPP on the LNS Side
6.5.4. LNS Reassembly
L2TP Command Reference
Command Hierarchies
L2TP Configuration Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Clear Commands
Debug Commands
Tools Commands
Command Descriptions
L2TP Configuration Commands
Global Commands
L2TP Tunnel Account Commands
L2TP Tunnel RADIUS Accounting Commands
Show Commands
Debug Commands
7.
Triple Play Security
7.1. In This Chapter
7.2. Triple Play Security Features
7.2.1. Anti-Spoofing Filters
7.2.1.1. Anti-spoofing Filter Types
7.2.1.2. Filtering Packets
7.2.2. Layer 2 Triple Play Security Features
7.2.2.1. MAC Pinning
7.2.2.2. MAC Protection
7.2.2.3. DoS Protection
7.2.2.3.1. Subscriber Aggregation Network
7.2.2.3.2. Network Control Filtering
7.2.2.4. VPLS Redirect Policy
7.2.3. ARP Handling
7.2.3.1. ARP Reply Agent
7.2.3.2. Dynamic ARP Table Population
7.2.3.3. Local Proxy ARP
7.2.4. Web Portal Redirect
Configuring Triple Play Security with CLI
Common Configuration Tasks
Configuring Anti-Spoofing Filters
Configuring Triple Play Security features
Configuring MAC Pinning
Configuring MAC Protection
Configuring VPLS Redirect Policy
Configuring ARP Handling
Configuring Proxy ARP
Configuring Local Proxy ARP
Configuring ARP Reply Agent in a VPLS Service
Configuring Remote Proxy ARP
Configuring Automatic ARP Table Population in an IES or VPRN Interface
Configuring CPU Protection
Configuring Web Portal Redirect
Triple Play Security Command Reference
Command Hierarchies
Anti-Spoofing Commands
Layer 2 Security Commands
ARP Handling Commands
Tools Commands
Command Descriptions
Triple Play Security Configuration Commands
Triple Play Anti-Spoofing Commands
Triple Play Layer 2 Security Commands
ARP Handling Commands
Show Commands
Tools Commands
8.
Triple Play Multicast
8.1. In This Chapter
8.2. Introduction to Multicast
8.3. Multicast in the Broadband Service Router
8.3.1. Internet Group Management Protocol
8.3.1.1. IGMP Versions and Interoperability Requirements
8.3.1.2. IGMP Version Transition
8.3.2. Multicast Listener Discovery
8.3.2.1. MLD Versions and Interoperability Requirements
8.3.2.2. Source Specific Multicast Groups
8.3.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
8.3.4. Ingress Multicast Path Management (IMPM) Enhancements
8.4. Multicast in the BSA
8.4.1. IGMP Snooping
8.4.1.1. IGMP/MLD Message Processing
8.4.1.2. IGMP Message Processing
8.4.1.3. MLD Message Processing
8.4.1.4. IGMP/MLD Filtering
8.4.2. Multicast VPLS Registration (MVR)
8.4.3. Layer 3 Multicast Load Balancing
8.4.4. IGMP State Reporter
8.4.4.1. IGMP Data Records
8.4.4.2. Transport Mechanism
8.4.4.3. HA Compliance
8.4.4.4. QoS Awareness
8.4.4.5. Hardware Support
8.4.4.6. IGMP Reporting Caveats
8.5. Multicast Support over Subscriber Interfaces in Routed CO Model
8.5.1. Hardware Support
8.5.2. Multicast Over IPoE
8.5.2.1. Per SAP Replication Mode
8.5.2.1.1. Per SAP Queue
8.5.2.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.5.2.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
8.5.2.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
8.5.2.2. Per Subscriber Host Replication Mode
8.5.2.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
8.5.2.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
8.5.3. Multicast Over PPPoE
8.5.4. IGMP Flooding Containment
8.5.5. IGMP/MLD Timers
8.5.6. IGMP/MLD Query Intervals
8.5.7. HQoS Adjustment
8.5.7.1. Host Tracking (HT) Considerations
8.5.7.2. HQoS Adjust Per Vport
8.5.7.2.1. Multi-Chassis Redundancy
8.5.7.2.2. Scalability Considerations
8.5.8. Redirection
8.5.9. Hierarchical Multicast CAC (H-MCAC)
8.5.9.1. MCAC Bundle Bandwidth Limit Considerations
8.5.10. Determining MCAC Policy in Effect
8.5.11. Multicast Filtering
8.5.12. Joining the Multicast Tree
8.5.13. Wholesale/Retail Requirements
8.5.14. QoS Considerations
8.5.15. Redundancy Considerations
8.5.15.1. Redirection Considerations
8.5.16. Query Intervals for Multicast
8.5.16.1. ESM Host-based Queries
8.5.16.2. Group Interface-based Queries
Configuring Triple Play Multicast Services with CLI
Configuring IGMP Snooping in the BSA
Enabling IGMP Snooping in a VPLS Service
With IGMPv3 Multicast Routers
With IGMPv1/2 Multicast Routers
Modifying IGMP Snooping Parameters
Modifying IGMP Snooping Parameters for a SAP or SDP
Configuring Static Multicast Groups on a SAP or SDP
Enabling IGMP Group Membership Report Filtering
Enabling IGMP Traffic Filtering
Configuring Multicast VPLS Registration (MVR)
Configuring IGMP, MKD, and PIM in the BSR
Enabling IGMP
Configuring IGMP Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Enabling MLD
Configuring MLD Interface Parameters
Configuring Static Parameters
Configuring SSM Translation
Configuring PIM
Enabling PIM
Configuring PIM Interface Parameters
Importing PIM Join/Register Policies
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Triple Play Multicast Command Reference
Command Hierarchies
MCAST Management Commands
Multicast Info Policy Bundle Commands
Triple Play Multicast Service Commands
Ingress Multicast Path Management Commands
Multicast Redirection
Multicast Query Timer Commands
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Multicast Management Configuration Commands
Generic Commands
Multicast Management Commands
Bandwidth Policy Commands
Multicast Info Policy Commands
Chassis Level Commands
Multicast Redirection Commands
Multicast Query Timer Commands
Forwarding Plane Commands
9. Triple Play Enhanced Subscriber Management
9.1. In This Section
9.2. Uniform RADIUS Server Configuration
9.2.1. RADIUS Server Configuration
9.2.1.1. Uniform RADIUS Server Configuration (Preferred)
9.2.1.2. Legacy RADIUS Server Configuration
9.3. RADIUS Authentication of Subscriber Sessions
9.3.1. RADIUS Authentication Extensions
9.3.1.1. Triple Play Network with RADIUS Authentication
9.3.2. RADIUS Authorization Extensions
9.3.2.1. Calling-Station-ID
9.3.2.2. Subscriber Session Timeout
9.3.2.2.1. Domain Name in Authentication
9.3.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
9.3.2.4. SHCV Policy
9.3.3. radius-server-policy Retry Attempt Overview
9.3.4. AAA RADIUS Server Operation Status
9.3.5. AAA RADIUS Accounting Server Stickiness
9.3.6. AAA RADIUS Authentication Fallback Action
9.3.7. AAA Test User Account
9.3.8. Troubleshooting the RADIUS Server
9.3.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
9.3.9.1. Provisioning IP Configuration of the Host
9.3.9.2. RADIUS Based Authentication in Wholesale Environment
9.3.9.3. Change of Authorization and Disconnect-Request
9.3.9.4. RADIUS-Based Accounting
9.3.9.5. RADIUS Accounting Terminating Cause
9.3.9.6. Accounting Modes Of Operation
9.3.9.7. Per Session Accounting
9.3.9.7.1. Caveats
9.3.9.8. RADIUS Session Accounting with PD as a Managed Route
9.3.9.9. No Host-Accounting
9.3.9.10. Host-Accounting Enabled
9.3.9.11. Reduction of Host Updates for Session Accounting Start and Stop
9.3.9.12. Accounting Interim Update Message Interval
9.3.9.13. CoA Triggered Accounting Interim Update
9.3.9.14. Class Attribute
9.3.9.15. User Name
9.3.9.16. Accounting-On and Accounting Off
9.3.9.17. RADIUS Accounting Message Buffering
9.3.9.18. Multiple Accounting Policies
9.3.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
9.4. Enhanced Subscriber Management Overview
9.4.1. Enhanced Subscriber Management Basics
9.4.1.1. Standard and Enhanced Subscriber Management
9.4.1.1.1. Subscriber Management Definitions
9.4.1.1.2. Subscriber Identification Policy
9.4.1.1.3. Subscriber Identification String
