Nokia 7450 ESS, 7750 SR, and 7950 XRS Release 14.0.R4
  Legal Disclaimers
  Customer Documentation and Product Support
  Legal Disclaimers
  Customer Documentation and Product Support
Acronym Reference Guide R14.0.R4
  1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Document and Product Support
  1. 7750 SR, 7450 ESS, and 7950 XRS Acronyms
  Customer Document and Product Support
Basic System Configuration Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
    1.2. In This Chapter
    1.3. Router System Configuration Process
  2. CLI Usage
    2.1. In This Chapter
    2.2. CLI Structure
    2.3. Navigating in the CLI
      2.3.1. CLI Contexts
      2.3.2. Basic CLI Commands
      2.3.3. CLI Environment Commands
      2.3.4. CLI Monitor Commands
    2.4. Getting Help in the CLI
    2.5. The CLI Command Prompt
    2.6. Displaying Configuration Contexts
    2.7. EXEC Files
    2.8. CLI Script Control
    2.9. Entering CLI Commands
      2.9.1. Command Completion
      2.9.2. Unordered and Unnamed Parameters
      2.9.3. Editing Keystrokes
      2.9.4. Absolute Paths
      2.9.5. History
      2.9.6. Entering Numerical Ranges
      2.9.7. Pipe/Match
      2.9.8. Pipe/Count
      2.9.9. Redirection
    2.10. VI Editor
      2.10.1. Summary of vi Commands
      2.10.2. Using the vi Commands
      2.10.3. EX Commands
    2.11. Configuration Rollback
      2.11.1. Feature Behavior
      2.11.2. Rollback and SNMP
      2.11.3. Rescue Configuration
      2.11.4. Operational Guidelines
    2.12. Transactional Configuration
      2.12.1. Basic Operation
      2.12.2. Transactions and Rollback
      2.12.3. Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Global Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        Monitor CLI Commands
        CLI Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  3. File System Management
    3.1. In This Chapter
    3.2. The File System
      3.2.1. Compact Flash Devices
      3.2.2. URLs
      3.2.3. Wildcards
    3.3. File Management Tasks
      3.3.1. Modifying File Attributes
      3.3.2. Creating Directories
      3.3.3. Copying Files
      3.3.4. Moving Files
      3.3.5. Deleting Files and Removing Directories
      3.3.6. Displaying Directory and File Information
      3.3.7. Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  4. Boot Options
    4.1. In This Chapter
    4.2. System Initialization
      4.2.1. Configuration and Image Loading
        4.2.1.1. Persistence
        4.2.1.2. Lawful Intercept
        4.2.1.3. FIPS-140-2 Mode
    4.3. Initial System Startup Process Flow
    4.4. Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  5. System Management
    5.1. In This Chapter
    5.2. System Management Parameters
      5.2.1. System Information
        5.2.1.1. System Name
        5.2.1.2. System Contact
        5.2.1.3. System Location
        5.2.1.4. System Coordinates
        5.2.1.5. Naming Objects
        5.2.1.6. Common Language Location Identifier
        5.2.1.7. DNS Security Extensions
      5.2.2. System Time
        5.2.2.1. Time Zones
        5.2.2.2. Network Time Protocol (NTP)
        5.2.2.3. SNTP Time Synchronization
        5.2.2.4. CRON
    5.3. High Availability
      5.3.1. HA Features
        5.3.1.1. Redundancy
          5.3.1.1.1. Software Redundancy
          5.3.1.1.2. Configuration Redundancy
          5.3.1.1.3. Component Redundancy
          5.3.1.1.4. Service Redundancy
          5.3.1.1.5. Accounting Configuration Redundancy
        5.3.1.2. Nonstop Forwarding
        5.3.1.3. Nonstop Routing (NSR)
        5.3.1.4. CPM Switchover
        5.3.1.5. Synchronization
          5.3.1.5.1. Configuration and boot-env Synchronization
          5.3.1.5.2. State Database Synchronization
    5.4. Synchronization and Redundancy
      5.4.1. Active and Standby Designations
      5.4.2. When the Active CPM Goes Offline
      5.4.3. OOB Management Ethernet Port Redundancy
      5.4.4. Persistence
        5.4.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    5.5. Network Synchronization
      5.5.1. Central Synchronization Sub-System
      5.5.2. 7950 XRS-40 Extension Chassis Central Clocks
      5.5.3. Synchronization Status Messages (SSM)
        5.5.3.1. DS1 Signals
        5.5.3.2. E1 Signals
        5.5.3.3. SONET/SDH Signals
        5.5.3.4. DS3/E3
      5.5.4. Synchronous Ethernet
      5.5.5. Clock Source Quality Level Definitions
      5.5.6. IEEE 1588v2 PTP
        5.5.6.1. PTP Clock Synchronization
        5.5.6.2. Performance Considerations
          5.5.6.2.1. Port-Based Timestamping of PTP Messages
        5.5.6.3. PTP Capabilities
        5.5.6.4. PTP Ordinary Slave Clock For Frequency
        5.5.6.5. PTP Ordinary Master Clock For Frequency
        5.5.6.6. PTP Boundary Clock for Frequency and Time
        5.5.6.7. PTP Clock Redundancy
        5.5.6.8. PTP Time for System Time and OAM Time
        5.5.6.9. PTP within Routing Instances
    5.6. System-Wide ATM Parameters
    5.7. Link Layer Discovery Protocol (LLDP)
    5.8. IP Hashing as an LSR
    5.9. Ethernet Satellites
      5.9.1. Software Repositories for Satellites
      5.9.2. Satellite Software Upgrade Overview
      5.9.3. Satellite Configuration
        5.9.3.1. Satellite Client Port Association
    5.10. Optical Extension Shelf (OES)
    5.11. Administrative Tasks
      5.11.1. Configuring the Chassis Mode
      5.11.2. Saving Configurations
      5.11.3. Specifying Post-Boot Configuration Files
      5.11.4. Network Timing
      5.11.5. Power Supplies
      5.11.6. Automatic Synchronization
        5.11.6.1. Boot-Env Option
        5.11.6.2. Config Option
      5.11.7. Manual Synchronization
        5.11.7.1. Forcing a Switchover
    5.12. System Router Instances
    5.13. System Configuration Process Overview
    5.14. Configuration Notes
      5.14.1. General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Synchronization Commands
        System Administration (Admin) Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
        Optical Extension Shelf (OES) Commands
        System Router Instance Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          System Time Commands
        Cron Commands
        Script Control Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
        Optical Extension Shelf (OES) Commands
        System Router Instance Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
    1.2. In This Chapter
    1.3. Router System Configuration Process
  2. CLI Usage
    2.1. In This Chapter
    2.2. CLI Structure
    2.3. Navigating in the CLI
      2.3.1. CLI Contexts
      2.3.2. Basic CLI Commands
      2.3.3. CLI Environment Commands
      2.3.4. CLI Monitor Commands
    2.4. Getting Help in the CLI
    2.5. The CLI Command Prompt
    2.6. Displaying Configuration Contexts
    2.7. EXEC Files
    2.8. CLI Script Control
    2.9. Entering CLI Commands
      2.9.1. Command Completion
      2.9.2. Unordered and Unnamed Parameters
      2.9.3. Editing Keystrokes
      2.9.4. Absolute Paths
      2.9.5. History
      2.9.6. Entering Numerical Ranges
      2.9.7. Pipe/Match
      2.9.8. Pipe/Count
      2.9.9. Redirection
    2.10. VI Editor
      2.10.1. Summary of vi Commands
      2.10.2. Using the vi Commands
      2.10.3. EX Commands
    2.11. Configuration Rollback
      2.11.1. Feature Behavior
      2.11.2. Rollback and SNMP
      2.11.3. Rescue Configuration
      2.11.4. Operational Guidelines
    2.12. Transactional Configuration
      2.12.1. Basic Operation
      2.12.2. Transactions and Rollback
      2.12.3. Authorization
    Basic CLI Command Reference
      Command Hierarchies
        Global Commands
        Monitor Commands
        Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
      Command Descriptions
        Global Commands
        Monitor CLI Commands
        CLI Environment Commands
        Candidate Commands
        Rollback Commands
        Management Infrastructure Control Commands
        Show Commands
  3. File System Management
    3.1. In This Chapter
    3.2. The File System
      3.2.1. Compact Flash Devices
      3.2.2. URLs
      3.2.3. Wildcards
    3.3. File Management Tasks
      3.3.1. Modifying File Attributes
      3.3.2. Creating Directories
      3.3.3. Copying Files
      3.3.4. Moving Files
      3.3.5. Deleting Files and Removing Directories
      3.3.6. Displaying Directory and File Information
      3.3.7. Repairing the File System
    File Command Reference
      Command Hierarchy
        File Commands
      Command Descriptions
        File System Commands
        File Commands
  4. Boot Options
    4.1. In This Chapter
    4.2. System Initialization
      4.2.1. Configuration and Image Loading
        4.2.1.1. Persistence
        4.2.1.2. Lawful Intercept
        4.2.1.3. FIPS-140-2 Mode
    4.3. Initial System Startup Process Flow
    4.4. Configuration Notes
    Configuring Boot Options File with CLI
    BOF Configuration Overview
    Basic BOF Configuration
    Common Configuration Tasks
      Searching for the BOF
      Accessing the CLI
        Console Connection
    Configuring BOF Parameters
    Service Management Tasks
      System Administration Commands
        Viewing the Current Configuration
        Modifying and Saving a Configuration
        Deleting BOF Parameters
        Saving a Configuration to a Different Filename
        Rebooting
    BOF Configuration Command Reference
      Command Hierarchies
         Configuration Commands
      Command Descriptions
        File Management Commands
        BOF Processing Control
        Console Port Configuration
        Image and Configuration Management
        Management Ethernet Configuration
        DNS Configuration Commands
    BOF Show Command Reference
      Command Hierarchies
      Command Descriptions
        BOF Show Commands
  5. System Management
    5.1. In This Chapter
    5.2. System Management Parameters
      5.2.1. System Information
        5.2.1.1. System Name
        5.2.1.2. System Contact
        5.2.1.3. System Location
        5.2.1.4. System Coordinates
        5.2.1.5. Naming Objects
        5.2.1.6. Common Language Location Identifier
        5.2.1.7. DNS Security Extensions
      5.2.2. System Time
        5.2.2.1. Time Zones
        5.2.2.2. Network Time Protocol (NTP)
        5.2.2.3. SNTP Time Synchronization
        5.2.2.4. CRON
    5.3. High Availability
      5.3.1. HA Features
        5.3.1.1. Redundancy
          5.3.1.1.1. Software Redundancy
          5.3.1.1.2. Configuration Redundancy
          5.3.1.1.3. Component Redundancy
          5.3.1.1.4. Service Redundancy
          5.3.1.1.5. Accounting Configuration Redundancy
        5.3.1.2. Nonstop Forwarding
        5.3.1.3. Nonstop Routing (NSR)
        5.3.1.4. CPM Switchover
        5.3.1.5. Synchronization
          5.3.1.5.1. Configuration and boot-env Synchronization
          5.3.1.5.2. State Database Synchronization
    5.4. Synchronization and Redundancy
      5.4.1. Active and Standby Designations
      5.4.2. When the Active CPM Goes Offline
      5.4.3. OOB Management Ethernet Port Redundancy
      5.4.4. Persistence
        5.4.4.1. Dynamic Data Persistency (DDP) Access Optimization for DHCP Leases
    5.5. Network Synchronization
      5.5.1. Central Synchronization Sub-System
      5.5.2. 7950 XRS-40 Extension Chassis Central Clocks
      5.5.3. Synchronization Status Messages (SSM)
        5.5.3.1. DS1 Signals
        5.5.3.2. E1 Signals
        5.5.3.3. SONET/SDH Signals
        5.5.3.4. DS3/E3
      5.5.4. Synchronous Ethernet
      5.5.5. Clock Source Quality Level Definitions
      5.5.6. IEEE 1588v2 PTP
        5.5.6.1. PTP Clock Synchronization
        5.5.6.2. Performance Considerations
          5.5.6.2.1. Port-Based Timestamping of PTP Messages
        5.5.6.3. PTP Capabilities
        5.5.6.4. PTP Ordinary Slave Clock For Frequency
        5.5.6.5. PTP Ordinary Master Clock For Frequency
        5.5.6.6. PTP Boundary Clock for Frequency and Time
        5.5.6.7. PTP Clock Redundancy
        5.5.6.8. PTP Time for System Time and OAM Time
        5.5.6.9. PTP within Routing Instances
    5.6. System-Wide ATM Parameters
    5.7. Link Layer Discovery Protocol (LLDP)
    5.8. IP Hashing as an LSR
    5.9. Ethernet Satellites
      5.9.1. Software Repositories for Satellites
      5.9.2. Satellite Software Upgrade Overview
      5.9.3. Satellite Configuration
        5.9.3.1. Satellite Client Port Association
    5.10. Optical Extension Shelf (OES)
    5.11. Administrative Tasks
      5.11.1. Configuring the Chassis Mode
      5.11.2. Saving Configurations
      5.11.3. Specifying Post-Boot Configuration Files
      5.11.4. Network Timing
      5.11.5. Power Supplies
      5.11.6. Automatic Synchronization
        5.11.6.1. Boot-Env Option
        5.11.6.2. Config Option
      5.11.7. Manual Synchronization
        5.11.7.1. Forcing a Switchover
    5.12. System Router Instances
    5.13. System Configuration Process Overview
    5.14. Configuration Notes
      5.14.1. General
    Configuring System Management with CLI
    System Management
      Saving Configurations
    Basic System Configuration
    Common Configuration Tasks
      System Information
        System Information Parameters
          Name
          Contact
          Location
          CLLI Code
        Coordinates
        System Time Elements
          Zone
          Summer Time Conditions
          NTP
          Broadcastclient
          SNTP
          CRON
        ANCP Enhancements
      Configuring Synchronization and Redundancy
        Configuring Persistence
        Configuring Synchronization
        Configuring Manual Synchronization
        Forcing a Switchover
        Configuring Synchronization Options
      Configuring Multi-Chassis Redundancy for LAG
      Configuring Mixed Mode
        Enabling Mixed Mode on a 7450 System
      Configuring Power Supply Parameters
      Configuring ATM System Parameters
      Configuring Backup Copies
      Post-Boot Configuration Extension Files
        Show Command Output and Console Messages
    System Timing
      Edit Mode
      Configuring Timing References
      Using the Revert Command
      Other Editing Commands
      Forcing a Specific Reference
    Configuring System Monitoring Thresholds
      Creating Events
      System Alarm Contact Inputs
    Configuring LLDP
    System Command Reference
      Command Hierarchies
        Configuration Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        System Time Commands
        Cron Commands
        Script Control Commands
        System Synchronization Commands
        System Administration (Admin) Commands
        High Availability (Redundancy) Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
        Optical Extension Shelf (OES) Commands
        System Router Instance Commands
      System Command Reference
        Generic Commands
        System Information Commands
        System Alarm Contact Input Commands
        System Threshold Alarm Commands
        Mixed Mode Configuration Commands
        Persistence Commands
        PTP Commands
        Date and Time Commands
        Network Time Protocol Commands
          SNTP Commands
          System Time Commands
        Cron Commands
        Script Control Commands
        System Synchronization Configuration Commands
        System Administration Commands
        Redundancy Commands
          Peer Commands
          Multi-Chassis Endpoint Commands
          MC-LAG Commands
          Multi-Chassis Ring Commands
        LLDP System Commands
        LLDP Ethernet Port Commands
        Optical Extension Shelf (OES) Commands
        System Router Instance Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  Standards and Protocol Support
  Customer Document and Product Support
Gx AVPs Reference Guide R14.0.R4
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. ALU-Specific AVPs
      1.2.5. ALU-Specific VSAs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. ALU-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Document and Product Support
  1. Gx AVP
    1.1. In This Section
    1.2. AVPs
      1.2.1. Reserved Keywords in the 7750 SR
      1.2.2. Standard Diameter AVPs
      1.2.3. Standard Diameter AVPs (format)
      1.2.4. ALU-Specific AVPs
      1.2.5. ALU-Specific VSAs (format)
      1.2.6. Diameter-Based AVP Applicability
      1.2.7. Gx AVP Applicability
      1.2.8. ALU-Specific AVP Applicability
      1.2.9. Result Codes (Result-Code AVP)
      1.2.10. Rule Failure Codes (Rule-Failure-Code AVP)
      1.2.11. Event Triggers (Event-Trigger AVP)
      1.2.12. Termination Causes (Termination-Cause AVP)
  Standards and Protocol Support
  Customer Document and Product Support
Interface Configuration Guide R14.0.R4
  1.  Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2.  Interfaces
    2.1. In This Chapter
    2.2. Configuration Overview
      2.2.1. Chassis Slots and Cards
      2.2.2. MCMs
      2.2.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
      2.2.4. XMAs/C-XMAs
      2.2.5. CMAs
      2.2.6. Versatile Service Module (VSM)
      2.2.7. Oversubscribed Ethernet MDAs
        2.2.7.1. Rate Limiting
        2.2.7.2. Packet Classification and Scheduling
      2.2.8. Channelized MDA/CMA Support
        2.2.8.1. Channelized DS-1/E-1 CMA
        2.2.8.2. Channelized DS-3/E-3 CMA
        2.2.8.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.2.8.4. Channelized OC-12/STM-4 ASAP MDAs
        2.2.8.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.2.8.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.2.8.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        2.2.8.8. Network Interconnections
    2.3. Digital Diagnostics Monitoring
      2.3.1. SFPs and XFPs
      2.3.2. Statistics Collection
    2.4. Ports
      2.4.1. Port Types
      2.4.2. Port Features
        2.4.2.1. Port State and Operational State
        2.4.2.2. 802.1x Network Access Control
          2.4.2.2.1. 802.1x Modes
          2.4.2.2.2. 802.1x Basics
          2.4.2.2.3. 802.1x Timers
          2.4.2.2.4. 802.1x Tunneling
          2.4.2.2.5. 802.1x Configuration and Limitations
        2.4.2.3. SONET/SDH Port Attributes
        2.4.2.4. SONET/SDH Path Attributes
        2.4.2.5. Multilink Frame Relay
          2.4.2.5.1. MLFR Bundle Data Plane
          2.4.2.5.2. MLFR Bundle Link Integrity Protocol
        2.4.2.6. FRF.12 End-to-End Fragmentation
          2.4.2.6.1. SAP Fragment Interleaving Option
        2.4.2.7. FRF.12 UNI/NNI Link Fragmentation
        2.4.2.8. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.4.2.9. Multilink Point-to-Point Protocol (MLPPP)
          2.4.2.9.1. Protocol Field (PID)
          2.4.2.9.2. B & E Bits
          2.4.2.9.3. Sequence Number
          2.4.2.9.4. Information Field
          2.4.2.9.5. Padding
          2.4.2.9.6. FCS
          2.4.2.9.7. LCP
          2.4.2.9.8. Link Fragmentation and Interleaving Support
        2.4.2.10. Multi-Class MLPPP
          2.4.2.10.1. QoS in MC-MLPPP
        2.4.2.11. Cisco HDLC
          2.4.2.11.1. SLARP
          2.4.2.11.2. SONET/SDH Scrambling and C2-Byte
          2.4.2.11.3. Timers
        2.4.2.12. Automatic Protection Switching (APS)
          2.4.2.12.1. Single Chassis and Multi-Chassis APS
          2.4.2.12.2. APS Switching Modes
          2.4.2.12.3. APS Channel and SONET Header K Bytes
          2.4.2.12.4. Revertive Switching
          2.4.2.12.5. Bidirectional 1+1 Switchover Operation Example
          2.4.2.12.6. Annex B (1+1 Optimized) Operation
          2.4.2.12.7. Protection of Upper Layer Protocols and Services
          2.4.2.12.8. APS User-Initiated Requests
          2.4.2.12.9. APS and SNMP
          2.4.2.12.10. APS Applicability, Restrictions and Interactions
          2.4.2.12.11. Sample APS Applications
        2.4.2.13. Inverse Multiplexing Over ATM (IMA)
          2.4.2.13.1. Inverse Multiplexing over ATM (IMA) Features
        2.4.2.14. Ethernet Local Management Interface (E-LMI)
        2.4.2.15. Link Layer Discovery Protocol (LLDP)
          2.4.2.15.1. LLDP Protocol Features
      2.4.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. Caveats
      2.5.3. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.3.1. Operational State
      2.5.4. PXC Sub-Ports
        2.5.4.1. PXC Sub-Port Operational State
      2.5.5. Port Statistics
        2.5.5.1. Statistics on Physical PXC Ports
      2.5.6. LAG with PXC Ports – PXC LAG
      2.5.7. Basic PXC Provisioning
      2.5.8. QoS
        2.5.8.1. Queue Allocation on PXC Sub-Ports
        2.5.8.2. Pool Allocations on PXC Ports
        2.5.8.3. QoS Summary
      2.5.9. Mirroring and LI on PXC Ports
      2.5.10. Multi-Chassis Redundancy
      2.5.11. Health Monitoring on the PXC Sub-Ports
      2.5.12. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Link Placement
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
          2.7.4.5.6. LSR Default Hash Routine— Label-Only Hash Option
          2.7.4.5.7. LSR Label-IP Hash Option Enabled
          2.7.4.5.8. LSR IP-Only Hash Option Enabled
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. Mixed Port-Speed LAG Support
        2.7.7.1. LAG Upgrade
      2.7.8. Multi-Chassis LAG
        2.7.8.1. Overview
        2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Configuring SFM5-12e Fabric Speed
      2.14.1. fabric-speed-a
      2.14.2. fabric-speed-b
    2.15. Configuration Process Overview
    2.16. Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Forwarding Path Extension (FPE) Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
        Forward Path Extension Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane Configuration Commands
        General Port Commands
        Port XC Commands
        Forwarding Path Extention (FPE) Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Tools Commands
        Forward Path Extension Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
  1.  Getting Started
    1.1. About This Guide
    1.2. Interface Configuration Process
  2.  Interfaces
    2.1. In This Chapter
    2.2. Configuration Overview
      2.2.1. Chassis Slots and Cards
      2.2.2. MCMs
      2.2.3. MDA-a, MDA-aXP, MDA, MDA-XP and MDA-e Modules
      2.2.4. XMAs/C-XMAs
      2.2.5. CMAs
      2.2.6. Versatile Service Module (VSM)
      2.2.7. Oversubscribed Ethernet MDAs
        2.2.7.1. Rate Limiting
        2.2.7.2. Packet Classification and Scheduling
      2.2.8. Channelized MDA/CMA Support
        2.2.8.1. Channelized DS-1/E-1 CMA
        2.2.8.2. Channelized DS-3/E-3 CMA
        2.2.8.3. Channelized Any Service Any Port (ASAP) CHOC-3/STM-1
        2.2.8.4. Channelized OC-12/STM-4 ASAP MDAs
        2.2.8.5. Channelized DS-3/E-3 ASAP MDA (4-Port)
        2.2.8.6. Channelized DS-3/E-3 ASAP MDA (12-Port)
        2.2.8.7. Channelized OC-3/STM-1 Circuit Emulation Services (CES) CMA and MDA
        2.2.8.8. Network Interconnections
    2.3. Digital Diagnostics Monitoring
      2.3.1. SFPs and XFPs
      2.3.2. Statistics Collection
    2.4. Ports
      2.4.1. Port Types
      2.4.2. Port Features
        2.4.2.1. Port State and Operational State
        2.4.2.2. 802.1x Network Access Control
          2.4.2.2.1. 802.1x Modes
          2.4.2.2.2. 802.1x Basics
          2.4.2.2.3. 802.1x Timers
          2.4.2.2.4. 802.1x Tunneling
          2.4.2.2.5. 802.1x Configuration and Limitations
        2.4.2.3. SONET/SDH Port Attributes
        2.4.2.4. SONET/SDH Path Attributes
        2.4.2.5. Multilink Frame Relay
          2.4.2.5.1. MLFR Bundle Data Plane
          2.4.2.5.2. MLFR Bundle Link Integrity Protocol
        2.4.2.6. FRF.12 End-to-End Fragmentation
          2.4.2.6.1. SAP Fragment Interleaving Option
        2.4.2.7. FRF.12 UNI/NNI Link Fragmentation
        2.4.2.8. MLFR/FRF.12 Support of APS, BFD, and Mirroring Features
        2.4.2.9. Multilink Point-to-Point Protocol (MLPPP)
          2.4.2.9.1. Protocol Field (PID)
          2.4.2.9.2. B & E Bits
          2.4.2.9.3. Sequence Number
          2.4.2.9.4. Information Field
          2.4.2.9.5. Padding
          2.4.2.9.6. FCS
          2.4.2.9.7. LCP
          2.4.2.9.8. Link Fragmentation and Interleaving Support
        2.4.2.10. Multi-Class MLPPP
          2.4.2.10.1. QoS in MC-MLPPP
        2.4.2.11. Cisco HDLC
          2.4.2.11.1. SLARP
          2.4.2.11.2. SONET/SDH Scrambling and C2-Byte
          2.4.2.11.3. Timers
        2.4.2.12. Automatic Protection Switching (APS)
          2.4.2.12.1. Single Chassis and Multi-Chassis APS
          2.4.2.12.2. APS Switching Modes
          2.4.2.12.3. APS Channel and SONET Header K Bytes
          2.4.2.12.4. Revertive Switching
          2.4.2.12.5. Bidirectional 1+1 Switchover Operation Example
          2.4.2.12.6. Annex B (1+1 Optimized) Operation
          2.4.2.12.7. Protection of Upper Layer Protocols and Services
          2.4.2.12.8. APS User-Initiated Requests
          2.4.2.12.9. APS and SNMP
          2.4.2.12.10. APS Applicability, Restrictions and Interactions
          2.4.2.12.11. Sample APS Applications
        2.4.2.13. Inverse Multiplexing Over ATM (IMA)
          2.4.2.13.1. Inverse Multiplexing over ATM (IMA) Features
        2.4.2.14. Ethernet Local Management Interface (E-LMI)
        2.4.2.15. Link Layer Discovery Protocol (LLDP)
          2.4.2.15.1. LLDP Protocol Features
      2.4.3. Per Port Aggregate Egress Queue Statistics Monitoring
    2.5. Port Cross-Connect (PXC)
      2.5.1. PXC Terminology
      2.5.2. Caveats
      2.5.3. PXC - Physical Port in Cross-Connect (Loopback) Mode
        2.5.3.1. Operational State
      2.5.4. PXC Sub-Ports
        2.5.4.1. PXC Sub-Port Operational State
      2.5.5. Port Statistics
        2.5.5.1. Statistics on Physical PXC Ports
      2.5.6. LAG with PXC Ports – PXC LAG
      2.5.7. Basic PXC Provisioning
      2.5.8. QoS
        2.5.8.1. Queue Allocation on PXC Sub-Ports
        2.5.8.2. Pool Allocations on PXC Ports
        2.5.8.3. QoS Summary
      2.5.9. Mirroring and LI on PXC Ports
      2.5.10. Multi-Chassis Redundancy
      2.5.11. Health Monitoring on the PXC Sub-Ports
      2.5.12. Configuration Example
    2.6. Forwarding Path Extensions (FPE)
    2.7. LAG
      2.7.1. LACP
        2.7.1.1. LACP Multiplexing
      2.7.2. Active-Standby LAG Operation
      2.7.3. LAG on Access QoS Consideration
        2.7.3.1. Adapt QoS Modes
        2.7.3.2. Per-fp-ing-queuing
        2.7.3.3. Per-fp-egr-queuing
        2.7.3.4. Per-fp-sap-instance
      2.7.4. LAG and ECMP Hashing
        2.7.4.1. Per Flow Hashing
          2.7.4.1.1. Changing Default Per Flow Hashing Inputs
        2.7.4.2. Per Link Hashing
          2.7.4.2.1. Weighted per-link-hash
        2.7.4.3. Explicit Per Link Hash Using LAG Link Mapping Profiles
        2.7.4.4. Consistent Per Service Hashing
        2.7.4.5. ESM – LAG Hashing per Vport
          2.7.4.5.1. Background
          2.7.4.5.2. Hashing per Vport
          2.7.4.5.3. Link Placement
          2.7.4.5.4. Multicast Consideration
          2.7.4.5.5. VPLS and Capture SAP Considerations
          2.7.4.5.6. LSR Default Hash Routine— Label-Only Hash Option
          2.7.4.5.7. LSR Label-IP Hash Option Enabled
          2.7.4.5.8. LSR IP-Only Hash Option Enabled
      2.7.5. LAG Hold Down Timers
      2.7.6. BFD over LAG Links
      2.7.7. Mixed Port-Speed LAG Support
        2.7.7.1. LAG Upgrade
      2.7.8. Multi-Chassis LAG
        2.7.8.1. Overview
        2.7.8.2. MC-LAG and Subscriber Routed Redundancy Protocol (SRRP)
        2.7.8.3. Point-to-Point (p2p) Redundant Connection Across Layer 2/3 VPN Network
        2.7.8.4. DSLAM Dual Homing in Layer 2/3 TPSDA Model
    2.8. G.8031 Protected Ethernet Tunnels
    2.9. G.8032 Protected Ethernet Rings
    2.10. Ethernet Port Monitoring
    2.11. 802.3ah OAM
      2.11.1. OAM Events
        2.11.1.1. Link Monitoring
          2.11.1.1.1. Capability Advertising
      2.11.2. Remote Loopback
      2.11.3. 802.3ah OAM PDU Tunneling for Epipe Service
        2.11.3.1. 802.3ah Grace Announcement
    2.12. MTU Configuration Guidelines
      2.12.1. Default MTU Values
      2.12.2. Modifying MTU Defaults
      2.12.3. Configuration Example
    2.13. Deploying Preprovisioned Components
    2.14. Configuring SFM5-12e Fabric Speed
      2.14.1. fabric-speed-a
      2.14.2. fabric-speed-b
    2.15. Configuration Process Overview
    2.16. Configuration Notes
     Configuring Physical Ports with CLI
    Preprovisioning Guidelines
      Predefining Entities
      Preprovisioning a Port
      Maximizing Bandwidth Use
    Basic Configuration
    Common Configuration Tasks
    Configuring Cards and MDAs
    Configuring Cards, MCMs and MDAs
      Configuring Cards and CMAs
      Configuring Forwarding Plane Parameters
      Configuring MDA Access and Network Pool Parameters
      Configuring MDA Policies for Named Pools Mode
    Configuring Ports
      Configuring Port Pool Parameters
      Changing Hybrid-Buffer-Allocation
      Configuring APS Parameters
      Configuring Ethernet Port Parameters
        Ethernet Network Port
        Ethernet Access Port
        Configuring 802.1x Authentication Port Parameters
      Configuring SONET/SDH Port Parameters
        SONET/SDH Network Port
        SONET/SDH Access Port
      Configuring Channelized Ports
        Verify the MDA Type
        Configuring a Channelized DS3 Port
        Configuring a Channelized OC-12-SFP Port
        Configuring a Channelized Any Service Any Port (ASAP) OC3-SFP Port
        Configuring Cisco HDLC on a Channelized Port
      Configuring Channelized STM1/OC3 Parameters
        Configuring Cpipe Port Parameters
          Configuring a DS1 Port
      Configuring ATM SAPs
        ATM SAP in an IES Service
        ATM SAP in an Epipe Service
      Configuring DWDM Port Parameters
      Configuring WaveTracker Parameters
      Configuring OTU Port Parameters
      Configuring ATM Interface Parameters
        PLCP/Direct Mapping
        ATM Interface Configurations
      Configuring Frame Relay Parameters
        SONET/SDH Interfaces
      Configuring Multilink PPP Bundles
      Configuring Multilink ATM Inverse Multiplexing (IMA) Bundles
        IMA Bundles
      Multi-Class MLPPP
        IMA Test Procedure
      Configuring Bundle Protection Group Ports
        Configuring a Channelized DS1 Card
      Configuring LAG Parameters
        Configuring BFD on LAG Links
      Configuring G.8031 Protected Ethernet Tunnels
    Service Management Tasks
      Modifying or Deleting an MDA, MCM, CMA or XMA
      Modifying a Card Type
      Deleting a Card
      Deleting Port Parameters
      Soft IOM Reset
        Soft Reset
        Deferred MDA Reset
    Configuration Command Reference
      Command Hierarchies
        Card Commands
        MCM Commands
        MDA Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane (FP) Commands
        Port Configuration Commands
        Port XC Commands
        Forwarding Path Extension (FPE) Commands
        Port APS Commands
        Ethernet Commands
        Interface Group Handler Commands