9.4.1.1.4. Subscriber Profile
9.4.1.1.5. SLA Profile
9.4.1.1.6. Explicit Subscriber Profile Mapping
9.4.2. ESM for IPv6
9.4.2.1. Models
9.4.2.1.1. PPPoE Host
9.4.2.1.2. PPPoE RG
9.4.2.1.3. IPoE Host/RG
9.4.2.2. Setup
9.4.2.3. Behavior
9.4.2.3.1. Dual Stack
9.4.2.3.2. Router Advertisements (RA)
9.4.2.3.3. CoA and Disconnect-Request
9.4.2.4. Delegated-Prefix-Length
9.4.2.4.1. Order of Preference for DPL
9.4.2.4.2. DHCP Server Address Utilization and Delegated Prefix Length
9.4.2.5. DHCPv6 Relay Agent
9.4.2.5.1. Configuring a DHCPv6 Relay Agent
9.4.2.6. DHCPv6 Relay to Third Party DHCPv6 External Server
9.4.2.7. DHCPv6 Local Server
9.4.3. Dynamic Subscriber Host Processing
9.4.3.1. Dynamic Tables
9.4.3.1.1. Active Subscriber Table
9.4.3.1.2. SLA Profile Instance Table
9.4.3.1.3. Subscriber Host Table
9.4.3.1.4. DHCP Lease State Table
9.4.4. Enhanced Subscriber Management Entities
9.4.4.1. Instantiating a New Host
9.4.4.2. Packet Processing for an Existing Host
9.4.5. ESM Host Lockout
9.4.5.1. Functionality
9.4.6. ANCP and GSMP
9.4.6.1. ANCP
9.4.6.1.1. Static ANCP Management
9.4.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
9.4.6.1.3. ANCP String
9.4.6.1.4. ANCP Persistency Support
9.4.6.2. General Switch Management Protocol Version 3 (GSMPv3)
9.4.6.3. DHCP Release Messages
9.4.6.3.1. DHCP Release
9.4.6.4. DHCP Client Mobility
9.4.6.5. DHCP Lease Control
9.4.7. Using Scripts for Dynamic Recognition of Subscribers
9.4.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
9.4.7.2. Determining the Subscriber Profile and SLA Profile of a Host
9.4.7.3. Determining the Subscriber Profile
9.4.7.4. Determining the SLA Profile
9.4.7.4.1. SLA-Based Egress QoS Marking
9.4.8. Auto-Sub ID
9.4.8.1. Sub-id Identifiers
9.4.8.2. Dual Stack Hosts
9.4.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
9.4.8.4. PPPoA/PPPoEoA Considerations
9.4.8.5. Deployment Considerations
9.4.8.6. Caveats
9.4.9. Limiting Subscribers and Hosts on a SAP
9.4.10. Static Subscriber Hosts
9.4.11. QoS for Subscribers and Hosts
9.4.11.1. QoS Parameters in Different Profiles
9.4.11.2. QoS Policy Overrides
9.4.12. ESM Subscriber Hierarchical Traffic Control
9.4.12.1. Subscriber HQoS
9.4.12.2. Subscriber CFHP
9.4.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
9.4.12.3.1. Broadband Network Gateway Application
9.4.12.3.2. Queue Determination and Scheduling
9.4.12.3.3. Weighted Scheduler Group
9.4.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
9.4.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
9.4.12.3.6. Vport Determination and Evaluation
9.4.12.3.7. Applying Aggregate Rate Limit to a Vport
9.4.12.3.8. Applying a Scheduler Policy to a Vport
9.4.12.3.9. Signaling of Last Mile Encapsulation Type
9.4.12.3.10. Configuration Example
9.4.13. Subscriber Volume Statistics
9.4.13.1. IP (Layer 3) Volume Accounting
9.4.13.2. Separate IPv4 and IPv6 Counters
9.4.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
9.4.14.1. IP Filter Attribute Format Details
9.4.14.2. Checking Filter Policy Details
9.4.15. ESM PPPoA/PPPoEoA
9.4.15.1. PPPoA
9.4.15.2. PPPoEoA
9.4.15.3. Hardware Support
9.4.15.4. Termination Points within 7450 ESS and 7750 SR
9.4.15.5. PPPoA Encapsulation
9.4.15.5.1. PPPoEoA Encapsulation
9.4.15.6. Encapsulation Summary
9.4.15.7. Concurrent Support for Different Service Types on the Same Port
9.4.15.8. Restrictions in Scaled ATM MDA Mode
9.4.15.9. QoS Implementation
9.4.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
9.4.15.11. Per VP Shaping
9.4.15.12. ATM/IOM QoS Integration
9.4.15.12.1. Intermediate Node Rate Limit/Shaper
9.4.15.12.2. Provisioning Aspects
9.4.15.12.3. HQoS Combinations
9.4.15.12.4. ATM Rate Adjustment
9.4.15.13. Subscriber Instantiation Use Cases
9.4.15.14. Authentication
9.4.15.15. LUDB Access via Capture SAP
9.4.15.16. Encapsulation Autosensing
9.4.15.17. SAP Autoprovisioning
9.4.15.18. PPP Nodes and ppp-policy
9.4.15.19. MTU Considerations
9.4.15.19.1. PPP(oE) Session Antispoofing
9.4.16. Multi-Chassis Synchronization
9.4.16.1. Overview
9.4.16.1.1. Loss of Synchronization and Reconciliation
9.4.17. Subscriber Routed Redundancy Protocol (SRRP)
9.4.17.1. SRRP Messaging
9.4.17.2. SRRP and Multi-Chassis Synchronization
9.4.17.3. SRRP Instance
9.4.17.3.1. SRRP Instance MCS Key
9.4.17.3.2. Containing Service Type and ID
9.4.17.3.3. Containing Subscriber IP Interface Name
9.4.17.3.4. Subscriber Subnet Information
9.4.17.3.5. Containing Group IP Interface Information
9.4.17.3.6. Remote Redundant IP Interface Mismatch
9.4.17.3.7. Remote Sending Redundant IP Interface Unavailable
9.4.17.3.8. Remote SRRP Advertisement SAP Non-existent
9.4.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
9.4.17.3.10. Local and Remote Dual Master Detected
9.4.17.4. Subscriber Subnet Owned IP Address Connectivity
9.4.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
9.4.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
9.4.18. PPPoE MC Redundancy
9.4.18.1. Hardware Support
9.4.18.2. SRRP Considerations for PPPoE
9.4.18.2.1. SRRP Fact-Checks
9.4.18.3. State Synchronization
9.4.18.3.1. PPPoE Multi-chassis Synchronization (MCS) Model
9.4.18.4. Traffic Control and Redundant Interface
9.4.18.4.1. Subnet Assignment and Advertisement - Option ‘A’
9.4.18.4.2. Subnet Assignment and Advertisement - Option ‘B’
9.4.18.5. MSAP Considerations
9.4.18.6. Unnumbered Interface Support
9.4.18.7. Compatibility with MC-LAG
9.4.18.8. IPv6 Support
9.4.18.9. Considerations with Local DHCP Server
9.4.18.10. Redundant Interface Considerations
9.4.19. Routed Central Office (CO)
9.4.19.1. Layer 3 Subscriber Interfaces
9.4.19.1.1. DHCP Interactions
9.4.19.1.2. Routed CO for IES Service
9.4.19.1.3. Routed CO for VPRN Service
9.4.19.2. Wholesale Retail Routed CO
9.4.19.2.1. Wholesale Retail Model
9.4.19.2.2. Configuration and Applicability
9.4.19.2.3. Hub-and-Spoke Forwarding
9.4.19.3. Routed Subscriber Hosts
9.4.19.3.1. Static Configured IPv4 Managed Route
9.4.19.3.2. Static Configured IPv6 Managed Route
9.4.19.3.3. Dynamic BGP Peering
9.4.19.3.4. RIP Listener
9.4.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
9.4.19.3.6. GRT Lookup and Routed CO in a VPRN
9.4.20. Dual Homing
9.4.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
9.4.20.2. Steady-State Operation of Dual-homed Ring
9.4.20.3. Broken-Ring Operation and the Transition to this State
9.4.20.4. Transition from Broken to Closed Ring State
9.4.20.5. Provisioning Aspects and Error Cases
9.4.20.6. Dual Homing to Two BSR Nodes
9.4.20.7. MC Services
9.4.20.8. Routed CO Dual Homing
9.4.20.8.1. Redundant Interfaces
9.4.20.8.2. SRRP in Dual Homing
9.4.20.8.3. Synchronization
9.4.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
9.4.20.9. SRRP and Multi-Chassis Synchronization
9.4.20.10. Dual Homing and ANCP
9.4.21. SRRP Enhancement
9.4.21.1. SRRP Fate Sharing
9.4.21.2. Fate Sharing Algorithm
9.4.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
9.4.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
9.4.21.3.2. Managed Routes
9.4.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
9.4.21.3.4. Activating SRRP State Tracking
9.4.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
9.4.21.5. Group Monitor
9.4.22. Subscriber Override
9.4.23. Dual Stack Lite
9.4.23.1. IP-in-IP
9.4.23.2. Configuring Dual Stack Lite
9.4.23.3. L2TP over IPv6
9.5. L2TP Tunnel RADIUS Accounting
9.5.1. Accounting Packets List
9.5.2. RADIUS Attributes Value Considerations
9.5.3. Other Optional RADIUS Attributes
9.5.4. RADIUS VSA to Enable L2TP Tunnel Accounting
9.5.5. MLPPP on the LNS Side
9.6. RADIUS Route Download
9.7. Managed SAP (MSAP)
9.7.1. Sticky MSAP
9.7.2. ESM Identification Process
9.7.2.1. SAP-ID ESM Identifier
9.7.2.2. DSLAM-ID
9.7.3. Default-Subscriber
9.7.4. Multicast Management
9.7.5. Subscriber Mirroring
9.8. Volume and Time Based Accounting
9.8.1. Metering
9.8.1.1. Categories Map and Categories
9.8.1.2. Quota Consumption
9.8.1.3. Minimum Credit Control Quota Values
9.8.1.4. RADIUS VSA Alc-Credit-Control-Quota
9.8.2. Credit Negotiation Mechanisms
9.8.3. Action on Credit Exhaustion
9.8.4. Action on Error-Conditions
9.8.5. Applicability of Volume and Time Based Accounting
9.9. Subscriber Host Idle Timeout
9.10. Web Authentication Protocol (WPP)
9.10.1. WPP Configurations
9.10.2. WPP Triggered Host Creation
9.10.2.1. LUDB Support For WPP
9.10.3. WPP Multi-Chassis Redundancy Support
9.11. One-time HTTP Redirection Overview
9.12. ESM over MPLS Pseudowires
9.12.1. Encapsulation
9.12.2. ESM and PW Ports
9.12.2.1. ESM on PW-Port Bound to a Physical Port
9.12.2.1.1. QoS Support
9.12.2.1.2. BNG Redundancy with ESM over Pseudowire
9.12.2.2. ESM on PXC-Based PW-Ports
9.13. Logical Link Identifier (LLID)
9.14. Open Authentication Model for DHCP and PPPoE Hosts
9.14.1. Terminology
9.14.2. LUDB and RADIUS Access Models
9.14.3. No Authentication
9.14.4. LUDB Only Access
9.14.5. LUDB Access via DHCPv4 Server
9.14.6. RADIUS Only Access
9.14.7. Consecutive Access to LUDB and RADIUS
9.14.8. RADIUS Fallback
9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
9.15.1. Terminology
9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
9.15.3. Default Gateway in IPv4 Flexible Addressing
9.15.4. IPv4 Subnet Sharing
9.15.5. IPv4 Subnet Mask Auto-Generation
9.15.6. Local-proxy-arp and arp-populate
9.15.7. Gi-address Configuration Consideration
9.15.8. PPPoE Considerations
9.15.9. IPoEv6 Considerations
9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
9.15.11. Caveats
9.16. uRPF for Subscriber Management
9.17. IPoE Sessions
9.17.1. Enabling IPoE Sessions
9.17.2. IPoE Session Authentication
9.17.3. IPoE Session Accounting
9.17.4. IPoE Session Mid-Session Changes
9.17.5. IPoE Session Termination
9.17.6. Limiting the Number of IPoE sessions
9.17.7. SAP Session Index
9.17.8. Resiliency
9.17.9. Notes
9.17.10. Configuration Steps
9.17.11. IPoE Session Migration
9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
9.18. Data-triggered Subscriber Management
9.18.1. Provisioning Data-triggered ESM
9.18.2. Authentication and Host Creation
9.18.3. DoS Protection
9.18.4. DHCP Promotion
9.18.5. Data-Triggered SLAAC Hosts
9.18.6. Stateful Multi-Chassis Redundancy (MCS)
9.18.7. Stateless Multi-Chassis Redundancy
9.18.7.1. MSAP Support
9.19. RADIUS Subscriber Services
9.19.1. Subscriber Service Building Blocks
9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
9.19.1.2. RADIUS Python Interface
9.19.1.3. Python Script
9.19.1.3.1. Python Script Example
9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
9.19.2. Subscriber Services RADIUS VSAs
9.19.3. Subscriber Service RADIUS Accounting
9.19.4. Accounting-Only Subscriber Service
9.19.5. QoS Override-based Subscriber Service
9.19.6. PCC Rule-based Subscriber Services
9.19.6.1. PCC Rule Actions
9.19.6.2. PCC Rule Instantiation
9.19.6.3. PCC Rules in a Subscriber Service
9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
9.19.6.5. PCC Rules on HSMDAv2�
9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
9.19.7. Combined Subscriber Services
9.19.8. Subscriber Services Python API
9.19.8.1. Common Subscriber Services Python API
9.19.8.2. Subscriber Service QoS Override Python API
9.19.8.3. Subscriber Service PCC Rules Python API
9.19.9. Operational Commands
9.19.9.1. Show Commands
9.19.9.2. Debug Commands
9.19.9.3. Resource Monitoring
9.20. Residential Gateway Replacement
9.21. ESM Troubleshooting Show Command
9.22. Hybrid Access
Configuring Enhanced Subscriber Management with CLI
Configuring RADIUS Authentication of DHCP Sessions
TCP MSS adjustment for ESM Hosts
Configuring Enhanced Subscriber Management
Basic Configurations
Subscriber Interface Configuration
Configuring Enhanced Subscriber Management Entities
Configuring a Subscriber Identification Policy
Configuring a Subscriber Profile
Configuring an SLA Profile
Configuring Explicit Mapping Entries
Routed CO with Basic Subscriber Management Features
Applying the Profiles and Policies
SLA Profile
Configuring Dual Homing
SHCV Policies
SHCV Policy
Subscriber Identification Policy
Subscriber Profile
Subscriber Management Command Reference
Command Hierarchies
ANCP Commands
GSMP Configuration Commands
Authentication Policy Commands
RADIUS Accounting Policy Commands
RADIUS Route Download Commands
Diameter Policy Commands
AAA Diameter Peer Policy Commands
Subscriber Management Diameter Application Policy Commands
Category Map and Credit Control Policy Commands
Filter Commands
BGP Peering Policy Commands
Explicit Subscriber Mapping Commands
IGMP Policy Commands
Host Lockout Commands
Host Tracking Policy Commands
PIM Policy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Auto-Generated Subscriber Identification Key Commands
Auto-Generated Subscriber Identification Key Service Commands
Subscriber MCAC Policy Commands
Subscriber Profile Commands
IPoE Session Policy Commands
Multi-Chassis Redundancy Commands
SHCV Policy Commands
Subscriber Management Service Commands
VPLS Subscriber Management Configuration Commands
Managed SAP Policy Commands
VPRN Subscriber Interface Configuration Commands
VPRN Subscriber Interface Group Interface Commands
IES Subscriber Management Configuration Commands
IES Subscriber Interface Commands
IES Subscriber Interface Group Interface Commands
Service Subscriber Interface, Group Interface IPoE Command
RIP Commands
VPort Commands
Redundant Interface Commands
Wireless Portal Protocol (WPP) Commands
Multiple PPoE Session QoS Commands
Multicast Listener Discovery (MLD) Commands
Show Commands
Monitor Commands
Clear Commands
Debug Commands
Tools Commands
Triple Play Subscriber Management Configuration Commands
Triple Play Subscriber Management Configuration Commands
Generic Commands
ANCP and GSMP Commands
RADIUS Policy Commands
RADIUS Route Download Commands
IGMP Policy Commands
PIM Policy Commands
Managed SAP Policy Commands
Multi-Chassis Redundancy Commands
SLA Profile Commands
Subscriber Identification Policy Commands
Subscriber Profile Commands
Explicit Subscriber Mapping Commands
Subscriber Management Service Commands
Subscriber Management Service Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
RIP Commands
Vport Commands
SHCV Policy Commands
Show Commands
Clear Commands
Tools Commands
Debug Commands
Monitor Commands
10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
10.1. In This Section
10.2. Overview
10.2.1. Terminology and Abbreviations
10.2.2. Restrictions
10.3. Deploying Oversubscribed Multi-Chassis Redundancy
10.3.1. Resource Exhaustion Notification and Simultaneous Failures
10.3.2. Resource Monitoring
10.3.3. Warm-Standby Mode Of Operation
10.3.4. IPoE vs PPPoE
10.3.5. Persistency
10.3.6. Routing and Redundant Interface in OMCR
10.3.7. Revertive Behavior
10.3.8. Service Restoration Times
10.3.9. Processing of the SRRP Flaps
10.3.10. Accounting
10.3.11. Configuration Guidelines
10.3.12. Troubleshooting Commands
OMCR Command Reference
Command Hierarchies
OMCR Configuration Commands
OMCR Configuration Commands
11.