        Multilink Bundle Commands
        SONET-SDH Commands
        TDM Commands
        DS3 Commands
        E1 Commands
        E3 Commands
        LAG Commands
        Ethernet Tunnel Commands
        Multi-Chassis Redundancy Commands
        Forward Path Extension Commands
      Configuration Command Descriptions
        Generic Commands
        Card Commands
        MCM Commands
        MDA (XMA) Commands
        MDA/Port QoS Commands
        Power Commands
        Virtual Scheduler Commands
        Forwarding Plane Configuration Commands
        General Port Commands
        Port XC Commands
        Forwarding Path Extention (FPE) Commands
        APS Commands
        Ethernet Port Commands
        802.1x Port Commands
        LLDP Port Commands
        Network Port Commands
        Interface Group Handler Commands
        Multilink-Bundle Port Commands
        SONET/SDH Port Commands
        SONET/SDH Path Commands
        ATM Interface Commands
        Frame Relay Commands
        TDM Commands
        LAG Commands
        Eth Tunnel Commands
        ETH-CFM Configuration Commands
        Multi-Chassis Redundancy Commands
          MC Endpoint Commands
          MC LAG Commands
          Multi-Chassis Ring Commands
        Forwarding Plane Tools Commands
        Forward Path Extension Commands
    Show, Monitor, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Hardware Show Commands
        PEQ Show Commands
        APS Show Commands
        Port Show Commands
        Multilink Bundle Show Commands
        LAG Show Commands
        Monitor Commands
        Clear Commands
        Tools Commands
          Debug Commands
  3. Standards and Protocol Support
  Customer Document and Product Support
Layer 2 Services and EVPN Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  VLL Services
    2.1. In This Chapter
    2.2. ATM VLL (Apipe) Services
      2.2.1. ATM VLL For End-to-End ATM Service
      2.2.2. ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      2.2.3. Traffic Management Support
        2.2.3.1. Ingress Network Classification
        2.2.3.2. Ingress Queuing and Shaping on the IOM
        2.2.3.3. Egress Queuing and Shaping on the IOM
        2.2.3.4. Egress Shaping/Scheduling
    2.3. Circuit Emulation Services (Cpipe)
      2.3.1. Mobile Infrastructure
      2.3.2. Circuit Emulation Modes
      2.3.3. Circuit Emulation Parameters
        2.3.3.1. Circuit Emulation Modes
        2.3.3.2. Absolute Mode Option
        2.3.3.3. Payload Size
        2.3.3.4. Jitter Buffer
        2.3.3.5. CES Circuit Operation
      2.3.4. Services for Transporting CES Circuits
      2.3.5. Network Synchronization Considerations
      2.3.6. Cpipe Payload
    2.4. Ethernet Pipe (Epipe) Services
      2.4.1. Epipe Service Overview
      2.4.2. Epipe Service Pseudo-wire VLAN Tag Processing
      2.4.3. Epipe Up Operational State Configuration Option
      2.4.4. Epipe with PBB
      2.4.5. Epipe over L2TPv3
      2.4.6. Ethernet Interworking VLL
      2.4.7. VLL CAC
      2.4.8. MC-Ring and VLL
    2.5. Frame Relay VLL (Fpipe) Services
      2.5.1. Frame Relay VLL
      2.5.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.5.3. Traffic Management Support
        2.5.3.1. Frame Relay Traffic Management
        2.5.3.2. Ingress SAP Classification and Marking
        2.5.3.3. Egress Network EXP Marking
        2.5.3.4. Ingress Network Classification
    2.6. IP Interworking VLL (Ipipe) Services
      2.6.1. Ipipe VLL
      2.6.2. IP Interworking VLL Datapath
      2.6.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.6.3.1. VLL Ethernet SAP Procedures
          2.6.3.1.1. VLL FR SAP Procedures
          2.6.3.1.2. VLL ATM SAP Procedures
          2.6.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.6.4. IPv6 Support on IP Interworking VLL
        2.6.4.1. IPv6 Datapath Operation
        2.6.4.2. IPv6 Stack Capability Signaling
    2.7. Services Configuration for MPLS-TP
      2.7.1. MPLS-TP SDPs
      2.7.2. VLL Spoke SDP Configuration
        2.7.2.1. Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      2.7.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.7.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.7.3.2. Lock PW End-Point Model
        2.7.3.3. PW Redundancy and Lock Instruct and Loopback
        2.7.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.7.3.5. Configuring an Administrative Lock
        2.7.3.6. Configuring a Loopback
    2.8. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.8.1. VCCV BVD Support
      2.8.2. VCCV BFD Encapsulation on a Pseudo-wire
      2.8.3. BFD Session Operation
      2.8.4. Configuring VCCV BFD
    2.9. Pseudo-wire Switching
      2.9.1. Pseudo-wire Switching with Protection
      2.9.2. Pseudo-wire Switching Behavior
      2.9.3. Static-to-Dynamic Pseudo-wire Switching
      2.9.4. Ingress VLAN Swapping
        2.9.4.1. Ingress VLAN Translation
      2.9.5. Pseudo-wire Redundancy
      2.9.6. Dynamic Multi-Segment Pseudo-wire Routing
        2.9.6.1. Overview
        2.9.6.2. Pseudo-wire Routing
          2.9.6.2.1. Static Routing
          2.9.6.2.2. Explicit Paths
        2.9.6.3. Configuring VLLs using Dynamic MS-PWs
          2.9.6.3.1. Active/Passive T-PE Selection
          2.9.6.3.2. Automatic Endpoint Configuration
          2.9.6.3.3. Selecting a Path for an MS-PW
          2.9.6.3.4. Pseudo-wire Templates
        2.9.6.4. Pseudo-wire Redundancy
        2.9.6.5. VCCV OAM for Dynamic MS-PWs
        2.9.6.6. VCCV-Ping on Dynamic MS-PWs
        2.9.6.7. VCCV-Trace on Dynamic MS-PWs
      2.9.7. Example Dynamic MS-PW Configuration
      2.9.8. VLL Resilience with Two Destination PE Nodes
        2.9.8.1. Master-Slave Operation
          2.9.8.1.1. Interaction with SAP-Specific OAM
          2.9.8.1.2. Local Rules at Slave VLL PE
          2.9.8.1.3. Operation of Master-Slave Pseudo-wire Redundancy with Existing Scenarios
          2.9.8.1.4. VLL Resilience for a Switched Pseudo-wire Path
      2.9.9. Pseudo-wire SAPs
      2.9.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.9.10.1. Operational Overview
        2.9.10.2. Detailed Operation
          2.9.10.2.1. Sample Operation of G.8031 BGP-MH
        2.9.10.3. BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        2.9.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.9.10.5. PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        2.9.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.9.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.9.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.9.10.6.3. Operation for BGP MH Site Support for Ethernet Tunnels
      2.9.11. Access Node Resilience Using MC-LAG and Pseudo-wire Redundancy
      2.9.12. VLL Resilience for a Switched Pseudo-wire Path
    2.10. Pseudo-wire Redundancy Service Models
      2.10.1. Redundant VLL Service Model
      2.10.2. T-LDP Status Notification Handling Rules
        2.10.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.10.2.2. Processing and Merging
    2.11. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.11.1. Primary Spoke-SDP Fallback to Secondary SAP
      2.11.2. Reversion to Primary Spoke SDP Path
      2.11.3. MC-APS and MC-LAG
        2.11.3.1. Failure Scenarios
    2.12. VLL Using G.8031 Protected Ethernet Tunnels
    2.13. MPLS Entropy Label and Hash Label
    2.14. BGP Virtual Private Wire Service (VPWS)
      2.14.1. Single-Homed BGP VPWS
      2.14.2. Dual-Homed BGP VPWS
      2.14.3. BGP VPWS Pseudo-wire Switching
        2.14.3.1. Pseudo-wire Signaling
        2.14.3.2. BGP VPWS Configuration Procedure
        2.14.3.3. Use of Pseudo-wire Template for BGP VPWS
        2.14.3.4. Use of Endpoint for BGP VPWS
    2.15. VLL Service Considerations
      2.15.1. SDPs
        2.15.1.1. SDP Statistics for VPLS and VLL Services
      2.15.2. SAP Encapsulations and Pseudo-wire Types
        2.15.2.1. PWE3 N-to-1 Cell Mode
        2.15.2.2. PWE3 AAL5 SDU Mode
        2.15.2.3. QoS Policies
        2.15.2.4. Filter Policies
        2.15.2.5. MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
  3.  Virtual Private LAN Service
    3.1. In This Chapter
    3.2. VPLS Service Overview
      3.2.1. VPLS Packet Walkthrough
    3.3. VPLS Features
      3.3.1. VPLS Enhancements
      3.3.2. VPLS over MPLS
      3.3.3. VPLS Service Pseudo-wire VLAN Tag Processing
      3.3.4. VPLS MAC Learning and Packet Forwarding
        3.3.4.1. MAC Learning Protection
        3.3.4.2. DEI in IEEE 802.1ad
      3.3.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.3.6. Pseudo-wire Control Word
      3.3.7. Table Management
        3.3.7.1. FIB Size
        3.3.7.2. FIB Size Alarms
        3.3.7.3. Local and Remote Aging Timers
        3.3.7.4. Disable MAC Aging
        3.3.7.5. Disable MAC Learning
        3.3.7.6. Unknown MAC Discard
        3.3.7.7. VPLS and Rate Limiting
        3.3.7.8. MAC Move
        3.3.7.9. Auto-Learn MAC Protect
          3.3.7.9.1. Operation
      3.3.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.3.9. VPLS and Spanning Tree Protocol
        3.3.9.1. Spanning Tree Operating Modes
        3.3.9.2. Multiple Spanning Tree
          3.3.9.2.1. Redundancy Access to VPLS
        3.3.9.3. MSTP for QinQ SAPs
        3.3.9.4. Provider MSTP
          3.3.9.4.1. MSTP General Principles
          3.3.9.4.2. MSTP in the SR-Series Platform
        3.3.9.5. Enhancements to the Spanning Tree Protocol
          3.3.9.5.1. L2PT Termination
          3.3.9.5.2. BPDU Translation
          3.3.9.5.3. L2PT and BPDU Translation
      3.3.10. Egress Multicast Groups
        3.3.10.1. Egress Multicast Group Provisioning
          3.3.10.1.1. Required Common SAP Parameters
          3.3.10.1.2. SAP Egress QoS Policy
          3.3.10.1.3. Efficient Multicast Egress SAP Chaining
          3.3.10.1.4. Mirroring and Efficient Multicast Replication
          3.3.10.1.5. IOM or XCM Chain Management
          3.3.10.1.6. IOM Mode B Capability
      3.3.11. VPLS Redundancy
        3.3.11.1. Spoke SDP Redundancy for Metro Interconnection
        3.3.11.2. Spoke SDP Based Redundant Access
        3.3.11.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.3.11.3.1. Fast Detection of Peer Failure using BFD
          3.3.11.3.2. MC-EP Passive Mode
        3.3.11.4. Support for Single Chassis Endpoint Mechanisms
          3.3.11.4.1. MAC Flush Support in MC-EP
          3.3.11.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.3.11.4.3. Support for Force Spoke SDP in MC-EP
          3.3.11.4.4. Revertive Behavior for Primary Pseudo-wire(s) in a MC-EP
        3.3.11.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.3.11.6. MAC Flush Additions for PBB VPLS
      3.3.12. VPLS Access Redundancy
        3.3.12.1. STP-Based Redundant Access to VPLS
        3.3.12.2. Redundant Access to VPLS Without STP
      3.3.13. Object Grouping and State Monitoring
        3.3.13.1.  VPLS Applicability — Block on VPLS a Failure
      3.3.14. MAC Flush Message Processing
        3.3.14.1. Dual Homing to a VPLS Service
        3.3.14.2. MC-Ring and VPLS
      3.3.15. ACL Next-Hop for VPLS
      3.3.16. SDP Statistics for VPLS and VLL Services
      3.3.17. BGP Auto-Discovery for LDP VPLS
        3.3.17.1. BGP AD Overview
        3.3.17.2. Information Model
        3.3.17.3. FEC Element for T-LDP Signaling
        3.3.17.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.3.17.5. SDP Usage
        3.3.17.6. Automatic Creation of SDPs
        3.3.17.7. Manually Provisioned SDP
        3.3.17.8. Automatic Instantiation of Pseudo-wires (SDP Bindings)
        3.3.17.9. Mixing Statically Configured and Auto-Discovered Pseudo-wires in a VPLS
        3.3.17.10. Resiliency Schemes
      3.3.18. BGP VPLS
        3.3.18.1. Pseudo-wire Signaling Details
        3.3.18.2. Supported VPLS Features
      3.3.19. VCCV BFD Support for VPLS Services
      3.3.20. BGP Multi-Homing for VPLS
        3.3.20.1. Information Model and Required Extensions to L2VPN NLRI
        3.3.20.2. Supported Services and Multi-Homing Objects
        3.3.20.3. Blackhole Avoidance
          3.3.20.3.1. MAC Flush to the Core PEs
          3.3.20.3.2. Indicating non-DF status towards the access PE or CE
        3.3.20.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.3.21. Multicast-Aware VPLS
        3.3.21.1. IGMP Snooping for VPLS
        3.3.21.2. MLD Snooping for VPLS
        3.3.21.3. PIM Snooping for VPLS
          3.3.21.3.1. Plain PIM Snooping
          3.3.21.3.2. PIM Proxy
        3.3.21.4. MAC-Based IPv6 Multicast Forwarding
        3.3.21.5. PIM and IGMP/MLD Snooping Interaction
        3.3.21.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.3.21.6.1. IGMP Snooping Synchronization
          3.3.21.6.2. MLD Snooping Synchronization
          3.3.21.6.3. PIM Snooping for IPv4 Synchronization
        3.3.21.7. VPLS Multicast-Aware High Availability Features
      3.3.22. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.3.23. MPLS Entropy Label and Hash Label
    3.4. Routed VPLS and I-VPLS
      3.4.1. IES or VPRN IP Interface Binding
        3.4.1.1. Assigning a Service Name to a VPLS Service
        3.4.1.2. Service Binding Requirements
        3.4.1.3. Bound Service Name Assignment
        3.4.1.4. Binding a Service Name to an IP Interface
        3.4.1.5. Bound Service Deletion or Service Name Removal
        3.4.1.6. IP Interface Attached VPLS Service Constraints
        3.4.1.7. IP Interface and VPLS Operational State Coordination
      3.4.2. IP Interface MTU and Fragmentation
        3.4.2.1. Unicast IP Routing into a VPLS Service
      3.4.3. ARP and VPLS FIB Interactions
        3.4.3.1. Routed VPLS Specific ARP Cache Behavior
      3.4.4. The allow-ip-int-bind VPLS Flag
        3.4.4.1. Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        3.4.4.2. Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        3.4.4.3. Network Ports Restricted to FP2-Based Systems or IOMs
        3.4.4.4. LAG Port Membership Constraints
        3.4.4.5. Routed VPLS Feature Restrictions
        3.4.4.6. Routed I-VPLS Feature Restrictions
      3.4.5. IES IP Interface VPLS Binding and Chassis Mode Interaction
      3.4.6. VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      3.4.7. Route Leaking Between Routing Contexts
        3.4.7.1. Ingress LAG and FP1 to Routed VPLS Discards
      3.4.8. IPv4 and IPv6 Multicast Routing Support
      3.4.9. BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      3.4.10. Routed VPLS Caveats
        3.4.10.1. VPLS SAP Ingress IP Filter Override
        3.4.10.2. IP Interface Defined Egress QoS Reclassification
        3.4.10.3. Remarking for VPLS and Routed Packets
        3.4.10.4. 7450 Mixed Mode Chassis
        3.4.10.5. IPv4 Multicast Routing
        3.4.10.6. Routed VPLS Supported Routing Related Protocols
        3.4.10.7. Spanning Tree and Split Horizon
    3.5. VPLS Service Considerations
      3.5.1. SAP Encapsulations
      3.5.2. VLAN Processing
      3.5.3. Ingress VLAN Swapping
      3.5.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.5.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.5.4.2. Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        3.5.4.3. MVRP Activation of Service Connectivity
        3.5.4.4. MVRP Control Plane
        3.5.4.5. STP-MVRP Interaction
          3.5.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.5.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.5.5. VPLS E-Tree Services
        3.5.5.1. VPLS E-Tree Services Overview
        3.5.5.2. Leaf-ac and Root-ac SAPs
        3.5.5.3. Leaf-ac and Root-ac SDP Binds
        3.5.5.4. Root-leaf-tag SAPs
        3.5.5.5. Root-leaf-tag SDP Binds
        3.5.5.6. Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
  4.  IEEE 802.1ah Provider Backbone Bridging
    4.1. In This Chapter
    4.2. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.3. PBB Features
      4.3.1. Integrated PBB-VPLS Solution
      4.3.2. PBB Technology
      4.3.3. PBB Mapping to Existing VPLS Configurations
      4.3.4. SAP and SDP Support
        4.3.4.1. PBB B-VPLS
        4.3.4.2. PBB I-VPLS
      4.3.5. PBB Packet Walkthrough
        4.3.5.1. PBB Control Planes
      4.3.6. Shortest Path Bridging MAC Mode (SPBM)
        4.3.6.1. Flooding and Learning Versus Link State
        4.3.6.2. SPB for B-VPLS
        4.3.6.3. Control B-VPLS and User B-VPLS
        4.3.6.4. Shortest Path and Single Tree
        4.3.6.5. Data Path and Forwarding
        4.3.6.6. SPB Ethernet OAM
        4.3.6.7. SPB Levels
      4.3.7. SPBM to Non-SPBM Interworking
        4.3.7.1. Static MACs and Static ISIDs
        4.3.7.2. Epipe Static Configuration
          4.3.7.2.1. I-VPLS Static Config
        4.3.7.3. SPBM ISID Policies
      4.3.8. ISID Policy Control
        4.3.8.1. Static ISID Advertisement
        4.3.8.2. I-VPLS for Unicast Service
      4.3.9. Default Behaviors
      4.3.10. Example Network Configuration
        4.3.10.1. Sample Configuration for Dut-A
          4.3.10.1.1. Show Commands Outputs
          4.3.10.1.2. Debug Commands
          4.3.10.1.3. Tools Commands
          4.3.10.1.4. Clear Commands
      4.3.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.3.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.3.12.1. I-VPLS Changes and Related MMRP Behavior
        4.3.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.3.12.3. Optimization for Improved Convergence Time
        4.3.12.4. Controlling MRP Scope using MRP Policies
      4.3.13. PBB and BGP-AD
      4.3.14. PBB ELINE Service
        4.3.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.3.15. PBB Using G.8031-Protected Ethernet Tunnels
        4.3.15.1. Solution Overview
        4.3.15.2. Detailed Solution Description
        4.3.15.3. Detailed PBB Emulated LAG Solution Description
        4.3.15.4. Support Service and Solution Combinations
      4.3.16. Periodic MAC Notification
      4.3.17. MAC Flush
        4.3.17.1. PBB Resiliency for B-VPLS Over Pseudo-wire Infrastructure
          4.3.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.3.17.1.2. PBB Blackholing Issue
          4.3.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.3.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.3.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.3.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.3.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.3.19. BGP Multi-homing for I-VPLS
      4.3.20. Access Multi-Homing over MPLS for PBB Epipes
      4.3.21. PBB and IGMP/MLD Snooping
      4.3.22. PBB and PIM Snooping
      4.3.23. PBB QoS
        4.3.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.3.23.1.1. Configuration Examples
          4.3.23.1.2. Details Solution Description
      4.3.24. Egress B-SAP per ISID Shaping
        4.3.24.1. B-SAP Egress ISID Shaping Configuration
        4.3.24.2. Provisioning Model
        4.3.24.3. Egress Queue Scheduling
        4.3.24.4. B-SAP per-ISID Shaping Configuration Example
      4.3.25. PBB OAM
        4.3.25.1. Mirroring
        4.3.25.2. OAM Commands
        4.3.25.3. CFM Support
    4.4. Configuration Examples
      4.4.1. PBB using G.8031 Protected Ethernet Tunnels
      4.4.2. MC-LAG Multihoming for Native PBB
      4.4.3. Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
  5.  Ethernet Virtual Private Networks (EVPNs)
    5.1. In This Chapter
    5.2. Overview
    5.3. EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    5.4. EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    5.5. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    5.6. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    5.7. EVPN for MPLS Tunnels in ELAN Services
    5.8. EVPN for MPLS Tunnels in ELINE Services
    5.9. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.10. VXLAN
      5.10.1. VXLAN ECMP and LAG
      5.10.2. VXLAN VPLS Tag Handling
      5.10.3. VXLAN MTU Considerations
      5.10.4. VXLAN QoS
        5.10.4.1. Ingress
        5.10.4.2. Egress
      5.10.5. VXLAN Ping
      5.10.6. IGMP Snooping on VXLAN
      5.10.7. Non-System IPv4 and IPv6 VXLAN Termination in VPLS and R-VPLS Services
    5.11. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    5.12. EVPN for VXLAN in VPLS Services
      5.12.1. Resiliency and BGP Multi-Homing
      5.12.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      5.12.3. Use of the unknown-mac-route
    5.13. EVPN for VXLAN in R-VPLS Services
    5.14. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    5.15. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    5.16. DC GW integration with the Nuage Virtual Services Directory (VSD)
      5.16.1. XMPP Interface on the DC GW
      5.16.2. Overview of the Static-Dynamic VSD Integration Model
        5.16.2.1. Step 1
        5.16.2.2. Step 2
        5.16.2.3. Step 3
        5.16.2.4. Step 4
        5.16.2.5. Step 5
      5.16.3. VSD-Domains and Association to Static-Dynamic Services
        5.16.3.1. VSD-Domain Type L2-DOMAIN
        5.16.3.2. VSD-Domain Type L2-DOMAIN-IRB
        5.16.3.3. VSD-Domain Type VRF-GRE
        5.16.3.4. VSD-Domain Type VRF-VXLAN
    5.17. Fully-Dynamic VSD Integration Model
      5.17.1. Step 1
      5.17.2. Step 2
      5.17.3. Step 3
      5.17.4. Step 4
      5.17.5. Step 5
      5.17.6. Python Script Implementation Details
      5.17.7. Provisioning Filters using the VSD Fully Dynamic Model
    5.18. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
      5.18.1. Replicator (AR-R) Procedures
      5.18.2. Leaf (AR-L) procedures
      5.18.3. Assisted-Replication Interaction with Other VPLS Features
    5.19. BGP-EVPN Control Plane for MPLS Tunnels
    5.20. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      5.20.1. EVPN and VPLS Integration
      5.20.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      5.20.3. EVPN Multi-Homing in VPLS Services
      5.20.4. EVPN All-Active Multi-Homing
      5.20.5. All-Active Multi-Homing Service Model
      5.20.6. ES Discovery and DF Election Procedures
      5.20.7. Aliasing
      5.20.8. Network Failures and Convergence for All-Active Multi-Homing
        5.20.8.1. Logical Failures on Ethernet Segments and Black-Holes
        5.20.8.2. Transient Issues Due to MAC Route Delays
      5.20.9. EVPN Single-Active Multi-Homing
        5.20.9.1. Single-Active Multi-Homing Service Model
        5.20.9.2. ES and DF Election Procedures
        5.20.9.3. Backup PE Function
        5.20.9.4. Network Failures and Convergence for Single-Active Multi-Homing
          5.20.9.4.1. Logical Failures on Ethernet Segments and Black-Holes
    5.21. BGP-EVPN Control Plane for EVPN-VPWS
    5.22. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      5.22.1. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    5.23. EVPN Multi-homing for EVPN-VPWS Services
    5.24. EVPN for MPLS Tunnels in Routed VPLS Services
      5.24.1. EVPN-MPLS Multi-Homing and Passive VRRP
    5.25. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    5.26. BGP-EVPN Control Plane for PBB-EVPN
      5.26.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      5.26.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      5.26.3. EVPN Route Type 4 - Ethernet Segment Route
    5.27. PBB-EVPN for I-VPLS and PBB Epipe Services
      5.27.1. Flood Containment for I-VPLS Services
      5.27.2. PBB-EVPN and PBB-VPLS Integration
      5.27.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        5.27.3.1. System BMAC Assignment in PBB-EVPN
        5.27.3.2. PBB-EVPN all-active multi-homing service model
          5.27.3.2.1. Network failures and convergence for all-active multi-homing
        5.27.3.3. PBB-EVPN Single-Active Multi-Homing Service Model
          5.27.3.3.1. Network Failures and Convergence for Single-Active Multihoming
        5.27.3.4. PBB-Epipes and EVPN Multi-Homing
        5.27.3.5. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
        5.27.3.6. PBB-EVPN ISID-Based CMAC Flush
    5.28. ARP/ND Snooping and Proxy Support
      5.28.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      5.28.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
        5.28.2.1. Procedure to Add the R Flag to a Specified Entry
    5.29. BGP-EVPN MAC-Mobility
    5.30. BGP-EVPN MAC-Duplication
    5.31. Conditional Static MAC and Protection
    5.32. Auto-Learn MAC Protect and Restricting Protected Source MACs
    5.33. Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    5.34. CFM Interaction with EVPN Services
    5.35. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      5.35.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      5.35.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    5.36. IGMP Snooping in EVPN-MPLS Services
    5.37. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
      5.37.1. BGP-EVPN Routes in Services Configured With Two BGP Instances
      5.37.2. Anycast Redundant Solution for Dual BGP Instance Services
      5.37.3. Using P2MP mLDP in Redundant Anycast DC GWs
    5.38. BGP and EVPN Route Selection for EVPN Routes
    5.39. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    5.40. Interaction of PBB-EVPN with Existing VPLS Features
    5.41. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    5.42. Routing Policies for BGP EVPN IP Prefixes
    5.43. MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  6. Pseudowire Ports
    6.1. In This Chapter
    6.2. Overview
    6.3. PW-Port Bound to a Physical Port
    6.4. FPE-Based PW-Port
      6.4.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.4.2. PXC-Based PW-Port — Building the Cross-Connect
        6.4.2.1. Building the Internal Transport Tunnel
        6.4.2.2. Mapping the External PW to the PW-Port
        6.4.2.3. Terminating the Service on PW-SAP
      6.4.3. Operational State of the PXC Based PW-Port
      6.4.4. QoS
        6.4.4.1.  Preservation of Forwarding Class Across PXC
      6.4.5. Statistics on the FPE based PW-Port
      6.4.6. Intra-Chassis Redundancy Models for PXC Based PW-Port
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  VLL Services
    2.1. In This Chapter
    2.2. ATM VLL (Apipe) Services
      2.2.1. ATM VLL For End-to-End ATM Service
      2.2.2. ATM Virtual Trunk Over IP/MPLS Packet-Switched Network
      2.2.3. Traffic Management Support
        2.2.3.1. Ingress Network Classification
        2.2.3.2. Ingress Queuing and Shaping on the IOM
        2.2.3.3. Egress Queuing and Shaping on the IOM
        2.2.3.4. Egress Shaping/Scheduling
    2.3. Circuit Emulation Services (Cpipe)
      2.3.1. Mobile Infrastructure
      2.3.2. Circuit Emulation Modes
      2.3.3. Circuit Emulation Parameters
        2.3.3.1. Circuit Emulation Modes
        2.3.3.2. Absolute Mode Option
        2.3.3.3. Payload Size
        2.3.3.4. Jitter Buffer
        2.3.3.5. CES Circuit Operation
      2.3.4. Services for Transporting CES Circuits
      2.3.5. Network Synchronization Considerations
      2.3.6. Cpipe Payload
    2.4. Ethernet Pipe (Epipe) Services
      2.4.1. Epipe Service Overview
      2.4.2. Epipe Service Pseudo-wire VLAN Tag Processing
      2.4.3. Epipe Up Operational State Configuration Option
      2.4.4. Epipe with PBB
      2.4.5. Epipe over L2TPv3
      2.4.6. Ethernet Interworking VLL
      2.4.7. VLL CAC
      2.4.8. MC-Ring and VLL
    2.5. Frame Relay VLL (Fpipe) Services
      2.5.1. Frame Relay VLL
      2.5.2. Frame Relay-to-ATM Interworking (FRF.5) VLL
      2.5.3. Traffic Management Support
        2.5.3.1. Frame Relay Traffic Management
        2.5.3.2. Ingress SAP Classification and Marking
        2.5.3.3. Egress Network EXP Marking
        2.5.3.4. Ingress Network Classification
    2.6. IP Interworking VLL (Ipipe) Services
      2.6.1. Ipipe VLL
      2.6.2. IP Interworking VLL Datapath
      2.6.3. Extension to IP VLL for Discovery of Ethernet CE IP Address
        2.6.3.1. VLL Ethernet SAP Procedures
          2.6.3.1.1. VLL FR SAP Procedures
          2.6.3.1.2. VLL ATM SAP Procedures
          2.6.3.1.3. VLL PPP/IPCP and Cisco-HDLC SAP Procedures
      2.6.4. IPv6 Support on IP Interworking VLL
        2.6.4.1. IPv6 Datapath Operation
        2.6.4.2. IPv6 Stack Capability Signaling
    2.7. Services Configuration for MPLS-TP
      2.7.1. MPLS-TP SDPs
      2.7.2. VLL Spoke SDP Configuration
        2.7.2.1. Epipe VLL Spoke-SDP Termination on IES, VPRN and VPLS
      2.7.3. Configuring MPLS-TP Lock Instruct and Loopback
        2.7.3.1. MPLS-TP PW Lock Instruct and Loopback Overview
        2.7.3.2. Lock PW End-Point Model
        2.7.3.3. PW Redundancy and Lock Instruct and Loopback
        2.7.3.4. Configuring a Test SAP for an MPLS-TP PW
        2.7.3.5. Configuring an Administrative Lock
        2.7.3.6. Configuring a Loopback
    2.8. VCCV BFD support for VLL, Spoke-SDP Termination on IES and VPRN, and VPLS Services
      2.8.1. VCCV BVD Support
      2.8.2. VCCV BFD Encapsulation on a Pseudo-wire
      2.8.3. BFD Session Operation
      2.8.4. Configuring VCCV BFD
    2.9. Pseudo-wire Switching
      2.9.1. Pseudo-wire Switching with Protection
      2.9.2. Pseudo-wire Switching Behavior
      2.9.3. Static-to-Dynamic Pseudo-wire Switching
      2.9.4. Ingress VLAN Swapping
        2.9.4.1. Ingress VLAN Translation
      2.9.5. Pseudo-wire Redundancy
      2.9.6. Dynamic Multi-Segment Pseudo-wire Routing
        2.9.6.1. Overview
        2.9.6.2. Pseudo-wire Routing
          2.9.6.2.1. Static Routing
          2.9.6.2.2. Explicit Paths
        2.9.6.3. Configuring VLLs using Dynamic MS-PWs
          2.9.6.3.1. Active/Passive T-PE Selection
          2.9.6.3.2. Automatic Endpoint Configuration
          2.9.6.3.3. Selecting a Path for an MS-PW
          2.9.6.3.4. Pseudo-wire Templates
        2.9.6.4. Pseudo-wire Redundancy
        2.9.6.5. VCCV OAM for Dynamic MS-PWs
        2.9.6.6. VCCV-Ping on Dynamic MS-PWs
        2.9.6.7. VCCV-Trace on Dynamic MS-PWs
      2.9.7. Example Dynamic MS-PW Configuration
      2.9.8. VLL Resilience with Two Destination PE Nodes
        2.9.8.1. Master-Slave Operation
          2.9.8.1.1. Interaction with SAP-Specific OAM
          2.9.8.1.2. Local Rules at Slave VLL PE
          2.9.8.1.3. Operation of Master-Slave Pseudo-wire Redundancy with Existing Scenarios
          2.9.8.1.4. VLL Resilience for a Switched Pseudo-wire Path
      2.9.9. Pseudo-wire SAPs
      2.9.10. Epipe Using BGP-MH Site Support for Ethernet Tunnels
        2.9.10.1. Operational Overview
        2.9.10.2. Detailed Operation
          2.9.10.2.1. Sample Operation of G.8031 BGP-MH
        2.9.10.3. BGP-MH Site Support for Ethernet Tunnels Operational-Group Model
        2.9.10.4. BGP-MH Specifics for MH Site Support for Ethernet Tunnels
        2.9.10.5. PW Redundancy for BGP MH Site Support for Ethernet Tunnels
        2.9.10.6. T-LDP Status Notification Handling Rules of BGP-MH Epipes
          2.9.10.6.1. Rules for Processing Endpoint SAP Active/Standby Status Bits
          2.9.10.6.2. Rules for Processing, Merging Local, and Received Endpoint Operational Status