WIFI Aggregation and Offload
11.1. In This Section
11.2. WIFI Aggregation and Offload Overview
11.3. Layer 2 over Soft-GRE Tunnels
11.3.1. Encapsulation
11.3.2. Data Path
11.4. Tunnel Level Egress QoS
11.4.1. QoS Overrides
11.4.2. Operational Commands
11.5. Authentication
11.5.1. EAP-Based Authentication
11.5.1.1. RADIUS Proxy
11.5.1.1.1. RADIUS Proxy — Server Load-Balancing
11.5.1.1.2. RADIUS Proxy — Cache Lookup
11.5.1.1.3. RADIUS Proxy — Accounting
11.5.2. Portal Authentication
11.6. Address Assignment
11.7. WIFI Mobility Anchor
11.8. Wholesale
11.9. CGN on WLAN-GW
11.10. Lawful Intercept on WLAN-GW
11.11. WLAN Location Enhancements
11.11.1. Triggered Interim Accounting-Updates
11.11.2. Operational Support
11.12. 3G/4G Interworking
11.12.1. Signaling Call Flow
11.12.1.1. GTP Setup with EAP Authentication
11.12.2. Location Notification in S2a
11.12.2.1. WLAN Location over S2a
11.12.2.2. Cellular Location over S2a
11.12.2.3. Cellular Location over Gn Interface
11.12.2.4. Operational Support
11.13. Migrant User Support
11.13.1. Migrant User Support with Portal-Authentication
11.13.1.1. DHCP
11.13.1.2. Authentication and Forwarding
11.13.2. Migrant User Support with EAP Authentication
11.13.3. Data Triggered Subscriber Creation
11.14. Distributed Subscriber Management (DSM)
11.14.1. DHCP
11.14.2. Authentication and Accounting
11.14.2.1. DSM Data-Plane
11.14.3. IP Filtering
11.14.3.1. Policing
11.14.3.2. Lawful Intercept (LI)
11.14.3.3. Data-Triggered UE Creation
11.14.4. Idle-Timeout and Session-Timeout Management
11.14.5. Operational Commands
11.14.6. Pool Manager
11.14.7. DHCPv6 and SLAAC
11.14.8. Call Trace
11.15. Distributed RADIUS Proxy
11.15.1. Enhanced Subscriber Management
11.15.2. Distributed Subscriber Management
11.15.3. VLAN Awareness
11.15.4. Operational Commands
11.16. WLAN-GW 1:1 Active-Backup Redundancy
11.16.1. DHCP Server Redundancy
11.16.2. Subscriber Creation after Switchover
11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
11.19. IPv6-only Access
11.19.1. IPv6 GRE Tunnels
11.19.2. IPv6 Client-Side RADIUS Proxy
11.19.3. Dual-Stack UEs over WLAN-GW
11.19.3.1. SLAAC Prefix Assignment
11.19.3.2. DHCPv6 IA_NA Assignment
11.19.3.3. Migrant User Support
11.19.3.4. Accounting
11.20. Layer 2 Wholesale
11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
11.22. Soft-L2TPv3 Tunnels
WiFi Command Reference
Command Hierarchies
WLAN-GW Commands
Subscriber Management BRG Commands
DSM Call Trace Commands
WLAN-GW Service Commands
RADIUS Server and Proxy Commands
LUDB Matching for RADIUS Proxy Cache
Data Plane Related Commands
Port Policy Commands
WIFI Aggregation and Offload – Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
WIFI Aggregation and Offload Commands
WIFI Aggregation and Offload Commands
Generic Commands
WLAN-GW Commands
DSM Call Trace Commands
RADIUS Server Policy Commands
CLI Command Description for RADIUS Server
CLI Command Description for RADIUS Proxy Server
LUDB Matching of RADIUS Proxy Cache Commands
WLAN-GW-Group Commands
Port Policy Commands
WLAN-GW Group Interface Commands
Migrant User Support Commands
Distributed Subscriber Management Commands
Show Commands
Debug Commands
Tools Commands
Clear Commands
12. GTP
12.1. In This Chapter
12.2. GTP Uplink
12.2.1. Identification Attributes
12.2.2. P-GW/GGSN Selection
12.2.3. Configuration
12.2.4. QoS Support
12.2.5. GTP Session Hold
12.2.6. Selective Breakout
12.2.7. IPoE Support
12.2.8. PPPoE Support
12.3. GTP Peering
12.4. Operational Commands
12.4.1. show router wlan-gw mobile-gateway
12.4.2. show router 300 wlan-gw mgw-address-cache
12.4.3. show subscriber-mgmt wlan-gw gtp-session detail
12.4.4. show subscriber-mgmt wlan-gw mgw-profile "default"
12.4.5. show subscriber-mgmt wlan-gw gtp-statistics
GTP Command Reference
Command Hierarchies
GTP Commands
GTP Service Commands
GTP Command Descriptions
GTP Commands
Generic Commands
GTP Commands
13.
virtual Residential Gateway
13.1. In This Section
13.2. virtual Residential Gateway Overview
13.2.1. Access Modes
13.2.2. Home Context on the vRGW
13.2.2.1. Implicit Home Authentication
13.2.2.2. Explicit Home Authentication
13.2.2.3. Change of Configuration
13.2.2.4. Home Lifetime
13.2.3. Device Context on the vRGW
13.2.4. Dynamic Configuration Changes
13.2.5. Per-Home Pool Management and L2-Aware NAT
13.2.5.1. Sticky IP Addresses
13.2.5.2. Managed Static IPv4 Addresses
13.2.5.3. DMZ
13.2.6. IPv6
13.2.7. QoS and Filter Support
13.2.8. Data-Triggered Authentication
13.2.9. Per-Host NAT Port Ranges
13.2.10. Inter-Chassis Redundancy
13.2.10.1. Pool State Synchronization
13.2.10.2. Regular Group Interfaces
13.2.10.3. WLAN-GW Group Interfaces
13.2.11. BRG and vRG Caveats
vRGW Command Reference
Command Hierarchies
Subscriber Management BRG Profile Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
Command Descriptions
Generic Commands
vRGW Commands
Subscriber Management Commands
Service Commands
Show Commands
Clear Commands
14. Dynamic Data Services
14.1. In This Section
14.2. Introduction to Dynamic Data Services
14.3. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
14.4. Data-Triggered Dynamic Data Services
14.4.1. Data Trigger
14.4.2. Dynamic Services Data Trigger Capture SAP
14.4.3. RADIUS Authentication
14.4.4. Local Authentication
14.4.5. Data-Triggered Dynamic Service Provisioning
14.4.6. Control Plane Protection
14.4.7. Debugging
RADIUS Triggered Dynamic Data Services Command Reference
Command Hierarchies
RADIUS Triggered Dynamic Data Services Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
RADIUS Triggered Dynamic Data Services Commands
Configuration Commands
Basic System Command
Show Commands
Clear Commands
Debug Commands
Tools Commands
15. Diameter and Diameter Applications
15.1. In This Section
15.2. Restrictions
15.3. Terminology
15.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
15.4.1. Extended Failure Handling (EFH)
15.4.1.1. Extended Failure Handling Example Call Flow
15.4.1.2. Extended Failure Handling Triggers
15.4.1.3. Assigning Interim Credit
15.4.1.4. Enabling Extended Failure Handling
15.4.1.5. Configuration Example 1 - Single Volume Interim Credit Value
15.4.1.6. Configuration Example 2 - Interim Credit Values Per Rating Group
15.4.1.7. Monitoring the Extended Failure Handling State
15.4.1.8. Additional Call Flow Examples
15.4.1.8.1. User Disconnects While EFH is Active
15.4.1.8.2. The Maximum Number of Attempts is Reached
15.4.1.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
15.5. Policy Management via Gx Interface
15.5.1. Gx Protocol
15.5.2. Policy Assignment Models
15.5.3. IP-CAN Session – Gx Session Identification
15.5.3.1. User Identification in PCRF
15.5.3.2. NAS-Port-Id as Subscription-Id
15.5.4. Gx Interface and ESM Subscriber Instantiation
15.5.4.1. Gx and Dual-Stack Hosts
15.5.4.2. Gx and PPPoEv6-DHCP
15.5.5. Gx Fallback Function
15.5.6. Gx CCR-I Replays
15.5.7. Gx CCR-t Replays
15.5.7.1. RAR and CCR-t Replay
15.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
15.5.7.3. CCR-t Replay And High Availability
15.5.8. Automatic Updates for IP Address Allocation/De-allocation
15.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
15.5.10. Gx, ESM and AA
15.5.10.1. ESM Subscriber-host vs AA Subscriber
15.5.10.2. AA Subscriber State
15.5.11. Policy Management via Gx
15.5.12. Gx-Based Overrides
15.5.12.1. Instantiation of Gx Overrides
15.5.12.2. HTTP Redirect Override
15.5.12.3. Removal of Overrides
15.5.12.4. Examples of Gx Overrides
15.5.13. PCC Rules
15.5.13.1. PCC Rule Concept
15.5.13.2. PCC Rule Instantiation
15.5.13.3. Base QoS-Policy and Base Filter
15.5.13.4. Generic Policy Sharing and Rule Sharing
15.5.13.5. PCC Rule Name and PCC Rule Removal
15.5.13.6. Gx Rule Ordering
15.5.13.7. PCC Rule Override
15.5.13.8. Aggregation of IP-Criterion
15.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
15.5.13.10. Gx Rules with Multiple Actions and Action Sharing
15.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
15.5.13.12. RADIUS and Gx Interaction
15.5.13.13. Bulk Changes via CLI while Gx Rules are Active
15.5.13.14. PCC Rule Direction
15.5.13.15. Action
15.5.13.16. Rate-Limiting Action (Ingress, Egress)
15.5.13.16.1. Dynamic Policers and Queue Mappings
15.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
15.5.13.17. Forwarding-Class Change (Ingress, Egress)
15.5.13.18. QoS Forward (Ingress and Egress)
15.5.13.19. Next-Hop Redirect (Ingress)
15.5.13.20. HTTP Redirect (Ingress)
15.5.13.21. Filter Forward/Drop (Ingress and Egress)
15.5.13.22. Service Gating Function
15.5.13.23. PCC Rule Provisioning Example
15.5.13.24. Operational Aspects
15.5.13.25. PCC Rules and Capacity Planning
15.5.13.26. PCC Rule Scaling Example
15.5.14. NAS Filter Inserts
15.5.14.1. Examples of NAS Entry Inserts
15.5.15. Error Handing and Rule Failure Reporting in ESM
15.5.15.1. AVP Decoding Failure in Gx
15.5.15.2. ESM Rule-Installation Failure
15.5.15.3. Failure Reporting in AA
15.5.15.4. Summary of Failure Reporting
15.5.16. Usage-Monitoring and Reporting
15.5.16.1. ESM Usage-Monitoring - What is Being Monitored
15.5.16.2. AA Usage-Monitoring – What is Being Monitored
15.5.16.3. Requesting Usage-Monitoring in ESM
15.5.16.4. Reporting Accumulated Usage
15.5.16.5. Disabling Usage-Monitoring
15.5.16.6. Usage-Monitoring for PCC Rules
15.5.16.7. Session Termination
15.5.16.8. Usage-Monitoring Examples
15.5.17. Event Triggers
15.5.18. Subscriber Verification
15.5.19. Subscriber Termination
15.5.20. Mobility Support in WiFi
15.5.20.1. Redundancy
15.5.21. Persistency and Origin-State-ID AVP
15.5.22. Overload Protection
15.6. Diameter NASREQ Application
15.6.1. Sample Configuration Steps
15.7. Diameter Redundancy
15.7.1. Diameter Peer Level Redundancy
15.7.2. Diameter Multi-Chassis Redundancy
15.7.2.1. Diameter Proxy Model General Operational Principles
15.7.2.2. Diameter Proxy Activity Selection
15.7.2.3. Synchronization and MCS
15.7.2.4. Retransmissions
15.7.2.5. Retransmissions and the T-bit
15.7.2.6. Diameter Proxy Role
15.7.2.7. Diameter Proxy and CC-Request-Number AVP
15.7.2.8. Stateless Diameter Proxy
15.7.2.9. Switchover Scenarios
15.7.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
15.7.2.11. Switchover Update Event (CCR-u)
15.7.2.12. Isolated Chassis
15.7.2.13. Diameter Identities
15.7.2.14. High Availability
15.7.3. Gx Specific Behavior
15.8. Diameter Debugging
16.
Python Script Support for ESM
16.1. In This Chapter
16.2. Python Script Support for ESM
16.3. Python in SR OS Overview
16.3.1. Python Policy – GTPv1-C API
16.3.2. Python Policy – GTPv2-C API
16.3.3. Python Changes
16.4. Python Support in sub-ident-policy
16.4.1. Configuration
16.4.2. Operator Debugging
16.4.3. Python Scripts
16.4.4. Sample Python Scripts
16.4.4.1. Example
16.4.4.2. Example
16.4.4.3. Example
16.4.5. Limitations
16.5. RADIUS Script Policy Overview
16.5.1. Python RADIUS API
16.5.2. Sample Script
16.6. Python Policy Overview
16.6.1. Python Policy – RADIUS API
16.6.2. Python Policy – DHCPv4 API
16.6.3. Python Policy – DHCPv6 API
16.6.4. Python Policy – Diameter API
16.6.5. Python Policy – DHCP Transaction Cache API
16.6.6. Python for PPPoE API
16.6.7. Python API for PPP Packet
16.6.8. Python API for PPP PAP
16.6.9. Python API for PPP CHAP
16.6.10. Python ESM API
16.6.11. Python Cache Support
16.6.12. Applying a Python Policy
16.6.13. Python Script Protection
16.7. Tips and Tricks
Python Command Reference
Command Hierarchies
Python Policy Commands
Python Script Commands
Services Commands
Show Commands
Tools Commands
Debug Commands
Clear Commands
Command Descriptions
Python Configuration Commands
Global Commands
Python Policy Commands
Python Script Commands
Services Commands
Tools Commands
Show Commands
Debug Commands
Clear Commands
Python RADIUS Command Reference
Command Hierarchies
Command Descriptions
Generic Commands
Script Commands
17. Standards and Protocol Support
Customer Document and Product Support
Unicast Routing Protocols Guide R14.0.R4
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. In This Chapter
2.2. RIP Overview
2.2.1. RIP Features
2.2.1.1. RIP Version Types
2.2.1.2. RIPv2 Authentication
2.2.1.3. RIP Packet Format
2.2.1.3.1. RIPv1 Format
2.2.1.3.2. RIPv2 Format
2.3. RIPng
2.3.1. RIPng Protocol
2.4. Common Attributes
2.4.1. Metrics
2.4.2. Timers
2.4.3. Import and Export Policies
2.4.4. Hierarchical Levels
2.5. RIP Configuration Process Overview
2.6. Configuration Notes
2.6.1. General
Configuring RIP with CLI
RIP and RIPng Configuration Overview
Preconfiguration Requirements
RIP Hierarchy
Basic RIP Configuration
Common Configuration Tasks
Configuring Interfaces
Configuring a Route Policy
Configuring RIP Parameters
Configuring Global-Level Parameters
Configuring Group-Level Parameters
Configuring Neighbor-Level Parameters
RIP Configuration Management Tasks
Modifying RIP Parameters
Deleting a Group
Deleting a Neighbor
RIP Configuration Command Reference
Command Hierarchies
Configuration Commands
Group Commands
Neighbor Commands
RIPng Configuration Commands
Group Commands
Neighbor Commands
Command Descriptions
Generic Commands
RIP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show RIP Commands
Clear RIP Commands
Debug RIP Commands
Command Descriptions
Show Commands
Clear Commands
Debug RIP Commands
3. OSPF
3.1. In This Chapter
3.2. Configuring OSPF
3.2.1. OSPF Areas
3.2.1.1. Backbone Area
3.2.1.2. Stub Area
3.2.1.3. Not-So-Stubby Area
3.2.1.3.1. OSPF Super Backbone
3.2.1.3.2. Sham Links
3.2.1.3.3. Implementing the OSPF Super Backbone
3.2.1.3.4. Loop Avoidance
3.2.1.3.5. DN-BIT
3.2.1.3.6. Route Tag
3.2.1.3.7. Sham Links
3.2.2. OSPFv3 Authentication
3.2.2.1. OSPFv3 Graceful Restart Helper
3.2.3. Virtual Links
3.2.4. Neighbors and Adjacencies
3.2.5. Link-State Advertisements
3.2.6. Metrics
3.2.7. Authentication
3.2.8. IP Subnets
3.2.9. Preconfiguration Recommendations
3.2.10. Multiple OSPF Instances
3.2.10.1. Route Export Policies for OSPF
3.2.10.2. Preventing Route Redistribution Loops
3.2.11. Multi-Address Support for OSPFv3
3.2.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.2.12.1. IP FRR Configuration
3.2.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.12.2. ECMP Considerations
3.2.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.2.12.4. IP FRR and BGP Next-Hop Resolution
3.2.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.2.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.2.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.3.1. Configuring a Route Next-Hop Policy Template
3.3.1.1. Configuring Affinity or Admin Group Constraints
3.3.1.2. Configuring SRLG Group Constraints
3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.3.1.4. Configuring Protection Type and Next-Hop Type Preferences
3.3.2. Application of Route Next-Hop Policy Template to an Interface
3.3.3. Excluding Prefixes from LFA SPF
3.3.4. Modification to LFA Next-Hop Selection Algorithm
3.4. LFA Protection using Segment Routing Backup Node SID
3.4.1. Configuring LFA using Backup Node SID
3.4.2. Detailed Operation of LFA Protection using Backup Node SID
3.4.3. Duplicate SID Handling
3.4.4. OSPF Control Plane Extensions
3.5. Segment Routing in Shortest Path Forwarding
3.6. OSPF LSA Filtering
3.7. FIB Prioritization
3.8. OSPF Configuration Process Overview
3.9. Configuration Notes
3.9.1. General
3.9.1.1. OSPF Defaults
Configuring OSPF with CLI
OSPF Configuration Guidelines
Basic OSPF Configuration
Configuring the Router ID
Configuring OSPF Components
Configuring OSPF Parameters
Configuring OSPF3 Parameters
Configuring an OSPF or OSPF3 Area
Configuring a Stub Area
Configuring a Not-So-Stubby Area
Configuring a Virtual Link
Configuring an Interface
Configuring Authentication
Overview
Configuring Authentication Keys and Algorithms
Configuring Authentication using Keychains
Assigning a Designated Router
Configuring Route Summaries
Configuring Route Preferences
OSPF Configuration Management Tasks
Modifying a Router ID
Deleting a Router ID
Modifying OSPF Parameters
OSPF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
OSPF Global Commands
OSPF Area Commands
Interface/Virtual Link Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
4. IS-IS
4.1. In This Chapter
4.2. Configuring IS-IS
4.2.1. Routing
4.2.2. IS-IS Frequently Used Terms
4.2.3. ISO Network Addressing
4.2.3.1. IS-IS PDU Configuration
4.2.3.2. IS-IS Operations
4.2.4. IS-IS Route Summarization
4.2.4.1. Partial SPF Calculation
4.2.5. IS-IS MT-Topology Support
4.2.5.1. Native IPv6 Support
4.2.6. IS-IS Administrative Tags
4.2.6.1. Setting Route Tags
4.2.6.2. Using Route Tags
4.2.6.3. Unnumbered Interface Support
4.2.7. Segment Routing in Shortest Path Forwarding
4.2.7.1. Configuring Segment Routing in Shortest Path
4.2.7.2. Segment Routing Operational Procedures
4.2.7.2.1. Prefix Advertisement and Resolution
4.2.7.2.2. Error and Resource Exhaustion Handling
4.2.7.3. Segment Routing Tunnel Management
4.2.7.3.1. Tunnel MTU Determination
4.2.7.4. Remote LFA with Segment Routing
4.2.7.5. IPv6 Segment Routing using MPLS Encapsulation
4.2.7.5.1. IS-IS MT=0 Extensions
4.2.7.5.2. Service and Forwarding Contexts Supported
4.2.7.5.3. Services Using SDP with a SR IPv6 Tunnel
4.2.7.6. Data Path Support
4.2.7.6.1. Hash Label and Entropy Label Support
4.2.7.7. Control Protocol Changes
4.2.7.7.1. IS-IS Control Protocol Changes
4.2.7.7.2. OSPF Control Protocol Changes
4.2.7.8. BGP Shortcut Using Segment Routing Tunnel
4.2.7.9. BGP Label Route Resolution Using Segment Routing Tunnel
4.2.7.10. Service Packet Forwarding with Segment Routing
4.2.7.11. Mirror Services and Lawful Intercept
4.2.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.2.8.1. Segment Routing Mapping Server
4.2.8.2. Segment Routing Mapping Server Prefix SID Resolution
4.3. FIB Prioritization
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
Configuring IS-IS with CLI
IS-IS Configuration Overview