          2.9.10.6.3. Operation for BGP MH Site Support for Ethernet Tunnels
      2.9.11. Access Node Resilience Using MC-LAG and Pseudo-wire Redundancy
      2.9.12. VLL Resilience for a Switched Pseudo-wire Path
    2.10. Pseudo-wire Redundancy Service Models
      2.10.1. Redundant VLL Service Model
      2.10.2. T-LDP Status Notification Handling Rules
        2.10.2.1. Processing Endpoint SAP Active/Standby Status Bits
        2.10.2.2. Processing and Merging
    2.11. High-Speed Downlink Packet Access (HSDPA) Off Load Fallback over ATM
      2.11.1. Primary Spoke-SDP Fallback to Secondary SAP
      2.11.2. Reversion to Primary Spoke SDP Path
      2.11.3. MC-APS and MC-LAG
        2.11.3.1. Failure Scenarios
    2.12. VLL Using G.8031 Protected Ethernet Tunnels
    2.13. MPLS Entropy Label and Hash Label
    2.14. BGP Virtual Private Wire Service (VPWS)
      2.14.1. Single-Homed BGP VPWS
      2.14.2. Dual-Homed BGP VPWS
      2.14.3. BGP VPWS Pseudo-wire Switching
        2.14.3.1. Pseudo-wire Signaling
        2.14.3.2. BGP VPWS Configuration Procedure
        2.14.3.3. Use of Pseudo-wire Template for BGP VPWS
        2.14.3.4. Use of Endpoint for BGP VPWS
    2.15. VLL Service Considerations
      2.15.1. SDPs
        2.15.1.1. SDP Statistics for VPLS and VLL Services
      2.15.2. SAP Encapsulations and Pseudo-wire Types
        2.15.2.1. PWE3 N-to-1 Cell Mode
        2.15.2.2. PWE3 AAL5 SDU Mode
        2.15.2.3. QoS Policies
        2.15.2.4. Filter Policies
        2.15.2.5. MAC Resources
     Configuring a VLL Service with CLI
      Basic Configurations
      Common Configuration Tasks
      Configuring VLL Components
        Creating an Apipe Service
          Configuring Basic Apipe SAP Parameters
          Configuring an ATM SAP in the N-to-1 Mapping of ATM VPI/VCI to ATM Pseudowire
          Configuring Apipe SDP Bindings
        Creating a Cpipe Service
          Basic Configuration
          Configuration Requirements
          Configuring Cpipe SAPs and Spoke SDPs
        Creating an Epipe Service
          Configuring Epipe SAP Parameters
          Distributed Epipe SAPs
          Configuring SDP Bindings
        Creating an Fpipe Service
          Configuring Fpipe SAP Parameters
          Configuring Fpipe SDP Bindings
        Creating an Ipipe Service
          Configuring Ipipe SAP Parameters
          Configuring Ipipe SDP Bindings
      Using Spoke SDP Control Words
      Same Fate Epipe VLANs Access Protection
      Pseudowire Configuration Notes
      Configuring Two VLL Paths Terminating on T-PE2
      Configuring VLL Resilience
      Configuring VLL Resilience for a Switched Pseudowire Path
      Configuring BGP Virtual Private Wire Service (VPWS)
        Single-Homed BGP VPWS
        Dual-Homed BGP VPWS
      Service Management Tasks
        Modifying Apipe Service Parameters
        Disabling an Apipe Service
        Re-Enabling an Apipe Service
        Deleting an Apipe Service
        Modifying a Cpipe Service
        Deleting a Cpipe Service
        Modifying Epipe Service Parameters
        Disabling an Epipe Service
        Re-Enabling an Epipe Service
        Deleting an Epipe Service
        Modifying Fpipe Service Parameters
        Disabling an Fpipe Service
        Re-enabling an Fpipe Service
        Deleting an Fpipe Service
        Modifying Ipipe Service Parameters
        Disabling an Ipipe Service
        Re-enabling an Ipipe Service
        Deleting an Ipipe Service
     VLL Service Configuration Command Reference
      Command Hierarchies
        Apipe Service Configuration Commands
        Related Apipe Commands
          Connection Profile Commands
        Cpipe Service Configuration Commands
        Epipe Service Configuration Commands
          Epipe Global Commands
          Epipe SAP Configuration Commands
          Epipe Spoke SDP Configuration Commands
          Template Commands
        Fpipe Service Configuration Commands
        Ipipe Service Configuration Commands
      Command Descriptions
        Generic Commands
        Service Commands
        VLL Global Commands
        VLL SAP Commands
        Circuit Emulation Commands
        ETH-CFM Service Commands
        Service Filter and QoS Policy Commands
        VLL Frame Relay Commands
        VLL SDP Commands
        ATM Commands
        OAM Commands
        Cpipe Commands
        VLL SAP Commands
        CPipe SDP Commands
        Epipe SAP Template Commands
     VLL Show Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VLL Show Commands
        VLL Clear Commands
        VLL Debug Commands
        VLL Tools Commands
  3.  Virtual Private LAN Service
    3.1. In This Chapter
    3.2. VPLS Service Overview
      3.2.1. VPLS Packet Walkthrough
    3.3. VPLS Features
      3.3.1. VPLS Enhancements
      3.3.2. VPLS over MPLS
      3.3.3. VPLS Service Pseudo-wire VLAN Tag Processing
      3.3.4. VPLS MAC Learning and Packet Forwarding
        3.3.4.1. MAC Learning Protection
        3.3.4.2. DEI in IEEE 802.1ad
      3.3.5. VPLS Using G.8031 Protected Ethernet Tunnels
      3.3.6. Pseudo-wire Control Word
      3.3.7. Table Management
        3.3.7.1. FIB Size
        3.3.7.2. FIB Size Alarms
        3.3.7.3. Local and Remote Aging Timers
        3.3.7.4. Disable MAC Aging
        3.3.7.5. Disable MAC Learning
        3.3.7.6. Unknown MAC Discard
        3.3.7.7. VPLS and Rate Limiting
        3.3.7.8. MAC Move
        3.3.7.9. Auto-Learn MAC Protect
          3.3.7.9.1. Operation
      3.3.8. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
      3.3.9. VPLS and Spanning Tree Protocol
        3.3.9.1. Spanning Tree Operating Modes
        3.3.9.2. Multiple Spanning Tree
          3.3.9.2.1. Redundancy Access to VPLS
        3.3.9.3. MSTP for QinQ SAPs
        3.3.9.4. Provider MSTP
          3.3.9.4.1. MSTP General Principles
          3.3.9.4.2. MSTP in the SR-Series Platform
        3.3.9.5. Enhancements to the Spanning Tree Protocol
          3.3.9.5.1. L2PT Termination
          3.3.9.5.2. BPDU Translation
          3.3.9.5.3. L2PT and BPDU Translation
      3.3.10. Egress Multicast Groups
        3.3.10.1. Egress Multicast Group Provisioning
          3.3.10.1.1. Required Common SAP Parameters
          3.3.10.1.2. SAP Egress QoS Policy
          3.3.10.1.3. Efficient Multicast Egress SAP Chaining
          3.3.10.1.4. Mirroring and Efficient Multicast Replication
          3.3.10.1.5. IOM or XCM Chain Management
          3.3.10.1.6. IOM Mode B Capability
      3.3.11. VPLS Redundancy
        3.3.11.1. Spoke SDP Redundancy for Metro Interconnection
        3.3.11.2. Spoke SDP Based Redundant Access
        3.3.11.3. Inter-Domain VPLS Resiliency Using Multi-Chassis Endpoints
          3.3.11.3.1. Fast Detection of Peer Failure using BFD
          3.3.11.3.2. MC-EP Passive Mode
        3.3.11.4. Support for Single Chassis Endpoint Mechanisms
          3.3.11.4.1. MAC Flush Support in MC-EP
          3.3.11.4.2. Block-on-Mesh-Failure Support in MC-EP Scenario
          3.3.11.4.3. Support for Force Spoke SDP in MC-EP
          3.3.11.4.4. Revertive Behavior for Primary Pseudo-wire(s) in a MC-EP
        3.3.11.5. Using B-VPLS for Increased Scalability and Reduced Convergence Times
        3.3.11.6. MAC Flush Additions for PBB VPLS
      3.3.12. VPLS Access Redundancy
        3.3.12.1. STP-Based Redundant Access to VPLS
        3.3.12.2. Redundant Access to VPLS Without STP
      3.3.13. Object Grouping and State Monitoring
        3.3.13.1.  VPLS Applicability — Block on VPLS a Failure
      3.3.14. MAC Flush Message Processing
        3.3.14.1. Dual Homing to a VPLS Service
        3.3.14.2. MC-Ring and VPLS
      3.3.15. ACL Next-Hop for VPLS
      3.3.16. SDP Statistics for VPLS and VLL Services
      3.3.17. BGP Auto-Discovery for LDP VPLS
        3.3.17.1. BGP AD Overview
        3.3.17.2. Information Model
        3.3.17.3. FEC Element for T-LDP Signaling
        3.3.17.4. BGP-AD and Target LDP (T-LDP) Interaction
        3.3.17.5. SDP Usage
        3.3.17.6. Automatic Creation of SDPs
        3.3.17.7. Manually Provisioned SDP
        3.3.17.8. Automatic Instantiation of Pseudo-wires (SDP Bindings)
        3.3.17.9. Mixing Statically Configured and Auto-Discovered Pseudo-wires in a VPLS
        3.3.17.10. Resiliency Schemes
      3.3.18. BGP VPLS
        3.3.18.1. Pseudo-wire Signaling Details
        3.3.18.2. Supported VPLS Features
      3.3.19. VCCV BFD Support for VPLS Services
      3.3.20. BGP Multi-Homing for VPLS
        3.3.20.1. Information Model and Required Extensions to L2VPN NLRI
        3.3.20.2. Supported Services and Multi-Homing Objects
        3.3.20.3. Blackhole Avoidance
          3.3.20.3.1. MAC Flush to the Core PEs
          3.3.20.3.2. Indicating non-DF status towards the access PE or CE
        3.3.20.4. BGP Multi-Homing for VPLS Inter-Domain Resiliency
      3.3.21. Multicast-Aware VPLS
        3.3.21.1. IGMP Snooping for VPLS
        3.3.21.2. MLD Snooping for VPLS
        3.3.21.3. PIM Snooping for VPLS
          3.3.21.3.1. Plain PIM Snooping
          3.3.21.3.2. PIM Proxy
        3.3.21.4. MAC-Based IPv6 Multicast Forwarding
        3.3.21.5. PIM and IGMP/MLD Snooping Interaction
        3.3.21.6. Multi-Chassis Synchronization for Layer 2 Snooping States
          3.3.21.6.1. IGMP Snooping Synchronization
          3.3.21.6.2. MLD Snooping Synchronization
          3.3.21.6.3. PIM Snooping for IPv4 Synchronization
        3.3.21.7. VPLS Multicast-Aware High Availability Features
      3.3.22. RSVP and LDP P2MP LSP for Forwarding VPLS/B-VPLS BUM and IP Multicast Packets
      3.3.23. MPLS Entropy Label and Hash Label
    3.4. Routed VPLS and I-VPLS
      3.4.1. IES or VPRN IP Interface Binding
        3.4.1.1. Assigning a Service Name to a VPLS Service
        3.4.1.2. Service Binding Requirements
        3.4.1.3. Bound Service Name Assignment
        3.4.1.4. Binding a Service Name to an IP Interface
        3.4.1.5. Bound Service Deletion or Service Name Removal
        3.4.1.6. IP Interface Attached VPLS Service Constraints
        3.4.1.7. IP Interface and VPLS Operational State Coordination
      3.4.2. IP Interface MTU and Fragmentation
        3.4.2.1. Unicast IP Routing into a VPLS Service
      3.4.3. ARP and VPLS FIB Interactions
        3.4.3.1. Routed VPLS Specific ARP Cache Behavior
      3.4.4. The allow-ip-int-bind VPLS Flag
        3.4.4.1. Routed VPLS SAPs Only Supported on Standard Ethernet Ports
        3.4.4.2. Routed VPLS SAPs Only Supported on FP2 (or later) Based Systems or IOM/IMM
        3.4.4.3. Network Ports Restricted to FP2-Based Systems or IOMs
        3.4.4.4. LAG Port Membership Constraints
        3.4.4.5. Routed VPLS Feature Restrictions
        3.4.4.6. Routed I-VPLS Feature Restrictions
      3.4.5. IES IP Interface VPLS Binding and Chassis Mode Interaction
      3.4.6. VPRN IP Interface VPLS Binding and Forwarding Plane Constraints
      3.4.7. Route Leaking Between Routing Contexts
        3.4.7.1. Ingress LAG and FP1 to Routed VPLS Discards
      3.4.8. IPv4 and IPv6 Multicast Routing Support
      3.4.9. BGP Auto Discovery (BGP-AD) for Routed VPLS Support
      3.4.10. Routed VPLS Caveats
        3.4.10.1. VPLS SAP Ingress IP Filter Override
        3.4.10.2. IP Interface Defined Egress QoS Reclassification
        3.4.10.3. Remarking for VPLS and Routed Packets
        3.4.10.4. 7450 Mixed Mode Chassis
        3.4.10.5. IPv4 Multicast Routing
        3.4.10.6. Routed VPLS Supported Routing Related Protocols
        3.4.10.7. Spanning Tree and Split Horizon
    3.5. VPLS Service Considerations
      3.5.1. SAP Encapsulations
      3.5.2. VLAN Processing
      3.5.3. Ingress VLAN Swapping
      3.5.4. Service Auto-Discovery using Multiple VLAN Registration Protocol (MVRP)
        3.5.4.1. Configure the MVRP Infrastructure using an M-VPLS Context
        3.5.4.2. Instantiate Related VLAN FIBs and Trunks in MVRP Scope
        3.5.4.3. MVRP Activation of Service Connectivity
        3.5.4.4. MVRP Control Plane
        3.5.4.5. STP-MVRP Interaction
          3.5.4.5.1. Interaction Between MVRP and Instantiated SAP Status
          3.5.4.5.2. Using Temporary Flooding to Optimize Failover Times
      3.5.5. VPLS E-Tree Services
        3.5.5.1. VPLS E-Tree Services Overview
        3.5.5.2. Leaf-ac and Root-ac SAPs
        3.5.5.3. Leaf-ac and Root-ac SDP Binds
        3.5.5.4. Root-leaf-tag SAPs
        3.5.5.5. Root-leaf-tag SDP Binds
        3.5.5.6. Interaction between VPLS E-Tree Services and Other Features
     Configuring a VPLS Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPLS Components
        Configuring Egress Multicast Groups
        Creating a VPLS Service
        Enabling Multiple MAC Registration Protocol (MMRP)
          Enabling MAC Move
          Configuring STP Bridge Parameters in a VPLS
        Configuring GSMP Parameters
        Configuring a VPLS SAP
          Local VPLS SAPs
          Distributed VPLS SAPs
          Configuring SAP-Specific STP Parameters
          STP SAP Operational States
          Configuring VPLS SAPs with Split Horizon
          Configuring MAC Learning Protection
        Applying an Egress Multicast Group to a VPLS Service SAP
        Configuring SAP Subscriber Management Parameters
        MSTP Control over Ethernet Tunnels
        Configuring SDP Bindings
        Configuring Overrides on Service SAPs
          Configuring Spoke SDP Specific STP Parameters
          Spoke SDP STP Operational States
          Configuring VPLS Spoke SDPs with Split Horizon
      Configuring VPLS Redundancy
        Creating a Management VPLS for SAP Protection
        Creating a Management VPLS for Spoke SDP Protection
        Configuring Load Balancing with Management VPLS
        Configuring Selective MAC Flush
        Configuring Multi-Chassis Endpoints
      ATM/Frame Relay PVC Access and Termination on a VPLS Service
      Configuring BGP Auto-Discovery
        Configuration Steps
        LDP Signaling
        Pseudowire Template
      Configuring BGP VPLS
        Configuring a VPLS Management Interface
      Configuring Policy-Based Forwarding for Deep Packet Inspection (DPI) in VPLS
      Configuring VPLS E-Tree Services
    Service Management Tasks
      Modifying VPLS Service Parameters
      Modifying Management VPLS Parameters
      Deleting a Management VPLS
      Disabling a Management VPLS
      Deleting a VPLS Service
      Disabling a VPLS Service
      Re-Enabling a VPLS Service
     VPLS Service Configuration Command Reference
      Command Hierarchies
        Global Commands
        Oper Group Commands
        SAP Commands
        Template Commands
        Mesh SDP Commands
        Spoke SDP Commands
        Provider Tunnel Commands
        Egress Multicast Group Commands
        Routed VPLS Commands
        Multi-Chassis Redundancy Commands
      Command Descriptions
        Generic Commands
        VPLS Service Commands
        VPLS Interface Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        General Switch Management Protocol Commands
          VPLS DHCP Commands
          VPLS STP Commands
          VPLS SAP Commands
        ETH-CFM Service Commands
          VPLS SAP ATM Commands
          VPLS Filter and QoS Policy Commands
          VPLS Template Commands
          Provider Tunnel Commands
          VPLS SDP Commands
          SAP Subscriber Management Commands
        VPLS Multicast Commands
          VPLS DHCP and Anti-Spoofing Commands
        Egress Multicast Group Commands
        BGP Auto-Discovery Commands
        Redundancy Commands
     VPLS Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
          Show Multi-Chassis Endpoint Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         VPLS Show Commands
        IGMP Snooping Show Commands
        IGMP Commands
          Show Multi-Chassis Endpoint Commands
        VPLS Clear Commands
        VPLS Debug Commands
  4.  IEEE 802.1ah Provider Backbone Bridging
    4.1. In This Chapter
    4.2. IEEE 802.1ah Provider Backbone Bridging (PBB) Overview
    4.3. PBB Features
      4.3.1. Integrated PBB-VPLS Solution
      4.3.2. PBB Technology
      4.3.3. PBB Mapping to Existing VPLS Configurations
      4.3.4. SAP and SDP Support
        4.3.4.1. PBB B-VPLS
        4.3.4.2. PBB I-VPLS
      4.3.5. PBB Packet Walkthrough
        4.3.5.1. PBB Control Planes
      4.3.6. Shortest Path Bridging MAC Mode (SPBM)
        4.3.6.1. Flooding and Learning Versus Link State
        4.3.6.2. SPB for B-VPLS
        4.3.6.3. Control B-VPLS and User B-VPLS
        4.3.6.4. Shortest Path and Single Tree
        4.3.6.5. Data Path and Forwarding
        4.3.6.6. SPB Ethernet OAM
        4.3.6.7. SPB Levels
      4.3.7. SPBM to Non-SPBM Interworking
        4.3.7.1. Static MACs and Static ISIDs
        4.3.7.2. Epipe Static Configuration
          4.3.7.2.1. I-VPLS Static Config
        4.3.7.3. SPBM ISID Policies
      4.3.8. ISID Policy Control
        4.3.8.1. Static ISID Advertisement
        4.3.8.2. I-VPLS for Unicast Service
      4.3.9. Default Behaviors
      4.3.10. Example Network Configuration
        4.3.10.1. Sample Configuration for Dut-A
          4.3.10.1.1. Show Commands Outputs
          4.3.10.1.2. Debug Commands
          4.3.10.1.3. Tools Commands
          4.3.10.1.4. Clear Commands
      4.3.11. IEEE 802.1ak MMRP for Service Aggregation and Zero Touch Provisioning
      4.3.12. MMRP Support Over B-VPLS SAPs and SDPs
        4.3.12.1. I-VPLS Changes and Related MMRP Behavior
        4.3.12.2. Limiting the Number of MMRP Entries on a Per B-VPLS Basis
        4.3.12.3. Optimization for Improved Convergence Time
        4.3.12.4. Controlling MRP Scope using MRP Policies
      4.3.13. PBB and BGP-AD
      4.3.14. PBB ELINE Service
        4.3.14.1. Non-Redundant PBB Epipe Spoke Termination
      4.3.15. PBB Using G.8031-Protected Ethernet Tunnels
        4.3.15.1. Solution Overview
        4.3.15.2. Detailed Solution Description
        4.3.15.3. Detailed PBB Emulated LAG Solution Description
        4.3.15.4. Support Service and Solution Combinations
      4.3.16. Periodic MAC Notification
      4.3.17. MAC Flush
        4.3.17.1. PBB Resiliency for B-VPLS Over Pseudo-wire Infrastructure
          4.3.17.1.1. Porting existing VPLS LDP MAC Flush in PBB VPLS
          4.3.17.1.2. PBB Blackholing Issue
          4.3.17.1.3. LDP MAC Flush Solution for PBB Blackholing
      4.3.18. Access Multi-Homing for Native PBB (B-VPLS over SAP Infrastructure)
        4.3.18.1. Solution Description for I-VPLS Over Native PBB Core
        4.3.18.2. Solution Description for PBB Epipe over G.8031 Ethernet Tunnels
          4.3.18.2.1. Dual-Homing into PBB Epipe - Local Switching Use Case
      4.3.19. BGP Multi-homing for I-VPLS
      4.3.20. Access Multi-Homing over MPLS for PBB Epipes
      4.3.21. PBB and IGMP/MLD Snooping
      4.3.22. PBB and PIM Snooping
      4.3.23. PBB QoS
        4.3.23.1. Transparency of Customer QoS Indication through PBB Backbone
          4.3.23.1.1. Configuration Examples
          4.3.23.1.2. Details Solution Description
      4.3.24. Egress B-SAP per ISID Shaping
        4.3.24.1. B-SAP Egress ISID Shaping Configuration
        4.3.24.2. Provisioning Model
        4.3.24.3. Egress Queue Scheduling
        4.3.24.4. B-SAP per-ISID Shaping Configuration Example
      4.3.25. PBB OAM
        4.3.25.1. Mirroring
        4.3.25.2. OAM Commands
        4.3.25.3. CFM Support
    4.4. Configuration Examples
      4.4.1. PBB using G.8031 Protected Ethernet Tunnels
      4.4.2. MC-LAG Multihoming for Native PBB
      4.4.3. Access Multi-Homing over MPLS for PBB Epipes
     PBB Configuration Command Reference
      Command Hierarchies
        Global Commands
        SAP Commands
        Mesh SDP Commands
        Spoke SDP Commands
        BGP-MH for I-VPLS Commands
      Command Descriptions
        VPLS Service Commands
     PBB Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         PBB Show Commands
        PBB Clear Commands
        PBB Debug Commands
  5.  Ethernet Virtual Private Networks (EVPNs)
    5.1. In This Chapter
    5.2. Overview
    5.3. EVPN for VXLAN Tunnels in a Layer-2 DC GW (EVPN-VXLAN)
    5.4. EVPN for VXLAN Tunnels in a Layer-2 DC with Integrated Routing Bridging Connectivity on the DC GW
    5.5. EVPN for VXLAN Tunnels in a Layer 3 DC with Integrated Routing Bridging Connectivity among VPRNs
    5.6. EVPN for VXLAN Tunnels in a Layer 3 DC with EVPN-Tunnel Connectivity among VPRNs
    5.7. EVPN for MPLS Tunnels in ELAN Services
    5.8. EVPN for MPLS Tunnels in ELINE Services
    5.9. EVPN for PBB over MPLS Tunnels (PBB-EVPN)
    5.10. VXLAN
      5.10.1. VXLAN ECMP and LAG
      5.10.2. VXLAN VPLS Tag Handling
      5.10.3. VXLAN MTU Considerations
      5.10.4. VXLAN QoS
        5.10.4.1. Ingress
        5.10.4.2. Egress
      5.10.5. VXLAN Ping
      5.10.6. IGMP Snooping on VXLAN
      5.10.7. Non-System IPv4 and IPv6 VXLAN Termination in VPLS and R-VPLS Services
    5.11. BGP-EVPN Control Plane for VXLAN Overlay Tunnels
    5.12. EVPN for VXLAN in VPLS Services
      5.12.1. Resiliency and BGP Multi-Homing
      5.12.2. Use of bgp-evpn, bgp-ad, and Sites in the Same VPLS Service
      5.12.3. Use of the unknown-mac-route
    5.13. EVPN for VXLAN in R-VPLS Services
    5.14. EVPN for VXLAN in IRB Backhaul R-VPLS Services and IP Prefixes
    5.15. EVPN for VXLAN in EVPN Tunnel R-VPLS Services
    5.16. DC GW integration with the Nuage Virtual Services Directory (VSD)
      5.16.1. XMPP Interface on the DC GW
      5.16.2. Overview of the Static-Dynamic VSD Integration Model
        5.16.2.1. Step 1
        5.16.2.2. Step 2
        5.16.2.3. Step 3
        5.16.2.4. Step 4
        5.16.2.5. Step 5
      5.16.3. VSD-Domains and Association to Static-Dynamic Services
        5.16.3.1. VSD-Domain Type L2-DOMAIN
        5.16.3.2. VSD-Domain Type L2-DOMAIN-IRB
        5.16.3.3. VSD-Domain Type VRF-GRE
        5.16.3.4. VSD-Domain Type VRF-VXLAN
    5.17. Fully-Dynamic VSD Integration Model
      5.17.1. Step 1
      5.17.2. Step 2
      5.17.3. Step 3
      5.17.4. Step 4
      5.17.5. Step 5
      5.17.6. Python Script Implementation Details
      5.17.7. Provisioning Filters using the VSD Fully Dynamic Model
    5.18. Layer 2 Multicast Optimization for VXLAN (Assisted-Replication)
      5.18.1. Replicator (AR-R) Procedures
      5.18.2. Leaf (AR-L) procedures
      5.18.3. Assisted-Replication Interaction with Other VPLS Features
    5.19. BGP-EVPN Control Plane for MPLS Tunnels
    5.20. EVPN for MPLS Tunnels in VPLS Services (EVPN-MPLS)
      5.20.1. EVPN and VPLS Integration
      5.20.2. Auto-Derived Route-Distinguisher (RD) in Services with Multiple BGP Families
      5.20.3. EVPN Multi-Homing in VPLS Services
      5.20.4. EVPN All-Active Multi-Homing
      5.20.5. All-Active Multi-Homing Service Model
      5.20.6. ES Discovery and DF Election Procedures
      5.20.7. Aliasing
      5.20.8. Network Failures and Convergence for All-Active Multi-Homing
        5.20.8.1. Logical Failures on Ethernet Segments and Black-Holes
        5.20.8.2. Transient Issues Due to MAC Route Delays
      5.20.9. EVPN Single-Active Multi-Homing
        5.20.9.1. Single-Active Multi-Homing Service Model
        5.20.9.2. ES and DF Election Procedures
        5.20.9.3. Backup PE Function
        5.20.9.4. Network Failures and Convergence for Single-Active Multi-Homing
          5.20.9.4.1. Logical Failures on Ethernet Segments and Black-Holes
    5.21. BGP-EVPN Control Plane for EVPN-VPWS
    5.22. EVPN for MPLS Tunnels in Epipe Services (EVPN-VPWS)
      5.22.1. Using A/S PW and MC-LAG with EVPN-VPWS Epipes
    5.23. EVPN Multi-homing for EVPN-VPWS Services
    5.24. EVPN for MPLS Tunnels in Routed VPLS Services
      5.24.1. EVPN-MPLS Multi-Homing and Passive VRRP
    5.25. P2MP mLDP tunnels for BUM traffic in EVPN-MPLS Services
    5.26. BGP-EVPN Control Plane for PBB-EVPN
      5.26.1. EVPN Route Type 3 - Inclusive Multicast Ethernet Tag Route
      5.26.2. EVPN Route Type 2 - MAC/IP Advertisement Route (or BMAC Routes)
      5.26.3. EVPN Route Type 4 - Ethernet Segment Route
    5.27. PBB-EVPN for I-VPLS and PBB Epipe Services
      5.27.1. Flood Containment for I-VPLS Services
      5.27.2. PBB-EVPN and PBB-VPLS Integration
      5.27.3. PBB-EVPN Multi-Homing in I-VPLS and PBB Epipe Services
        5.27.3.1. System BMAC Assignment in PBB-EVPN
        5.27.3.2. PBB-EVPN all-active multi-homing service model
          5.27.3.2.1. Network failures and convergence for all-active multi-homing
        5.27.3.3. PBB-EVPN Single-Active Multi-Homing Service Model
          5.27.3.3.1. Network Failures and Convergence for Single-Active Multihoming
        5.27.3.4. PBB-Epipes and EVPN Multi-Homing
        5.27.3.5. PBB-EVPN and Use of P2MP mLDP Tunnels for Default Multicast List
        5.27.3.6. PBB-EVPN ISID-Based CMAC Flush
    5.28. ARP/ND Snooping and Proxy Support
      5.28.1. Proxy-ARP/ND Periodic Refresh, Unsolicited Refresh and Confirm-Messages
      5.28.2. Proxy-ND and the Router Flag in Neighbor Advertisement messages
        5.28.2.1. Procedure to Add the R Flag to a Specified Entry
    5.29. BGP-EVPN MAC-Mobility
    5.30. BGP-EVPN MAC-Duplication
    5.31. Conditional Static MAC and Protection
    5.32. Auto-Learn MAC Protect and Restricting Protected Source MACs
    5.33. Black-hole MAC and its Application to Proxy-ARP/Proxy-ND Duplicate Detection
    5.34. CFM Interaction with EVPN Services
    5.35. DC GW Policy Based Forwarding/Routing to an EVPN ESI (Ethernet Segment Identifier)
      5.35.1. Policy Based Forwarding in VPLS Services for Nuage Service Chaining Integration in L2-Domains
      5.35.2. Policy Based Routing in VPRN Services for Nuage Service Chaining Integration in L2-DOMAIN-IRB Domains
    5.36. IGMP Snooping in EVPN-MPLS Services
    5.37. Configuring EVPN-VXLAN and EVPN-MPLS in the Same VPLS Service
      5.37.1. BGP-EVPN Routes in Services Configured With Two BGP Instances
      5.37.2. Anycast Redundant Solution for Dual BGP Instance Services
      5.37.3. Using P2MP mLDP in Redundant Anycast DC GWs
    5.38. BGP and EVPN Route Selection for EVPN Routes
    5.39. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPLS Features
    5.40. Interaction of PBB-EVPN with Existing VPLS Features
    5.41. Interaction of EVPN-VXLAN and EVPN-MPLS with Existing VPRN Features
    5.42. Routing Policies for BGP EVPN IP Prefixes
    5.43. MPLS Entropy Label and Hash Label
    Configuring an EVPN Service with CLI
      EVPN-VXLAN Configuration Examples
        Layer 2 PE Example
        EVPN for VXLAN in R-VPLS Services Example
        EVPN for VXLAN in EVPN Tunnel R-VPLS Services Example
        EVPN for VXLAN in R-VPLS Services with IPv6 interfaces and prefixes Example
      EVPN-MPLS Configuration Examples
        EVPN All-active Multi-homing Example
        EVPN Single-active Multi-homing Example
      PBB-EVPN Configuration Examples
        PBB-EVPN All-active Multi-homing Example
        PBB-EVPN Single-active Multi-homing Example
    EVPN Command Reference
      Command Hierarchies
        EVPN Configuration Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        EVPN Configuration Commands
        Show Configuration Commands
        Clear Commands
        Debug Commands
        Tools Commands
  6. Pseudowire Ports
    6.1. In This Chapter
    6.2. Overview
    6.3. PW-Port Bound to a Physical Port
    6.4. FPE-Based PW-Port
      6.4.1. Cross-Connect Between the External PW and the FPE-Based PW-Port
      6.4.2. PXC-Based PW-Port — Building the Cross-Connect
        6.4.2.1. Building the Internal Transport Tunnel
        6.4.2.2. Mapping the External PW to the PW-Port
        6.4.2.3. Terminating the Service on PW-SAP
      6.4.3. Operational State of the PXC Based PW-Port
      6.4.4. QoS
        6.4.4.1.  Preservation of Forwarding Class Across PXC
      6.4.5. Statistics on the FPE based PW-Port
      6.4.6. Intra-Chassis Redundancy Models for PXC Based PW-Port
  7. Standards and Protocol Support
  Customer Document and Product Support
Layer 3 Services Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  Internet Enhanced Service
    2.1. In This Chapter
    2.2. IES Service Overview
    2.3. IES Features
      2.3.1. IP Interfaces
        2.3.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.3.1.1.1. QPPB Applications
          2.3.1.1.2. Inter-AS Coordination of QoS Policies
          2.3.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.3.1.2. QPPB
          2.3.1.2.1. Associating an FC and Priority with a Route
          2.3.1.2.2. Displaying QoS Information Associated with Routes
          2.3.1.2.3. Enabling QPPB on an IP Interface
          2.3.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.3.1.2.5. QPPB and Multiple Paths to a Destination
          2.3.1.2.6. QPPB and Policy-Based Routing
        2.3.1.3. QPPB and GRT Lookup
          2.3.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.3.1.4. Object Grouping and State Monitoring
          2.3.1.4.1. IES IP Interface Applicability
      2.3.2. Subscriber Interfaces
        2.3.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.3.2.2. RADIUS Accounting
      2.3.3. SAPs
        2.3.3.1. Encapsulations
        2.3.3.2. ATM SAP Encapsulations for IES
        2.3.3.3. Pseudowire SAPs
        2.3.3.4. Encapsulation
        2.3.3.5. Pseudowire SAP Configuration
        2.3.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.3.3.7. Shaping and Bandwidth Control
        2.3.3.8. Lag Considerations
        2.3.3.9. Last Mile Packet Size Adjustment
        2.3.3.10. Redundancy with Pseudowire SAPs
        2.3.3.11. Operational Group Support for PW Ports
      2.3.4. Routing Protocols
        2.3.4.1. CPE Connectivity Check
      2.3.5. QoS Policies
      2.3.6. Filter Policies
      2.3.7. MPLS Entropy Label and Hash Label
      2.3.8. Spoke SDPs
      2.3.9. SRRP
        2.3.9.1. SRRP Messaging
        2.3.9.2. SRRP and Multi-Chassis Synchronization
        2.3.9.3. SRRP Instance
          2.3.9.3.1. SRRP Instance MCS Key
          2.3.9.3.2. Containing Service Type and ID
          2.3.9.3.3. Containing Subscriber IP Interface Name
          2.3.9.3.4. Subscriber Subnet Information
          2.3.9.3.5. Containing Group IP Interface Information
          2.3.9.3.6. Remote Redundant IP Interface Mismatch
          2.3.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.3.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.3.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.3.9.3.10. Local and Remote Dual Master Detected
        2.3.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.3.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.3.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.3.9.7. BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Management Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
        Redundant Interface Commands
        IES Subscriber Interface Commands
        IES Interface Commands