Router Levels
Area Address Attributes
Interface Level Capability
Route Leaking
Basic IS-IS Configuration
Common Configuration Tasks
Configuring IS-IS Components
Enabling IS-IS
Modifying Router-Level Parameters
Configuring ISO Area Addresses
Configuring Global IS-IS Parameters
Migration to IS-IS Multi-Topology
Configuring Interface Parameters
Example: Configuring a Level 1 Area
Example: Modifying a Router’s Level Capability
Configuring IS-IS Link Groups
IS-IS Configuration Management Tasks
Disabling IS-IS
Removing IS-IS
Modifying Global IS-IS Parameters
Modifying IS-IS Interface Parameters
Configuring Authentication using Keychains
Configuring Leaking
Redistributing External IS-IS Routers
Specifying MAC Addresses for All IS-IS Routers
IS-IS Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
IS-IS Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
5. BGP
5.1. In This Chapter
5.2. BGP Overview
5.3. BGP Sessions
5.3.1. BGP Session States
5.3.2. Detecting BGP Session Failures
5.3.2.1. Peer Tracking
5.3.2.2. Bidirectional Forwarding Detection (BFD)
5.3.2.3. Fast External Failover
5.3.3. High Availability BGP Sessions
5.3.3.1. BGP Graceful Restart
5.3.4. BGP Session Security
5.3.4.1. TCP MD5 Authentication
5.3.4.2. TTL Security Mechanism
5.3.5. BGP Groups
5.4. BGP Design Concepts
5.4.1. Route Reflection
5.4.2. BGP Confederations
5.5. BGP Messages
5.5.1. Open Message
5.5.1.1. Changing the Autonomous System Number
5.5.1.2. Changing a Confederation Number
5.5.1.3. BGP Advertisement
5.5.2. Update Message
5.5.3. Keepalive Message
5.5.4. Notification Message
5.5.4.1. UPDATE Message Error Handling
5.5.5. Route Refresh Message
5.6. BGP Path Attributes
5.6.1. Origin
5.6.2. AS Path
5.6.2.1. AS Override
5.6.2.2. Using Local AS for ASN Migration
5.6.2.3. 4-Octet Autonomous System Numbers
5.6.3. Next-Hop
5.6.3.1. Next-Hop IPv4 Address Family over IPv6
5.6.3.2. Next-Hop VPN-IPv4 Address Family over IPv6
5.6.3.3. Next-Hop VPN-IPv6 Address Family over IPv6
5.6.3.4. Next-Hop Resolution
5.6.3.5. Next-Hop Tracking
5.6.3.6. Next-Hop Indirection
5.6.3.7. Using Multiple Address Families over IPv6 BGP Sessions
5.6.4. MED
5.6.4.1. Deterministic MED
5.6.5. Local Preference
5.6.6. Route Aggregation Path Attributes
5.6.7. Community and Extended Community Attributes
5.6.8. Route Reflection Attributes
5.6.9. Multi-Protocol BGP Attributes
5.6.10. 4-Octet AS Attributes
5.6.11. AIGP Metric
5.7. BGP Routing Information Base (RIB)
5.7.1. RIB-IN Features
5.7.1.1. BGP Import Policies
5.7.2. LOC-RIB Features
5.7.2.1. BGP Decision Process
5.7.2.1.1. Always Compare MED
5.7.2.1.2. Ignore Next-Hop Metric
5.7.2.2. BGP Route Installation in the Route Table
5.7.2.3. Weighted ECMP for BGP Routes
5.7.2.4. BGP Route Installation in the Tunnel Table
5.7.2.5. BGP Fast Reroute
5.7.2.5.1. Calculating Backup Paths
5.7.2.5.2. Failure Detection and Switchover to the Backup Path
5.7.2.6. QoS Policy Propagation via BGP (QPPB)
5.7.2.7. BGP Policy Accounting
5.7.2.8. Route Flap Damping (RFD)
5.7.3. RIB-OUT Features
5.7.3.1. BGP Export Policies
5.7.3.2. Outbound Route Filtering (ORF)
5.7.3.3. RT Constrained Route Distribution
5.7.3.4. Min Route Advertisement Interval (MRAI)
5.7.3.5. Advertise-Inactive
5.7.3.6. Best-External
5.7.3.7. Add-Paths
5.7.3.7.1. Path Selection with Add-Paths
5.7.3.8. Split-Horizon
5.8. BGP Applications
5.8.1. Next-hop Resolution Using Tunnels
5.8.1.1. BGP Routes
5.8.1.2. BGP Labeled Routes
5.8.1.3. VPN-IPv4 and VPN-IPv6 Routes
5.8.2. BGP Flow-Spec
5.8.2.1. Validating Received Flow Routes
5.8.2.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.3. Configuration of TTL Propagation for BGP Label Routes
5.8.3.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.3.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.4. BGP Prefix Origin Validation
5.8.5. BGP Route Leaking
5.9. BGP Configuration Process Overview
5.10. Configuration Notes
5.10.1. General
5.10.1.1. BGP Defaults
5.10.1.2. BGP MIB Notes
Configuring BGP with CLI
BGP Configuration Overview
Preconfiguration Requirements
BGP Hierarchy
Internal and External BGP Configurations
Basic BGP Configuration
Common Configuration Tasks
Creating an Autonomous System
Configuring a Router ID
BGP Confederations
BGP Route Reflectors
BGP Components
Configuring Group Attributes
Configuring Neighbor Attributes
Configuring Route Reflection
Configuring a Confederation
BGP Configuration Management Tasks
Modifying an AS Number
Modifying a Confederation Number
Modifying the BGP Router ID
Modifying the Router-Level Router ID
Deleting a Neighbor
Deleting Groups
BGP Command Reference
Command Hierarchies
Global BGP Commands
Group BGP Commands
Neighbor BGP Commands
Other BGP-Related Commands
Command Descriptions
Generic Commands
BGP Commands
Other BGP-Related Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
6. Route Policies
6.1. In This Chapter
6.2. Configuring Route Policies
6.2.1. Policy Statements
6.2.1.1. Policy Statement Chaining and Logical Expressions
6.2.1.2. Routing Policy Subroutines
6.2.1.3. Policy Evaluation Command
6.2.1.4. Exclusive Editing for Policy Configuration
6.2.1.5. Default Action Behavior
6.2.1.6. Denied IP Unicast Prefixes
6.2.1.7. Controlling Route Flapping
6.2.2. Regular Expressions
6.2.3. BGP and OSPF Route Policy Support
6.2.3.1. BGP Route Policies
6.2.3.2. Re-advertised Route Policies
6.2.3.3. Triggered Policies
6.2.3.4. Set MED to IGP Cost using Route Policies
6.2.3.5. BGP Policy Subroutines
6.2.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.2.4. Routing Policy Parameterization
6.2.5. When to Use Route Policies
6.3. Route Policy Configuration Process Overview
6.4. Configuration Notes
6.4.1. General
Configuring Route Policies with CLI
Route Policy Configuration Overview
When to Create Routing Policies
Default Route Policy Actions
Policy Evaluation
Damping
Basic Configurations
Configuring Route Policy Components
Beginning the Policy Statement
Creating a Route Policy
Configuring a Default Action
Configuring an Entry
Configuring a Community List
Configuring Damping
Configuring a Prefix List
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Route Policy Configuration Management Tasks
Editing Policy Statements and Parameters
Deleting an Entry
Deleting a Policy Statement
Route Policy Command Reference
Command Hierarchies
Route Policy Configuration Commands
Command Descriptions
Generic Commands
Route Policy Options
Route Policy Damping Commands
Route Policy Prefix Commands
Route Policy Entry Match Commands
Route Policy Action Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
1. Getting Started
1.1. About This Guide
1.2. Router Configuration Process
2. RIP
2.1. In This Chapter
2.2. RIP Overview
2.2.1. RIP Features
2.2.1.1. RIP Version Types
2.2.1.2. RIPv2 Authentication
2.2.1.3. RIP Packet Format
2.2.1.3.1. RIPv1 Format
2.2.1.3.2. RIPv2 Format
2.3. RIPng
2.3.1. RIPng Protocol
2.4. Common Attributes
2.4.1. Metrics
2.4.2. Timers
2.4.3. Import and Export Policies
2.4.4. Hierarchical Levels
2.5. RIP Configuration Process Overview
2.6. Configuration Notes
2.6.1. General
Configuring RIP with CLI
RIP and RIPng Configuration Overview
Preconfiguration Requirements
RIP Hierarchy
Basic RIP Configuration
Common Configuration Tasks
Configuring Interfaces
Configuring a Route Policy
Configuring RIP Parameters
Configuring Global-Level Parameters
Configuring Group-Level Parameters
Configuring Neighbor-Level Parameters
RIP Configuration Management Tasks
Modifying RIP Parameters
Deleting a Group
Deleting a Neighbor