        IES Interface DHCP Commands
        PPPoE Commands
        IES Interface ICMP Commands
        IES Interface IPv6 Commands
        IES Spoke SDP Commands
        IES SAP Commands
        SAP Subscriber Management Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
        ATM Commands
        IES Interface VRRP Commands
        IPSec Gateway Commands
        Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
  3.  Virtual Private Routed Network Service
    3.1. In This Chapter
    3.2. VPRN Service Overview
      3.2.1. Routing Prerequisites
      3.2.2. Core MP-BGP Support
      3.2.3. Route Distinguishers
        3.2.3.1. eiBGP Load Balancing
      3.2.4. Route Reflector
      3.2.5. CE to PE Route Exchange
        3.2.5.1. Route Redistribution
        3.2.5.2. CPE Connectivity Check
      3.2.6. Constrained Route Distribution (RT Constraint)
        3.2.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.2.6.2. Configuring the Route Target Address Family
        3.2.6.3. Originating RT Constraint Routes
        3.2.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.2.6.5. Using RT Constraint Routes
      3.2.7. BGP Fast Reroute in a VPRN
        3.2.7.1. BGP Fast Reroute in a VPRN Configuration
      3.2.8. BGP Best-External in a VPRN Context
    3.3. VPRN Features
      3.3.1. IP Interfaces
        3.3.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.3.1.2. QPPB Applications
        3.3.1.3. Inter-AS Coordination of QoS Policies
        3.3.1.4. Traffic Differentiation Based on Route Characteristics
        3.3.1.5. QPPB
        3.3.1.6. Associating an FC and Priority with a Route
        3.3.1.7. Displaying QoS Information Associated with Routes
        3.3.1.8. Enabling QPPB on an IP interface
        3.3.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.3.1.10. QPPB and Multiple Paths to a Destination
        3.3.1.11. QPPB and Policy-Based Routing
        3.3.1.12. QPPB and GRT Lookup
        3.3.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.3.1.14. Object Grouping and State Monitoring
        3.3.1.15. VPRN IP Interface Applicability
      3.3.2. Subscriber Interfaces
      3.3.3. SAPs
        3.3.3.1. Encapsulations
        3.3.3.2. ATM SAP Encapsulations for VPRN Services
        3.3.3.3. Pseudowire SAPs
      3.3.4. QoS Policies
      3.3.5. Filter Policies
      3.3.6. DSCP Marking
        3.3.6.1. Default DSCP Mapping Table
      3.3.7. Configuration of TTL Propagation for VPRN Routes
      3.3.8. CE to PE Routing Protocols
        3.3.8.1. PE to PE Tunneling Mechanisms
        3.3.8.2. Per VRF Route Limiting
      3.3.9. Spoke SDPs
        3.3.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.3.9.2. Spoke SDP Redundancy into IES/VPRN
      3.3.10. IP-VPNs
        3.3.10.1. Using OSPF in IP-VPNs
      3.3.11. IPCP Subnet Negotiation
      3.3.12. Cflowd for IP-VPNs
      3.3.13. Inter-AS VPRNs
      3.3.14. Carrier Supporting Carrier (CsC)
        3.3.14.1. Terminology
        3.3.14.2. CSC Connectivity Models
        3.3.14.3. CSC-PE Configuration and Operation
        3.3.14.4. CSC Interface
        3.3.14.5. QoS
        3.3.14.6. MPLS
        3.3.14.7. CSC VPRN Service Configuration
      3.3.15. Traffic Leaking to GRT
      3.3.16. Traffic Leaking from VPRN to GRT for IPv6
      3.3.17. RIP Metric Propagation in VPRNs
      3.3.18. NTP Within a VPRN Service
      3.3.19. PTP Within a VPRN Service
      3.3.20. VPN Route Label Allocation
        3.3.20.1. Configuring the Service Label Mode
        3.3.20.2. Restrictions and Usage Notes
      3.3.21. VPRN Support for BGP Flowspec
      3.3.22. MPLS Entropy Label and Hash Label
    3.4. QoS on Ingress Bindings
    3.5. Multicast in IP-VPN Applications
      3.5.1. Use of Data MDTs
      3.5.2. Multicast Protocols Supported in the Provider Network
      3.5.3. MVPN Membership Auto-discovery using BGP
      3.5.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.5.5. VRF Route Import Extended Community
      3.5.6. Provider Tunnel Support
        3.5.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.5.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.5.6.3. P2MP LDP I-PMSI and S-PMSI
        3.5.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.5.6.5. P2MP LSP S-PMSI
        3.5.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.5.6.7. MVPN Sender-only/Receiver-only
        3.5.6.8. S-PMSI Trigger Thresholds
        3.5.6.9. Migration from Existing Rosen Implementation
        3.5.6.10. Policy-based S-PMSI
          3.5.6.10.1. Supported MPLS Tunnels
          3.5.6.10.2. Supported Multicast Features
          3.5.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.5.6.10.4. Configuration example
      3.5.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.5.8. Multicast VPN Extranet
        3.5.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.5.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.5.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.5.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.5.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.5.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.5.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.5.11. IPv6 MVPN Support
      3.5.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.5.13. NG-MVPN Multicast Source Geo-Redundancy
      3.5.14. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.5.15. Inter-AS MVPN
        3.5.15.1. BGP Connector Attribute
        3.5.15.2. PIM RPF Vector
        3.5.15.3. Inter-AS MVPN Option B
        3.5.15.4. Inter-AS MVPN Option C
        3.5.15.5. NG-MVPN Non-segmented Inter-AS Solution
          3.5.15.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.5.15.5.2. Configuration Example
          3.5.15.5.3. Inter-AS Non-segmented MLDP
          3.5.15.5.4. ECMP
    3.6. VPRN Off-Ramp
      3.6.1. DDoS Off-Ramping Through Flowspec
    3.7. FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        Network Time Protocol Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface DHCP Commands
        Interface ICMP Commands
        Interface SAP ATM Commands
        Interface Anti-Spoofing Commands
        Interface SAP Filter and QoS Policy Commands
        Interface VRRP Commands
        Interface SAP Commands
        Routed VPLS Commands
        Network Ingress Commands
        SAP Subscriber Management Commands
        BGP Commands
        ETH-CFM Service Commands
        IS-IS Commands
        OSPF Commands
        PIM Commands
        PPPoE Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Commands
        SDP Commands
        Threat Management Service Interface Commands
        RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
    Tools Command Reference
      Command Hierarchies
        Tools Commands
      Command Descriptions
        Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  Internet Enhanced Service
    2.1. In This Chapter
    2.2. IES Service Overview
    2.3. IES Features
      2.3.1. IP Interfaces
        2.3.1.1. QoS Policy Propagation Using BGP (QPPB)
          2.3.1.1.1. QPPB Applications
          2.3.1.1.2. Inter-AS Coordination of QoS Policies
          2.3.1.1.3. Traffic Differentiation Based on Route Characteristics
        2.3.1.2. QPPB
          2.3.1.2.1. Associating an FC and Priority with a Route
          2.3.1.2.2. Displaying QoS Information Associated with Routes
          2.3.1.2.3. Enabling QPPB on an IP Interface
          2.3.1.2.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.3.1.2.5. QPPB and Multiple Paths to a Destination
          2.3.1.2.6. QPPB and Policy-Based Routing
        2.3.1.3. QPPB and GRT Lookup
          2.3.1.3.1. QPPB Interaction with SAP Ingress QoS Policy
        2.3.1.4. Object Grouping and State Monitoring
          2.3.1.4.1. IES IP Interface Applicability
      2.3.2. Subscriber Interfaces
        2.3.2.1. IPv6 Enhanced Subscriber Management (ESM)
        2.3.2.2. RADIUS Accounting
      2.3.3. SAPs
        2.3.3.1. Encapsulations
        2.3.3.2. ATM SAP Encapsulations for IES
        2.3.3.3. Pseudowire SAPs
        2.3.3.4. Encapsulation
        2.3.3.5. Pseudowire SAP Configuration
        2.3.3.6. QoS for Pseudowire Ports and Pseudowire SAPs
        2.3.3.7. Shaping and Bandwidth Control
        2.3.3.8. Lag Considerations
        2.3.3.9. Last Mile Packet Size Adjustment
        2.3.3.10. Redundancy with Pseudowire SAPs
        2.3.3.11. Operational Group Support for PW Ports
      2.3.4. Routing Protocols
        2.3.4.1. CPE Connectivity Check
      2.3.5. QoS Policies
      2.3.6. Filter Policies
      2.3.7. MPLS Entropy Label and Hash Label
      2.3.8. Spoke SDPs
      2.3.9. SRRP
        2.3.9.1. SRRP Messaging
        2.3.9.2. SRRP and Multi-Chassis Synchronization
        2.3.9.3. SRRP Instance
          2.3.9.3.1. SRRP Instance MCS Key
          2.3.9.3.2. Containing Service Type and ID
          2.3.9.3.3. Containing Subscriber IP Interface Name
          2.3.9.3.4. Subscriber Subnet Information
          2.3.9.3.5. Containing Group IP Interface Information
          2.3.9.3.6. Remote Redundant IP Interface Mismatch
          2.3.9.3.7. Remote Sending Redundant IP Interface Unavailable
          2.3.9.3.8. Remote SRRP Advertisement SAP Non-existent
          2.3.9.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          2.3.9.3.10. Local and Remote Dual Master Detected
        2.3.9.4. Subscriber Subnet Owned IP Address Connectivity
        2.3.9.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        2.3.9.6. Receive SRRP Advertisement SAP and Anti-Spoof
        2.3.9.7. BFD with SRRP/VRRP
    Configuring an IES Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring IES Components
        Configuring an IES Service
        Configuring IES Subscriber Interface Parameters
        Configuring IES Interface Parameters
        Configuring Spoke-SDP Parameters
        Configuring SAP Parameters
        Configuring IES SAP ATM Parameters
        Configuring VRRP
        Configuring IPSec Parameters
        IGMP Host Tracking
      Service Management Tasks
        Modifying IES Service Parameters
        Deleting a Spoke-SDP
        Deleting an IES Service
        Disabling an IES Service
        Re-Enabling an IES Service
     IES Services Command Reference
      Command Hierarchies
        IES Service Configuration Commands
          Global Commands
          Interface Commands
        Routed VPLS Commands
        Redundant Interface Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        VRRP Commands
        Spoke SDP Commands
        Subscriber Interface Commands
          Group Interface SAP Commands
        Threat Management Service Interface Commands
      Command Descriptions
        Generic Commands
        IES Global Commands
        Redundant Interface Commands
        IES Subscriber Interface Commands
        IES Interface Commands
        IES Interface DHCP Commands
        PPPoE Commands
        IES Interface ICMP Commands
        IES Interface IPv6 Commands
        IES Spoke SDP Commands
        IES SAP Commands
        SAP Subscriber Management Commands
        ETH-CFM Service Commands
        IES Filter and QoS Policy Commands
        ATM Commands
        IES Interface VRRP Commands
        IPSec Gateway Commands
        Threat Management Service Interface Commands
    IES Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Monitor Commands
      Command Descriptions
         IES Show Commands
        IES Clear Commands
        IES Debug Commands
        IES Monitor Commands
  3.  Virtual Private Routed Network Service
    3.1. In This Chapter
    3.2. VPRN Service Overview
      3.2.1. Routing Prerequisites
      3.2.2. Core MP-BGP Support
      3.2.3. Route Distinguishers
        3.2.3.1. eiBGP Load Balancing
      3.2.4. Route Reflector
      3.2.5. CE to PE Route Exchange
        3.2.5.1. Route Redistribution
        3.2.5.2. CPE Connectivity Check
      3.2.6. Constrained Route Distribution (RT Constraint)
        3.2.6.1. Constrained VPN Route Distribution Based on Route Targets
        3.2.6.2. Configuring the Route Target Address Family
        3.2.6.3. Originating RT Constraint Routes
        3.2.6.4. Receiving and Re-Advertising RT Constraint Routes
        3.2.6.5. Using RT Constraint Routes
      3.2.7. BGP Fast Reroute in a VPRN
        3.2.7.1. BGP Fast Reroute in a VPRN Configuration
      3.2.8. BGP Best-External in a VPRN Context
    3.3. VPRN Features
      3.3.1. IP Interfaces
        3.3.1.1. QoS Policy Propagation Using BGP (QPPB)
        3.3.1.2. QPPB Applications
        3.3.1.3. Inter-AS Coordination of QoS Policies
        3.3.1.4. Traffic Differentiation Based on Route Characteristics
        3.3.1.5. QPPB
        3.3.1.6. Associating an FC and Priority with a Route
        3.3.1.7. Displaying QoS Information Associated with Routes
        3.3.1.8. Enabling QPPB on an IP interface
        3.3.1.9. QPPB When Next-Hops are Resolved by QPPB Routes
        3.3.1.10. QPPB and Multiple Paths to a Destination
        3.3.1.11. QPPB and Policy-Based Routing
        3.3.1.12. QPPB and GRT Lookup
        3.3.1.13. QPPB Interaction with SAP Ingress QoS Policy
        3.3.1.14. Object Grouping and State Monitoring
        3.3.1.15. VPRN IP Interface Applicability
      3.3.2. Subscriber Interfaces
      3.3.3. SAPs
        3.3.3.1. Encapsulations
        3.3.3.2. ATM SAP Encapsulations for VPRN Services
        3.3.3.3. Pseudowire SAPs
      3.3.4. QoS Policies
      3.3.5. Filter Policies
      3.3.6. DSCP Marking
        3.3.6.1. Default DSCP Mapping Table
      3.3.7. Configuration of TTL Propagation for VPRN Routes
      3.3.8. CE to PE Routing Protocols
        3.3.8.1. PE to PE Tunneling Mechanisms
        3.3.8.2. Per VRF Route Limiting
      3.3.9. Spoke SDPs
        3.3.9.1. T-LDP Status Signaling for Spoke-SDPs Terminating on IES/VPRN
        3.3.9.2. Spoke SDP Redundancy into IES/VPRN
      3.3.10. IP-VPNs
        3.3.10.1. Using OSPF in IP-VPNs
      3.3.11. IPCP Subnet Negotiation
      3.3.12. Cflowd for IP-VPNs
      3.3.13. Inter-AS VPRNs
      3.3.14. Carrier Supporting Carrier (CsC)
        3.3.14.1. Terminology
        3.3.14.2. CSC Connectivity Models
        3.3.14.3. CSC-PE Configuration and Operation
        3.3.14.4. CSC Interface
        3.3.14.5. QoS
        3.3.14.6. MPLS
        3.3.14.7. CSC VPRN Service Configuration
      3.3.15. Traffic Leaking to GRT
      3.3.16. Traffic Leaking from VPRN to GRT for IPv6
      3.3.17. RIP Metric Propagation in VPRNs
      3.3.18. NTP Within a VPRN Service
      3.3.19. PTP Within a VPRN Service
      3.3.20. VPN Route Label Allocation
        3.3.20.1. Configuring the Service Label Mode
        3.3.20.2. Restrictions and Usage Notes
      3.3.21. VPRN Support for BGP Flowspec
      3.3.22. MPLS Entropy Label and Hash Label
    3.4. QoS on Ingress Bindings
    3.5. Multicast in IP-VPN Applications
      3.5.1. Use of Data MDTs
      3.5.2. Multicast Protocols Supported in the Provider Network
      3.5.3. MVPN Membership Auto-discovery using BGP
      3.5.4. PE-PE Transmission of C-Multicast Routing using BGP
      3.5.5. VRF Route Import Extended Community
      3.5.6. Provider Tunnel Support
        3.5.6.1. Point-to-Multipoint Inclusive (I-PMSI) and Selective (S-PMSI) Provider Multicast Service Interface
        3.5.6.2. P2MP RSVP-TE I-PMSI and S-PMSI
        3.5.6.3. P2MP LDP I-PMSI and S-PMSI
        3.5.6.4. Wildcard (C-*, C-*) P2MP LSP S-PMSI
        3.5.6.5. P2MP LSP S-PMSI
        3.5.6.6. Dynamic Multicast Signaling over P2MP LDP in VRF
        3.5.6.7. MVPN Sender-only/Receiver-only
        3.5.6.8. S-PMSI Trigger Thresholds
        3.5.6.9. Migration from Existing Rosen Implementation
        3.5.6.10. Policy-based S-PMSI
          3.5.6.10.1. Supported MPLS Tunnels
          3.5.6.10.2. Supported Multicast Features
          3.5.6.10.3. In-service Changes to Multi-stream S-PMSI
          3.5.6.10.4. Configuration example
      3.5.7. MVPN (NG-MVPN) Upstream Multicast Hop Fast Failover
      3.5.8. Multicast VPN Extranet
        3.5.8.1. Multicast Extranet for Rosen MVPN for PIM SSM
        3.5.8.2. Multicast Extranet for NG-MVPN for PIM SSM
        3.5.8.3. Multicast Extranet with Per-group Mapping for PIM SSM
        3.5.8.4. Multicast GRT-source/VRF-receiver Extranet with Per Group Mapping for PIM SSM
        3.5.8.5. Multicast Extranet with Per-group Mapping for PIM ASM
      3.5.9. Non-Congruent Unicast and Multicast Topologies for Multicast VPN
      3.5.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
      3.5.11. IPv6 MVPN Support
      3.5.12. Multicast Core Diversity for Rosen MDT_SAFI MVPNs
      3.5.13. NG-MVPN Multicast Source Geo-Redundancy
      3.5.14. Multicast Core Diversity for Rosen MDT SAFI MVPNs
      3.5.15. Inter-AS MVPN
        3.5.15.1. BGP Connector Attribute
        3.5.15.2. PIM RPF Vector
        3.5.15.3. Inter-AS MVPN Option B
        3.5.15.4. Inter-AS MVPN Option C
        3.5.15.5. NG-MVPN Non-segmented Inter-AS Solution
          3.5.15.5.1. Non-Segmented d-mLDP and Inter-AS VPN
          3.5.15.5.2. Configuration Example
          3.5.15.5.3. Inter-AS Non-segmented MLDP
          3.5.15.5.4. ECMP
    3.6. VPRN Off-Ramp
      3.6.1. DDoS Off-Ramping Through Flowspec
    3.7. FIB Prioritization
    Configuring a VPRN Service with CLI
      Basic Configuration
      Common Configuration Tasks
      Configuring VPRN Components
        Creating a VPRN Service
        Configuring Global VPRN Parameters
        Configuring VPRN Log Parameters
          Configuring a Spoke-SDP
        Configuring VPRN Protocols - PIM
          Configuring Router Interfaces
          Configuring VPRN Protocols - BGP
          Configuring VPRN Protocols - RIP
          Configuring VPRN Protocols - OSPF
          Configuring TMS Parameters
          Configuring a VPRN Interface
          Configuring Overload State on a Single SFM
          Configuring a VPRN Interface SAP
      Configuring IPSec Parameters
      Service Management Tasks
        Modifying VPRN Service Parameters
        Deleting a VPRN Service
        Disabling a VPRN Service
        Re-enabling a VPRN Service
    VPRN Service Configuration Commands
      Command Hierarchies
        VPRN Service Configuration Commands
        L2TP Commands
        DHCP Commands
        GSMP Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        NTP Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface Spoke SDP Commands
        Interface VRRP Commands
        Interface SAP Commands
        Interface SAP Tunnel Commands
        Routed VPLS Commands
        Oper Group Commands
        Network Ingress Commands
        BGP Configuration Commands
        IS-IS Configuration Commands
        OSPF Configuration Commands
        PIM Configuration Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Configuration Commands
        Threat Management Service Interface Commands
        RADIUS Commands
        Web Portal Protocol Configuration Commands
      Command Descriptions
        Generic Commands
        Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router DHCP Configuration Commands
        IGMP Commands
        IPSec Configuration Commands
        Log Commands
        Multicast VPN Commands
        Redundant Interface Commands
        Router Advertisement Commands
        Network Time Protocol Commands
        NAT Commands
        Subscriber Interface Commands
        Interface Commands
        Network Interface Commands
        Interface DHCP Commands
        Interface ICMP Commands
        Interface SAP ATM Commands
        Interface Anti-Spoofing Commands
        Interface SAP Filter and QoS Policy Commands
        Interface VRRP Commands
        Interface SAP Commands
        Routed VPLS Commands
        Network Ingress Commands
        SAP Subscriber Management Commands
        BGP Commands
        ETH-CFM Service Commands
        IS-IS Commands
        OSPF Commands
        PIM Commands
        PPPoE Commands
        MSDP Configuration Commands
        MLD Configuration Commands
        RIP Commands
        SDP Commands
        Threat Management Service Interface Commands
        RADIUS Proxy Commands
     VPRN Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        VPRN Show Commands
        VPRN Clear Commands
        VPRN Debug Commands
    Tools Command Reference
      Command Hierarchies
        Tools Commands
      Command Descriptions
        Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
Log Events Guide R14.0.R4
  1. Log Events
    1.1. In This Chapter
    1.2. Log Events
    1.3. Sample Log Event
  2. SR Log Events
    2.1. APPLICATION_ASSURANCE
      2.1.1. tmnxBsxAarpInstOperStateChanged
      2.1.2. tmnxBsxAarpInstStateChanged
      2.1.3. tmnxBsxAaSubPolResExceeded
      2.1.4. tmnxBsxAaSubPolResExceededClear
      2.1.5. tmnxBsxAaSubscriberAcctDataLoss
      2.1.6. tmnxBsxAaSubscribersUnassigned
      2.1.7. tmnxBsxDatapathCpuUsage
      2.1.8. tmnxBsxDatapathCpuUsageClear
      2.1.9. tmnxBsxDnsIpCacheFull
      2.1.10. tmnxBsxDnsIpCacheFullClear
      2.1.11. tmnxBsxHttpUrlParamLimitExceeded
      2.1.12. tmnxBsxIsaAaGrpBitRate
      2.1.13. tmnxBsxIsaAaGrpBitRateClear
      2.1.14. tmnxBsxIsaAaGrpCapCostThres
      2.1.15. tmnxBsxIsaAaGrpCapCostThresClear
      2.1.16. tmnxBsxIsaAaGrpFailureClearV2
      2.1.17. tmnxBsxIsaAaGrpFailureV2
      2.1.18. tmnxBsxIsaAaGrpFlowFull
      2.1.19. tmnxBsxIsaAaGrpFlowFullClear
      2.1.20. tmnxBsxIsaAaGrpFlowSetup
      2.1.21. tmnxBsxIsaAaGrpFlowSetupClear
      2.1.22. tmnxBsxIsaAaGrpFmSbWaSBufOvld
      2.1.23. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
      2.1.24. tmnxBsxIsaAaGrpNonRedundantV2
      2.1.25. tmnxBsxIsaAaGrpOvrldCutthru
      2.1.26. tmnxBsxIsaAaGrpOvrldCutthruClr
      2.1.27. tmnxBsxIsaAaGrpPacketRate
      2.1.28. tmnxBsxIsaAaGrpPacketRateClear
      2.1.29. tmnxBsxIsaAaGrpSwitchover
      2.1.30. tmnxBsxIsaAaGrpToSbWaSBufOvld
      2.1.31. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
      2.1.32. tmnxBsxIsaAaSubLoadBalance
      2.1.33. tmnxBsxIsaAaTimFileProcFailure
      2.1.34. tmnxBsxMobileSubModifyFailure
      2.1.35. tmnxBsxRadApFailure
      2.1.36. tmnxBsxRadApIntrmUpdateSkipped
      2.1.37. tmnxBsxRadApServOperStateChange
      2.1.38. tmnxBsxStatFtrEnTcaThreshCrClear
      2.1.39. tmnxBsxStatFtrEnTcaThreshCrossed
      2.1.40. tmnxBsxStatFtrTcaThreshCrClear
      2.1.41. tmnxBsxStatFtrTcaThreshCrossed
      2.1.42. tmnxBsxStatPolcrTcaThreshCrClear
      2.1.43. tmnxBsxStatPolcrTcaThreshCrossed
      2.1.44. tmnxBsxStatTcaThreshCrossed
      2.1.45. tmnxBsxStatTcaThreshCrossedClear
      2.1.46. tmnxBsxSubModifyFailure
      2.1.47. tmnxBsxTcpValTcaCrossed
      2.1.48. tmnxBsxTcpValTcaCrossedClear
      2.1.49. tmnxBsxTransIpPolAaSubCreated
      2.1.50. tmnxBsxTransIpPolAaSubDeleted
      2.1.51. tmnxBsxTransIpPolDhcpAddWarning
      2.1.52. tmnxBsxTransIpPolDhcpDelWarning
      2.1.53. tmnxBsxTransIpPolDiamGxError
      2.1.54. tmnxBsxTransIpPolRadCoAAudit
      2.1.55. tmnxBsxTransIpPolRadCoAError
      2.1.56. tmnxBsxTransIpPolRadDiscError
      2.1.57. tmnxBsxTransitIpPersistenceWarn
      2.1.58. tmnxBsxUrlFilterOperStateChange
      2.1.59. tmnxBsxUrlListFailure
      2.1.60. tmnxBsxUrlListUpdate
    2.2. APS
      2.2.1. apsEventChannelMismatch
      2.2.2. apsEventFEPLF
      2.2.3. apsEventModeMismatch
      2.2.4. apsEventPSBF
      2.2.5. apsEventSwitchover
      2.2.6. tApsChannelMismatchClear
      2.2.7. tApsChanTxLaisStateChange
      2.2.8. tApsFEPLFClear
      2.2.9. tApsLocalSwitchCommandClear
      2.2.10. tApsLocalSwitchCommandSet
      2.2.11. tApsMcApsCtlLinkStateChange
      2.2.12. tApsModeMismatchClear
      2.2.13. tApsPrimaryChannelChange
      2.2.14. tApsPSBFClear
      2.2.15. tApsRemoteSwitchCommandClear
      2.2.16. tApsRemoteSwitchCommandSet
    2.3. ATM
      2.3.1. atmIfcStatusChange
      2.3.2. atmIlmiPeerVclStatusChange
      2.3.3. atmIlmiPeerVplStatusChange
      2.3.4. atmVclStatusChange
      2.3.5. atmVplStatusChange
      2.3.6. atmVtlStatusChange
      2.3.7. tAtmEpOutOfPeerVpiOrVciRange
      2.3.8. tAtmIlmiLinkStatusChange
      2.3.9. tAtmMaxPeerVccsExceeded
      2.3.10. tAtmMaxPeerVpcsExceeded
      2.3.11. tAtmPlcpSubLayerClear
      2.3.12. tAtmPlcpSubLayerDown
      2.3.13. tAtmTcSubLayerClear
      2.3.14. tAtmTcSubLayerDown
    2.4. BFD
      2.4.1. tmnxBfdOnLspSessDeleted
      2.4.2. tmnxBfdOnLspSessDown
      2.4.3. tmnxBfdOnLspSessNoCpmNpResources
      2.4.4. tmnxBfdOnLspSessProtChange
      2.4.5. tmnxBfdOnLspSessUp
    2.5. BGP
      2.5.1. bgpBackwardTransNotification
      2.5.2. bgpCfgViol
      2.5.3. bgpConnMgrTerminated
      2.5.4. bgpConnNoKA
      2.5.5. bgpConnNoOpenRcvd
      2.5.6. bgpEstablishedNotification
      2.5.7. bgpInterfaceDown
      2.5.8. bgpNoMemoryPeer
      2.5.9. bgpPeerNotFound
      2.5.10. bgpRejectConnBadLocAddr
      2.5.11. bgpRemoteEndClosedConn
      2.5.12. bgpTerminated
      2.5.13. bgpVariableRangeViolation
      2.5.14. receiveNotification
      2.5.15. sendNotification
      2.5.16. tBgp4PathAttrInvalid
      2.5.17. tBgp4RouteInvalid
      2.5.18. tBgp4UpdateInvalid
      2.5.19. tBgp4WithdrawnRtFromUpdateError
      2.5.20. tBgpFibResourceFailPeer
      2.5.21. tBgpFlowRouteInvalid
      2.5.22. tBgpFlowspecUnsupportdComAction
      2.5.23. tBgpGeneral
      2.5.24. tBgpInstanceDynamicPeerLmtReachd
      2.5.25. tBgpMaxNgPfxLmt
      2.5.26. tBgpMaxNgPfxLmtThresholdReached
      2.5.27. tBgpNgBackwardTransition
      2.5.28. tBgpNgEstablished
      2.5.29. tBgpPeerGRStatusChange
      2.5.30. tBgpPeerNgHoldTimeInconsistent
      2.5.31. tBgpPGDynamicPeerLmtReached
      2.5.32. tBgpReceivedInvalidNlri
    2.6. CALLTRACE
      2.6.1. tmnxCallTraceLocSizeLimitReached
      2.6.2. tmnxCallTraceMaxFilesNumReached
    2.7. CFLOWD
      2.7.1. tmnxCflowdCreateFailure
      2.7.2. tmnxCflowdFlowCreateFailure
      2.7.3. tmnxCflowdPacketTxFailure
      2.7.4. tmnxCflowdStateChange
    2.8. CHASSIS
      2.8.1. CpmIcPortSFFStatusDDMCorrupt
      2.8.2. CpmIcPortSFFStatusFailure
      2.8.3. CpmIcPortSFFStatusReadError
      2.8.4. CpmIcPortSFFStatusUnsupported
      2.8.5. SfmIcPortSFFStatusDDMCorrupt
      2.8.6. SfmIcPortSFFStatusFailure
      2.8.7. SfmIcPortSFFStatusReadError
      2.8.8. SfmIcPortSFFStatusUnsupported
      2.8.9. tIPsecIsaMemHighWatermark
      2.8.10. tIPsecIsaMemLowWatermark
      2.8.11. tIPsecIsaMemMax
      2.8.12. tmnxAlarmInputVoltageFailure
      2.8.13. tmnxChassisHiBwMcastAlarm
      2.8.14. tmnxChassisNotificationClear
      2.8.15. tmnxChassisUpgradeComplete
      2.8.16. tmnxChassisUpgradeInProgress
      2.8.17. tmnxCpmALocalIcPortAvail
      2.8.18. tmnxCpmANoLocalIcPort
      2.8.19. tmnxCpmBLocalIcPortAvail
      2.8.20. tmnxCpmBNoLocalIcPort
      2.8.21. tmnxCpmCardSyncFileNotPresent
      2.8.22. tmnxCpmIcPortDDMClear
      2.8.23. tmnxCpmIcPortDDMFailure
      2.8.24. tmnxCpmIcPortDown
      2.8.25. tmnxCpmIcPortSFFInserted
      2.8.26. tmnxCpmIcPortSFFRemoved
      2.8.27. tmnxCpmIcPortUp
      2.8.28. tmnxCpmMemSizeMismatch
      2.8.29. tmnxCpmMemSizeMismatchClear
      2.8.30. tmnxDcpCardFpEventOvrflw
      2.8.31. tmnxDcpCardFpEventOvrflwClr
      2.8.32. tmnxDcpCardSapEventOvrflw
      2.8.33. tmnxDcpCardSapEventOvrflwClr
      2.8.34. tmnxDcpCardVrtrIfEventOvrflw
      2.8.35. tmnxDcpCardVrtrIfEventOvrflwClr
      2.8.36. tmnxDcpFpDynPoolUsageHiAlmClear
      2.8.37. tmnxDcpFpDynPoolUsageHiAlmRaise
      2.8.38. tmnxEnvTempTooHigh
      2.8.39. tmnxEqCardChipIfCellEvent
      2.8.40. tmnxEqCardChipIfDownEvent
      2.8.41. tmnxEqCardFailure
      2.8.42. tmnxEqCardFirmwareUpgraded
      2.8.43. tmnxEqCardInserted
      2.8.44. tmnxEqCardPChipCamEvent
      2.8.45. tmnxEqCardPChipError
      2.8.46. tmnxEqCardPChipMemoryEvent
      2.8.47. tmnxEqCardQChipBufMemoryEvent
      2.8.48. tmnxEqCardQChipIntMemoryEvent
      2.8.49. tmnxEqCardQChipStatsMemoryEvent
      2.8.50. tmnxEqCardRemoved
      2.8.51. tmnxEqCardSoftResetAlarm
      2.8.52. tmnxEqCardTChipParityEvent
      2.8.53. tmnxEqDataPathFailureProtImpact
      2.8.54. tmnxEqFanFailure
      2.8.55. tmnxEqFlashDataLoss
      2.8.56. tmnxEqFlashDiskFull
      2.8.57. tmnxEqHwEnhancedCapability
      2.8.58. tmnxEqLowSwitchFabricCap
      2.8.59. tmnxEqLowSwitchFabricCapClear
      2.8.60. tmnxEqMdaCfgNotCompatible
      2.8.61. tmnxEqMdaIngrXplError
      2.8.62. tmnxEqMdaSyncENotCompatible
      2.8.63. tmnxEqMdaXplError
      2.8.64. tmnxEqMgmtEthRedStandbyClear
      2.8.65. tmnxEqMgmtEthRedStandbyRaise
      2.8.66. tmnxEqPhysChassisFanFailure
      2.8.67. tmnxEqPhysChassisFanFailureClear
      2.8.68. tmnxEqPhysChassPowerSupAcFail
      2.8.69. tmnxEqPhysChassPowerSupAcFailClr
      2.8.70. tmnxEqPhysChassPowerSupDcFail
      2.8.71. tmnxEqPhysChassPowerSupDcFailClr
      2.8.72. tmnxEqPhysChassPowerSupInFail
      2.8.73. tmnxEqPhysChassPowerSupInFailClr
      2.8.74. tmnxEqPhysChassPowerSupOutFail
      2.8.75. tmnxEqPhysChassPowerSupOutFailCl
      2.8.76. tmnxEqPhysChassPowerSupOvrTmp
      2.8.77. tmnxEqPhysChassPowerSupOvrTmpClr
      2.8.78. tmnxEqPowerCapacityExceeded
      2.8.79. tmnxEqPowerCapacityExceededClear
      2.8.80. tmnxEqPowerLostCapacity
      2.8.81. tmnxEqPowerLostCapacityClear
      2.8.82. tmnxEqPowerOverloadState
      2.8.83. tmnxEqPowerOverloadStateClear
      2.8.84. tmnxEqPowerSafetyAlertClear
      2.8.85. tmnxEqPowerSafetyAlertThreshold
      2.8.86. tmnxEqPowerSafetyLevelClear
      2.8.87. tmnxEqPowerSafetyLevelThreshold
      2.8.88. tmnxEqPowerSupplyFailureAc
      2.8.89. tmnxEqPowerSupplyFailureDc
      2.8.90. tmnxEqPowerSupplyFailureInput
      2.8.91. tmnxEqPowerSupplyFailureOutput
      2.8.92. tmnxEqPowerSupplyFailureOvt
      2.8.93. tmnxEqPowerSupplyInputFeedAlm
      2.8.94. tmnxEqPowerSupplyInputFeedAlmClr
      2.8.95. tmnxEqPowerSupplyInserted
      2.8.96. tmnxEqPowerSupplyPemACRectAlm
      2.8.97. tmnxEqPowerSupplyPemACRectAlmClr
      2.8.98. tmnxEqPowerSupplyRemoved
      2.8.99. tmnxEqProvPowerCapacityAlm
      2.8.100. tmnxEqProvPowerCapacityAlmClr
      2.8.101. tmnxEqSyncIfTimingBITS2Alarm
      2.8.102. tmnxEqSyncIfTimingBITS2AlarmClr
      2.8.103. tmnxEqSyncIfTimingBITS2Quality
      2.8.104. tmnxEqSyncIfTimingBITSAlarm
      2.8.105. tmnxEqSyncIfTimingBITSAlarmClear
      2.8.106. tmnxEqSyncIfTimingBITSOutRefChg
      2.8.107. tmnxEqSyncIfTimingBITSQuality
      2.8.108. tmnxEqSyncIfTimingHoldover
      2.8.109. tmnxEqSyncIfTimingHoldoverClear
      2.8.110. tmnxEqSyncIfTimingPTPAlarm
      2.8.111. tmnxEqSyncIfTimingPTPAlarmClr
      2.8.112. tmnxEqSyncIfTimingPTPQuality
      2.8.113. tmnxEqSyncIfTimingRef1Alarm
      2.8.114. tmnxEqSyncIfTimingRef1AlarmClear
      2.8.115. tmnxEqSyncIfTimingRef1Quality
      2.8.116. tmnxEqSyncIfTimingRef2Alarm
      2.8.117. tmnxEqSyncIfTimingRef2AlarmClear
      2.8.118. tmnxEqSyncIfTimingRef2Quality
      2.8.119. tmnxEqSyncIfTimingRefSwitch
      2.8.120. tmnxEqSyncIfTimingSystemQuality
      2.8.121. tmnxEqWrongCard