RIP Configuration Command Reference
Command Hierarchies
Configuration Commands
Group Commands
Neighbor Commands
RIPng Configuration Commands
Group Commands
Neighbor Commands
Command Descriptions
Generic Commands
RIP Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show RIP Commands
Clear RIP Commands
Debug RIP Commands
Command Descriptions
Show Commands
Clear Commands
Debug RIP Commands
3. OSPF
3.1. In This Chapter
3.2. Configuring OSPF
3.2.1. OSPF Areas
3.2.1.1. Backbone Area
3.2.1.2. Stub Area
3.2.1.3. Not-So-Stubby Area
3.2.1.3.1. OSPF Super Backbone
3.2.1.3.2. Sham Links
3.2.1.3.3. Implementing the OSPF Super Backbone
3.2.1.3.4. Loop Avoidance
3.2.1.3.5. DN-BIT
3.2.1.3.6. Route Tag
3.2.1.3.7. Sham Links
3.2.2. OSPFv3 Authentication
3.2.2.1. OSPFv3 Graceful Restart Helper
3.2.3. Virtual Links
3.2.4. Neighbors and Adjacencies
3.2.5. Link-State Advertisements
3.2.6. Metrics
3.2.7. Authentication
3.2.8. IP Subnets
3.2.9. Preconfiguration Recommendations
3.2.10. Multiple OSPF Instances
3.2.10.1. Route Export Policies for OSPF
3.2.10.2. Preventing Route Redistribution Loops
3.2.11. Multi-Address Support for OSPFv3
3.2.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
3.2.12.1. IP FRR Configuration
3.2.12.1.1. Reducing the Scope of the LFA Calculation by SPF
3.2.12.2. ECMP Considerations
3.2.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
3.2.12.4. IP FRR and BGP Next-Hop Resolution
3.2.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
3.2.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
3.2.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
3.3.1. Configuring a Route Next-Hop Policy Template
3.3.1.1. Configuring Affinity or Admin Group Constraints
3.3.1.2. Configuring SRLG Group Constraints
3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
3.3.1.4. Configuring Protection Type and Next-Hop Type Preferences
3.3.2. Application of Route Next-Hop Policy Template to an Interface
3.3.3. Excluding Prefixes from LFA SPF
3.3.4. Modification to LFA Next-Hop Selection Algorithm
3.4. LFA Protection using Segment Routing Backup Node SID
3.4.1. Configuring LFA using Backup Node SID
3.4.2. Detailed Operation of LFA Protection using Backup Node SID
3.4.3. Duplicate SID Handling
3.4.4. OSPF Control Plane Extensions
3.5. Segment Routing in Shortest Path Forwarding
3.6. OSPF LSA Filtering
3.7. FIB Prioritization
3.8. OSPF Configuration Process Overview
3.9. Configuration Notes
3.9.1. General
3.9.1.1. OSPF Defaults
Configuring OSPF with CLI
OSPF Configuration Guidelines
Basic OSPF Configuration
Configuring the Router ID
Configuring OSPF Components
Configuring OSPF Parameters
Configuring OSPF3 Parameters
Configuring an OSPF or OSPF3 Area
Configuring a Stub Area
Configuring a Not-So-Stubby Area
Configuring a Virtual Link
Configuring an Interface
Configuring Authentication
Overview
Configuring Authentication Keys and Algorithms
Configuring Authentication using Keychains
Assigning a Designated Router
Configuring Route Summaries
Configuring Route Preferences
OSPF Configuration Management Tasks
Modifying a Router ID
Deleting a Router ID
Modifying OSPF Parameters
OSPF Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
OSPF Global Commands
OSPF Area Commands
Interface/Virtual Link Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
4. IS-IS
4.1. In This Chapter
4.2. Configuring IS-IS
4.2.1. Routing
4.2.2. IS-IS Frequently Used Terms
4.2.3. ISO Network Addressing
4.2.3.1. IS-IS PDU Configuration
4.2.3.2. IS-IS Operations
4.2.4. IS-IS Route Summarization
4.2.4.1. Partial SPF Calculation
4.2.5. IS-IS MT-Topology Support
4.2.5.1. Native IPv6 Support
4.2.6. IS-IS Administrative Tags
4.2.6.1. Setting Route Tags
4.2.6.2. Using Route Tags
4.2.6.3. Unnumbered Interface Support
4.2.7. Segment Routing in Shortest Path Forwarding
4.2.7.1. Configuring Segment Routing in Shortest Path
4.2.7.2. Segment Routing Operational Procedures
4.2.7.2.1. Prefix Advertisement and Resolution
4.2.7.2.2. Error and Resource Exhaustion Handling
4.2.7.3. Segment Routing Tunnel Management
4.2.7.3.1. Tunnel MTU Determination
4.2.7.4. Remote LFA with Segment Routing
4.2.7.5. IPv6 Segment Routing using MPLS Encapsulation
4.2.7.5.1. IS-IS MT=0 Extensions
4.2.7.5.2. Service and Forwarding Contexts Supported
4.2.7.5.3. Services Using SDP with a SR IPv6 Tunnel
4.2.7.6. Data Path Support
4.2.7.6.1. Hash Label and Entropy Label Support
4.2.7.7. Control Protocol Changes
4.2.7.7.1. IS-IS Control Protocol Changes
4.2.7.7.2. OSPF Control Protocol Changes
4.2.7.8. BGP Shortcut Using Segment Routing Tunnel
4.2.7.9. BGP Label Route Resolution Using Segment Routing Tunnel
4.2.7.10. Service Packet Forwarding with Segment Routing
4.2.7.11. Mirror Services and Lawful Intercept
4.2.8. Segment Routing Mapping Server Function for IPv4 Prefixes
4.2.8.1. Segment Routing Mapping Server
4.2.8.2. Segment Routing Mapping Server Prefix SID Resolution
4.3. FIB Prioritization
4.4. IS-IS Configuration Process Overview
4.5. Configuration Notes
4.5.1. General
Configuring IS-IS with CLI
IS-IS Configuration Overview
Router Levels
Area Address Attributes
Interface Level Capability
Route Leaking
Basic IS-IS Configuration
Common Configuration Tasks
Configuring IS-IS Components
Enabling IS-IS
Modifying Router-Level Parameters
Configuring ISO Area Addresses
Configuring Global IS-IS Parameters
Migration to IS-IS Multi-Topology
Configuring Interface Parameters
Example: Configuring a Level 1 Area
Example: Modifying a Router’s Level Capability
Configuring IS-IS Link Groups
IS-IS Configuration Management Tasks
Disabling IS-IS
Removing IS-IS
Modifying Global IS-IS Parameters
Modifying IS-IS Interface Parameters
Configuring Authentication using Keychains
Configuring Leaking
Redistributing External IS-IS Routers
Specifying MAC Addresses for All IS-IS Routers
IS-IS Configuration Command Reference
Command Hierarchies
Configuration Commands
Command Descriptions
Generic Commands
IS-IS Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
5. BGP
5.1. In This Chapter
5.2. BGP Overview
5.3. BGP Sessions
5.3.1. BGP Session States
5.3.2. Detecting BGP Session Failures
5.3.2.1. Peer Tracking
5.3.2.2. Bidirectional Forwarding Detection (BFD)
5.3.2.3. Fast External Failover
5.3.3. High Availability BGP Sessions
5.3.3.1. BGP Graceful Restart
5.3.4. BGP Session Security
5.3.4.1. TCP MD5 Authentication
5.3.4.2. TTL Security Mechanism
5.3.5. BGP Groups
5.4. BGP Design Concepts
5.4.1. Route Reflection
5.4.2. BGP Confederations
5.5. BGP Messages
5.5.1. Open Message
5.5.1.1. Changing the Autonomous System Number
5.5.1.2. Changing a Confederation Number
5.5.1.3. BGP Advertisement
5.5.2. Update Message
5.5.3. Keepalive Message
5.5.4. Notification Message
5.5.4.1. UPDATE Message Error Handling
5.5.5. Route Refresh Message
5.6. BGP Path Attributes
5.6.1. Origin
5.6.2. AS Path
5.6.2.1. AS Override
5.6.2.2. Using Local AS for ASN Migration
5.6.2.3. 4-Octet Autonomous System Numbers
5.6.3. Next-Hop
5.6.3.1. Next-Hop IPv4 Address Family over IPv6
5.6.3.2. Next-Hop VPN-IPv4 Address Family over IPv6
5.6.3.3. Next-Hop VPN-IPv6 Address Family over IPv6
5.6.3.4. Next-Hop Resolution
5.6.3.5. Next-Hop Tracking
5.6.3.6. Next-Hop Indirection
5.6.3.7. Using Multiple Address Families over IPv6 BGP Sessions
5.6.4. MED
5.6.4.1. Deterministic MED
5.6.5. Local Preference
5.6.6. Route Aggregation Path Attributes
5.6.7. Community and Extended Community Attributes
5.6.8. Route Reflection Attributes
5.6.9. Multi-Protocol BGP Attributes
5.6.10. 4-Octet AS Attributes