      2.8.122. tmnxExtStandbyCpmReboot
      2.8.123. tmnxExtStandbyCpmRebootFail
      2.8.124. tmnxInterChassisCommsDown
      2.8.125. tmnxInterChassisCommsUp
      2.8.126. tmnxIomEventOverflow
      2.8.127. tmnxIomEventOverflowClr
      2.8.128. tmnxIomResExhausted
      2.8.129. tmnxIomResHighLimitReached
      2.8.130. tmnxIomResStateClr
      2.8.131. tmnxIPsecIsaGrpActiveIsaChgd
      2.8.132. tmnxIPsecIsaGrpTnlHighWMark
      2.8.133. tmnxIPsecIsaGrpTnlLowWMark
      2.8.134. tmnxIPsecIsaGrpTnlMax
      2.8.135. tmnxIPsecIsaGrpUnableToSwitch
      2.8.136. tmnxMDAIsaTunnelGroupChange
      2.8.137. tmnxOesCardDegraded
      2.8.138. tmnxOesCardFirmwareErr
      2.8.139. tmnxOesCfgBlocked
      2.8.140. tmnxOesCfgFailNoMemory
      2.8.141. tmnxOesCtlCardActivityChange
      2.8.142. tmnxOesCtlCardPortDown
      2.8.143. tmnxOesCtlCardPortUp
      2.8.144. tmnxOesCtlCommsDown
      2.8.145. tmnxOesCtlCommsUp
      2.8.146. tmnxOesDbInvalid
      2.8.147. tmnxOesDbInvalidClear
      2.8.148. tmnxOesDbSyncFailure
      2.8.149. tmnxOesDbSyncFailureClear
      2.8.150. tmnxOesDbUnsync
      2.8.151. tmnxOesDbUnsyncClear
      2.8.152. tmnxOesFan32HReqd
      2.8.153. tmnxOesFan32HReqdClear
      2.8.154. tmnxOesFanFailure
      2.8.155. tmnxOesFanFailureClear
      2.8.156. tmnxOesFanInserted
      2.8.157. tmnxOesFanRemoved
      2.8.158. tmnxOesFanSpeedHigh
      2.8.159. tmnxOesFanSpeedHighClear
      2.8.160. tmnxOesFanSpeedLow
      2.8.161. tmnxOesFanSpeedLowClear
      2.8.162. tmnxOesFirmwareCondition
      2.8.163. tmnxOesFpgaFail
      2.8.164. tmnxOesFpgaFailClear
      2.8.165. tmnxOesFpgaTimeout
      2.8.166. tmnxOesFpgaTimeoutClear
      2.8.167. tmnxOesNtpOutOfSync
      2.8.168. tmnxOesNtpSync
      2.8.169. tmnxOesOptTrnspndrMiscFail
      2.8.170. tmnxOesPowerSupplyFailure
      2.8.171. tmnxOesPowerSupplyFailureClear
      2.8.172. tmnxOesPowerSupplyInserted
      2.8.173. tmnxOesPowerSupplyRemoved
      2.8.174. tmnxOesRedundancyFail
      2.8.175. tmnxOesRedundancyReady
      2.8.176. tmnxOesSwBelowMinRev
      2.8.177. tmnxOesSwUpgdCleanupFailed
      2.8.178. tmnxOesSwUpgdFailed
      2.8.179. tmnxOesTempLow
      2.8.180. tmnxOesTempLowClear
      2.8.181. tmnxOesUsrpnlPortDown
      2.8.182. tmnxOesUsrpnlPortUp
      2.8.183. tmnxPeBootloaderVersionMismatch
      2.8.184. tmnxPeBootromVersionMismatch
      2.8.185. tmnxPeFirmwareVersionWarning
      2.8.186. tmnxPeFPGAVersionMismatch
      2.8.187. tmnxPeSoftwareLoadFailed
      2.8.188. tmnxPeSoftwareVersionMismatch
      2.8.189. tmnxPlcyAcctStatsEventOvrflw
      2.8.190. tmnxPlcyAcctStatsEventOvrflwClr
      2.8.191. tmnxPlcyAcctStatsPoolExcResource
      2.8.192. tmnxPlcyAcctStatsPoolLowResource
      2.8.193. tmnxPowerSupplyWrongFanDir
      2.8.194. tmnxPowerSupplyWrongFanDirClear
      2.8.195. tmnxRedPrimaryCPMFail
      2.8.196. tmnxSasAlarminput1StateChanged
      2.8.197. tmnxSasAlarminput2StateChanged
      2.8.198. tmnxSasAlarminput3StateChanged
      2.8.199. tmnxSasAlarminput4StateChanged
      2.8.200. tmnxSfmIcPortDDMClear
      2.8.201. tmnxSfmIcPortDDMFailure
      2.8.202. tmnxSfmIcPortDegraded
      2.8.203. tmnxSfmIcPortDegradedClear
      2.8.204. tmnxSfmIcPortDown
      2.8.205. tmnxSfmIcPortSFFInserted
      2.8.206. tmnxSfmIcPortSFFRemoved
      2.8.207. tmnxSfmIcPortUp
      2.8.208. tmnxSyncIfTimBITS2048khzUnsup
      2.8.209. tmnxSyncIfTimBITS2048khzUnsupClr
    2.9. DEBUG
      2.9.1. traceEvent
    2.10. DHCP
      2.10.1. sapDHCPLeaseEntriesExceeded
      2.10.2. sapDHCPLseStateMobilityError
      2.10.3. sapDHCPLseStateOverride
      2.10.4. sapDHCPLseStatePopulateErr
      2.10.5. sapDHCPProxyServerError
      2.10.6. sapDHCPSuspiciousPcktRcvd
      2.10.7. sapStatHost6DynMacConflict
      2.10.8. sapStaticHostDynMacConflict
      2.10.9. sdpBindDHCPLeaseEntriesExceeded
      2.10.10. sdpBindDHCPLseStateMobilityErr
      2.10.11. sdpBindDHCPLseStateOverride
      2.10.12. sdpBindDHCPLseStatePopulateErr
      2.10.13. sdpBindDHCPProxyServerError
      2.10.14. sdpBindDHCPSuspiciousPcktRcvd
      2.10.15. svcDHCPLseStateRestoreProblem
      2.10.16. svcDHCPMiscellaneousProblem
      2.10.17. tmnxVRtrDHCP6AssignedIllegSubnet
      2.10.18. tmnxVRtrDHCP6ClientMacUnresolved
      2.10.19. tmnxVRtrDHCP6IllegalClientAddr
      2.10.20. tmnxVRtrDHCP6LseStateOverride
      2.10.21. tmnxVRtrDHCP6RelayLseStExceeded
      2.10.22. tmnxVRtrDHCP6RelayReplyStripUni
      2.10.23. tmnxVRtrDHCP6ServerLseStExceeded
      2.10.24. tmnxVRtrDHCPIfLseStatesExceeded
      2.10.25. tmnxVRtrDHCPSuspiciousPcktRcvd
    2.11. DHCPS
      2.11.1. tmnxDhcpsAddrAllocationFailure
      2.11.2. tmnxDhcpsFoLeaseUpdateFailed
      2.11.3. tmnxDhcpsFoStateChange
      2.11.4. tmnxDhcpsLeaseOfferedExpired
      2.11.5. tmnxDhcpsPacketDropped
      2.11.6. tmnxDhcpsPoolFoLeaseUpdateFailed
      2.11.7. tmnxDhcpsPoolFoStateChange
      2.11.8. tmnxDhcpSvrDeclineStaticAddr
      2.11.9. tmnxDhcpSvrHostConflict
      2.11.10. tmnxDhcpSvrIntLseConflict
      2.11.11. tmnxDhcpSvrLeaseCreate
      2.11.12. tmnxDhcpSvrLeaseDefaultTimers
      2.11.13. tmnxDhcpSvrLeaseDelete
      2.11.14. tmnxDhcpSvrLeaseModify
      2.11.15. tmnxDhcpSvrLeaseNotOwner
      2.11.16. tmnxDhcpSvrMaxLeasesReached
      2.11.17. tmnxDhcpSvrMsgTooLong
      2.11.18. tmnxDhcpSvrNoContFreeBlocks
      2.11.19. tmnxDhcpSvrNoSubnetFixAddr
      2.11.20. tmnxDhcpSvrPfxThDepletedV6
      2.11.21. tmnxDhcpSvrPfxThTooLowV6
      2.11.22. tmnxDhcpSvrPlThDepletedV6
      2.11.23. tmnxDhcpSvrPlThTooLowV6
      2.11.24. tmnxDhcpSvrPoolDepleted
      2.11.25. tmnxDhcpSvrPoolMinFreeExc
      2.11.26. tmnxDhcpSvrPoolUnknown
      2.11.27. tmnxDhcpSvrSubnetDepleted
      2.11.28. tmnxDhcpSvrSubnetMinFreeExc
      2.11.29. tmnxDhcpSvrUserDbUnknown
    2.12. DIAMETER
      2.12.1. tmnxDiamAppSessionFailure
      2.12.2. tmnxDiamMessageDropped
      2.12.3. tmnxDiamPolicyPeerStateChange
      2.12.4. tmnxDiamPpPrxMcLocStateChanged
      2.12.5. tmnxDiamSessionEvent
    2.13. DYNSVC
      2.13.1. tmnxDynSvcSapFailed
    2.14. EFM_OAM
      2.14.1. dot3OamNonThresholdEvent
      2.14.2. dot3OamThresholdEvent
      2.14.3. tmnxDot3OamLoopCleared
      2.14.4. tmnxDot3OamLoopDetected
      2.14.5. tmnxDot3OamNonThresholdEventClr
      2.14.6. tmnxDot3OamPeerChanged
      2.14.7. tmnxDot3OamSdThresholdEvent
      2.14.8. tmnxDot3OamThresholdEventClr
    2.15. ELMI
      2.15.1. tmnxElmiEVCStatusChangeEvent
      2.15.2. tmnxElmiIfStatusChangeEvent
    2.16. ERING
      2.16.1. tmnxEthRingApsPrvsnClearAlarm
      2.16.2. tmnxEthRingApsPrvsnRaiseAlarm
      2.16.3. tmnxEthRingPathFwdStateChange
    2.17. ETH_CFM
      2.17.1. dot1agCfmFaultAlarm
      2.17.2. tmnxDot1agCfmMepAisStateChanged
      2.17.3. tmnxDot1agCfmMepCsfStateChanged
      2.17.4. tmnxDot1agCfmMepDMTestComplete
      2.17.5. tmnxDot1agCfmMepEthTestComplete
      2.17.6. tmnxDot1agCfmMepFcltyFaultClear
      2.17.7. tmnxDot1agCfmMepFcltyFaultRaise
      2.17.8. tmnxDot1agCfmMepLbmTestComplete
      2.17.9. tmnxDot1agCfmMepLtmTestComplete
      2.17.10. tmnxDot1agCfmMepSLMTestComplete
      2.17.11. tmnxDot1agCfmMipEvaluation
    2.18. ETUN
      2.18.1. tmnxEthTunnelApsCfgClearAlarm
      2.18.2. tmnxEthTunnelApsCfgRaiseAlarm
      2.18.3. tmnxEthTunnelApsNoRspClearAlarm
      2.18.4. tmnxEthTunnelApsNoRspRaiseAlarm
      2.18.5. tmnxEthTunnelApsPrvsnClearAlarm
      2.18.6. tmnxEthTunnelApsPrvsnRaiseAlarm
      2.18.7. tmnxEthTunnelApsSwitchoverAlarm
    2.19. FILTER
      2.19.1. tFilterApplyPathProblem
      2.19.2. tFilterBgpFlowSpecProblem
      2.19.3. tFilterEmbeddingOperStateChange
      2.19.4. tFilterEmbedFlowspecOperStateChg
      2.19.5. tFilterEmbedOpenflowOperStateChg
      2.19.6. tFilterEmbedVsdOperStateChg
      2.19.7. tFilterOpenflowRequestRejected
      2.19.8. tFilterRadSharedFltrAlarmClear
      2.19.9. tFilterRadSharedFltrAlarmRaised
      2.19.10. tFilterSubInsFltrEntryDropped
      2.19.11. tFilterSubInsSpaceAlarmCleared
      2.19.12. tFilterSubInsSpaceAlarmRaised
      2.19.13. tFilterTmsEvent
      2.19.14. tIPFilterPBRPacketsDrop
    2.20. GMPLS
      2.20.1. vRtrGmplsLspPathStateChange
    2.21. GSMP
      2.21.1. tmnxAncpEgrRateMonitorEvent
      2.21.2. tmnxAncpEgrRateMonitorEventL
      2.21.3. tmnxAncpIngRateMonitorEvent
      2.21.4. tmnxAncpIngRateMonitorEventL
      2.21.5. tmnxAncpSesRejected
      2.21.6. tmnxAncpShcvDisabledEvent
      2.21.7. tmnxAncpShcvDisabledEventL
      2.21.8. tmnxAncpStringRejected
    2.22. IGH
      2.22.1. tmnxIfGroupHandlerProtoOprChange
      2.22.2. tmnxIfGroupHdlrMbrProtoOprChange
    2.23. IGMP
      2.23.1. vRtrIgmpGrpIfSapCModeRxQueryMism
      2.23.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
      2.23.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
      2.23.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
      2.23.5. vRtrIgmpGrpIfSapMcacPlcyDropped
      2.23.6. vRtrIgmpGrpIfSapRxQueryVerMism
      2.23.7. vRtrIgmpHostCModeRxQueryMismatch
      2.23.8. vRtrIgmpHostInstantiationFail
      2.23.9. vRtrIgmpHostMaxGrpsLimitExceeded
      2.23.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
      2.23.11. vRtrIgmpHostMaxSrcsLimitExceeded
      2.23.12. vRtrIgmpHostMcacPlcyDropped
      2.23.13. vRtrIgmpHostQryIntervalConflict
      2.23.14. vRtrIgmpHostRxQueryVerMismatch
      2.23.15. vRtrIgmpIfCModeRxQueryMismatch
      2.23.16. vRtrIgmpIfRxQueryVerMismatch
      2.23.17. vRtrIgmpMaxGrpsLimitExceeded
      2.23.18. vRtrIgmpMaxGrpSrcsLimitExceeded
      2.23.19. vRtrIgmpMaxSrcsLimitExceeded
      2.23.20. vRtrIgmpMcacPlcyDropped
    2.24. IGMP_SNOOPING
      2.24.1. sapIgmpSnpgGrpLimitExceeded
      2.24.2. sapIgmpSnpgGrpSrcLimitExceeded
      2.24.3. sapIgmpSnpgMcacPlcyDropped
      2.24.4. sapIgmpSnpgMcsFailure
      2.24.5. sapIgmpSnpgSrcLimitExceeded
      2.24.6. sdpBndIgmpSnpgGrpLimitExceeded
      2.24.7. sdpBndIgmpSnpgGrpSrcLimitExceed
      2.24.8. sdpBndIgmpSnpgMcacPlcyDropped
      2.24.9. sdpBndIgmpSnpgSrcLimitExceeded
    2.25. IP
      2.25.1. clearRTMError
      2.25.2. fibAddFailed
      2.25.3. ipAnyDuplicateAddress
      2.25.4. ipArpBadInterface
      2.25.5. ipArpDuplicateIpAddress
      2.25.6. ipArpDuplicateMacAddress
      2.25.7. ipArpInfoOverwritten
      2.25.8. ipDuplicateAddress
      2.25.9. ipEtherBroadcast
      2.25.10. qosNetworkPolicyMallocFailed
    2.26. IPSEC
      2.26.1. tIPsecBfdIntfSessStateChgd
      2.26.2. tIPsecRadAcctPlcyFailure
      2.26.3. tIPsecRUSAFailToAddRoute
      2.26.4. tIPsecRuTnlEncapIpMtuTooSmall
      2.26.5. tIPsecRUTnlFailToCreate
      2.26.6. tIPsecRUTnlRemoved
      2.26.7. tIPSecTrustAnchorPrfOprChg
      2.26.8. tIPsecTunnelEncapIpMtuTooSmall
      2.26.9. tmnxIPsecGWOperStateChange
      2.26.10. tmnxIPsecTunnelOperStateChange
      2.26.11. tmnxSecNotifCmptedCertChnChngd
      2.26.12. tmnxSecNotifCmptedCertHashChngd
      2.26.13. tmnxSecNotifSendChnNotInCmptChn
    2.27. ISIS
      2.27.1. tmnxIsisAdjacencyChange
      2.27.2. tmnxIsisAdjBfdSessionSetupFail
      2.27.3. tmnxIsisAdjRestartStatusChange
      2.27.4. tmnxIsisAreaMismatch
      2.27.5. tmnxIsisAuthFail
      2.27.6. tmnxIsisAutTypeFail
      2.27.7. tmnxIsisCircIdExhausted
      2.27.8. tmnxIsisCorruptedLSPDetected
      2.27.9. tmnxIsisDatabaseOverload
      2.27.10. tmnxIsisExportLimitReached
      2.27.11. tmnxIsisExportLimitWarning
      2.27.12. tmnxIsisFailureDisabled
      2.27.13. tmnxIsisIDLenMismatch
      2.27.14. tmnxIsisLdpSyncExit
      2.27.15. tmnxIsisLdpSyncTimerStarted
      2.27.16. tmnxIsisLSPPurge
      2.27.17. tmnxIsisLSPTooLargeToPropagate
      2.27.18. tmnxIsisManualAddressDrops
      2.27.19. tmnxIsisMaxAreaAddrsMismatch
      2.27.20. tmnxIsisMaxSeqExceedAttempt
      2.27.21. tmnxIsisOrigLSPBufSizeMismatch
      2.27.22. tmnxIsisOwnLSPPurge
      2.27.23. tmnxIsisPfxLimitOverloadWarning
      2.27.24. tmnxIsisProtoSuppMismatch
      2.27.25. tmnxIsisRejectedAdjacency
      2.27.26. tmnxIsisRejectedAdjacencySid
      2.27.27. tmnxIsisRoutesExpLmtDropped
      2.27.28. tmnxIsisSequenceNumberSkip
      2.27.29. tmnxIsisSidError
      2.27.30. tmnxIsisSidNotInLabelRange
      2.27.31. tmnxIsisSpbEctFidCfgChg
      2.27.32. tmnxIsisSpbNbrMultAdjExists
      2.27.33. tmnxIsisSpbNbrMultAdjExistsClear
      2.27.34. tmnxIsisSrgbBadLabelRange
      2.27.35. tmnxIsisVersionSkew
      2.27.36. vRtrIsisSpbNbrMultAdjExists
      2.27.37. vRtrIsisSpbNbrMultAdjExistsClear
      2.27.38. vRtrSpbEctFidCfgChg
    2.28. L2TP
      2.28.1. tmnxL2tpApFailure
      2.28.2. tmnxL2tpIsaMdaVRtrStateChange
      2.28.3. tmnxL2tpLnsPppNcpFailure
      2.28.4. tmnxL2tpLnsSePppSessionFailure
      2.28.5. tmnxL2tpPeerUnreachable
      2.28.6. tmnxL2tpTunnelBlacklisted
      2.28.7. tmnxL2tpTunnelSelBlacklistFull
    2.29. LAG
      2.29.1. DynamicCostOff
      2.29.2. DynamicCostOn
      2.29.3. LagPortAddFailed
      2.29.4. LagPortAddFailureCleared
      2.29.5. LagStateEvent
      2.29.6. LagSubGroupSelected
      2.29.7. tLagMemberStateEvent
      2.29.8. tmnxLagBfdMemStateChanged
    2.30. LDAP
      2.30.1. tmnxLdapOperStateChange
      2.30.2. tmnxLdapServerOperStateChange
    2.31. LDP
      2.31.1. vRtrLdpGroupIdMismatch
      2.31.2. vRtrLdpNgIfStateChange
      2.31.3. vRtrLdpNgInetIfStateChange
      2.31.4. vRtrLdpNgIpv4InstStateChange
      2.31.5. vRtrLdpNgIpv6InstStateChange
      2.31.6. vRtrLdpNgResourceExhaustion
      2.31.7. vRtrLdpNgSessionStateChange
      2.31.8. vRtrLdpNgSessMaxFecLimitReached
      2.31.9. vRtrLdpNgSessMaxFecThresChanged
      2.31.10. vRtrLdpNgTargPeerStateChange
      2.31.11. vRtrLdpStateChange
    2.32. LI
      2.32.1. cli_config_io
      2.32.2. cli_unauth_config_io
      2.32.3. cli_unauth_user_io
      2.32.4. cli_user_io
      2.32.5. cli_user_login
      2.32.6. cli_user_login_failed
      2.32.7. cli_user_login_max_attempts
      2.32.8. cli_user_logout
      2.32.9. destinationDisabled
      2.32.10. destinationEnabled
      2.32.11. ftp_user_login
      2.32.12. ftp_user_login_failed
      2.32.13. ftp_user_login_max_attempts
      2.32.14. ftp_user_logout
      2.32.15. host_snmp_attempts
      2.32.16. radiusFailed
      2.32.17. sbiBootLiConfig
      2.32.18. snmp_user_set
      2.32.19. sourceDisabled
      2.32.20. sourceEnabled
      2.32.21. sourceSapChange
      2.32.22. sourceSubscriberChange
      2.32.23. ssh_user_login
      2.32.24. ssh_user_login_failed
      2.32.25. ssh_user_login_max_attempts
      2.32.26. ssh_user_logout
      2.32.27. ssiSaveConfigFailed
      2.32.28. ssiSaveConfigSucceeded
      2.32.29. ssiSyncConfigFailed
      2.32.30. ssiSyncConfigOK
      2.32.31. tMirrorDestinationChangeReject
      2.32.32. tMirrorFilterAssignToItfWarn
      2.32.33. tMirrorFilterAssignToSapWarn
      2.32.34. tMirrorFilterAssignToSdpWarn
      2.32.35. tMirrorLiNat64SubOperStateCh
      2.32.36. tMirrorLiNatL2awSubOperStateCh
      2.32.37. tMirrorLiNatLsnSubOperStateCh
      2.32.38. tMirrorSourceFilterAssignReject
      2.32.39. tMirrorSourceFilterAssignWarn
      2.32.40. tMirrorSourceFilterOverruled
      2.32.41. tMirrorSourceIPFltrChangeReject
      2.32.42. tMirrorSourceIPv6FltrChangeRej
      2.32.43. tMirrorSourceLiFilterChanged
      2.32.44. tMirrorSourceLiSubProblem
      2.32.45. tMirrorSourceMacFltrChangeReject
      2.32.46. tmnxClear
      2.32.47. tmnxConfigCreate
      2.32.48. tmnxConfigDelete
      2.32.49. tmnxConfigModify
      2.32.50. tmnxStateChange
    2.33. LLDP
      2.33.1. lldpRemTablesChange
    2.34. LMP
      2.34.1. tmnxLmpVRtrControlChannelState
      2.34.2. tmnxLmpVRtrDbLinkPropMismatch
      2.34.3. tmnxLmpVRtrDbLinkPropMismatchClr
      2.34.4. tmnxLmpVRtrTeLinkPropMismatch
      2.34.5. tmnxLmpVRtrTeLinkPropMismatchClr
      2.34.6. tmnxLmpVRtrTeLinkState
    2.35. LOGGER
      2.35.1. STARTED
      2.35.2. tmnxClear
      2.35.3. tmnxLogAccountingDataLoss
      2.35.4. tmnxLogAdminLocFailed
      2.35.5. tmnxLogBackupLocFailed
      2.35.6. tmnxLogEventOverrun
      2.35.7. tmnxLogEventThrottled
      2.35.8. tmnxLogFileDeleted
      2.35.9. tmnxLogFileRollover
      2.35.10. tmnxLogOnlyEventOverrun
      2.35.11. tmnxLogOnlyEventThrottled
      2.35.12. tmnxLogSpaceContention
      2.35.13. tmnxLogTraceError
      2.35.14. tmnxStdEventsReplayed
      2.35.15. tmnxSysLogTargetProblem
      2.35.16. tmnxTestEvent
    2.36. MC_REDUNDANCY
      2.36.1. srrpPacketDiscarded
      2.36.2. tMcPeerIPsecTnlGrpMasterStateChg
      2.36.3. tMcPeerIPsecTnlGrpProtStatusChg
      2.36.4. tmnxMCEPSessionPsvModeDisabled
      2.36.5. tmnxMCEPSessionPsvModeEnabled
      2.36.6. tmnxMcLagInfoLagChanged
      2.36.7. tmnxMcOmcrClientNumEntriesHigh
      2.36.8. tmnxMcOmcrStatFailedChanged
      2.36.9. tmnxMcPeerEPBfdSessionClose
      2.36.10. tmnxMcPeerEPBfdSessionDown
      2.36.11. tmnxMcPeerEPBfdSessionOpen
      2.36.12. tmnxMcPeerEPBfdSessionUp
      2.36.13. tmnxMcPeerEPOperDown
      2.36.14. tmnxMcPeerEPOperUp
      2.36.15. tmnxMcPeerRingsOperStateChanged
      2.36.16. tmnxMcPeerSyncStatusChanged
      2.36.17. tmnxMcRedundancyMismatchDetected
      2.36.18. tmnxMcRedundancyMismatchResolved
      2.36.19. tmnxMcRedundancyPeerStateChanged
      2.36.20. tmnxMcRingInbCtrlOperStateChgd
      2.36.21. tmnxMcRingNodeLocOperStateChgd
      2.36.22. tmnxMcRingOperStateChanged
      2.36.23. tmnxMcSyncClientAlarmCleared
      2.36.24. tmnxMcSyncClientAlarmRaised
      2.36.25. tmnxMcSyncClockSkewCleared
      2.36.26. tmnxMcSyncClockSkewRaised
      2.36.27. tmnxSrrpBecameBackup
      2.36.28. tmnxSrrpBfdIntfSessStateChgd
      2.36.29. tmnxSrrpDualMaster
      2.36.30. tmnxSrrpDuplicateSubIfAddress
      2.36.31. tmnxSrrpInstanceIdMismatch
      2.36.32. tmnxSrrpOperDownInvalidMac
      2.36.33. tmnxSrrpOperDownInvalidMacClear
      2.36.34. tmnxSrrpRedIfMismatch
      2.36.35. tmnxSrrpSapMismatch
      2.36.36. tmnxSrrpSapTagMismatch
      2.36.37. tmnxSrrpSubnetMismatch
      2.36.38. tmnxSrrpSubnetMismatchCleared
      2.36.39. tmnxSrrpSystemIpNotSet
      2.36.40. tmnxSrrpTrapNewMaster
    2.37. MCPATH
      2.37.1. tmnxMcPathAvailBwLimitReached
      2.37.2. tmnxMcPathAvailBwValWithinRange
      2.37.3. tmnxMcPathSrcGrpBlkHole
      2.37.4. tmnxMcPathSrcGrpBlkHoleClear
    2.38. MIRROR
      2.38.1. destinationDisabled
      2.38.2. destinationEnabled
      2.38.3. sourceDisabled
      2.38.4. sourceEnabled
      2.38.5. sourceIpFilterChange
      2.38.6. sourceMacFilterChange
      2.38.7. sourceSapChange
      2.38.8. sourceSubscriberChange
      2.38.9. tMirrorSourceIpv6FilterChange
    2.39. MLD
      2.39.1. vRtrMldGrpIfSapCModeRxQueryMism
      2.39.2. vRtrMldGrpIfSapMaxGrpsLimExceed
      2.39.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
      2.39.4. vRtrMldGrpIfSapMaxSrcsLimExceed
      2.39.5. vRtrMldGrpIfSapMcacPlcyDropped
      2.39.6. vRtrMldGrpIfSapRxQueryVerMism
      2.39.7. vRtrMldHostCModeRxQueryMismatch
      2.39.8. vRtrMldHostInstantiationFail
      2.39.9. vRtrMldHostMaxGrpsLimitExceeded
      2.39.10. vRtrMldHostMaxGrpSrcsLimitExcd
      2.39.11. vRtrMldHostMaxSrcsLimitExceeded
      2.39.12. vRtrMldHostMcacPlcyDropped
      2.39.13. vRtrMldHostQryIntervalConflict
      2.39.14. vRtrMldHostRxQueryVerMismatch
      2.39.15. vRtrMldIfCModeRxQueryMismatch
      2.39.16. vRtrMldIfRxQueryVerMismatch
      2.39.17. vRtrMldMaxGrpsLimitExceeded
      2.39.18. vRtrMldMaxGrpSrcsLimitExceeded
      2.39.19. vRtrMldMaxSrcsLimitExceeded
      2.39.20. vRtrMldMcacPlcyDropped
    2.40. MLD_SNOOPING
      2.40.1. sapMldSnpgGrpLimitExceeded
      2.40.2. sapMldSnpgMcsFailure
      2.40.3. sdpBndMldSnpgGrpLimitExceeded
    2.41. MPLS
      2.41.1. mplsTunnelDown
      2.41.2. mplsTunnelReoptimized
      2.41.3. mplsTunnelRerouted
      2.41.4. mplsTunnelUp
      2.41.5. mplsXCDown
      2.41.6. mplsXCUp
      2.41.7. vRtrMplsIfStateChange
      2.41.8. vRtrMplsLspActivePathChanged
      2.41.9. vRtrMplsLspDown
      2.41.10. vRtrMplsLspPathDown
      2.41.11. vRtrMplsLspPathLstFillReoptElig
      2.41.12. vRtrMplsLspPathMbbStatusEvent
      2.41.13. vRtrMplsLspPathRerouted
      2.41.14. vRtrMplsLspPathResignaled
      2.41.15. vRtrMplsLspPathSoftPreempted
      2.41.16. vRtrMplsLspPathUp
      2.41.17. vRtrMplsLspSwitchStbyFailure
      2.41.18. vRtrMplsLspUp
      2.41.19. vRtrMplsNodeInIgpOverload
      2.41.20. vRtrMplsP2mpInstanceDown
      2.41.21. vRtrMplsP2mpInstanceResignaled
      2.41.22. vRtrMplsP2mpInstanceUp
      2.41.23. vRtrMplsResignalTimerExpired
      2.41.24. vRtrMplsS2lSubLspDown
      2.41.25. vRtrMplsS2lSubLspRerouted
      2.41.26. vRtrMplsS2lSubLspResignaled
      2.41.27. vRtrMplsS2lSubLspUp
      2.41.28. vRtrMplsStateChange
      2.41.29. vRtrMplsXCBundleChange
    2.42. MPLS_TP
      2.42.1. vRtrMplsTpLspActivePathChange
      2.42.2. vRtrMplsTpLspActivePathUp
      2.42.3. vRtrMplsTpLspPtTypeMismatchAlarm
      2.42.4. vRtrMplsTpLspPtTypeMismatchClear
      2.42.5. vRtrMplsTpLspRevertMismatchAlarm
      2.42.6. vRtrMplsTpLspRevertMismatchClear
    2.43. MSDP
      2.43.1. msdpBackwardTransition
      2.43.2. msdpEstablished
      2.43.3. tmnxMsdpNgActSrcLimExcd
      2.43.4. tmnxMsdpNgGroupSrcActMsgsExcd
      2.43.5. tmnxMsdpNgPeerActSrcLimExcd
      2.43.6. tmnxMsdpNgRPFFailure
      2.43.7. tmnxMsdpNgSourceSrcActMsgsExcd
    2.44. NAT
      2.44.1. tmnxNatDetMapOperStateChanged
      2.44.2. tmnxNatDetPlcyChanged
      2.44.3. tmnxNatDetPlcyOperStateChanged
      2.44.4. tmnxNatFwd2EntryAdded
      2.44.5. tmnxNatFwd2OperStateChanged
      2.44.6. tmnxNatInAddrPrefixBlksFree
      2.44.7. tmnxNatIsaGrpIsDegraded
      2.44.8. tmnxNatIsaGrpOperStateChanged
      2.44.9. tmnxNatIsaMemberSessionUsageHigh
      2.44.10. tmnxNatL2AwSubIcmpPortUsageHigh
      2.44.11. tmnxNatL2AwSubSessionUsageHigh
      2.44.12. tmnxNatL2AwSubTcpPortUsageHigh
      2.44.13. tmnxNatL2AwSubUdpPortUsageHigh
      2.44.14. tmnxNatLsnSubBlksFree
      2.44.15. tmnxNatLsnSubIcmpPortUsgHigh
      2.44.16. tmnxNatLsnSubSessionUsgHigh
      2.44.17. tmnxNatLsnSubTcpPortUsgHigh
      2.44.18. tmnxNatLsnSubUdpPortUsgHigh
      2.44.19. tmnxNatMapRuleChange
      2.44.20. tmnxNatMdaActive
      2.44.21. tmnxNatMdaDetectsLoadSharingErr
      2.44.22. tmnxNatPcpSrvStateChanged
      2.44.23. tmnxNatPlAddrFree
      2.44.24. tmnxNatPlBlockAllocationL2Aw
      2.44.25. tmnxNatPlBlockAllocationLsn
      2.44.26. tmnxNatPlL2AwBlockUsageHigh
      2.44.27. tmnxNatPlLsnMemberBlockUsageHigh
      2.44.28. tmnxNatPlLsnRedActiveChanged
      2.44.29. tmnxNatResourceProblemCause
      2.44.30. tmnxNatResourceProblemDetected
      2.44.31. tmnxNatVrtrOutDnatOnlyRoutesHigh
    2.45. NTP
      2.45.1. tmnxNtpAuthMismatch
      2.45.2. tmnxNtpNoServersAvail
      2.45.3. tmnxNtpOperChange
      2.45.4. tmnxNtpServerChange
      2.45.5. tmnxNtpServersAvail
    2.46. OAM
      2.46.1. svcIdInvalid
      2.46.2. svcIdWrongType
      2.46.3. tmnxAncpLoopbackTestCompleted
      2.46.4. tmnxAncpLoopbackTestCompletedL
      2.46.5. tmnxOamLdpTtraceAutoDiscState
      2.46.6. tmnxOamLdpTtraceFecDisStatus
      2.46.7. tmnxOamLdpTtraceFecPFailUpdate
      2.46.8. tmnxOamLdpTtraceFecProbeState
      2.46.9. tmnxOamPingProbeFailedV3
      2.46.10. tmnxOamPingTestCompletedV3
      2.46.11. tmnxOamPingTestFailedV3
      2.46.12. tmnxOamPmThrClear
      2.46.13. tmnxOamPmThrRaise
      2.46.14. tmnxOamSaaThreshold
      2.46.15. tmnxOamTrPathChange
      2.46.16. tmnxOamTrTestCompleted
      2.46.17. tmnxOamTrTestFailed
      2.46.18. tmnxTwampSrvInactivityTimeout
      2.46.19. tmnxTwampSrvMaxConnsExceeded
      2.46.20. tmnxTwampSrvMaxSessExceeded
      2.46.21. tmnxTwampSrvPfxMaxConnsExceeded
      2.46.22. tmnxTwampSrvPfxMaxSessExceeded
    2.47. OPEN_FLOW
      2.47.1. tmnxOFFlowEntryInsertFailed
    2.48. OSPF
      2.48.1. tmnxOspfAdjBfdSessionSetupFail
      2.48.2. tmnxOspfAreaMaxAgeLsa
      2.48.3. tmnxOspfAreaOriginateLsa
      2.48.4. tmnxOspfAsMaxAgeLsa
      2.48.5. tmnxOspfAsOriginateLsa
      2.48.6. tmnxOspfExportLimitReached
      2.48.7. tmnxOspfExportLimitWarning
      2.48.8. tmnxOspfFailureDisabled
      2.48.9. tmnxOspfLsdbApproachingOverflow
      2.48.10. tmnxOspfLsdbOverflow
      2.48.11. tmnxOspfNgIfAuthFailure
      2.48.12. tmnxOspfNgIfConfigError
      2.48.13. tmnxOspfNgIfRxBadPacket
      2.48.14. tmnxOspfNgIfStateChange
      2.48.15. tmnxOspfNgIfTxRetransmit
      2.48.16. tmnxOspfNgLdpSyncExit
      2.48.17. tmnxOspfNgLdpSyncTimerStarted
      2.48.18. tmnxOspfNgLinkMaxAgeLsa
      2.48.19. tmnxOspfNgLinkOriginateLsa
      2.48.20. tmnxOspfNgNbrRestartHlprStsChg
      2.48.21. tmnxOspfNgNbrStateChange
      2.48.22. tmnxOspfNssaTranslatorStatusChg
      2.48.23. tmnxOspfOverloadEntered
      2.48.24. tmnxOspfOverloadExited
      2.48.25. tmnxOspfOverloadWarning
      2.48.26. tmnxOspfRejectedAdjacencySid
      2.48.27. tmnxOspfRestartStatusChange
      2.48.28. tmnxOspfRoutesExpLmtDropped
      2.48.29. tmnxOspfShamIfAuthFailure
      2.48.30. tmnxOspfShamIfConfigError
      2.48.31. tmnxOspfShamIfRxBadPacket
      2.48.32. tmnxOspfShamIfStateChange
      2.48.33. tmnxOspfShamIfTxRetransmit
      2.48.34. tmnxOspfShamNbrRestartHlprStsChg
      2.48.35. tmnxOspfShamNbrStateChange
      2.48.36. tmnxOspfSpfRunsRestarted
      2.48.37. tmnxOspfSpfRunsStopped
      2.48.38. tmnxOspfSrgbBadLabelRange
      2.48.39. tmnxOspfSrSidError
      2.48.40. tmnxOspfSrSidNotInLabelRange
      2.48.41. tmnxOspfVirtIfAuthFailure
      2.48.42. tmnxOspfVirtIfConfigError
      2.48.43. tmnxOspfVirtIfRxBadPacket
      2.48.44. tmnxOspfVirtIfStateChange
      2.48.45. tmnxOspfVirtIfTxRetransmit
      2.48.46. tmnxOspfVirtNbrRestartHlprStsChg
      2.48.47. tmnxOspfVirtNbrStateChange
    2.49. PIM
      2.49.1. vRtrPimNgBSRStateChange
      2.49.2. vRtrPimNgDataMtReused
      2.49.3. vRtrPimNgGrpInSSMRange
      2.49.4. vRtrPimNgHelloDropped
      2.49.5. vRtrPimNgIfNeighborLoss
      2.49.6. vRtrPimNgIfNeighborUp
      2.49.7. vRtrPimNgInvalidIPmsiTunnel
      2.49.8. vRtrPimNgInvalidJoinPrune
      2.49.9. vRtrPimNgInvalidRegister
      2.49.10. vRtrPimNgMaxGraftRetry
      2.49.11. vRtrPimNgMaxGrpsLimitExceeded
      2.49.12. vRtrPimNgMcacPlcyDropped
      2.49.13. vRtrPimNgMDTLimitExceeded
      2.49.14. vRtrPimNgReplicationLmtExceeded
      2.49.15. vRtrPimNgSGLimitExceeded
    2.50. PIM_SNOOPING
      2.50.1. tmnxPimSnpgIfNeighborLoss
      2.50.2. tmnxPimSnpgIfNeighborUp
      2.50.3. tmnxPimSnpgSGLimitExceeded
      2.50.4. tmnxPimSnpgSnoopModeChanged
    2.51. PORT
      2.51.1. SFPStatusBlocked
      2.51.2. SFPStatusCulprit
      2.51.3. SFPStatusDDMCorrupt
      2.51.4. SFPStatusFailure
      2.51.5. SFPStatusOperational
      2.51.6. SFPStatusReadError
      2.51.7. SFPStatusUnsupported
      2.51.8. tdcmAlarms
      2.51.9. tmnxBundleMemberMlfrLoopback
      2.51.10. tmnxDS1E1LoopbackStarted
      2.51.11. tmnxDS1E1LoopbackStopped
      2.51.12. tmnxDS3E3LoopbackStarted
      2.51.13. tmnxDS3E3LoopbackStopped
      2.51.14. tmnxDSXClockSyncStateChange
      2.51.15. tmnxEqCohOptPortAlarm
      2.51.16. tmnxEqDigitalDiagMonitorClear
      2.51.17. tmnxEqDigitalDiagMonitorFailure
      2.51.18. tmnxEqPortBndlBadEndPtDiscr
      2.51.19. tmnxEqPortBndlRedDiffExceeded
      2.51.20. tmnxEqPortBndlYellowDiffExceeded
      2.51.21. tmnxEqPortDS1Alarm
      2.51.22. tmnxEqPortDS1AlarmClear
      2.51.23. tmnxEqPortDS3Alarm
      2.51.24. tmnxEqPortDS3AlarmClear
      2.51.25. tmnxEqPortDuplexCfgNotCompatible
      2.51.26. tmnxEqPortError
      2.51.27. tmnxEqPortEtherAlarm
      2.51.28. tmnxEqPortEtherAlarmClear
      2.51.29. tmnxEqPortEtherCrcAlarm
      2.51.30. tmnxEqPortEtherCrcAlarmClear
      2.51.31. tmnxEqPortEtherInternalAlarm
      2.51.32. tmnxEqPortEtherInternalAlarmClr
      2.51.33. tmnxEqPortEtherLoopCleared
      2.51.34. tmnxEqPortEtherLoopDetected
      2.51.35. tmnxEqPortEtherSymMonAlarm
      2.51.36. tmnxEqPortEtherSymMonAlarmClear
      2.51.37. tmnxEqPortIngressRateCfgNotCompatible
      2.51.38. tmnxEqPortOpticalAmpAlarm
      2.51.39. tmnxEqPortSFPInserted
      2.51.40. tmnxEqPortSFPRemoved
      2.51.41. tmnxEqPortSonetAlarm
      2.51.42. tmnxEqPortSonetAlarmClear
      2.51.43. tmnxEqPortSonetPathAlarm
      2.51.44. tmnxEqPortSonetPathAlarmClear
      2.51.45. tmnxEqPortSpeedCfgNotCompatible
      2.51.46. tmnxEqPortWaveTrackerAlarm
      2.51.47. tmnxEqSonetClockSrcNotCompatible
      2.51.48. tmnxEqSonetFramingNotCompatible
      2.51.49. tmnxEqSonetSfThreshNotCompatible
      2.51.50. tmnxOesPortError
      2.51.51. tmnxOesPortErrorClear
      2.51.52. tmnxOtuIfAlarmNotification
      2.51.53. tmnxPortUnsupportedFunction
      2.51.54. tmnxResvCbsPoolThreshAmber
      2.51.55. tmnxResvCbsPoolThreshGreen
      2.51.56. tmnxResvCbsPoolThreshRed
      2.51.57. tmnxSonetSDHLoopbackStarted
      2.51.58. tmnxSonetSDHLoopbackStopped
      2.51.59. tPortAccEgrQGrpHostMatchFailure
      2.51.60. tPortEgrVPortHostMatchFailure
    2.52. PPP
      2.52.1. ipcpPeerOnDifferentSubnet
      2.52.2. ipcpPeerRejectedOurIp
      2.52.3. ipcpPeerSuggestedDifferentIp
      2.52.4. ipcpRemoteIpUnknown
      2.52.5. ipcpSameLocalAndRemoteIp
      2.52.6. ipv6cpPeerOnDifferentSubnet
      2.52.7. ipv6cpPeerRejectedOurIntId
      2.52.8. ipv6cpPeerSuggestedDiffIntId
      2.52.9. ipv6cpRemoteIntIdUnknown
      2.52.10. ipv6cpSameLocalAndRemoteIntId
      2.52.11. tmnxPppCpDown
      2.52.12. tmnxPppCpUp
      2.52.13. tmnxPppKeepaliveFailure
      2.52.14. tmnxPppLoopback
      2.52.15. tmnxPppLoopbackClear
      2.52.16. tmnxPppLqmFailure
      2.52.17. tmnxPppNcpDown
      2.52.18. tmnxPppNcpUp
    2.53. PPPOE
      2.53.1. tmnxMlpppBundleIndicatorsChange
      2.53.2. tmnxPppoeNcpFailure
      2.53.3. tmnxPppoeSessionFailure
    2.54. PTP
      2.54.1. tmnxPtpCardNotSupported
      2.54.2. tmnxPtpCardNotSupportedClear
      2.54.3. tmnxPtpClockRecoveryStateChange
      2.54.4. tmnxPtpDynamicChange
      2.54.5. tmnxPtpMasterClockChangedEvent
      2.54.6. tmnxPtpOutOfResources
      2.54.7. tmnxPtpOutOfResourcesClear
      2.54.8. tmnxPtpPortNoTimestamping
    2.55. RADIUS
      2.55.1. tmnxRadAcctOnOngoing
      2.55.2. tmnxRadRouteDownloadFailed
      2.55.3. tmnxRadSrvPlcySrvOperStateCh
    2.56. RIP
      2.56.1. ripPacketDiscarded
      2.56.2. vRtrRipAuthTypeFailure
      2.56.3. vRtrRipAuthTypeMismatch
      2.56.4. vRtrRipInstanceExpLmtReached
      2.56.5. vRtrRipInstanceExpLmtWarning
      2.56.6. vRtrRipInstanceRestarted
      2.56.7. vRtrRipInstanceRtsExpLmtDropped
      2.56.8. vRtrRipInstanceShuttingDown
    2.57. RIP_NG
      2.57.1. tmnxRipNgAuthFailure
      2.57.2. tmnxRipNgAuthTypeMismatch
      2.57.3. tmnxRipNgIfUcastAddrNotUsed
      2.57.4. tmnxRipNgInstExpLmtReached
      2.57.5. tmnxRipNgInstExpLmtWarning
      2.57.6. tmnxRipNgInstRestarted
      2.57.7. tmnxRipNgInstRtsExpLmtDropped
      2.57.8. tmnxRipNgInstShuttingDown
      2.57.9. tmnxRipNgPacketDiscarded
    2.58. ROUTE_POLICY
      2.58.1. trigPolicyPrevEval
    2.59. RPKI
      2.59.1. tmnxRpkiNotifySession
      2.59.2. tmnxRpkiStaleTimerExpiry
    2.60. RSVP