5.6.11. AIGP Metric
5.7. BGP Routing Information Base (RIB)
5.7.1. RIB-IN Features
5.7.1.1. BGP Import Policies
5.7.2. LOC-RIB Features
5.7.2.1. BGP Decision Process
5.7.2.1.1. Always Compare MED
5.7.2.1.2. Ignore Next-Hop Metric
5.7.2.2. BGP Route Installation in the Route Table
5.7.2.3. Weighted ECMP for BGP Routes
5.7.2.4. BGP Route Installation in the Tunnel Table
5.7.2.5. BGP Fast Reroute
5.7.2.5.1. Calculating Backup Paths
5.7.2.5.2. Failure Detection and Switchover to the Backup Path
5.7.2.6. QoS Policy Propagation via BGP (QPPB)
5.7.2.7. BGP Policy Accounting
5.7.2.8. Route Flap Damping (RFD)
5.7.3. RIB-OUT Features
5.7.3.1. BGP Export Policies
5.7.3.2. Outbound Route Filtering (ORF)
5.7.3.3. RT Constrained Route Distribution
5.7.3.4. Min Route Advertisement Interval (MRAI)
5.7.3.5. Advertise-Inactive
5.7.3.6. Best-External
5.7.3.7. Add-Paths
5.7.3.7.1. Path Selection with Add-Paths
5.7.3.8. Split-Horizon
5.8. BGP Applications
5.8.1. Next-hop Resolution Using Tunnels
5.8.1.1. BGP Routes
5.8.1.2. BGP Labeled Routes
5.8.1.3. VPN-IPv4 and VPN-IPv6 Routes
5.8.2. BGP Flow-Spec
5.8.2.1. Validating Received Flow Routes
5.8.2.2. Using Flow Routes to Create Dynamic Filter Entries
5.8.3. Configuration of TTL Propagation for BGP Label Routes
5.8.3.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
5.8.3.2. TTL Propagation for RFC 3107 Label Routes at LSR
5.8.4. BGP Prefix Origin Validation
5.8.5. BGP Route Leaking
5.9. BGP Configuration Process Overview
5.10. Configuration Notes
5.10.1. General
5.10.1.1. BGP Defaults
5.10.1.2. BGP MIB Notes
Configuring BGP with CLI
BGP Configuration Overview
Preconfiguration Requirements
BGP Hierarchy
Internal and External BGP Configurations
Basic BGP Configuration
Common Configuration Tasks
Creating an Autonomous System
Configuring a Router ID
BGP Confederations
BGP Route Reflectors
BGP Components
Configuring Group Attributes
Configuring Neighbor Attributes
Configuring Route Reflection
Configuring a Confederation
BGP Configuration Management Tasks
Modifying an AS Number
Modifying a Confederation Number
Modifying the BGP Router ID
Modifying the Router-Level Router ID
Deleting a Neighbor
Deleting Groups
BGP Command Reference
Command Hierarchies
Global BGP Commands
Group BGP Commands
Neighbor BGP Commands
Other BGP-Related Commands
Command Descriptions
Generic Commands
BGP Commands
Other BGP-Related Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Clear Commands
Debug Commands
Command Descriptions
Show Commands
Clear Commands
Debug Commands
6. Route Policies
6.1. In This Chapter
6.2. Configuring Route Policies
6.2.1. Policy Statements
6.2.1.1. Policy Statement Chaining and Logical Expressions
6.2.1.2. Routing Policy Subroutines
6.2.1.3. Policy Evaluation Command
6.2.1.4. Exclusive Editing for Policy Configuration
6.2.1.5. Default Action Behavior
6.2.1.6. Denied IP Unicast Prefixes
6.2.1.7. Controlling Route Flapping
6.2.2. Regular Expressions
6.2.3. BGP and OSPF Route Policy Support
6.2.3.1. BGP Route Policies
6.2.3.2. Re-advertised Route Policies
6.2.3.3. Triggered Policies
6.2.3.4. Set MED to IGP Cost using Route Policies
6.2.3.5. BGP Policy Subroutines
6.2.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
6.2.4. Routing Policy Parameterization
6.2.5. When to Use Route Policies
6.3. Route Policy Configuration Process Overview
6.4. Configuration Notes
6.4.1. General
Configuring Route Policies with CLI
Route Policy Configuration Overview
When to Create Routing Policies
Default Route Policy Actions
Policy Evaluation
Damping
Basic Configurations
Configuring Route Policy Components
Beginning the Policy Statement
Creating a Route Policy
Configuring a Default Action
Configuring an Entry
Configuring a Community List
Configuring Damping
Configuring a Prefix List
Configuring PIM Join/Register Policies
Configuring Bootstrap Message Import and Export Policies
Route Policy Configuration Management Tasks
Editing Policy Statements and Parameters
Deleting an Entry
Deleting a Policy Statement
Route Policy Command Reference
Command Hierarchies
Route Policy Configuration Commands
Command Descriptions
Generic Commands
Route Policy Options
Route Policy Damping Commands
Route Policy Prefix Commands
Route Policy Entry Match Commands
Route Policy Action Commands
Show, Clear, and Debug Command Reference
Command Hierarchies
Show Commands
Command Descriptions
Show Commands
7. Standards and Protocol Support
Customer Document and Product Support
Versatile Service Module Guide R14.0.R4
1. Versatile Service Module
1.1. In This Guide
1.1.1. In This Chapter
1.2. VSM Overview
1.2.1. Multiple System Solution
1.2.2. Hybrid Service Solution
1.2.3. Single System Multiple Interface Solution
1.2.4. Full Feature Internal Service Cross Connect Solution
1.3. Functional Components
1.3.1. Service Cross Connect Adapter (CCA)
1.3.2. Internal Service CCAG
1.3.3. Internal Service Cross Connect Identifier (CCID)
1.4. CCAG Bandwidth and Resiliency
1.4.1. CCAG LAG Attributes
1.4.2. CCAG Traffic Distribution
1.4.3. CCAG SAP QoS
1.4.3.1. Link Level CCAG SAP QoS Adaptation
1.4.3.2. Distributed CCAG SAP QoS Adaptation
1.4.4. VSM-CCA-XP
1.5. Configuration Process Overview
1.6. Configuration Notes
Configuring VSM and CCAG with CLI
Basic Configuration
Common Configuration Tasks
Configure VSM CCAG Components
Provision VSM on an MDA
Provision CCAG Parameters
Configure Path Components
Cross Connecting Network IP Interfaces
Cross Connecting Services
Epipe
VPLS
IES
VPRN
Service Management Tasks
Modifying or Deleting a VSM MDA
Modifying CCAG Parameters on a Network IP Interface
Modifying CCAG Parameters
Modifying Path Parameters
Modifying Service Parameters
Epipe
VPLS
IES
VPRN
VSM Command Reference
Command Hierarchies
VSM Configuration Commands
Related Commands
VSM Configuration Command Descriptions
Generic Commands
VSM CLI Tree Node Commands
VSM Path Commands
Related Commands
Services Commands
Service CCAG SAP Provisioning
2. Standards and Protocol Support
Customer Document and Product Support
1. Versatile Service Module
1.1. In This Guide
1.1.1. In This Chapter
1.2. VSM Overview
1.2.1. Multiple System Solution
1.2.2. Hybrid Service Solution
1.2.3. Single System Multiple Interface Solution
1.2.4. Full Feature Internal Service Cross Connect Solution
1.3. Functional Components
1.3.1. Service Cross Connect Adapter (CCA)
1.3.2. Internal Service CCAG
1.3.3. Internal Service Cross Connect Identifier (CCID)
1.4. CCAG Bandwidth and Resiliency
1.4.1. CCAG LAG Attributes
1.4.2. CCAG Traffic Distribution
1.4.3. CCAG SAP QoS
1.4.3.1. Link Level CCAG SAP QoS Adaptation
1.4.3.2. Distributed CCAG SAP QoS Adaptation
1.4.4. VSM-CCA-XP
1.5. Configuration Process Overview
1.6. Configuration Notes
Configuring VSM and CCAG with CLI
Basic Configuration
Common Configuration Tasks
Configure VSM CCAG Components
Provision VSM on an MDA
Provision CCAG Parameters
Configure Path Components
Cross Connecting Network IP Interfaces
Cross Connecting Services
Epipe
VPLS
IES
VPRN
Service Management Tasks
Modifying or Deleting a VSM MDA
Modifying CCAG Parameters on a Network IP Interface
Modifying CCAG Parameters
Modifying Path Parameters
Modifying Service Parameters
Epipe
VPLS
IES
VPRN
VSM Command Reference
Command Hierarchies
VSM Configuration Commands
Related Commands
VSM Configuration Command Descriptions
Generic Commands
VSM CLI Tree Node Commands
VSM Path Commands
Related Commands
Services Commands
Service CCAG SAP Provisioning
2. Standards and Protocol Support
Customer Document and Product Support