      2.60.1. vRtrRsvpIfNbrStateDown
      2.60.2. vRtrRsvpIfNbrStateUp
      2.60.3. vRtrRsvpIfStateChange
      2.60.4. vRtrRsvpPEFailOverPriToStdBy
      2.60.5. vRtrRsvpPEFailOverStdByToPri
      2.60.6. vRtrRsvpStateChange
    2.61. SATELLITE
      2.61.1. tmnxSatelliteOperStateChange
      2.61.2. tmnxSatSyncIfTimHoldover
      2.61.3. tmnxSatSyncIfTimHoldoverClear
      2.61.4. tmnxSatSyncIfTimRef1Alarm
      2.61.5. tmnxSatSyncIfTimRef1AlarmClear
      2.61.6. tmnxSatSyncIfTimRef1Quality
      2.61.7. tmnxSatSyncIfTimRef2Alarm
      2.61.8. tmnxSatSyncIfTimRef2AlarmClear
      2.61.9. tmnxSatSyncIfTimRef2Quality
      2.61.10. tmnxSatSyncIfTimRefSwitch
      2.61.11. tmnxSatSyncIfTimSystemQuality
    2.62. SECURITY
      2.62.1. cli_user_login
      2.62.2. cli_user_login_failed
      2.62.3. cli_user_login_max_attempts
      2.62.4. cli_user_logout
      2.62.5. enable_admin
      2.62.6. ftp_transfer_failed
      2.62.7. ftp_transfer_successful
      2.62.8. ftp_user_login
      2.62.9. ftp_user_login_failed
      2.62.10. ftp_user_login_max_attempts
      2.62.11. ftp_user_logout
      2.62.12. host_snmp_attempts
      2.62.13. mafEntryMatch
      2.62.14. radiusInetServerOperStatusChange
      2.62.15. radiusOperStatusChange
      2.62.16. radiusSystemIpAddrNotSet
      2.62.17. sapDcpDynamicConform
      2.62.18. sapDcpDynamicEnforceAlloc
      2.62.19. sapDcpDynamicEnforceFreed
      2.62.20. sapDcpDynamicExcd
      2.62.21. sapDcpDynamicHoldDownEnd
      2.62.22. sapDcpDynamicHoldDownStart
      2.62.23. sapDcpLocMonExcd
      2.62.24. sapDcpLocMonExcdAllDynAlloc
      2.62.25. sapDcpLocMonExcdAllDynFreed
      2.62.26. sapDcpLocMonExcdDynResource
      2.62.27. sapDcpStaticConform
      2.62.28. sapDcpStaticExcd
      2.62.29. sapDcpStaticHoldDownEnd
      2.62.30. sapDcpStaticHoldDownStart
      2.62.31. SSH_server_preserve_key_fail
      2.62.32. ssh_user_login
      2.62.33. ssh_user_login_failed
      2.62.34. ssh_user_login_max_attempts
      2.62.35. ssh_user_logout
      2.62.36. sysDNSSecFailedAuthentication
      2.62.37. tacplusInetSrvrOperStatusChange
      2.62.38. tacplusOperStatusChange
      2.62.39. tmnxAppPkiCertVerificationFailed
      2.62.40. tmnxCAProfileStateChange
      2.62.41. tmnxCAProfUpDueToRevokeChkCrlOpt
      2.62.42. tmnxCliGroupSessionLimitExceeded
      2.62.43. tmnxConfigCreate
      2.62.44. tmnxConfigDelete
      2.62.45. tmnxConfigModify
      2.62.46. tmnxCpmProtDefPolModified
      2.62.47. tmnxCpmProtExcdSapEcm
      2.62.48. tmnxCpmProtExcdSapIp
      2.62.49. tmnxCpmProtExcdSdpBind
      2.62.50. tmnxCpmProtExcdSdpBindEcm
      2.62.51. tmnxCpmProtExcdSdpBindIp
      2.62.52. tmnxCpmProtViolIf
      2.62.53. tmnxCpmProtViolIfOutProf
      2.62.54. tmnxCpmProtViolMac
      2.62.55. tmnxCpmProtViolPort
      2.62.56. tmnxCpmProtViolPortAgg
      2.62.57. tmnxCpmProtViolSap
      2.62.58. tmnxCpmProtViolSapOutProf
      2.62.59. tmnxCpmProtViolSdpBind
      2.62.60. tmnxCpmProtViolSdpBindOutProf
      2.62.61. tmnxCpmProtViolVdoSvcClient
      2.62.62. tmnxCpmProtViolVdoVrtrClient
      2.62.63. tmnxDcpCardFpEventOvrflw
      2.62.64. tmnxDcpCardFpEventOvrflwClr
      2.62.65. tmnxDcpCardSapEventOvrflw
      2.62.66. tmnxDcpCardSapEventOvrflwClr
      2.62.67. tmnxDcpCardVrtrIfEventOvrflw
      2.62.68. tmnxDcpCardVrtrIfEventOvrflwClr
      2.62.69. tmnxDcpFpDynPoolUsageHiAlmClear
      2.62.70. tmnxDcpFpDynPoolUsageHiAlmRaise
      2.62.71. tmnxKeyChainAuthFailure
      2.62.72. tmnxMD5AuthFailure
      2.62.73. tmnxPkiCAProfActnStatusChg
      2.62.74. tmnxPkiCAProfCrlUpdAllUrlsFail
      2.62.75. tmnxPkiCAProfCrlUpdateStart
      2.62.76. tmnxPkiCAProfCrlUpdateSuccess
      2.62.77. tmnxPkiCAProfCrlUpdateUrlFail
      2.62.78. tmnxPkiCAProfCrlUpdLargPreUpdTm
      2.62.79. tmnxPkiCAProfCrlUpdNoNxtUpdTime
      2.62.80. tmnxPkiCAProfRevokeChkWarning
      2.62.81. tmnxPkiCertAfterExpWarning
      2.62.82. tmnxPkiCertBeforeExpWarning
      2.62.83. tmnxPkiCertExpWarningCleared
      2.62.84. tmnxPkiCertNotYetValid
      2.62.85. tmnxPkiCertVerificationFailed
      2.62.86. tmnxPkiCRLAfterExpWarning
      2.62.87. tmnxPkiCRLBeforeExpWarning
      2.62.88. tmnxPkiCRLExpWarningCleared
      2.62.89. tmnxPkiCRLNotYetValid
      2.62.90. tmnxPkiFileReadFailed
      2.62.91. tmnxPkiFileWriteFailed
      2.62.92. tmnxSecComputeCertChainFailure
      2.62.93. tmnxSecNotifFileReloaded
      2.62.94. tmnxSecNotifKeyChainExpired
      2.62.95. tmnxSecPwdHistoryFileLoadFailed
      2.62.96. tmnxSecPwdHistoryFileWriteFailed
      2.62.97. tmnxStateChange
      2.62.98. tmnxSysLicenseExpiresSoon
      2.62.99. tmnxSysLicenseInvalid
      2.62.100. tmnxSysLicenseValid
      2.62.101. tmnxUsrProfSessionLimitExceeded
      2.62.102. user_disconnect
      2.62.103. vRtrIfDcpDynamicConform
      2.62.104. vRtrIfDcpDynamicEnforceAlloc
      2.62.105. vRtrIfDcpDynamicEnforceFreed
      2.62.106. vRtrIfDcpDynamicExcd
      2.62.107. vRtrIfDcpDynamicHoldDownEnd
      2.62.108. vRtrIfDcpDynamicHoldDownStart
      2.62.109. vRtrIfDcpLocMonExcd
      2.62.110. vRtrIfDcpLocMonExcdAllDynAlloc
      2.62.111. vRtrIfDcpLocMonExcdAllDynFreed
      2.62.112. vRtrIfDcpLocMonExcdDynResource
      2.62.113. vRtrIfDcpStaticConform
      2.62.114. vRtrIfDcpStaticExcd
      2.62.115. vRtrIfDcpStaticHoldDownEnd
      2.62.116. vRtrIfDcpStaticHoldDownStart
    2.63. SFLOW
      2.63.1. tmnxSflowCpEntrySampling
      2.63.2. tmnxSflowPacketTxFailure
    2.64. SNMP
      2.64.1. authenticationFailure
      2.64.2. coldStart
      2.64.3. fallingAlarm
      2.64.4. linkDown
      2.64.5. linkUp
      2.64.6. risingAlarm
      2.64.7. snmpdError
      2.64.8. warmStart
    2.65. STP
      2.65.1. higherPriorityBridge
      2.65.2. newRootBridge
      2.65.3. newRootSap
      2.65.4. newRootVcpState
      2.65.5. pipActiveProtocolChange
      2.65.6. receivedTCN
      2.65.7. sapActiveProtocolChange
      2.65.8. sapEncapDot1d
      2.65.9. sapEncapPVST
      2.65.10. tmnxNewCistRegionalRootBridge
      2.65.11. tmnxNewMstiRegionalRootBridge
      2.65.12. tmnxPipStpExcepCondStateChng
      2.65.13. tmnxSapStpExcepCondStateChng
      2.65.14. tmnxSdpBndStpExcepCondStateChng
      2.65.15. tmnxStpMeshNotInMstRegion
      2.65.16. tmnxStpRootGuardViolation
      2.65.17. tmnxSvcNewRootSdpBind
      2.65.18. tmnxSvcSdpActiveProtocolChange
      2.65.19. tmnxSvcSdpBindEncapDot1d
      2.65.20. tmnxSvcSdpBindEncapPVST
      2.65.21. tmnxSvcSdpBindRcvdHigherBriPrio
      2.65.22. tmnxSvcSdpBindRcvdTCN
      2.65.23. tmnxSvcTopoChgSdpBindMajorState
      2.65.24. tmnxSvcTopoChgSdpBindState
      2.65.25. topologyChangePipMajorState
      2.65.26. topologyChangePipState
      2.65.27. topologyChangeSapMajorState
      2.65.28. topologyChangeSapState
      2.65.29. topologyChangeVcpState
      2.65.30. unacknowledgedTCN
      2.65.31. vcpActiveProtocolChange
    2.66. SVCMGR
      2.66.1. dynamicSdpBindConfigChanged
      2.66.2. dynamicSdpBindCreationFailed
      2.66.3. dynamicSdpConfigChanged
      2.66.4. dynamicSdpCreationFailed
      2.66.5. hostConnectivityLost
      2.66.6. hostConnectivityRestored
      2.66.7. iesIfStatusChanged
      2.66.8. msapCreationFailure
      2.66.9. msapStateChanged
      2.66.10. sapAtmPppNcpFailure
      2.66.11. sapAtmPppSessionFailure
      2.66.12. sapCemPacketDefectAlarm
      2.66.13. sapCemPacketDefectAlarmClear
      2.66.14. sapEthLoopbackStarted
      2.66.15. sapEthLoopbackStopped
      2.66.16. sapHostBGPPeeringSetupFailed
      2.66.17. sapHostRipListenerSetupFailed
      2.66.18. sapIfIgnorePortStateStart
      2.66.19. sapIfIgnorePortStateStop
      2.66.20. sapIpipeCeIpAddrChange
      2.66.21. sapPortStateChangeProcessed
      2.66.22. sapReceivedProtSrcMac
      2.66.23. sapStatusChanged
      2.66.24. sapTlsDataSapInstStatusChgd
      2.66.25. sapTlsMacAddrLimitAlarmCleared
      2.66.26. sapTlsMacAddrLimitAlarmRaised
      2.66.27. sapTlsMacMoveExceeded
      2.66.28. sapTlsMacMoveExceedNonBlock
      2.66.29. sapTunnelEncapIpMtuTooSmall
      2.66.30. sapTunnelStateChange
      2.66.31. sdpBandwidthOverbooked
      2.66.32. sdpBindEthLoopbackStarted
      2.66.33. sdpBindEthLoopbackStopped
      2.66.34. sdpBindInsufficientBandwidth
      2.66.35. sdpBindIpipeCeIpAddressChange
      2.66.36. sdpBindPwLocalStatusBitsChanged
      2.66.37. sdpBindPwPeerFaultAddrChanged
      2.66.38. sdpBindPwPeerStatusBitsChanged
      2.66.39. sdpBindReceivedProtSrcMac
      2.66.40. sdpBindSdpStateChangeProcessed
      2.66.41. sdpBindStatusChanged
      2.66.42. sdpBindTlsMacMoveExceeded
      2.66.43. sdpBindTlsMacMoveExceedNonBlock
      2.66.44. sdpControlPwActiveStateChg
      2.66.45. sdpEgrIfsNetDomInconsCntChanged
      2.66.46. sdpKeepAliveLateReply
      2.66.47. sdpKeepAliveProbeFailure
      2.66.48. sdpKeepAliveStarted
      2.66.49. sdpKeepAliveStopped
      2.66.50. sdpPbbActvPwWithNonActvCtrlPwChg
      2.66.51. sdpStatusChanged
      2.66.52. sdpTlsMacAddrLimitAlarmCleared
      2.66.53. sdpTlsMacAddrLimitAlarmRaised
      2.66.54. svcArpHostOverride
      2.66.55. svcArpHostPopulateErr
      2.66.56. svcBgpEvpnDupMacAddrsCleared
      2.66.57. svcBgpEvpnDupMacAddrsDetected
      2.66.58. svcBindSysHiUsageAlarmCleared
      2.66.59. svcBindSysHiUsageAlarmRaised
      2.66.60. svcEndPointMacLimitAlarmCleared
      2.66.61. svcEndPointMacLimitAlarmRaised
      2.66.62. svcEpipePbbOperStatusChanged
      2.66.63. svcEPMCEPConfigMismatch
      2.66.64. svcEPMCEPConfigMismatchResolved
      2.66.65. svcEPMCEPPassiveModeActive
      2.66.66. svcEPMCEPPassiveModePassive
      2.66.67. svcEvpnDestSysHiUsgClr
      2.66.68. svcEvpnDestSysHiUsgSet
      2.66.69. svcEvpnMHEsEviDFStateChgd
      2.66.70. svcEvpnMHEsIsidDFStateChgd
      2.66.71. svcEvpnMplsMacMoveExceedNonBlock
      2.66.72. svcEvpnMplsTEPEgrBndSvcHiUsgClr
      2.66.73. svcEvpnMplsTEPEgrBndSvcHiUsgSet
      2.66.74. svcEvpnMplsTEPEgrBndSysHiUsgClr
      2.66.75. svcEvpnMplsTEPEgrBndSysHiUsgSet
      2.66.76. svcEvpnMplsTEPHiUsageCleared
      2.66.77. svcEvpnMplsTEPHiUsageRaised
      2.66.78. svcEvpnRcvdProtSrcMac
      2.66.79. svcFdbMimDestTblFullAlrm
      2.66.80. svcFdbMimDestTblFullAlrmCleared
      2.66.81. svcMacFdbTblFullAlarm
      2.66.82. svcMacFdbTblFullAlarmCleared
      2.66.83. svcMSPwRetryExpiredNotif
      2.66.84. svcMSPwRtMisconfig
      2.66.85. svcOperGrpOperStatusChanged
      2.66.86. svcPersistencyProblem
      2.66.87. svcRestoreHostProblem
      2.66.88. svcSiteMinDnTimerStateChg
      2.66.89. svcStatusChanged
      2.66.90. svcTlsDupVTEPEgrVNICleared
      2.66.91. svcTlsDupVTEPEgrVNIDetected
      2.66.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
      2.66.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
      2.66.94. svcTlsFdbTableFullAlarmCleared
      2.66.95. svcTlsFdbTableFullAlarmRaised
      2.66.96. svcTlsGroupOperStatusChanged
      2.66.97. svcTlsMacPinningViolation
      2.66.98. svcTlsMfibTableFullAlarmCleared
      2.66.99. svcTlsMfibTableFullAlarmRaised
      2.66.100. svcTlsMrpAttrRegistrationFailed
      2.66.101. svcTlsMrpAttrTblFullAlarmCleared
      2.66.102. svcTlsMrpAttrTblFullAlarmRaised
      2.66.103. svcTlsProxyArpDupClear
      2.66.104. svcTlsProxyArpDupDetect
      2.66.105. svcTlsProxyArpSvcHiUsgClr
      2.66.106. svcTlsProxyArpSvcHiUsgSet
      2.66.107. svcTlsProxyArpSysHiUsgClr
      2.66.108. svcTlsProxyArpSysHiUsgSet
      2.66.109. svcTlsProxyNdDupClear
      2.66.110. svcTlsProxyNdDupDetect
      2.66.111. svcTlsProxyNdSvcHiUsgClr
      2.66.112. svcTlsProxyNdSvcHiUsgSet
      2.66.113. svcTlsProxyNdSysHiUsgClr
      2.66.114. svcTlsProxyNdSysHiUsgSet
      2.66.115. svcTlsSiteDesigFwdrChg
      2.66.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
      2.66.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
      2.66.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
      2.66.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
      2.66.120. svcTlsVTEPHiUsageAlarmCleared
      2.66.121. svcTlsVTEPHiUsageAlarmRaised
      2.66.122. svcTlsVxlanReplicatorChgd
      2.66.123. svcVllSiteDesigFwdrChg
      2.66.124. tmnxEndPointTxActiveChanged
      2.66.125. tmnxIpTunnelOperRemIpChg
      2.66.126. tmnxIpTunnelOperStateChange
      2.66.127. tmnxSapStpExcepCondStateChng
      2.66.128. tmnxStpRootGuardViolation
      2.66.129. tmnxSubAcctPlcyFailure
      2.66.130. tmnxSubAcctPlcyRadSerOperStatChg
      2.66.131. tmnxSubAuthPlcyRadSerOperStatChg
      2.66.132. tmnxSubBrgCreated
      2.66.133. tmnxSubBrgCvInitFailed
      2.66.134. tmnxSubBrgDeleted
      2.66.135. tmnxSubBrgRadiusAuthError
      2.66.136. tmnxSubBrgRadiusCoaError
      2.66.137. tmnxSubBrgRadiusUpdateIpoeSeFail
      2.66.138. tmnxSubBrgSessionLimitReached
      2.66.139. tmnxSubHostInconsistentAtmTdOvr
      2.66.140. tmnxSubHostInfoConflict
      2.66.141. tmnxSubHostLcktLimitReached
      2.66.142. tmnxSubHostLcktSapLimitReached
      2.66.143. tmnxSubIpoeInvalidCidRidChange
      2.66.144. tmnxSubIpoeInvalidSessionKey
      2.66.145. tmnxSubIpoeMigrHostDeleted
      2.66.146. tmnxSubIpoePersistenceRecovery
      2.66.147. tmnxSubIpoeSessionLimitReached
      2.66.148. tmnxSubMcsRelatedProblem
      2.66.149. tmnxSubMngdHostCreationFail
      2.66.150. tmnxSubMngdHostOverride
      2.66.151. tmnxSubPlBndFailed
      2.66.152. tmnxSubRadSapCoAError
      2.66.153. tmnxSubRadSapDisconnectError
      2.66.154. tmnxSubRadSapSubAuthError
      2.66.155. tmnxSubRadSdpBndCoAError
      2.66.156. tmnxSubRadSdpBndDisconnectError
      2.66.157. tmnxSubRadSdpBndSubAuthError
      2.66.158. tmnxSubscriberCreated
      2.66.159. tmnxSubscriberDeleted
      2.66.160. tmnxSubscriberRenamed
      2.66.161. tmnxSubSlaacOverride
      2.66.162. tmnxSubSlaacSetupFailure
      2.66.163. tmnxSubSysChassMemoryUsageHi
      2.66.164. tmnxSubUserCategoryError
      2.66.165. tmnxSubUserCategoryOutOfCredit
      2.66.166. tmnxSubUserCategoryRefreshCredit
      2.66.167. tmnxSubVSubnetHostsDeleted
    2.67. SYSTEM
      2.67.1. persistenceRestoreProblem
      2.67.2. persistencyClosedAlarmCleared
      2.67.3. persistencyClosedAlarmRaised
      2.67.4. persistencyEventReport
      2.67.5. persistencyFileSysThresCleared
      2.67.6. persistencyFileSysThresRaised
      2.67.7. sbiBootConfig
      2.67.8. sbiBootConfigFailFileError
      2.67.9. sbiBootConfigOKFileError
      2.67.10. sbiBootSnmpd
      2.67.11. schedActionFailure
      2.67.12. smScriptAbort
      2.67.13. smScriptException
      2.67.14. smScriptResult
      2.67.15. sntpTimeDiffExceedsThreshold
      2.67.16. socket_bind_failed
      2.67.17. socket_conn_accept_failed
      2.67.18. ssiSaveConfigFailed
      2.67.19. ssiSaveConfigSucceeded
      2.67.20. ssiSyncBootEnvFailed
      2.67.21. ssiSyncBootEnvOK
      2.67.22. ssiSyncCertFailed
      2.67.23. ssiSyncCertOK
      2.67.24. ssiSyncConfigFailed
      2.67.25. ssiSyncConfigOK
      2.67.26. ssiSyncRollbackFailed
      2.67.27. ssiSyncRollbackOK
      2.67.28. stiDateAndTimeChanged
      2.67.29. tmnxConfigConflict
      2.67.30. tmnxConfigCreate
      2.67.31. tmnxConfigDelete
      2.67.32. tmnxConfigModify
      2.67.33. tmnxEhsDroppedByMinDelay
      2.67.34. tmnxEhsHandlerInvoked
      2.67.35. tmnxFtpClientFailure
      2.67.36. tmnxModuleMallocFailed
      2.67.37. tmnxRedCpmActive
      2.67.38. tmnxRedSingleCpm
      2.67.39. tmnxRedStandbyReady
      2.67.40. tmnxRedStandbySyncing
      2.67.41. tmnxRedStandbySyncLost
      2.67.42. tmnxRedSwitchover
      2.67.43. tmnxSmLaunchStartFailed
      2.67.44. tmnxSnmpdStateChange
      2.67.45. tmnxSntpOperChange
      2.67.46. tmnxSssiMismatch
      2.67.47. tmnxStateChange
      2.67.48. tmnxSysBaseMacAddressNotSet
      2.67.49. tmnxSysExecFinished
      2.67.50. tmnxSysExecStarted
      2.67.51. tmnxSysNvsysFileError
      2.67.52. tmnxSysRollbackDeleteStarted
      2.67.53. tmnxSysRollbackFileDeleteStatus
      2.67.54. tmnxSysRollbackSaveStarted
      2.67.55. tmnxSysRollbackSaveStatusChange
      2.67.56. tmnxSysRollbackStarted
      2.67.57. tmnxSysRollbackStatusChange
      2.67.58. tmnxSysVsdServerAvailable
      2.67.59. tmnxSysVsdServerUnavailable
      2.67.60. tmnxSysXmppServerFunctional
      2.67.61. tmnxSysXmppServerNotFunctional
      2.67.62. tmnxTrapDropped
    2.68. USER
      2.68.1. cli_config_io
      2.68.2. cli_unauth_config_io
      2.68.3. cli_unauth_user_io
      2.68.4. cli_user_io
      2.68.5. cli_user_login
      2.68.6. cli_user_login_failed
      2.68.7. cli_user_login_max_attempts
      2.68.8. cli_user_logout
      2.68.9. ftp_user_login
      2.68.10. ftp_user_login_failed
      2.68.11. ftp_user_login_max_attempts
      2.68.12. ftp_user_logout
      2.68.13. snmp_user_set
    2.69. VIDEO
      2.69.1. tmnxVdoAdSpliceAbort
      2.69.2. tmnxVdoClientSessionsLmtCleared
      2.69.3. tmnxVdoClientSessionsLmtExceeded
      2.69.4. tmnxVdoDuplicateSsrcId
      2.69.5. tmnxVdoGrpSrcAnlyzrErrState
      2.69.6. tmnxVdoGrpSrcAnlyzrStClear
      2.69.7. tmnxVdoMdaSessionsLimitCleared
      2.69.8. tmnxVdoMdaSessionsLimitExceeded
      2.69.9. tmnxVdoMdaSGLimitCleared
      2.69.10. tmnxVdoMdaSGLimitExceeded
    2.70. VRRP
      2.70.1. tmnxVrrpBecameBackup
      2.70.2. tmnxVrrpBfdIntfSessStateChgd
      2.70.3. tmnxVrrpIPListMismatch
      2.70.4. tmnxVrrpIPListMismatchClear
      2.70.5. tmnxVrrpMultipleOwners
      2.70.6. tmnxVrrpOperDownInvalidMac
      2.70.7. tmnxVrrpOperDownInvalidMacClear
      2.70.8. tVrrpBecameBackup
      2.70.9. tVrrpIPListMismatch
      2.70.10. tVrrpIPListMismatchClear
      2.70.11. tVrrpMultipleOwners
      2.70.12. tVrrpOperDownInvalidMac
      2.70.13. tVrrpOperDownInvalidMacClear
      2.70.14. tVrrpPacketDiscarded
      2.70.15. tVrrpRouterAdvNotActivated
      2.70.16. tVrrpRouterAdvNotActivatedClear
      2.70.17. tVrrpTrapNewMaster
      2.70.18. vrrpPacketDiscarded
      2.70.19. vrrpTrapAuthFailure
      2.70.20. vrrpTrapNewMaster
      2.70.21. vrrpTrapProtoError
    2.71. VRTR
      2.71.1. tmnxVRtrArpLmt
      2.71.2. tmnxVRtrArpThresholdExceeded
      2.71.3. tmnxVRtrBfdExtNoCpmNpResources
      2.71.4. tmnxVRtrBfdMaxSessionOnSlot
      2.71.5. tmnxVRtrBfdPortTypeNotSupported
      2.71.6. tmnxVRtrBfdSessExtDeleted
      2.71.7. tmnxVRtrBfdSessExtDown
      2.71.8. tmnxVRtrBfdSessExtProtChange
      2.71.9. tmnxVRtrBfdSessExtUp
      2.71.10. tmnxVRtrDnsFault
      2.71.11. tmnxVRtrFibOccupancyThreshold
      2.71.12. tmnxVRtrGrtExportLimitReached
      2.71.13. tmnxVRtrGrtRoutesExpLimitDropped
      2.71.14. tmnxVRtrGrtV6ExportLimitReached
      2.71.15. tmnxVRtrGrtV6RoutesExpLimDropped
      2.71.16. tmnxVRtrHighRouteCleared
      2.71.17. tmnxVRtrHighRouteTCA
      2.71.18. tmnxVRtrIfIgnorePortState
      2.71.19. tmnxVRtrIfLdpSyncTimerStart
      2.71.20. tmnxVRtrIfLdpSyncTimerStop
      2.71.21. tmnxVRtrInetAddressAttachFailed
      2.71.22. tmnxVRtrIPv6HighRouteCleared
      2.71.23. tmnxVRtrIPv6HighRouteTCA
      2.71.24. tmnxVRtrIPv6MidRouteTCA
      2.71.25. tmnxVRtrIpv6NbrLmt
      2.71.26. tmnxVRtrIpv6NbrThresholdExceeded
      2.71.27. tmnxVRtrMacAcctLimitCleared
      2.71.28. tmnxVRtrMacAcctLimitReached
      2.71.29. tmnxVRtrManagedRouteAddFailed
      2.71.30. tmnxVRtrMaxArpEntriesCleared
      2.71.31. tmnxVRtrMaxArpEntriesTCA
      2.71.32. tmnxVRtrMaxRoutes
      2.71.33. tmnxVRtrMcastMaxRoutesCleared
      2.71.34. tmnxVRtrMcastMaxRoutesTCA
      2.71.35. tmnxVRtrMcastMidRouteTCA
      2.71.36. tmnxVRtrMidRouteTCA
      2.71.37. tmnxVRtrNgBfdNoCpmNpResources
      2.71.38. tmnxVRtrNgBfdSessDeleted
      2.71.39. tmnxVRtrNgBfdSessDown
      2.71.40. tmnxVRtrNgBfdSessProtChange
      2.71.41. tmnxVRtrNgBfdSessUp
      2.71.42. tmnxVRtrNHRvplsARPExhaust
      2.71.43. tmnxVRtrNHRvplsARPHighUsage
      2.71.44. tmnxVRtrNHRvplsARPHighUsageClr
      2.71.45. tmnxVRtrSingleSfmOverloadStateCh
      2.71.46. tmnxVRtrStaticRouteCPEStatus
      2.71.47. tmnxVRtrStaticRouteStatusChanged
    2.72. WLAN_GW
      2.72.1. tmnxWlanGwDsmGtpTunnelSetupFail
      2.72.2. tmnxWlanGwGrpOperStateChanged
      2.72.3. tmnxWlanGwGtpMessageDropped
      2.72.4. tmnxWlanGwIomActive
      2.72.5. tmnxWlanGwMgwConnected
      2.72.6. tmnxWlanGwMgwRestarted
      2.72.7. tmnxWlanGwMgwStateChanged
      2.72.8. tmnxWlanGwNumMgwHi
      2.72.9. tmnxWlanGwQosRadiusGtpMismatch
      2.72.10. tmnxWlanGwResrcProblemCause
      2.72.11. tmnxWlanGwResrcProblemDetected
      2.72.12. tmnxWlanGwSubIfPmAddNewPlFailed
      2.72.13. tmnxWlanGwSubIfPmCrIntObjFailed
      2.72.14. tmnxWlanGwSubIfPmLsQryRtryFailed
      2.72.15. tmnxWlanGwSubIfPmNewPlReqFailed
      2.72.16. tmnxWlanGwSubIfPmPoolTimeout
      2.72.17. tmnxWlanGwSubIfPmPoolUsageLow
      2.72.18. tmnxWlanGwSubIfPmStartD6cFailed
      2.72.19. tmnxWlanGwSubIfRedActiveChanged
      2.72.20. tmnxWlanGwTuQosProblem
    2.73. WPP
      2.73.1. tmnxWppHostAuthenticationFailed
      2.73.2. tmnxWppPortalStatChanged
      2.73.3. tmnxWppPortalUnreachable
  Customer Document and Product Support
  1. Log Events
    1.1. In This Chapter
    1.2. Log Events
    1.3. Sample Log Event
  2. SR Log Events
    2.1. APPLICATION_ASSURANCE
      2.1.1. tmnxBsxAarpInstOperStateChanged
      2.1.2. tmnxBsxAarpInstStateChanged
      2.1.3. tmnxBsxAaSubPolResExceeded
      2.1.4. tmnxBsxAaSubPolResExceededClear
      2.1.5. tmnxBsxAaSubscriberAcctDataLoss
      2.1.6. tmnxBsxAaSubscribersUnassigned
      2.1.7. tmnxBsxDatapathCpuUsage
      2.1.8. tmnxBsxDatapathCpuUsageClear
      2.1.9. tmnxBsxDnsIpCacheFull
      2.1.10. tmnxBsxDnsIpCacheFullClear
      2.1.11. tmnxBsxHttpUrlParamLimitExceeded
      2.1.12. tmnxBsxIsaAaGrpBitRate
      2.1.13. tmnxBsxIsaAaGrpBitRateClear
      2.1.14. tmnxBsxIsaAaGrpCapCostThres
      2.1.15. tmnxBsxIsaAaGrpCapCostThresClear
      2.1.16. tmnxBsxIsaAaGrpFailureClearV2
      2.1.17. tmnxBsxIsaAaGrpFailureV2
      2.1.18. tmnxBsxIsaAaGrpFlowFull
      2.1.19. tmnxBsxIsaAaGrpFlowFullClear
      2.1.20. tmnxBsxIsaAaGrpFlowSetup
      2.1.21. tmnxBsxIsaAaGrpFlowSetupClear
      2.1.22. tmnxBsxIsaAaGrpFmSbWaSBufOvld
      2.1.23. tmnxBsxIsaAaGrpFmSbWaSBufOvldClr
      2.1.24. tmnxBsxIsaAaGrpNonRedundantV2
      2.1.25. tmnxBsxIsaAaGrpOvrldCutthru
      2.1.26. tmnxBsxIsaAaGrpOvrldCutthruClr
      2.1.27. tmnxBsxIsaAaGrpPacketRate
      2.1.28. tmnxBsxIsaAaGrpPacketRateClear
      2.1.29. tmnxBsxIsaAaGrpSwitchover
      2.1.30. tmnxBsxIsaAaGrpToSbWaSBufOvld
      2.1.31. tmnxBsxIsaAaGrpToSbWaSBufOvldClr
      2.1.32. tmnxBsxIsaAaSubLoadBalance
      2.1.33. tmnxBsxIsaAaTimFileProcFailure
      2.1.34. tmnxBsxMobileSubModifyFailure
      2.1.35. tmnxBsxRadApFailure
      2.1.36. tmnxBsxRadApIntrmUpdateSkipped
      2.1.37. tmnxBsxRadApServOperStateChange
      2.1.38. tmnxBsxStatFtrEnTcaThreshCrClear
      2.1.39. tmnxBsxStatFtrEnTcaThreshCrossed
      2.1.40. tmnxBsxStatFtrTcaThreshCrClear
      2.1.41. tmnxBsxStatFtrTcaThreshCrossed
      2.1.42. tmnxBsxStatPolcrTcaThreshCrClear
      2.1.43. tmnxBsxStatPolcrTcaThreshCrossed
      2.1.44. tmnxBsxStatTcaThreshCrossed
      2.1.45. tmnxBsxStatTcaThreshCrossedClear
      2.1.46. tmnxBsxSubModifyFailure
      2.1.47. tmnxBsxTcpValTcaCrossed
      2.1.48. tmnxBsxTcpValTcaCrossedClear
      2.1.49. tmnxBsxTransIpPolAaSubCreated
      2.1.50. tmnxBsxTransIpPolAaSubDeleted
      2.1.51. tmnxBsxTransIpPolDhcpAddWarning
      2.1.52. tmnxBsxTransIpPolDhcpDelWarning
      2.1.53. tmnxBsxTransIpPolDiamGxError
      2.1.54. tmnxBsxTransIpPolRadCoAAudit
      2.1.55. tmnxBsxTransIpPolRadCoAError
      2.1.56. tmnxBsxTransIpPolRadDiscError
      2.1.57. tmnxBsxTransitIpPersistenceWarn
      2.1.58. tmnxBsxUrlFilterOperStateChange
      2.1.59. tmnxBsxUrlListFailure
      2.1.60. tmnxBsxUrlListUpdate
    2.2. APS
      2.2.1. apsEventChannelMismatch
      2.2.2. apsEventFEPLF
      2.2.3. apsEventModeMismatch
      2.2.4. apsEventPSBF
      2.2.5. apsEventSwitchover
      2.2.6. tApsChannelMismatchClear
      2.2.7. tApsChanTxLaisStateChange
      2.2.8. tApsFEPLFClear
      2.2.9. tApsLocalSwitchCommandClear
      2.2.10. tApsLocalSwitchCommandSet
      2.2.11. tApsMcApsCtlLinkStateChange
      2.2.12. tApsModeMismatchClear
      2.2.13. tApsPrimaryChannelChange
      2.2.14. tApsPSBFClear
      2.2.15. tApsRemoteSwitchCommandClear
      2.2.16. tApsRemoteSwitchCommandSet
    2.3. ATM
      2.3.1. atmIfcStatusChange
      2.3.2. atmIlmiPeerVclStatusChange
      2.3.3. atmIlmiPeerVplStatusChange
      2.3.4. atmVclStatusChange
      2.3.5. atmVplStatusChange
      2.3.6. atmVtlStatusChange
      2.3.7. tAtmEpOutOfPeerVpiOrVciRange
      2.3.8. tAtmIlmiLinkStatusChange
      2.3.9. tAtmMaxPeerVccsExceeded
      2.3.10. tAtmMaxPeerVpcsExceeded
      2.3.11. tAtmPlcpSubLayerClear
      2.3.12. tAtmPlcpSubLayerDown
      2.3.13. tAtmTcSubLayerClear
      2.3.14. tAtmTcSubLayerDown
    2.4. BFD
      2.4.1. tmnxBfdOnLspSessDeleted
      2.4.2. tmnxBfdOnLspSessDown
      2.4.3. tmnxBfdOnLspSessNoCpmNpResources
      2.4.4. tmnxBfdOnLspSessProtChange
      2.4.5. tmnxBfdOnLspSessUp
    2.5. BGP
      2.5.1. bgpBackwardTransNotification
      2.5.2. bgpCfgViol
      2.5.3. bgpConnMgrTerminated
      2.5.4. bgpConnNoKA
      2.5.5. bgpConnNoOpenRcvd
      2.5.6. bgpEstablishedNotification
      2.5.7. bgpInterfaceDown
      2.5.8. bgpNoMemoryPeer
      2.5.9. bgpPeerNotFound
      2.5.10. bgpRejectConnBadLocAddr
      2.5.11. bgpRemoteEndClosedConn
      2.5.12. bgpTerminated
      2.5.13. bgpVariableRangeViolation
      2.5.14. receiveNotification
      2.5.15. sendNotification
      2.5.16. tBgp4PathAttrInvalid
      2.5.17. tBgp4RouteInvalid
      2.5.18. tBgp4UpdateInvalid
      2.5.19. tBgp4WithdrawnRtFromUpdateError
      2.5.20. tBgpFibResourceFailPeer
      2.5.21. tBgpFlowRouteInvalid
      2.5.22. tBgpFlowspecUnsupportdComAction
      2.5.23. tBgpGeneral
      2.5.24. tBgpInstanceDynamicPeerLmtReachd
      2.5.25. tBgpMaxNgPfxLmt
      2.5.26. tBgpMaxNgPfxLmtThresholdReached
      2.5.27. tBgpNgBackwardTransition
      2.5.28. tBgpNgEstablished
      2.5.29. tBgpPeerGRStatusChange
      2.5.30. tBgpPeerNgHoldTimeInconsistent
      2.5.31. tBgpPGDynamicPeerLmtReached
      2.5.32. tBgpReceivedInvalidNlri
    2.6. CALLTRACE
      2.6.1. tmnxCallTraceLocSizeLimitReached
      2.6.2. tmnxCallTraceMaxFilesNumReached
    2.7. CFLOWD
      2.7.1. tmnxCflowdCreateFailure
      2.7.2. tmnxCflowdFlowCreateFailure
      2.7.3. tmnxCflowdPacketTxFailure
      2.7.4. tmnxCflowdStateChange
    2.8. CHASSIS
      2.8.1. CpmIcPortSFFStatusDDMCorrupt
      2.8.2. CpmIcPortSFFStatusFailure
      2.8.3. CpmIcPortSFFStatusReadError
      2.8.4. CpmIcPortSFFStatusUnsupported
      2.8.5. SfmIcPortSFFStatusDDMCorrupt
      2.8.6. SfmIcPortSFFStatusFailure
      2.8.7. SfmIcPortSFFStatusReadError
      2.8.8. SfmIcPortSFFStatusUnsupported
      2.8.9. tIPsecIsaMemHighWatermark
      2.8.10. tIPsecIsaMemLowWatermark
      2.8.11. tIPsecIsaMemMax
      2.8.12. tmnxAlarmInputVoltageFailure
      2.8.13. tmnxChassisHiBwMcastAlarm
      2.8.14. tmnxChassisNotificationClear
      2.8.15. tmnxChassisUpgradeComplete
      2.8.16. tmnxChassisUpgradeInProgress
      2.8.17. tmnxCpmALocalIcPortAvail
      2.8.18. tmnxCpmANoLocalIcPort
      2.8.19. tmnxCpmBLocalIcPortAvail
      2.8.20. tmnxCpmBNoLocalIcPort
      2.8.21. tmnxCpmCardSyncFileNotPresent
      2.8.22. tmnxCpmIcPortDDMClear
      2.8.23. tmnxCpmIcPortDDMFailure
      2.8.24. tmnxCpmIcPortDown
      2.8.25. tmnxCpmIcPortSFFInserted
      2.8.26. tmnxCpmIcPortSFFRemoved
      2.8.27. tmnxCpmIcPortUp
      2.8.28. tmnxCpmMemSizeMismatch
      2.8.29. tmnxCpmMemSizeMismatchClear
      2.8.30. tmnxDcpCardFpEventOvrflw
      2.8.31. tmnxDcpCardFpEventOvrflwClr
      2.8.32. tmnxDcpCardSapEventOvrflw
      2.8.33. tmnxDcpCardSapEventOvrflwClr
      2.8.34. tmnxDcpCardVrtrIfEventOvrflw
      2.8.35. tmnxDcpCardVrtrIfEventOvrflwClr
      2.8.36. tmnxDcpFpDynPoolUsageHiAlmClear
      2.8.37. tmnxDcpFpDynPoolUsageHiAlmRaise
      2.8.38. tmnxEnvTempTooHigh
      2.8.39. tmnxEqCardChipIfCellEvent
      2.8.40. tmnxEqCardChipIfDownEvent
      2.8.41. tmnxEqCardFailure
      2.8.42. tmnxEqCardFirmwareUpgraded
      2.8.43. tmnxEqCardInserted
      2.8.44. tmnxEqCardPChipCamEvent
      2.8.45. tmnxEqCardPChipError
      2.8.46. tmnxEqCardPChipMemoryEvent
      2.8.47. tmnxEqCardQChipBufMemoryEvent
      2.8.48. tmnxEqCardQChipIntMemoryEvent
      2.8.49. tmnxEqCardQChipStatsMemoryEvent
      2.8.50. tmnxEqCardRemoved
      2.8.51. tmnxEqCardSoftResetAlarm
      2.8.52. tmnxEqCardTChipParityEvent
      2.8.53. tmnxEqDataPathFailureProtImpact
      2.8.54. tmnxEqFanFailure
      2.8.55. tmnxEqFlashDataLoss
      2.8.56. tmnxEqFlashDiskFull
      2.8.57. tmnxEqHwEnhancedCapability
      2.8.58. tmnxEqLowSwitchFabricCap
      2.8.59. tmnxEqLowSwitchFabricCapClear
      2.8.60. tmnxEqMdaCfgNotCompatible
      2.8.61. tmnxEqMdaIngrXplError
      2.8.62. tmnxEqMdaSyncENotCompatible
      2.8.63. tmnxEqMdaXplError
      2.8.64. tmnxEqMgmtEthRedStandbyClear
      2.8.65. tmnxEqMgmtEthRedStandbyRaise
      2.8.66. tmnxEqPhysChassisFanFailure
      2.8.67. tmnxEqPhysChassisFanFailureClear
      2.8.68. tmnxEqPhysChassPowerSupAcFail
      2.8.69. tmnxEqPhysChassPowerSupAcFailClr
      2.8.70. tmnxEqPhysChassPowerSupDcFail
      2.8.71. tmnxEqPhysChassPowerSupDcFailClr
      2.8.72. tmnxEqPhysChassPowerSupInFail
      2.8.73. tmnxEqPhysChassPowerSupInFailClr
      2.8.74. tmnxEqPhysChassPowerSupOutFail
      2.8.75. tmnxEqPhysChassPowerSupOutFailCl
      2.8.76. tmnxEqPhysChassPowerSupOvrTmp
      2.8.77. tmnxEqPhysChassPowerSupOvrTmpClr
      2.8.78. tmnxEqPowerCapacityExceeded
      2.8.79. tmnxEqPowerCapacityExceededClear
      2.8.80. tmnxEqPowerLostCapacity
      2.8.81. tmnxEqPowerLostCapacityClear
      2.8.82. tmnxEqPowerOverloadState
      2.8.83. tmnxEqPowerOverloadStateClear
      2.8.84. tmnxEqPowerSafetyAlertClear
      2.8.85. tmnxEqPowerSafetyAlertThreshold
      2.8.86. tmnxEqPowerSafetyLevelClear
      2.8.87. tmnxEqPowerSafetyLevelThreshold
      2.8.88. tmnxEqPowerSupplyFailureAc
      2.8.89. tmnxEqPowerSupplyFailureDc
      2.8.90. tmnxEqPowerSupplyFailureInput
      2.8.91. tmnxEqPowerSupplyFailureOutput
      2.8.92. tmnxEqPowerSupplyFailureOvt
      2.8.93. tmnxEqPowerSupplyInputFeedAlm
      2.8.94. tmnxEqPowerSupplyInputFeedAlmClr
      2.8.95. tmnxEqPowerSupplyInserted
      2.8.96. tmnxEqPowerSupplyPemACRectAlm
      2.8.97. tmnxEqPowerSupplyPemACRectAlmClr
      2.8.98. tmnxEqPowerSupplyRemoved
      2.8.99. tmnxEqProvPowerCapacityAlm
      2.8.100. tmnxEqProvPowerCapacityAlmClr
      2.8.101. tmnxEqSyncIfTimingBITS2Alarm
      2.8.102. tmnxEqSyncIfTimingBITS2AlarmClr
      2.8.103. tmnxEqSyncIfTimingBITS2Quality
      2.8.104. tmnxEqSyncIfTimingBITSAlarm
      2.8.105. tmnxEqSyncIfTimingBITSAlarmClear
      2.8.106. tmnxEqSyncIfTimingBITSOutRefChg
      2.8.107. tmnxEqSyncIfTimingBITSQuality
      2.8.108. tmnxEqSyncIfTimingHoldover
      2.8.109. tmnxEqSyncIfTimingHoldoverClear
      2.8.110. tmnxEqSyncIfTimingPTPAlarm
      2.8.111. tmnxEqSyncIfTimingPTPAlarmClr
      2.8.112. tmnxEqSyncIfTimingPTPQuality
      2.8.113. tmnxEqSyncIfTimingRef1Alarm
      2.8.114. tmnxEqSyncIfTimingRef1AlarmClear
      2.8.115. tmnxEqSyncIfTimingRef1Quality
      2.8.116. tmnxEqSyncIfTimingRef2Alarm
      2.8.117. tmnxEqSyncIfTimingRef2AlarmClear
      2.8.118. tmnxEqSyncIfTimingRef2Quality
      2.8.119. tmnxEqSyncIfTimingRefSwitch
      2.8.120. tmnxEqSyncIfTimingSystemQuality
      2.8.121. tmnxEqWrongCard
      2.8.122. tmnxExtStandbyCpmReboot
      2.8.123. tmnxExtStandbyCpmRebootFail
      2.8.124. tmnxInterChassisCommsDown
      2.8.125. tmnxInterChassisCommsUp
      2.8.126. tmnxIomEventOverflow
      2.8.127. tmnxIomEventOverflowClr
      2.8.128. tmnxIomResExhausted
      2.8.129. tmnxIomResHighLimitReached
      2.8.130. tmnxIomResStateClr
      2.8.131. tmnxIPsecIsaGrpActiveIsaChgd
      2.8.132. tmnxIPsecIsaGrpTnlHighWMark
      2.8.133. tmnxIPsecIsaGrpTnlLowWMark
      2.8.134. tmnxIPsecIsaGrpTnlMax
      2.8.135. tmnxIPsecIsaGrpUnableToSwitch
      2.8.136. tmnxMDAIsaTunnelGroupChange
      2.8.137. tmnxOesCardDegraded
      2.8.138. tmnxOesCardFirmwareErr
      2.8.139. tmnxOesCfgBlocked
      2.8.140. tmnxOesCfgFailNoMemory
      2.8.141. tmnxOesCtlCardActivityChange
      2.8.142. tmnxOesCtlCardPortDown
      2.8.143. tmnxOesCtlCardPortUp
      2.8.144. tmnxOesCtlCommsDown
      2.8.145. tmnxOesCtlCommsUp
      2.8.146. tmnxOesDbInvalid
      2.8.147. tmnxOesDbInvalidClear
      2.8.148. tmnxOesDbSyncFailure
      2.8.149. tmnxOesDbSyncFailureClear
      2.8.150. tmnxOesDbUnsync
      2.8.151. tmnxOesDbUnsyncClear
      2.8.152. tmnxOesFan32HReqd
      2.8.153. tmnxOesFan32HReqdClear
      2.8.154. tmnxOesFanFailure
      2.8.155. tmnxOesFanFailureClear
      2.8.156. tmnxOesFanInserted
      2.8.157. tmnxOesFanRemoved
      2.8.158. tmnxOesFanSpeedHigh
      2.8.159. tmnxOesFanSpeedHighClear
      2.8.160. tmnxOesFanSpeedLow
      2.8.161. tmnxOesFanSpeedLowClear
      2.8.162. tmnxOesFirmwareCondition
      2.8.163. tmnxOesFpgaFail
      2.8.164. tmnxOesFpgaFailClear
      2.8.165. tmnxOesFpgaTimeout
      2.8.166. tmnxOesFpgaTimeoutClear
      2.8.167. tmnxOesNtpOutOfSync
      2.8.168. tmnxOesNtpSync
      2.8.169. tmnxOesOptTrnspndrMiscFail
      2.8.170. tmnxOesPowerSupplyFailure
      2.8.171. tmnxOesPowerSupplyFailureClear
      2.8.172. tmnxOesPowerSupplyInserted
      2.8.173. tmnxOesPowerSupplyRemoved
      2.8.174. tmnxOesRedundancyFail
      2.8.175. tmnxOesRedundancyReady
      2.8.176. tmnxOesSwBelowMinRev
      2.8.177. tmnxOesSwUpgdCleanupFailed
      2.8.178. tmnxOesSwUpgdFailed
      2.8.179. tmnxOesTempLow
      2.8.180. tmnxOesTempLowClear
      2.8.181. tmnxOesUsrpnlPortDown
      2.8.182. tmnxOesUsrpnlPortUp
      2.8.183. tmnxPeBootloaderVersionMismatch
      2.8.184. tmnxPeBootromVersionMismatch
      2.8.185. tmnxPeFirmwareVersionWarning
      2.8.186. tmnxPeFPGAVersionMismatch
      2.8.187. tmnxPeSoftwareLoadFailed
      2.8.188. tmnxPeSoftwareVersionMismatch
      2.8.189. tmnxPlcyAcctStatsEventOvrflw
      2.8.190. tmnxPlcyAcctStatsEventOvrflwClr
      2.8.191. tmnxPlcyAcctStatsPoolExcResource
      2.8.192. tmnxPlcyAcctStatsPoolLowResource
      2.8.193. tmnxPowerSupplyWrongFanDir
      2.8.194. tmnxPowerSupplyWrongFanDirClear
      2.8.195. tmnxRedPrimaryCPMFail
      2.8.196. tmnxSasAlarminput1StateChanged
      2.8.197. tmnxSasAlarminput2StateChanged
      2.8.198. tmnxSasAlarminput3StateChanged
      2.8.199. tmnxSasAlarminput4StateChanged
      2.8.200. tmnxSfmIcPortDDMClear
      2.8.201. tmnxSfmIcPortDDMFailure
      2.8.202. tmnxSfmIcPortDegraded
      2.8.203. tmnxSfmIcPortDegradedClear
      2.8.204. tmnxSfmIcPortDown
      2.8.205. tmnxSfmIcPortSFFInserted
      2.8.206. tmnxSfmIcPortSFFRemoved
      2.8.207. tmnxSfmIcPortUp
      2.8.208. tmnxSyncIfTimBITS2048khzUnsup
      2.8.209. tmnxSyncIfTimBITS2048khzUnsupClr
    2.9. DEBUG
      2.9.1. traceEvent
    2.10. DHCP
      2.10.1. sapDHCPLeaseEntriesExceeded
      2.10.2. sapDHCPLseStateMobilityError
      2.10.3. sapDHCPLseStateOverride
      2.10.4. sapDHCPLseStatePopulateErr
      2.10.5. sapDHCPProxyServerError
      2.10.6. sapDHCPSuspiciousPcktRcvd
      2.10.7. sapStatHost6DynMacConflict
      2.10.8. sapStaticHostDynMacConflict
      2.10.9. sdpBindDHCPLeaseEntriesExceeded
      2.10.10. sdpBindDHCPLseStateMobilityErr
      2.10.11. sdpBindDHCPLseStateOverride
      2.10.12. sdpBindDHCPLseStatePopulateErr
      2.10.13. sdpBindDHCPProxyServerError
      2.10.14. sdpBindDHCPSuspiciousPcktRcvd
      2.10.15. svcDHCPLseStateRestoreProblem
      2.10.16. svcDHCPMiscellaneousProblem
      2.10.17. tmnxVRtrDHCP6AssignedIllegSubnet
      2.10.18. tmnxVRtrDHCP6ClientMacUnresolved
      2.10.19. tmnxVRtrDHCP6IllegalClientAddr
      2.10.20. tmnxVRtrDHCP6LseStateOverride
      2.10.21. tmnxVRtrDHCP6RelayLseStExceeded
      2.10.22. tmnxVRtrDHCP6RelayReplyStripUni
      2.10.23. tmnxVRtrDHCP6ServerLseStExceeded
      2.10.24. tmnxVRtrDHCPIfLseStatesExceeded
      2.10.25. tmnxVRtrDHCPSuspiciousPcktRcvd
    2.11. DHCPS
      2.11.1. tmnxDhcpsAddrAllocationFailure
      2.11.2. tmnxDhcpsFoLeaseUpdateFailed
      2.11.3. tmnxDhcpsFoStateChange
      2.11.4. tmnxDhcpsLeaseOfferedExpired
      2.11.5. tmnxDhcpsPacketDropped
      2.11.6. tmnxDhcpsPoolFoLeaseUpdateFailed
      2.11.7. tmnxDhcpsPoolFoStateChange
      2.11.8. tmnxDhcpSvrDeclineStaticAddr
      2.11.9. tmnxDhcpSvrHostConflict
      2.11.10. tmnxDhcpSvrIntLseConflict
      2.11.11. tmnxDhcpSvrLeaseCreate
      2.11.12. tmnxDhcpSvrLeaseDefaultTimers
      2.11.13. tmnxDhcpSvrLeaseDelete
      2.11.14. tmnxDhcpSvrLeaseModify
      2.11.15. tmnxDhcpSvrLeaseNotOwner
      2.11.16. tmnxDhcpSvrMaxLeasesReached
      2.11.17. tmnxDhcpSvrMsgTooLong
      2.11.18. tmnxDhcpSvrNoContFreeBlocks
      2.11.19. tmnxDhcpSvrNoSubnetFixAddr
      2.11.20. tmnxDhcpSvrPfxThDepletedV6
      2.11.21. tmnxDhcpSvrPfxThTooLowV6
      2.11.22. tmnxDhcpSvrPlThDepletedV6
      2.11.23. tmnxDhcpSvrPlThTooLowV6
      2.11.24. tmnxDhcpSvrPoolDepleted
      2.11.25. tmnxDhcpSvrPoolMinFreeExc
      2.11.26. tmnxDhcpSvrPoolUnknown
      2.11.27. tmnxDhcpSvrSubnetDepleted
      2.11.28. tmnxDhcpSvrSubnetMinFreeExc
      2.11.29. tmnxDhcpSvrUserDbUnknown
    2.12. DIAMETER
      2.12.1. tmnxDiamAppSessionFailure
      2.12.2. tmnxDiamMessageDropped
      2.12.3. tmnxDiamPolicyPeerStateChange
      2.12.4. tmnxDiamPpPrxMcLocStateChanged
      2.12.5. tmnxDiamSessionEvent
    2.13. DYNSVC
      2.13.1. tmnxDynSvcSapFailed
    2.14. EFM_OAM
      2.14.1. dot3OamNonThresholdEvent
      2.14.2. dot3OamThresholdEvent
      2.14.3. tmnxDot3OamLoopCleared
      2.14.4. tmnxDot3OamLoopDetected
      2.14.5. tmnxDot3OamNonThresholdEventClr
      2.14.6. tmnxDot3OamPeerChanged
      2.14.7. tmnxDot3OamSdThresholdEvent
      2.14.8. tmnxDot3OamThresholdEventClr
    2.15. ELMI
      2.15.1. tmnxElmiEVCStatusChangeEvent
      2.15.2. tmnxElmiIfStatusChangeEvent
    2.16. ERING
      2.16.1. tmnxEthRingApsPrvsnClearAlarm
      2.16.2. tmnxEthRingApsPrvsnRaiseAlarm
      2.16.3. tmnxEthRingPathFwdStateChange
    2.17. ETH_CFM
      2.17.1. dot1agCfmFaultAlarm
      2.17.2. tmnxDot1agCfmMepAisStateChanged
      2.17.3. tmnxDot1agCfmMepCsfStateChanged
      2.17.4. tmnxDot1agCfmMepDMTestComplete
      2.17.5. tmnxDot1agCfmMepEthTestComplete
      2.17.6. tmnxDot1agCfmMepFcltyFaultClear
      2.17.7. tmnxDot1agCfmMepFcltyFaultRaise
      2.17.8. tmnxDot1agCfmMepLbmTestComplete
      2.17.9. tmnxDot1agCfmMepLtmTestComplete
      2.17.10. tmnxDot1agCfmMepSLMTestComplete
      2.17.11. tmnxDot1agCfmMipEvaluation
    2.18. ETUN
      2.18.1. tmnxEthTunnelApsCfgClearAlarm
      2.18.2. tmnxEthTunnelApsCfgRaiseAlarm
      2.18.3. tmnxEthTunnelApsNoRspClearAlarm
      2.18.4. tmnxEthTunnelApsNoRspRaiseAlarm
      2.18.5. tmnxEthTunnelApsPrvsnClearAlarm
      2.18.6. tmnxEthTunnelApsPrvsnRaiseAlarm
      2.18.7. tmnxEthTunnelApsSwitchoverAlarm
    2.19. FILTER
      2.19.1. tFilterApplyPathProblem
      2.19.2. tFilterBgpFlowSpecProblem
      2.19.3. tFilterEmbeddingOperStateChange
      2.19.4. tFilterEmbedFlowspecOperStateChg
      2.19.5. tFilterEmbedOpenflowOperStateChg
      2.19.6. tFilterEmbedVsdOperStateChg
      2.19.7. tFilterOpenflowRequestRejected
      2.19.8. tFilterRadSharedFltrAlarmClear
      2.19.9. tFilterRadSharedFltrAlarmRaised
      2.19.10. tFilterSubInsFltrEntryDropped
      2.19.11. tFilterSubInsSpaceAlarmCleared
      2.19.12. tFilterSubInsSpaceAlarmRaised
      2.19.13. tFilterTmsEvent
      2.19.14. tIPFilterPBRPacketsDrop
    2.20. GMPLS
      2.20.1. vRtrGmplsLspPathStateChange
    2.21. GSMP
      2.21.1. tmnxAncpEgrRateMonitorEvent
      2.21.2. tmnxAncpEgrRateMonitorEventL
      2.21.3. tmnxAncpIngRateMonitorEvent
      2.21.4. tmnxAncpIngRateMonitorEventL
      2.21.5. tmnxAncpSesRejected
      2.21.6. tmnxAncpShcvDisabledEvent
      2.21.7. tmnxAncpShcvDisabledEventL
      2.21.8. tmnxAncpStringRejected
    2.22. IGH
      2.22.1. tmnxIfGroupHandlerProtoOprChange
      2.22.2. tmnxIfGroupHdlrMbrProtoOprChange
    2.23. IGMP
      2.23.1. vRtrIgmpGrpIfSapCModeRxQueryMism
      2.23.2. vRtrIgmpGrpIfSapMaxGrpsLimExceed
      2.23.3. vRtrIgmpGrpIfSapMaxGrpSrcLimExcd
      2.23.4. vRtrIgmpGrpIfSapMaxSrcsLimExceed
      2.23.5. vRtrIgmpGrpIfSapMcacPlcyDropped
      2.23.6. vRtrIgmpGrpIfSapRxQueryVerMism
      2.23.7. vRtrIgmpHostCModeRxQueryMismatch
      2.23.8. vRtrIgmpHostInstantiationFail
      2.23.9. vRtrIgmpHostMaxGrpsLimitExceeded
      2.23.10. vRtrIgmpHostMaxGrpSrcsLimitExcd
      2.23.11. vRtrIgmpHostMaxSrcsLimitExceeded
      2.23.12. vRtrIgmpHostMcacPlcyDropped
      2.23.13. vRtrIgmpHostQryIntervalConflict
      2.23.14. vRtrIgmpHostRxQueryVerMismatch
      2.23.15. vRtrIgmpIfCModeRxQueryMismatch
      2.23.16. vRtrIgmpIfRxQueryVerMismatch
      2.23.17. vRtrIgmpMaxGrpsLimitExceeded
      2.23.18. vRtrIgmpMaxGrpSrcsLimitExceeded
      2.23.19. vRtrIgmpMaxSrcsLimitExceeded
      2.23.20. vRtrIgmpMcacPlcyDropped
    2.24. IGMP_SNOOPING
      2.24.1. sapIgmpSnpgGrpLimitExceeded
      2.24.2. sapIgmpSnpgGrpSrcLimitExceeded
      2.24.3. sapIgmpSnpgMcacPlcyDropped
      2.24.4. sapIgmpSnpgMcsFailure
      2.24.5. sapIgmpSnpgSrcLimitExceeded
      2.24.6. sdpBndIgmpSnpgGrpLimitExceeded
      2.24.7. sdpBndIgmpSnpgGrpSrcLimitExceed
      2.24.8. sdpBndIgmpSnpgMcacPlcyDropped
      2.24.9. sdpBndIgmpSnpgSrcLimitExceeded
    2.25. IP
      2.25.1. clearRTMError
      2.25.2. fibAddFailed
      2.25.3. ipAnyDuplicateAddress
      2.25.4. ipArpBadInterface
      2.25.5. ipArpDuplicateIpAddress
      2.25.6. ipArpDuplicateMacAddress
      2.25.7. ipArpInfoOverwritten
      2.25.8. ipDuplicateAddress
      2.25.9. ipEtherBroadcast
      2.25.10. qosNetworkPolicyMallocFailed
    2.26. IPSEC
      2.26.1. tIPsecBfdIntfSessStateChgd
      2.26.2. tIPsecRadAcctPlcyFailure
      2.26.3. tIPsecRUSAFailToAddRoute
      2.26.4. tIPsecRuTnlEncapIpMtuTooSmall
      2.26.5. tIPsecRUTnlFailToCreate
      2.26.6. tIPsecRUTnlRemoved
      2.26.7. tIPSecTrustAnchorPrfOprChg
      2.26.8. tIPsecTunnelEncapIpMtuTooSmall
      2.26.9. tmnxIPsecGWOperStateChange
      2.26.10. tmnxIPsecTunnelOperStateChange
      2.26.11. tmnxSecNotifCmptedCertChnChngd
      2.26.12. tmnxSecNotifCmptedCertHashChngd
      2.26.13. tmnxSecNotifSendChnNotInCmptChn
    2.27. ISIS
      2.27.1. tmnxIsisAdjacencyChange
      2.27.2. tmnxIsisAdjBfdSessionSetupFail
      2.27.3. tmnxIsisAdjRestartStatusChange
      2.27.4. tmnxIsisAreaMismatch
      2.27.5. tmnxIsisAuthFail
      2.27.6. tmnxIsisAutTypeFail
      2.27.7. tmnxIsisCircIdExhausted
      2.27.8. tmnxIsisCorruptedLSPDetected
      2.27.9. tmnxIsisDatabaseOverload
      2.27.10. tmnxIsisExportLimitReached
      2.27.11. tmnxIsisExportLimitWarning
      2.27.12. tmnxIsisFailureDisabled
      2.27.13. tmnxIsisIDLenMismatch
      2.27.14. tmnxIsisLdpSyncExit
      2.27.15. tmnxIsisLdpSyncTimerStarted
      2.27.16. tmnxIsisLSPPurge
      2.27.17. tmnxIsisLSPTooLargeToPropagate
      2.27.18. tmnxIsisManualAddressDrops
      2.27.19. tmnxIsisMaxAreaAddrsMismatch
      2.27.20. tmnxIsisMaxSeqExceedAttempt
      2.27.21. tmnxIsisOrigLSPBufSizeMismatch
      2.27.22. tmnxIsisOwnLSPPurge
      2.27.23. tmnxIsisPfxLimitOverloadWarning
      2.27.24. tmnxIsisProtoSuppMismatch
      2.27.25. tmnxIsisRejectedAdjacency
      2.27.26. tmnxIsisRejectedAdjacencySid
      2.27.27. tmnxIsisRoutesExpLmtDropped
      2.27.28. tmnxIsisSequenceNumberSkip
      2.27.29. tmnxIsisSidError
      2.27.30. tmnxIsisSidNotInLabelRange
      2.27.31. tmnxIsisSpbEctFidCfgChg
      2.27.32. tmnxIsisSpbNbrMultAdjExists
      2.27.33. tmnxIsisSpbNbrMultAdjExistsClear
      2.27.34. tmnxIsisSrgbBadLabelRange
      2.27.35. tmnxIsisVersionSkew
      2.27.36. vRtrIsisSpbNbrMultAdjExists
      2.27.37. vRtrIsisSpbNbrMultAdjExistsClear
      2.27.38. vRtrSpbEctFidCfgChg
    2.28. L2TP
      2.28.1. tmnxL2tpApFailure
      2.28.2. tmnxL2tpIsaMdaVRtrStateChange
      2.28.3. tmnxL2tpLnsPppNcpFailure
      2.28.4. tmnxL2tpLnsSePppSessionFailure
      2.28.5. tmnxL2tpPeerUnreachable
      2.28.6. tmnxL2tpTunnelBlacklisted
      2.28.7. tmnxL2tpTunnelSelBlacklistFull
    2.29. LAG
      2.29.1. DynamicCostOff
      2.29.2. DynamicCostOn
      2.29.3. LagPortAddFailed
      2.29.4. LagPortAddFailureCleared
      2.29.5. LagStateEvent
      2.29.6. LagSubGroupSelected
      2.29.7. tLagMemberStateEvent
      2.29.8. tmnxLagBfdMemStateChanged
    2.30. LDAP
      2.30.1. tmnxLdapOperStateChange
      2.30.2. tmnxLdapServerOperStateChange
    2.31. LDP
      2.31.1. vRtrLdpGroupIdMismatch
      2.31.2. vRtrLdpNgIfStateChange
      2.31.3. vRtrLdpNgInetIfStateChange
      2.31.4. vRtrLdpNgIpv4InstStateChange
      2.31.5. vRtrLdpNgIpv6InstStateChange
      2.31.6. vRtrLdpNgResourceExhaustion
      2.31.7. vRtrLdpNgSessionStateChange
      2.31.8. vRtrLdpNgSessMaxFecLimitReached
      2.31.9. vRtrLdpNgSessMaxFecThresChanged
      2.31.10. vRtrLdpNgTargPeerStateChange
      2.31.11. vRtrLdpStateChange
    2.32. LI
      2.32.1. cli_config_io
      2.32.2. cli_unauth_config_io
      2.32.3. cli_unauth_user_io
      2.32.4. cli_user_io
      2.32.5. cli_user_login
      2.32.6. cli_user_login_failed
      2.32.7. cli_user_login_max_attempts
      2.32.8. cli_user_logout
      2.32.9. destinationDisabled
      2.32.10. destinationEnabled
      2.32.11. ftp_user_login
      2.32.12. ftp_user_login_failed
      2.32.13. ftp_user_login_max_attempts
      2.32.14. ftp_user_logout
      2.32.15. host_snmp_attempts
      2.32.16. radiusFailed
      2.32.17. sbiBootLiConfig
      2.32.18. snmp_user_set
      2.32.19. sourceDisabled
      2.32.20. sourceEnabled
      2.32.21. sourceSapChange
      2.32.22. sourceSubscriberChange
      2.32.23. ssh_user_login
      2.32.24. ssh_user_login_failed
      2.32.25. ssh_user_login_max_attempts
      2.32.26. ssh_user_logout
      2.32.27. ssiSaveConfigFailed
      2.32.28. ssiSaveConfigSucceeded
      2.32.29. ssiSyncConfigFailed
      2.32.30. ssiSyncConfigOK
      2.32.31. tMirrorDestinationChangeReject
      2.32.32. tMirrorFilterAssignToItfWarn
      2.32.33. tMirrorFilterAssignToSapWarn
      2.32.34. tMirrorFilterAssignToSdpWarn
      2.32.35. tMirrorLiNat64SubOperStateCh
      2.32.36. tMirrorLiNatL2awSubOperStateCh
      2.32.37. tMirrorLiNatLsnSubOperStateCh
      2.32.38. tMirrorSourceFilterAssignReject
      2.32.39. tMirrorSourceFilterAssignWarn
      2.32.40. tMirrorSourceFilterOverruled
      2.32.41. tMirrorSourceIPFltrChangeReject
      2.32.42. tMirrorSourceIPv6FltrChangeRej
      2.32.43. tMirrorSourceLiFilterChanged
      2.32.44. tMirrorSourceLiSubProblem
      2.32.45. tMirrorSourceMacFltrChangeReject
      2.32.46. tmnxClear
      2.32.47. tmnxConfigCreate
      2.32.48. tmnxConfigDelete
      2.32.49. tmnxConfigModify
      2.32.50. tmnxStateChange
    2.33. LLDP
      2.33.1. lldpRemTablesChange
    2.34. LMP
      2.34.1. tmnxLmpVRtrControlChannelState
      2.34.2. tmnxLmpVRtrDbLinkPropMismatch
      2.34.3. tmnxLmpVRtrDbLinkPropMismatchClr
      2.34.4. tmnxLmpVRtrTeLinkPropMismatch
      2.34.5. tmnxLmpVRtrTeLinkPropMismatchClr
      2.34.6. tmnxLmpVRtrTeLinkState
    2.35. LOGGER
      2.35.1. STARTED
      2.35.2. tmnxClear
      2.35.3. tmnxLogAccountingDataLoss
      2.35.4. tmnxLogAdminLocFailed
      2.35.5. tmnxLogBackupLocFailed
      2.35.6. tmnxLogEventOverrun
      2.35.7. tmnxLogEventThrottled
      2.35.8. tmnxLogFileDeleted
      2.35.9. tmnxLogFileRollover
      2.35.10. tmnxLogOnlyEventOverrun
      2.35.11. tmnxLogOnlyEventThrottled
      2.35.12. tmnxLogSpaceContention
      2.35.13. tmnxLogTraceError
      2.35.14. tmnxStdEventsReplayed
      2.35.15. tmnxSysLogTargetProblem
      2.35.16. tmnxTestEvent
    2.36. MC_REDUNDANCY
      2.36.1. srrpPacketDiscarded
      2.36.2. tMcPeerIPsecTnlGrpMasterStateChg
      2.36.3. tMcPeerIPsecTnlGrpProtStatusChg
      2.36.4. tmnxMCEPSessionPsvModeDisabled
      2.36.5. tmnxMCEPSessionPsvModeEnabled
      2.36.6. tmnxMcLagInfoLagChanged
      2.36.7. tmnxMcOmcrClientNumEntriesHigh
      2.36.8. tmnxMcOmcrStatFailedChanged
      2.36.9. tmnxMcPeerEPBfdSessionClose
      2.36.10. tmnxMcPeerEPBfdSessionDown
      2.36.11. tmnxMcPeerEPBfdSessionOpen
      2.36.12. tmnxMcPeerEPBfdSessionUp
      2.36.13. tmnxMcPeerEPOperDown
      2.36.14. tmnxMcPeerEPOperUp
      2.36.15. tmnxMcPeerRingsOperStateChanged
      2.36.16. tmnxMcPeerSyncStatusChanged
      2.36.17. tmnxMcRedundancyMismatchDetected
      2.36.18. tmnxMcRedundancyMismatchResolved
      2.36.19. tmnxMcRedundancyPeerStateChanged
      2.36.20. tmnxMcRingInbCtrlOperStateChgd
      2.36.21. tmnxMcRingNodeLocOperStateChgd
      2.36.22. tmnxMcRingOperStateChanged
      2.36.23. tmnxMcSyncClientAlarmCleared
      2.36.24. tmnxMcSyncClientAlarmRaised
      2.36.25. tmnxMcSyncClockSkewCleared
      2.36.26. tmnxMcSyncClockSkewRaised
      2.36.27. tmnxSrrpBecameBackup
      2.36.28. tmnxSrrpBfdIntfSessStateChgd
      2.36.29. tmnxSrrpDualMaster
      2.36.30. tmnxSrrpDuplicateSubIfAddress
      2.36.31. tmnxSrrpInstanceIdMismatch
      2.36.32. tmnxSrrpOperDownInvalidMac
      2.36.33. tmnxSrrpOperDownInvalidMacClear
      2.36.34. tmnxSrrpRedIfMismatch
      2.36.35. tmnxSrrpSapMismatch
      2.36.36. tmnxSrrpSapTagMismatch
      2.36.37. tmnxSrrpSubnetMismatch
      2.36.38. tmnxSrrpSubnetMismatchCleared
      2.36.39. tmnxSrrpSystemIpNotSet
      2.36.40. tmnxSrrpTrapNewMaster
    2.37. MCPATH
      2.37.1. tmnxMcPathAvailBwLimitReached
      2.37.2. tmnxMcPathAvailBwValWithinRange
      2.37.3. tmnxMcPathSrcGrpBlkHole
      2.37.4. tmnxMcPathSrcGrpBlkHoleClear
    2.38. MIRROR
      2.38.1. destinationDisabled
      2.38.2. destinationEnabled
      2.38.3. sourceDisabled
      2.38.4. sourceEnabled
      2.38.5. sourceIpFilterChange
      2.38.6. sourceMacFilterChange
      2.38.7. sourceSapChange
      2.38.8. sourceSubscriberChange
      2.38.9. tMirrorSourceIpv6FilterChange
    2.39. MLD
      2.39.1. vRtrMldGrpIfSapCModeRxQueryMism
      2.39.2. vRtrMldGrpIfSapMaxGrpsLimExceed
      2.39.3. vRtrMldGrpIfSapMaxGrpSrcLimExcd
      2.39.4. vRtrMldGrpIfSapMaxSrcsLimExceed
      2.39.5. vRtrMldGrpIfSapMcacPlcyDropped
      2.39.6. vRtrMldGrpIfSapRxQueryVerMism
      2.39.7. vRtrMldHostCModeRxQueryMismatch
      2.39.8. vRtrMldHostInstantiationFail
      2.39.9. vRtrMldHostMaxGrpsLimitExceeded
      2.39.10. vRtrMldHostMaxGrpSrcsLimitExcd
      2.39.11. vRtrMldHostMaxSrcsLimitExceeded
      2.39.12. vRtrMldHostMcacPlcyDropped
      2.39.13. vRtrMldHostQryIntervalConflict
      2.39.14. vRtrMldHostRxQueryVerMismatch
      2.39.15. vRtrMldIfCModeRxQueryMismatch
      2.39.16. vRtrMldIfRxQueryVerMismatch
      2.39.17. vRtrMldMaxGrpsLimitExceeded
      2.39.18. vRtrMldMaxGrpSrcsLimitExceeded
      2.39.19. vRtrMldMaxSrcsLimitExceeded
      2.39.20. vRtrMldMcacPlcyDropped
    2.40. MLD_SNOOPING
      2.40.1. sapMldSnpgGrpLimitExceeded
      2.40.2. sapMldSnpgMcsFailure
      2.40.3. sdpBndMldSnpgGrpLimitExceeded
    2.41. MPLS
      2.41.1. mplsTunnelDown
      2.41.2. mplsTunnelReoptimized
      2.41.3. mplsTunnelRerouted
      2.41.4. mplsTunnelUp
      2.41.5. mplsXCDown
      2.41.6. mplsXCUp
      2.41.7. vRtrMplsIfStateChange
      2.41.8. vRtrMplsLspActivePathChanged
      2.41.9. vRtrMplsLspDown
      2.41.10. vRtrMplsLspPathDown
      2.41.11. vRtrMplsLspPathLstFillReoptElig
      2.41.12. vRtrMplsLspPathMbbStatusEvent
      2.41.13. vRtrMplsLspPathRerouted
      2.41.14. vRtrMplsLspPathResignaled
      2.41.15. vRtrMplsLspPathSoftPreempted
      2.41.16. vRtrMplsLspPathUp
      2.41.17. vRtrMplsLspSwitchStbyFailure
      2.41.18. vRtrMplsLspUp
      2.41.19. vRtrMplsNodeInIgpOverload
      2.41.20. vRtrMplsP2mpInstanceDown
      2.41.21. vRtrMplsP2mpInstanceResignaled
      2.41.22. vRtrMplsP2mpInstanceUp
      2.41.23. vRtrMplsResignalTimerExpired
      2.41.24. vRtrMplsS2lSubLspDown
      2.41.25. vRtrMplsS2lSubLspRerouted
      2.41.26. vRtrMplsS2lSubLspResignaled
      2.41.27. vRtrMplsS2lSubLspUp
      2.41.28. vRtrMplsStateChange
      2.41.29. vRtrMplsXCBundleChange
    2.42. MPLS_TP
      2.42.1. vRtrMplsTpLspActivePathChange
      2.42.2. vRtrMplsTpLspActivePathUp
      2.42.3. vRtrMplsTpLspPtTypeMismatchAlarm
      2.42.4. vRtrMplsTpLspPtTypeMismatchClear
      2.42.5. vRtrMplsTpLspRevertMismatchAlarm
      2.42.6. vRtrMplsTpLspRevertMismatchClear
    2.43. MSDP
      2.43.1. msdpBackwardTransition
      2.43.2. msdpEstablished
      2.43.3. tmnxMsdpNgActSrcLimExcd
      2.43.4. tmnxMsdpNgGroupSrcActMsgsExcd
      2.43.5. tmnxMsdpNgPeerActSrcLimExcd
      2.43.6. tmnxMsdpNgRPFFailure
      2.43.7. tmnxMsdpNgSourceSrcActMsgsExcd
    2.44. NAT
      2.44.1. tmnxNatDetMapOperStateChanged
      2.44.2. tmnxNatDetPlcyChanged
      2.44.3. tmnxNatDetPlcyOperStateChanged
      2.44.4. tmnxNatFwd2EntryAdded
      2.44.5. tmnxNatFwd2OperStateChanged
      2.44.6. tmnxNatInAddrPrefixBlksFree
      2.44.7. tmnxNatIsaGrpIsDegraded
      2.44.8. tmnxNatIsaGrpOperStateChanged
      2.44.9. tmnxNatIsaMemberSessionUsageHigh
      2.44.10. tmnxNatL2AwSubIcmpPortUsageHigh
      2.44.11. tmnxNatL2AwSubSessionUsageHigh
      2.44.12. tmnxNatL2AwSubTcpPortUsageHigh
      2.44.13. tmnxNatL2AwSubUdpPortUsageHigh
      2.44.14. tmnxNatLsnSubBlksFree
      2.44.15. tmnxNatLsnSubIcmpPortUsgHigh
      2.44.16. tmnxNatLsnSubSessionUsgHigh
      2.44.17. tmnxNatLsnSubTcpPortUsgHigh
      2.44.18. tmnxNatLsnSubUdpPortUsgHigh
      2.44.19. tmnxNatMapRuleChange
      2.44.20. tmnxNatMdaActive
      2.44.21. tmnxNatMdaDetectsLoadSharingErr
      2.44.22. tmnxNatPcpSrvStateChanged
      2.44.23. tmnxNatPlAddrFree
      2.44.24. tmnxNatPlBlockAllocationL2Aw
      2.44.25. tmnxNatPlBlockAllocationLsn
      2.44.26. tmnxNatPlL2AwBlockUsageHigh
      2.44.27. tmnxNatPlLsnMemberBlockUsageHigh
      2.44.28. tmnxNatPlLsnRedActiveChanged
      2.44.29. tmnxNatResourceProblemCause
      2.44.30. tmnxNatResourceProblemDetected
      2.44.31. tmnxNatVrtrOutDnatOnlyRoutesHigh
    2.45. NTP
      2.45.1. tmnxNtpAuthMismatch
      2.45.2. tmnxNtpNoServersAvail
      2.45.3. tmnxNtpOperChange
      2.45.4. tmnxNtpServerChange
      2.45.5. tmnxNtpServersAvail
    2.46. OAM
      2.46.1. svcIdInvalid
      2.46.2. svcIdWrongType
      2.46.3. tmnxAncpLoopbackTestCompleted
      2.46.4. tmnxAncpLoopbackTestCompletedL
      2.46.5. tmnxOamLdpTtraceAutoDiscState
      2.46.6. tmnxOamLdpTtraceFecDisStatus
      2.46.7. tmnxOamLdpTtraceFecPFailUpdate
      2.46.8. tmnxOamLdpTtraceFecProbeState
      2.46.9. tmnxOamPingProbeFailedV3
      2.46.10. tmnxOamPingTestCompletedV3
      2.46.11. tmnxOamPingTestFailedV3
      2.46.12. tmnxOamPmThrClear
      2.46.13. tmnxOamPmThrRaise
      2.46.14. tmnxOamSaaThreshold
      2.46.15. tmnxOamTrPathChange
      2.46.16. tmnxOamTrTestCompleted
      2.46.17. tmnxOamTrTestFailed
      2.46.18. tmnxTwampSrvInactivityTimeout
      2.46.19. tmnxTwampSrvMaxConnsExceeded
      2.46.20. tmnxTwampSrvMaxSessExceeded
      2.46.21. tmnxTwampSrvPfxMaxConnsExceeded
      2.46.22. tmnxTwampSrvPfxMaxSessExceeded
    2.47. OPEN_FLOW
      2.47.1. tmnxOFFlowEntryInsertFailed
    2.48. OSPF
      2.48.1. tmnxOspfAdjBfdSessionSetupFail
      2.48.2. tmnxOspfAreaMaxAgeLsa
      2.48.3. tmnxOspfAreaOriginateLsa
      2.48.4. tmnxOspfAsMaxAgeLsa
      2.48.5. tmnxOspfAsOriginateLsa
      2.48.6. tmnxOspfExportLimitReached
      2.48.7. tmnxOspfExportLimitWarning
      2.48.8. tmnxOspfFailureDisabled
      2.48.9. tmnxOspfLsdbApproachingOverflow
      2.48.10. tmnxOspfLsdbOverflow
      2.48.11. tmnxOspfNgIfAuthFailure
      2.48.12. tmnxOspfNgIfConfigError
      2.48.13. tmnxOspfNgIfRxBadPacket
      2.48.14. tmnxOspfNgIfStateChange
      2.48.15. tmnxOspfNgIfTxRetransmit
      2.48.16. tmnxOspfNgLdpSyncExit
      2.48.17. tmnxOspfNgLdpSyncTimerStarted
      2.48.18. tmnxOspfNgLinkMaxAgeLsa
      2.48.19. tmnxOspfNgLinkOriginateLsa
      2.48.20. tmnxOspfNgNbrRestartHlprStsChg
      2.48.21. tmnxOspfNgNbrStateChange
      2.48.22. tmnxOspfNssaTranslatorStatusChg
      2.48.23. tmnxOspfOverloadEntered
      2.48.24. tmnxOspfOverloadExited
      2.48.25. tmnxOspfOverloadWarning
      2.48.26. tmnxOspfRejectedAdjacencySid
      2.48.27. tmnxOspfRestartStatusChange
      2.48.28. tmnxOspfRoutesExpLmtDropped
      2.48.29. tmnxOspfShamIfAuthFailure
      2.48.30. tmnxOspfShamIfConfigError
      2.48.31. tmnxOspfShamIfRxBadPacket
      2.48.32. tmnxOspfShamIfStateChange
      2.48.33. tmnxOspfShamIfTxRetransmit
      2.48.34. tmnxOspfShamNbrRestartHlprStsChg
      2.48.35. tmnxOspfShamNbrStateChange
      2.48.36. tmnxOspfSpfRunsRestarted
      2.48.37. tmnxOspfSpfRunsStopped
      2.48.38. tmnxOspfSrgbBadLabelRange
      2.48.39. tmnxOspfSrSidError
      2.48.40. tmnxOspfSrSidNotInLabelRange
      2.48.41. tmnxOspfVirtIfAuthFailure
      2.48.42. tmnxOspfVirtIfConfigError
      2.48.43. tmnxOspfVirtIfRxBadPacket
      2.48.44. tmnxOspfVirtIfStateChange
      2.48.45. tmnxOspfVirtIfTxRetransmit
      2.48.46. tmnxOspfVirtNbrRestartHlprStsChg
      2.48.47. tmnxOspfVirtNbrStateChange
    2.49. PIM
      2.49.1. vRtrPimNgBSRStateChange
      2.49.2. vRtrPimNgDataMtReused
      2.49.3. vRtrPimNgGrpInSSMRange
      2.49.4. vRtrPimNgHelloDropped
      2.49.5. vRtrPimNgIfNeighborLoss
      2.49.6. vRtrPimNgIfNeighborUp
      2.49.7. vRtrPimNgInvalidIPmsiTunnel
      2.49.8. vRtrPimNgInvalidJoinPrune
      2.49.9. vRtrPimNgInvalidRegister
      2.49.10. vRtrPimNgMaxGraftRetry
      2.49.11. vRtrPimNgMaxGrpsLimitExceeded
      2.49.12. vRtrPimNgMcacPlcyDropped
      2.49.13. vRtrPimNgMDTLimitExceeded
      2.49.14. vRtrPimNgReplicationLmtExceeded
      2.49.15. vRtrPimNgSGLimitExceeded
    2.50. PIM_SNOOPING
      2.50.1. tmnxPimSnpgIfNeighborLoss
      2.50.2. tmnxPimSnpgIfNeighborUp
      2.50.3. tmnxPimSnpgSGLimitExceeded
      2.50.4. tmnxPimSnpgSnoopModeChanged
    2.51. PORT
      2.51.1. SFPStatusBlocked
      2.51.2. SFPStatusCulprit
      2.51.3. SFPStatusDDMCorrupt
      2.51.4. SFPStatusFailure
      2.51.5. SFPStatusOperational
      2.51.6. SFPStatusReadError
      2.51.7. SFPStatusUnsupported
      2.51.8. tdcmAlarms
      2.51.9. tmnxBundleMemberMlfrLoopback
      2.51.10. tmnxDS1E1LoopbackStarted
      2.51.11. tmnxDS1E1LoopbackStopped
      2.51.12. tmnxDS3E3LoopbackStarted
      2.51.13. tmnxDS3E3LoopbackStopped
      2.51.14. tmnxDSXClockSyncStateChange
      2.51.15. tmnxEqCohOptPortAlarm
      2.51.16. tmnxEqDigitalDiagMonitorClear
      2.51.17. tmnxEqDigitalDiagMonitorFailure
      2.51.18. tmnxEqPortBndlBadEndPtDiscr
      2.51.19. tmnxEqPortBndlRedDiffExceeded
      2.51.20. tmnxEqPortBndlYellowDiffExceeded
      2.51.21. tmnxEqPortDS1Alarm
      2.51.22. tmnxEqPortDS1AlarmClear
      2.51.23. tmnxEqPortDS3Alarm
      2.51.24. tmnxEqPortDS3AlarmClear
      2.51.25. tmnxEqPortDuplexCfgNotCompatible
      2.51.26. tmnxEqPortError
      2.51.27. tmnxEqPortEtherAlarm
      2.51.28. tmnxEqPortEtherAlarmClear
      2.51.29. tmnxEqPortEtherCrcAlarm
      2.51.30. tmnxEqPortEtherCrcAlarmClear
      2.51.31. tmnxEqPortEtherInternalAlarm
      2.51.32. tmnxEqPortEtherInternalAlarmClr
      2.51.33. tmnxEqPortEtherLoopCleared
      2.51.34. tmnxEqPortEtherLoopDetected
      2.51.35. tmnxEqPortEtherSymMonAlarm
      2.51.36. tmnxEqPortEtherSymMonAlarmClear
      2.51.37. tmnxEqPortIngressRateCfgNotCompatible
      2.51.38. tmnxEqPortOpticalAmpAlarm
      2.51.39. tmnxEqPortSFPInserted
      2.51.40. tmnxEqPortSFPRemoved
      2.51.41. tmnxEqPortSonetAlarm
      2.51.42. tmnxEqPortSonetAlarmClear
      2.51.43. tmnxEqPortSonetPathAlarm
      2.51.44. tmnxEqPortSonetPathAlarmClear
      2.51.45. tmnxEqPortSpeedCfgNotCompatible
      2.51.46. tmnxEqPortWaveTrackerAlarm
      2.51.47. tmnxEqSonetClockSrcNotCompatible
      2.51.48. tmnxEqSonetFramingNotCompatible
      2.51.49. tmnxEqSonetSfThreshNotCompatible
      2.51.50. tmnxOesPortError
      2.51.51. tmnxOesPortErrorClear
      2.51.52. tmnxOtuIfAlarmNotification
      2.51.53. tmnxPortUnsupportedFunction
      2.51.54. tmnxResvCbsPoolThreshAmber
      2.51.55. tmnxResvCbsPoolThreshGreen
      2.51.56. tmnxResvCbsPoolThreshRed
      2.51.57. tmnxSonetSDHLoopbackStarted
      2.51.58. tmnxSonetSDHLoopbackStopped
      2.51.59. tPortAccEgrQGrpHostMatchFailure
      2.51.60. tPortEgrVPortHostMatchFailure
    2.52. PPP
      2.52.1. ipcpPeerOnDifferentSubnet
      2.52.2. ipcpPeerRejectedOurIp
      2.52.3. ipcpPeerSuggestedDifferentIp
      2.52.4. ipcpRemoteIpUnknown
      2.52.5. ipcpSameLocalAndRemoteIp
      2.52.6. ipv6cpPeerOnDifferentSubnet
      2.52.7. ipv6cpPeerRejectedOurIntId
      2.52.8. ipv6cpPeerSuggestedDiffIntId
      2.52.9. ipv6cpRemoteIntIdUnknown
      2.52.10. ipv6cpSameLocalAndRemoteIntId
      2.52.11. tmnxPppCpDown
      2.52.12. tmnxPppCpUp
      2.52.13. tmnxPppKeepaliveFailure
      2.52.14. tmnxPppLoopback
      2.52.15. tmnxPppLoopbackClear
      2.52.16. tmnxPppLqmFailure
      2.52.17. tmnxPppNcpDown
      2.52.18. tmnxPppNcpUp
    2.53. PPPOE
      2.53.1. tmnxMlpppBundleIndicatorsChange
      2.53.2. tmnxPppoeNcpFailure
      2.53.3. tmnxPppoeSessionFailure
    2.54. PTP
      2.54.1. tmnxPtpCardNotSupported
      2.54.2. tmnxPtpCardNotSupportedClear
      2.54.3. tmnxPtpClockRecoveryStateChange
      2.54.4. tmnxPtpDynamicChange
      2.54.5. tmnxPtpMasterClockChangedEvent
      2.54.6. tmnxPtpOutOfResources
      2.54.7. tmnxPtpOutOfResourcesClear
      2.54.8. tmnxPtpPortNoTimestamping
    2.55. RADIUS
      2.55.1. tmnxRadAcctOnOngoing
      2.55.2. tmnxRadRouteDownloadFailed
      2.55.3. tmnxRadSrvPlcySrvOperStateCh
    2.56. RIP
      2.56.1. ripPacketDiscarded
      2.56.2. vRtrRipAuthTypeFailure
      2.56.3. vRtrRipAuthTypeMismatch
      2.56.4. vRtrRipInstanceExpLmtReached
      2.56.5. vRtrRipInstanceExpLmtWarning
      2.56.6. vRtrRipInstanceRestarted
      2.56.7. vRtrRipInstanceRtsExpLmtDropped
      2.56.8. vRtrRipInstanceShuttingDown
    2.57. RIP_NG
      2.57.1. tmnxRipNgAuthFailure
      2.57.2. tmnxRipNgAuthTypeMismatch
      2.57.3. tmnxRipNgIfUcastAddrNotUsed
      2.57.4. tmnxRipNgInstExpLmtReached
      2.57.5. tmnxRipNgInstExpLmtWarning
      2.57.6. tmnxRipNgInstRestarted
      2.57.7. tmnxRipNgInstRtsExpLmtDropped
      2.57.8. tmnxRipNgInstShuttingDown
      2.57.9. tmnxRipNgPacketDiscarded
    2.58. ROUTE_POLICY
      2.58.1. trigPolicyPrevEval
    2.59. RPKI
      2.59.1. tmnxRpkiNotifySession
      2.59.2. tmnxRpkiStaleTimerExpiry
    2.60. RSVP
      2.60.1. vRtrRsvpIfNbrStateDown
      2.60.2. vRtrRsvpIfNbrStateUp
      2.60.3. vRtrRsvpIfStateChange
      2.60.4. vRtrRsvpPEFailOverPriToStdBy
      2.60.5. vRtrRsvpPEFailOverStdByToPri
      2.60.6. vRtrRsvpStateChange
    2.61. SATELLITE
      2.61.1. tmnxSatelliteOperStateChange
      2.61.2. tmnxSatSyncIfTimHoldover
      2.61.3. tmnxSatSyncIfTimHoldoverClear
      2.61.4. tmnxSatSyncIfTimRef1Alarm
      2.61.5. tmnxSatSyncIfTimRef1AlarmClear
      2.61.6. tmnxSatSyncIfTimRef1Quality
      2.61.7. tmnxSatSyncIfTimRef2Alarm
      2.61.8. tmnxSatSyncIfTimRef2AlarmClear
      2.61.9. tmnxSatSyncIfTimRef2Quality
      2.61.10. tmnxSatSyncIfTimRefSwitch
      2.61.11. tmnxSatSyncIfTimSystemQuality
    2.62. SECURITY
      2.62.1. cli_user_login
      2.62.2. cli_user_login_failed
      2.62.3. cli_user_login_max_attempts
      2.62.4. cli_user_logout
      2.62.5. enable_admin
      2.62.6. ftp_transfer_failed
      2.62.7. ftp_transfer_successful
      2.62.8. ftp_user_login
      2.62.9. ftp_user_login_failed
      2.62.10. ftp_user_login_max_attempts
      2.62.11. ftp_user_logout
      2.62.12. host_snmp_attempts
      2.62.13. mafEntryMatch
      2.62.14. radiusInetServerOperStatusChange
      2.62.15. radiusOperStatusChange
      2.62.16. radiusSystemIpAddrNotSet
      2.62.17. sapDcpDynamicConform
      2.62.18. sapDcpDynamicEnforceAlloc
      2.62.19. sapDcpDynamicEnforceFreed
      2.62.20. sapDcpDynamicExcd
      2.62.21. sapDcpDynamicHoldDownEnd
      2.62.22. sapDcpDynamicHoldDownStart
      2.62.23. sapDcpLocMonExcd
      2.62.24. sapDcpLocMonExcdAllDynAlloc
      2.62.25. sapDcpLocMonExcdAllDynFreed
      2.62.26. sapDcpLocMonExcdDynResource
      2.62.27. sapDcpStaticConform
      2.62.28. sapDcpStaticExcd
      2.62.29. sapDcpStaticHoldDownEnd
      2.62.30. sapDcpStaticHoldDownStart
      2.62.31. SSH_server_preserve_key_fail
      2.62.32. ssh_user_login
      2.62.33. ssh_user_login_failed
      2.62.34. ssh_user_login_max_attempts
      2.62.35. ssh_user_logout
      2.62.36. sysDNSSecFailedAuthentication
      2.62.37. tacplusInetSrvrOperStatusChange
      2.62.38. tacplusOperStatusChange
      2.62.39. tmnxAppPkiCertVerificationFailed
      2.62.40. tmnxCAProfileStateChange
      2.62.41. tmnxCAProfUpDueToRevokeChkCrlOpt
      2.62.42. tmnxCliGroupSessionLimitExceeded
      2.62.43. tmnxConfigCreate
      2.62.44. tmnxConfigDelete
      2.62.45. tmnxConfigModify
      2.62.46. tmnxCpmProtDefPolModified
      2.62.47. tmnxCpmProtExcdSapEcm
      2.62.48. tmnxCpmProtExcdSapIp
      2.62.49. tmnxCpmProtExcdSdpBind
      2.62.50. tmnxCpmProtExcdSdpBindEcm
      2.62.51. tmnxCpmProtExcdSdpBindIp
      2.62.52. tmnxCpmProtViolIf
      2.62.53. tmnxCpmProtViolIfOutProf
      2.62.54. tmnxCpmProtViolMac
      2.62.55. tmnxCpmProtViolPort
      2.62.56. tmnxCpmProtViolPortAgg
      2.62.57. tmnxCpmProtViolSap
      2.62.58. tmnxCpmProtViolSapOutProf
      2.62.59. tmnxCpmProtViolSdpBind
      2.62.60. tmnxCpmProtViolSdpBindOutProf
      2.62.61. tmnxCpmProtViolVdoSvcClient
      2.62.62. tmnxCpmProtViolVdoVrtrClient
      2.62.63. tmnxDcpCardFpEventOvrflw
      2.62.64. tmnxDcpCardFpEventOvrflwClr
      2.62.65. tmnxDcpCardSapEventOvrflw
      2.62.66. tmnxDcpCardSapEventOvrflwClr
      2.62.67. tmnxDcpCardVrtrIfEventOvrflw
      2.62.68. tmnxDcpCardVrtrIfEventOvrflwClr
      2.62.69. tmnxDcpFpDynPoolUsageHiAlmClear
      2.62.70. tmnxDcpFpDynPoolUsageHiAlmRaise
      2.62.71. tmnxKeyChainAuthFailure
      2.62.72. tmnxMD5AuthFailure
      2.62.73. tmnxPkiCAProfActnStatusChg
      2.62.74. tmnxPkiCAProfCrlUpdAllUrlsFail
      2.62.75. tmnxPkiCAProfCrlUpdateStart
      2.62.76. tmnxPkiCAProfCrlUpdateSuccess
      2.62.77. tmnxPkiCAProfCrlUpdateUrlFail
      2.62.78. tmnxPkiCAProfCrlUpdLargPreUpdTm
      2.62.79. tmnxPkiCAProfCrlUpdNoNxtUpdTime
      2.62.80. tmnxPkiCAProfRevokeChkWarning
      2.62.81. tmnxPkiCertAfterExpWarning
      2.62.82. tmnxPkiCertBeforeExpWarning
      2.62.83. tmnxPkiCertExpWarningCleared
      2.62.84. tmnxPkiCertNotYetValid
      2.62.85. tmnxPkiCertVerificationFailed
      2.62.86. tmnxPkiCRLAfterExpWarning
      2.62.87. tmnxPkiCRLBeforeExpWarning
      2.62.88. tmnxPkiCRLExpWarningCleared
      2.62.89. tmnxPkiCRLNotYetValid
      2.62.90. tmnxPkiFileReadFailed
      2.62.91. tmnxPkiFileWriteFailed
      2.62.92. tmnxSecComputeCertChainFailure
      2.62.93. tmnxSecNotifFileReloaded
      2.62.94. tmnxSecNotifKeyChainExpired
      2.62.95. tmnxSecPwdHistoryFileLoadFailed
      2.62.96. tmnxSecPwdHistoryFileWriteFailed
      2.62.97. tmnxStateChange
      2.62.98. tmnxSysLicenseExpiresSoon
      2.62.99. tmnxSysLicenseInvalid
      2.62.100. tmnxSysLicenseValid
      2.62.101. tmnxUsrProfSessionLimitExceeded
      2.62.102. user_disconnect
      2.62.103. vRtrIfDcpDynamicConform
      2.62.104. vRtrIfDcpDynamicEnforceAlloc
      2.62.105. vRtrIfDcpDynamicEnforceFreed
      2.62.106. vRtrIfDcpDynamicExcd
      2.62.107. vRtrIfDcpDynamicHoldDownEnd
      2.62.108. vRtrIfDcpDynamicHoldDownStart
      2.62.109. vRtrIfDcpLocMonExcd
      2.62.110. vRtrIfDcpLocMonExcdAllDynAlloc
      2.62.111. vRtrIfDcpLocMonExcdAllDynFreed
      2.62.112. vRtrIfDcpLocMonExcdDynResource
      2.62.113. vRtrIfDcpStaticConform
      2.62.114. vRtrIfDcpStaticExcd
      2.62.115. vRtrIfDcpStaticHoldDownEnd
      2.62.116. vRtrIfDcpStaticHoldDownStart
    2.63. SFLOW
      2.63.1. tmnxSflowCpEntrySampling
      2.63.2. tmnxSflowPacketTxFailure
    2.64. SNMP
      2.64.1. authenticationFailure
      2.64.2. coldStart
      2.64.3. fallingAlarm
      2.64.4. linkDown
      2.64.5. linkUp
      2.64.6. risingAlarm
      2.64.7. snmpdError
      2.64.8. warmStart
    2.65. STP
      2.65.1. higherPriorityBridge
      2.65.2. newRootBridge
      2.65.3. newRootSap
      2.65.4. newRootVcpState
      2.65.5. pipActiveProtocolChange
      2.65.6. receivedTCN
      2.65.7. sapActiveProtocolChange
      2.65.8. sapEncapDot1d
      2.65.9. sapEncapPVST
      2.65.10. tmnxNewCistRegionalRootBridge
      2.65.11. tmnxNewMstiRegionalRootBridge
      2.65.12. tmnxPipStpExcepCondStateChng
      2.65.13. tmnxSapStpExcepCondStateChng
      2.65.14. tmnxSdpBndStpExcepCondStateChng
      2.65.15. tmnxStpMeshNotInMstRegion
      2.65.16. tmnxStpRootGuardViolation
      2.65.17. tmnxSvcNewRootSdpBind
      2.65.18. tmnxSvcSdpActiveProtocolChange
      2.65.19. tmnxSvcSdpBindEncapDot1d
      2.65.20. tmnxSvcSdpBindEncapPVST
      2.65.21. tmnxSvcSdpBindRcvdHigherBriPrio
      2.65.22. tmnxSvcSdpBindRcvdTCN
      2.65.23. tmnxSvcTopoChgSdpBindMajorState
      2.65.24. tmnxSvcTopoChgSdpBindState
      2.65.25. topologyChangePipMajorState
      2.65.26. topologyChangePipState
      2.65.27. topologyChangeSapMajorState
      2.65.28. topologyChangeSapState
      2.65.29. topologyChangeVcpState
      2.65.30. unacknowledgedTCN
      2.65.31. vcpActiveProtocolChange
    2.66. SVCMGR
      2.66.1. dynamicSdpBindConfigChanged
      2.66.2. dynamicSdpBindCreationFailed
      2.66.3. dynamicSdpConfigChanged
      2.66.4. dynamicSdpCreationFailed
      2.66.5. hostConnectivityLost
      2.66.6. hostConnectivityRestored
      2.66.7. iesIfStatusChanged
      2.66.8. msapCreationFailure
      2.66.9. msapStateChanged
      2.66.10. sapAtmPppNcpFailure
      2.66.11. sapAtmPppSessionFailure
      2.66.12. sapCemPacketDefectAlarm
      2.66.13. sapCemPacketDefectAlarmClear
      2.66.14. sapEthLoopbackStarted
      2.66.15. sapEthLoopbackStopped
      2.66.16. sapHostBGPPeeringSetupFailed
      2.66.17. sapHostRipListenerSetupFailed
      2.66.18. sapIfIgnorePortStateStart
      2.66.19. sapIfIgnorePortStateStop
      2.66.20. sapIpipeCeIpAddrChange
      2.66.21. sapPortStateChangeProcessed
      2.66.22. sapReceivedProtSrcMac
      2.66.23. sapStatusChanged
      2.66.24. sapTlsDataSapInstStatusChgd
      2.66.25. sapTlsMacAddrLimitAlarmCleared
      2.66.26. sapTlsMacAddrLimitAlarmRaised
      2.66.27. sapTlsMacMoveExceeded
      2.66.28. sapTlsMacMoveExceedNonBlock
      2.66.29. sapTunnelEncapIpMtuTooSmall
      2.66.30. sapTunnelStateChange
      2.66.31. sdpBandwidthOverbooked
      2.66.32. sdpBindEthLoopbackStarted
      2.66.33. sdpBindEthLoopbackStopped
      2.66.34. sdpBindInsufficientBandwidth
      2.66.35. sdpBindIpipeCeIpAddressChange
      2.66.36. sdpBindPwLocalStatusBitsChanged
      2.66.37. sdpBindPwPeerFaultAddrChanged
      2.66.38. sdpBindPwPeerStatusBitsChanged
      2.66.39. sdpBindReceivedProtSrcMac
      2.66.40. sdpBindSdpStateChangeProcessed
      2.66.41. sdpBindStatusChanged
      2.66.42. sdpBindTlsMacMoveExceeded
      2.66.43. sdpBindTlsMacMoveExceedNonBlock
      2.66.44. sdpControlPwActiveStateChg
      2.66.45. sdpEgrIfsNetDomInconsCntChanged
      2.66.46. sdpKeepAliveLateReply
      2.66.47. sdpKeepAliveProbeFailure
      2.66.48. sdpKeepAliveStarted
      2.66.49. sdpKeepAliveStopped
      2.66.50. sdpPbbActvPwWithNonActvCtrlPwChg
      2.66.51. sdpStatusChanged
      2.66.52. sdpTlsMacAddrLimitAlarmCleared
      2.66.53. sdpTlsMacAddrLimitAlarmRaised
      2.66.54. svcArpHostOverride
      2.66.55. svcArpHostPopulateErr
      2.66.56. svcBgpEvpnDupMacAddrsCleared
      2.66.57. svcBgpEvpnDupMacAddrsDetected
      2.66.58. svcBindSysHiUsageAlarmCleared
      2.66.59. svcBindSysHiUsageAlarmRaised
      2.66.60. svcEndPointMacLimitAlarmCleared
      2.66.61. svcEndPointMacLimitAlarmRaised
      2.66.62. svcEpipePbbOperStatusChanged
      2.66.63. svcEPMCEPConfigMismatch
      2.66.64. svcEPMCEPConfigMismatchResolved
      2.66.65. svcEPMCEPPassiveModeActive
      2.66.66. svcEPMCEPPassiveModePassive
      2.66.67. svcEvpnDestSysHiUsgClr
      2.66.68. svcEvpnDestSysHiUsgSet
      2.66.69. svcEvpnMHEsEviDFStateChgd
      2.66.70. svcEvpnMHEsIsidDFStateChgd
      2.66.71. svcEvpnMplsMacMoveExceedNonBlock
      2.66.72. svcEvpnMplsTEPEgrBndSvcHiUsgClr
      2.66.73. svcEvpnMplsTEPEgrBndSvcHiUsgSet
      2.66.74. svcEvpnMplsTEPEgrBndSysHiUsgClr
      2.66.75. svcEvpnMplsTEPEgrBndSysHiUsgSet
      2.66.76. svcEvpnMplsTEPHiUsageCleared
      2.66.77. svcEvpnMplsTEPHiUsageRaised
      2.66.78. svcEvpnRcvdProtSrcMac
      2.66.79. svcFdbMimDestTblFullAlrm
      2.66.80. svcFdbMimDestTblFullAlrmCleared
      2.66.81. svcMacFdbTblFullAlarm
      2.66.82. svcMacFdbTblFullAlarmCleared
      2.66.83. svcMSPwRetryExpiredNotif
      2.66.84. svcMSPwRtMisconfig
      2.66.85. svcOperGrpOperStatusChanged
      2.66.86. svcPersistencyProblem
      2.66.87. svcRestoreHostProblem
      2.66.88. svcSiteMinDnTimerStateChg
      2.66.89. svcStatusChanged
      2.66.90. svcTlsDupVTEPEgrVNICleared
      2.66.91. svcTlsDupVTEPEgrVNIDetected
      2.66.92. svcTlsEvpnTunnNHopHiUsgAlarmClr
      2.66.93. svcTlsEvpnTunnNHopHiUsgAlarmSet
      2.66.94. svcTlsFdbTableFullAlarmCleared
      2.66.95. svcTlsFdbTableFullAlarmRaised
      2.66.96. svcTlsGroupOperStatusChanged
      2.66.97. svcTlsMacPinningViolation
      2.66.98. svcTlsMfibTableFullAlarmCleared
      2.66.99. svcTlsMfibTableFullAlarmRaised
      2.66.100. svcTlsMrpAttrRegistrationFailed
      2.66.101. svcTlsMrpAttrTblFullAlarmCleared
      2.66.102. svcTlsMrpAttrTblFullAlarmRaised
      2.66.103. svcTlsProxyArpDupClear
      2.66.104. svcTlsProxyArpDupDetect
      2.66.105. svcTlsProxyArpSvcHiUsgClr
      2.66.106. svcTlsProxyArpSvcHiUsgSet
      2.66.107. svcTlsProxyArpSysHiUsgClr
      2.66.108. svcTlsProxyArpSysHiUsgSet
      2.66.109. svcTlsProxyNdDupClear
      2.66.110. svcTlsProxyNdDupDetect
      2.66.111. svcTlsProxyNdSvcHiUsgClr
      2.66.112. svcTlsProxyNdSvcHiUsgSet
      2.66.113. svcTlsProxyNdSysHiUsgClr
      2.66.114. svcTlsProxyNdSysHiUsgSet
      2.66.115. svcTlsSiteDesigFwdrChg
      2.66.116. svcTlsVTEPEgrVniSvcHiUsgAlarmClr
      2.66.117. svcTlsVTEPEgrVniSvcHiUsgAlarmSet
      2.66.118. svcTlsVTEPEgrVniSysHiUsgAlarmClr
      2.66.119. svcTlsVTEPEgrVniSysHiUsgAlarmSet
      2.66.120. svcTlsVTEPHiUsageAlarmCleared
      2.66.121. svcTlsVTEPHiUsageAlarmRaised
      2.66.122. svcTlsVxlanReplicatorChgd
      2.66.123. svcVllSiteDesigFwdrChg
      2.66.124. tmnxEndPointTxActiveChanged
      2.66.125. tmnxIpTunnelOperRemIpChg
      2.66.126. tmnxIpTunnelOperStateChange
      2.66.127. tmnxSapStpExcepCondStateChng
      2.66.128. tmnxStpRootGuardViolation
      2.66.129. tmnxSubAcctPlcyFailure
      2.66.130. tmnxSubAcctPlcyRadSerOperStatChg
      2.66.131. tmnxSubAuthPlcyRadSerOperStatChg
      2.66.132. tmnxSubBrgCreated
      2.66.133. tmnxSubBrgCvInitFailed
      2.66.134. tmnxSubBrgDeleted
      2.66.135. tmnxSubBrgRadiusAuthError
      2.66.136. tmnxSubBrgRadiusCoaError
      2.66.137. tmnxSubBrgRadiusUpdateIpoeSeFail
      2.66.138. tmnxSubBrgSessionLimitReached
      2.66.139. tmnxSubHostInconsistentAtmTdOvr
      2.66.140. tmnxSubHostInfoConflict
      2.66.141. tmnxSubHostLcktLimitReached
      2.66.142. tmnxSubHostLcktSapLimitReached
      2.66.143. tmnxSubIpoeInvalidCidRidChange
      2.66.144. tmnxSubIpoeInvalidSessionKey
      2.66.145. tmnxSubIpoeMigrHostDeleted
      2.66.146. tmnxSubIpoePersistenceRecovery
      2.66.147. tmnxSubIpoeSessionLimitReached
      2.66.148. tmnxSubMcsRelatedProblem
      2.66.149. tmnxSubMngdHostCreationFail
      2.66.150. tmnxSubMngdHostOverride
      2.66.151. tmnxSubPlBndFailed
      2.66.152. tmnxSubRadSapCoAError
      2.66.153. tmnxSubRadSapDisconnectError
      2.66.154. tmnxSubRadSapSubAuthError
      2.66.155. tmnxSubRadSdpBndCoAError
      2.66.156. tmnxSubRadSdpBndDisconnectError
      2.66.157. tmnxSubRadSdpBndSubAuthError
      2.66.158. tmnxSubscriberCreated
      2.66.159. tmnxSubscriberDeleted
      2.66.160. tmnxSubscriberRenamed
      2.66.161. tmnxSubSlaacOverride
      2.66.162. tmnxSubSlaacSetupFailure
      2.66.163. tmnxSubSysChassMemoryUsageHi
      2.66.164. tmnxSubUserCategoryError
      2.66.165. tmnxSubUserCategoryOutOfCredit
      2.66.166. tmnxSubUserCategoryRefreshCredit
      2.66.167. tmnxSubVSubnetHostsDeleted
    2.67. SYSTEM
      2.67.1. persistenceRestoreProblem
      2.67.2. persistencyClosedAlarmCleared
      2.67.3. persistencyClosedAlarmRaised
      2.67.4. persistencyEventReport
      2.67.5. persistencyFileSysThresCleared
      2.67.6. persistencyFileSysThresRaised
      2.67.7. sbiBootConfig
      2.67.8. sbiBootConfigFailFileError
      2.67.9. sbiBootConfigOKFileError
      2.67.10. sbiBootSnmpd
      2.67.11. schedActionFailure
      2.67.12. smScriptAbort
      2.67.13. smScriptException
      2.67.14. smScriptResult
      2.67.15. sntpTimeDiffExceedsThreshold
      2.67.16. socket_bind_failed
      2.67.17. socket_conn_accept_failed
      2.67.18. ssiSaveConfigFailed
      2.67.19. ssiSaveConfigSucceeded
      2.67.20. ssiSyncBootEnvFailed
      2.67.21. ssiSyncBootEnvOK
      2.67.22. ssiSyncCertFailed
      2.67.23. ssiSyncCertOK
      2.67.24. ssiSyncConfigFailed
      2.67.25. ssiSyncConfigOK
      2.67.26. ssiSyncRollbackFailed
      2.67.27. ssiSyncRollbackOK
      2.67.28. stiDateAndTimeChanged
      2.67.29. tmnxConfigConflict
      2.67.30. tmnxConfigCreate
      2.67.31. tmnxConfigDelete
      2.67.32. tmnxConfigModify
      2.67.33. tmnxEhsDroppedByMinDelay
      2.67.34. tmnxEhsHandlerInvoked
      2.67.35. tmnxFtpClientFailure
      2.67.36. tmnxModuleMallocFailed
      2.67.37. tmnxRedCpmActive
      2.67.38. tmnxRedSingleCpm
      2.67.39. tmnxRedStandbyReady
      2.67.40. tmnxRedStandbySyncing
      2.67.41. tmnxRedStandbySyncLost
      2.67.42. tmnxRedSwitchover
      2.67.43. tmnxSmLaunchStartFailed
      2.67.44. tmnxSnmpdStateChange
      2.67.45. tmnxSntpOperChange
      2.67.46. tmnxSssiMismatch
      2.67.47. tmnxStateChange
      2.67.48. tmnxSysBaseMacAddressNotSet
      2.67.49. tmnxSysExecFinished
      2.67.50. tmnxSysExecStarted
      2.67.51. tmnxSysNvsysFileError
      2.67.52. tmnxSysRollbackDeleteStarted
      2.67.53. tmnxSysRollbackFileDeleteStatus
      2.67.54. tmnxSysRollbackSaveStarted
      2.67.55. tmnxSysRollbackSaveStatusChange
      2.67.56. tmnxSysRollbackStarted
      2.67.57. tmnxSysRollbackStatusChange
      2.67.58. tmnxSysVsdServerAvailable
      2.67.59. tmnxSysVsdServerUnavailable
      2.67.60. tmnxSysXmppServerFunctional
      2.67.61. tmnxSysXmppServerNotFunctional
      2.67.62. tmnxTrapDropped
    2.68. USER
      2.68.1. cli_config_io
      2.68.2. cli_unauth_config_io
      2.68.3. cli_unauth_user_io
      2.68.4. cli_user_io
      2.68.5. cli_user_login
      2.68.6. cli_user_login_failed
      2.68.7. cli_user_login_max_attempts
      2.68.8. cli_user_logout
      2.68.9. ftp_user_login
      2.68.10. ftp_user_login_failed
      2.68.11. ftp_user_login_max_attempts
      2.68.12. ftp_user_logout
      2.68.13. snmp_user_set
    2.69. VIDEO
      2.69.1. tmnxVdoAdSpliceAbort
      2.69.2. tmnxVdoClientSessionsLmtCleared
      2.69.3. tmnxVdoClientSessionsLmtExceeded
      2.69.4. tmnxVdoDuplicateSsrcId
      2.69.5. tmnxVdoGrpSrcAnlyzrErrState
      2.69.6. tmnxVdoGrpSrcAnlyzrStClear
      2.69.7. tmnxVdoMdaSessionsLimitCleared
      2.69.8. tmnxVdoMdaSessionsLimitExceeded
      2.69.9. tmnxVdoMdaSGLimitCleared
      2.69.10. tmnxVdoMdaSGLimitExceeded
    2.70. VRRP
      2.70.1. tmnxVrrpBecameBackup
      2.70.2. tmnxVrrpBfdIntfSessStateChgd
      2.70.3. tmnxVrrpIPListMismatch
      2.70.4. tmnxVrrpIPListMismatchClear
      2.70.5. tmnxVrrpMultipleOwners
      2.70.6. tmnxVrrpOperDownInvalidMac
      2.70.7. tmnxVrrpOperDownInvalidMacClear
      2.70.8. tVrrpBecameBackup
      2.70.9. tVrrpIPListMismatch
      2.70.10. tVrrpIPListMismatchClear
      2.70.11. tVrrpMultipleOwners
      2.70.12. tVrrpOperDownInvalidMac
      2.70.13. tVrrpOperDownInvalidMacClear
      2.70.14. tVrrpPacketDiscarded
      2.70.15. tVrrpRouterAdvNotActivated
      2.70.16. tVrrpRouterAdvNotActivatedClear
      2.70.17. tVrrpTrapNewMaster
      2.70.18. vrrpPacketDiscarded
      2.70.19. vrrpTrapAuthFailure
      2.70.20. vrrpTrapNewMaster
      2.70.21. vrrpTrapProtoError
    2.71. VRTR
      2.71.1. tmnxVRtrArpLmt
      2.71.2. tmnxVRtrArpThresholdExceeded
      2.71.3. tmnxVRtrBfdExtNoCpmNpResources
      2.71.4. tmnxVRtrBfdMaxSessionOnSlot
      2.71.5. tmnxVRtrBfdPortTypeNotSupported
      2.71.6. tmnxVRtrBfdSessExtDeleted
      2.71.7. tmnxVRtrBfdSessExtDown
      2.71.8. tmnxVRtrBfdSessExtProtChange
      2.71.9. tmnxVRtrBfdSessExtUp
      2.71.10. tmnxVRtrDnsFault
      2.71.11. tmnxVRtrFibOccupancyThreshold
      2.71.12. tmnxVRtrGrtExportLimitReached
      2.71.13. tmnxVRtrGrtRoutesExpLimitDropped
      2.71.14. tmnxVRtrGrtV6ExportLimitReached
      2.71.15. tmnxVRtrGrtV6RoutesExpLimDropped
      2.71.16. tmnxVRtrHighRouteCleared
      2.71.17. tmnxVRtrHighRouteTCA
      2.71.18. tmnxVRtrIfIgnorePortState
      2.71.19. tmnxVRtrIfLdpSyncTimerStart
      2.71.20. tmnxVRtrIfLdpSyncTimerStop
      2.71.21. tmnxVRtrInetAddressAttachFailed
      2.71.22. tmnxVRtrIPv6HighRouteCleared
      2.71.23. tmnxVRtrIPv6HighRouteTCA
      2.71.24. tmnxVRtrIPv6MidRouteTCA
      2.71.25. tmnxVRtrIpv6NbrLmt
      2.71.26. tmnxVRtrIpv6NbrThresholdExceeded
      2.71.27. tmnxVRtrMacAcctLimitCleared
      2.71.28. tmnxVRtrMacAcctLimitReached
      2.71.29. tmnxVRtrManagedRouteAddFailed
      2.71.30. tmnxVRtrMaxArpEntriesCleared
      2.71.31. tmnxVRtrMaxArpEntriesTCA
      2.71.32. tmnxVRtrMaxRoutes
      2.71.33. tmnxVRtrMcastMaxRoutesCleared
      2.71.34. tmnxVRtrMcastMaxRoutesTCA
      2.71.35. tmnxVRtrMcastMidRouteTCA
      2.71.36. tmnxVRtrMidRouteTCA
      2.71.37. tmnxVRtrNgBfdNoCpmNpResources
      2.71.38. tmnxVRtrNgBfdSessDeleted
      2.71.39. tmnxVRtrNgBfdSessDown
      2.71.40. tmnxVRtrNgBfdSessProtChange
      2.71.41. tmnxVRtrNgBfdSessUp
      2.71.42. tmnxVRtrNHRvplsARPExhaust
      2.71.43. tmnxVRtrNHRvplsARPHighUsage
      2.71.44. tmnxVRtrNHRvplsARPHighUsageClr
      2.71.45. tmnxVRtrSingleSfmOverloadStateCh
      2.71.46. tmnxVRtrStaticRouteCPEStatus
      2.71.47. tmnxVRtrStaticRouteStatusChanged
    2.72. WLAN_GW
      2.72.1. tmnxWlanGwDsmGtpTunnelSetupFail
      2.72.2. tmnxWlanGwGrpOperStateChanged
      2.72.3. tmnxWlanGwGtpMessageDropped
      2.72.4. tmnxWlanGwIomActive
      2.72.5. tmnxWlanGwMgwConnected
      2.72.6. tmnxWlanGwMgwRestarted
      2.72.7. tmnxWlanGwMgwStateChanged
      2.72.8. tmnxWlanGwNumMgwHi
      2.72.9. tmnxWlanGwQosRadiusGtpMismatch
      2.72.10. tmnxWlanGwResrcProblemCause
      2.72.11. tmnxWlanGwResrcProblemDetected
      2.72.12. tmnxWlanGwSubIfPmAddNewPlFailed
      2.72.13. tmnxWlanGwSubIfPmCrIntObjFailed
      2.72.14. tmnxWlanGwSubIfPmLsQryRtryFailed
      2.72.15. tmnxWlanGwSubIfPmNewPlReqFailed
      2.72.16. tmnxWlanGwSubIfPmPoolTimeout
      2.72.17. tmnxWlanGwSubIfPmPoolUsageLow
      2.72.18. tmnxWlanGwSubIfPmStartD6cFailed
      2.72.19. tmnxWlanGwSubIfRedActiveChanged
      2.72.20. tmnxWlanGwTuQosProblem
    2.73. WPP
      2.73.1. tmnxWppHostAuthenticationFailed
      2.73.2. tmnxWppPortalStatChanged
      2.73.3. tmnxWppPortalUnreachable
  Customer Document and Product Support
MPLS Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2.  MPLS and RSVP
    2.1. In This Chapter
    2.2. MPLS
      2.2.1. MPLS Label Stack
        2.2.1.1. Label Values
      2.2.2. MPLS Entropy Label and Hash Label
        2.2.2.1. Inserting and Processing the Entropy Label
          2.2.2.1.1. Ingress LER
          2.2.2.1.2. LSR
        2.2.2.2. Egress LER
        2.2.2.3. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        2.2.2.4. Entropy Label on OAM Packets
      2.2.3. Label Switching Routers
        2.2.3.1. LSP Types
      2.2.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.2.4.1. Bootstrapping the BFD Session
        2.2.4.2. LSP BFD Configuration
        2.2.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.2.4.4. BFD Configuration on RSVP-TE LSPs
        2.2.4.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        2.2.4.6. Manual Bypass LSP
          2.2.4.6.1. PLR Bypass LSP Selection Rules
          2.2.4.6.2. FRR Node-Protection (Facility)
        2.2.4.7. Uniform FRR Failover Time
        2.2.4.8. MPLS/RSVP on Broadcast Interface
        2.2.4.9. Automatic Bandwidth Allocation for RSVP LSPs
          2.2.4.9.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          2.2.4.9.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          2.2.4.9.3. Measurement of LSP Bandwidth
          2.2.4.9.4. Passive Monitoring of LSP Bandwidth
          2.2.4.9.5. Periodic Automatic Bandwidth Adjustment
          2.2.4.9.6. Overflow-Triggered Auto-Bandwidth Adjustment
          2.2.4.9.7. Manually-Triggered Auto-Bandwidth Adjustment
    2.3. RSVP
      2.3.1. Using RSVP for MPLS
        2.3.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.3.1.2. Hello Protocol
        2.3.1.3. MD5 Authentication of RSVP Interface
        2.3.1.4. Configuring Authentication using Keychains
      2.3.2. Reservation Styles
        2.3.2.1. RSVP Message Pacing
      2.3.3. RSVP Overhead Refresh Reduction
      2.3.4. RSVP Graceful Restart Helper
      2.3.5. Enhancements to RSVP Control Plane Congestion Control
      2.3.6. RSVP LSP Statistics
      2.3.7. P2MP RSVP-TE LSP Statistics
        2.3.7.1. Configuring RSVP P2MP LSP Egress Statistics
        2.3.7.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.3.7.3. Configuring Implicit Null
      2.3.8. Using Unnumbered Point-to-Point Interface in RSVP
        2.3.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
    2.4. MPLS Transport Profile
      2.4.1. MPLS-TP Model
      2.4.2. MPLS-TP Provider Edge and Gateway
        2.4.2.1. VLL Services
        2.4.2.2. Spoke-SDP Termination
      2.4.3. MPLS-TP LSR
      2.4.4. Detailed Descriptions of MPLS-TP
        2.4.4.1. MPLS-TP LSPs
        2.4.4.2. MPLS-TP on Pseudowires
      2.4.5. MPLS-TP Maintenance Identifiers
        2.4.5.1. Generic Associated Channel
        2.4.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.4.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.4.5.2.2. Proactive CC, CV and RDI
          2.4.5.2.3. BFD-based RDI
        2.4.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.4.5.4. PW Control Channel Status Request Mechanism
        2.4.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.4.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.4.5.7. MPLS-TP LSP Protection
      2.4.6. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      2.4.7. Alarm Indication Signal (AIS)
      2.4.8. Configuring MPLS-TP
        2.4.8.1. Configuration Overview
        2.4.8.2. Node-Wide MPLS-TP Parameter Configuration
        2.4.8.3. Node-Wide MPLS-TP Identifier Configuration
        2.4.8.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.4.8.5. Interface Configuration for MPLS-TP
        2.4.8.6. LER Configuration for MPLS-TP
          2.4.8.6.1. LSP and Path Configuration
          2.4.8.6.2. Support for Downstream Mapping Information
          2.4.8.6.3. Proactive CC/CV (using BFD) Configuration
          2.4.8.6.4. Protection templates and Linear Protection Configuration
        2.4.8.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.4.9. MPLS-TP Show Commands
        2.4.9.1. Static MPLS Labels
        2.4.9.2. MPLS-TP Tunnel Configuration
        2.4.9.3. MPLS-TP Path configuration
        2.4.9.4. MPLS-TP Protection
        2.4.9.5. MPLS TP Node Configuration
        2.4.9.6. MPLS-TP Interfaces
      2.4.10. MPLS-TP Debug Commands
    2.5. Traffic Engineering
      2.5.1. TE Metric (IS-IS and OSPF)
      2.5.2. Admin Group Support on Facility Bypass Backup LSP
        2.5.2.1. Procedures at Head-End Node
        2.5.2.2. Procedures at PLR Node
      2.5.3. Diff-Serv Traffic Engineering
        2.5.3.1. Mapping of Traffic to a Diff-Serv LSP
        2.5.3.2. Admission Control of Classes
          2.5.3.2.1. Maximum Allocation Model
          2.5.3.2.2. Russian Doll Model
        2.5.3.3. RSVP Control Plane Extensions
        2.5.3.4. IGP Extensions
        2.5.3.5. Diff-Serv TE Configuration and Operation
          2.5.3.5.1. RSVP Protocol Level
          2.5.3.5.2. RSVP Interface Level
          2.5.3.5.3. LSP and LSP Path Levels
      2.5.4. Diff-Serv TE LSP Class Type Change under Failure
        2.5.4.1. LSP Primary Path Retry Procedures
        2.5.4.2. Bandwidth Sharing Across Class Types
        2.5.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.5.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.6. Advanced MPLS/RSVP Features
      2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.6.2. LSP Path Change
      2.6.3. Manual LSP Path Switch
      2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.6.5. Automatic Creation of RSVP-TE LSP Mesh
      2.6.6. RSVP-TE LSP Shortcut for IGP Resolution
        2.6.6.1. Using LSP Relative Metric with IGP Shortcut
        2.6.6.2. ECMP Considerations
        2.6.6.3. Handling of Control Packets
        2.6.6.4. Forwarding Adjacency
        2.6.6.5. LDP Forwarding over IGP Shortcut
        2.6.6.6. Handling of Multicast Packets
          2.6.6.6.1. Disabling TTL Propagation in an LSP Shortcut
      2.6.7. RSVP-TE LSP Signaling using LSP Template
      2.6.8. Shared Risk Link Groups
        2.6.8.1. Enabling Disjoint Backup Paths
        2.6.8.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.6.8.3. Static Configurations of SRLG Memberships
      2.6.9. TE Graceful Shutdown
      2.6.10. Soft Preemption of Diff-Serv RSVP LSP
      2.6.11. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.6.12. Inter-Area TE LSP (ERO Expansion Method)
        2.6.12.1. Area Border Node FRR Protection for Inter-Area LSP
          2.6.12.1.1. Rerouting of Inter-Area LSP
          2.6.12.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.6.12.2. Inter-Area LSP support of OSPF Virtual Links
        2.6.12.3. Area Border Node FRR Protection for Inter-Area LSP
      2.6.13. Automatic Creation of a RSVP Mesh LSP
        2.6.13.1. Feature Configuration
        2.6.13.2. Feature Behavior
        2.6.13.3. Multi-Area and Multi-Instance Support
        2.6.13.4. Mesh LSP Name Encoding and Statistics
      2.6.14. Timer-based Reversion for RSVP-TE LSPs
      2.6.15. Automatic Creation of an RSVP One-Hop LSP
        2.6.15.1. Feature Configuration
        2.6.15.2. Feature Behavior
      2.6.16. MPLS Entropy Label
    2.7. Point-to-Multipoint (P2MP) RSVP LSP
      2.7.1. Application in Video Broadcast
      2.7.2. P2MP LSP Data Plane
        2.7.2.1. Procedures at Ingress LER Node
        2.7.2.2. Procedures at LSR Node
        2.7.2.3. Procedures at Branch LSR Node
        2.7.2.4. Procedures at Egress LER Node
        2.7.2.5. Procedures at BUD LSR Node
      2.7.3. Ingress Path Management for P2MP LSP Packets
        2.7.3.1. Ingress P2MP Path Management on XCM/IOM-3/IMMs
        2.7.3.2. Ingress P2MP Path Management on IOM-2
      2.7.4. RSVP Control Plane in a P2MP LSP
      2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.7.5.1. Procedures at Ingress LER Node
        2.7.5.2. Procedures at Egress LER Node
          2.7.5.2.1. Procedures with a Primary Tunnel Interface
    2.8. Segment Routing With Traffic Engineering (SR-TE)
      2.8.1. SR-TE Support
      2.8.2. SR-TE LSP Instantiation
        2.8.2.1. PCC-Initiated and PCC-Controlled LSP
          2.8.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
        2.8.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
      2.8.3. SR-TE LSP Path Computation
        2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.8.4. SR-TE LSP Protection
      2.8.5. Static Route Resolution using SR-TE LSP
      2.8.6. BGP Shortcuts Using SR-TE LSP
      2.8.7. BGP Label Route Resolution Using SR-TE LSP
      2.8.8. Service Packet Forwarding using SR-TE LSP
      2.8.9. Data Path Support
        2.8.9.1. SR-TE LSP Metric and MTU Settings
        2.8.9.2. Hash Label and Entropy Label Support
    2.9. MPLS Service Usage
      2.9.1. Service Distribution Paths
    2.10. MPLS/RSVP Configuration Process Overview
    2.11. Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring and Operating SR-TE
      SR-TE Configuration Prerequisites
      SR-TE LSP Configuration Overview
      Configuring Path Computation and Control for SR-TE LSP
        Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      Configuring SR-TE LSP Label Stack Size
      Configuring Adjacency SID Parameters
      Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
  3.  GMPLS
    3.1. In This Chapter
    3.2. GMPLS
      3.2.1. Example Applications
        3.2.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.2.1.2. Use Case 2: Multi-Layer Resiliency
    3.3. GMPLS UNI Architecture
      3.3.1. Addressing and End-to-End gLSP Architecture
    3.4. 1830 PSS Identifiers
    3.5. Recovery Reference Models
      3.5.1. End to End Recovery (IP-layer)
      3.5.2. End to End ECMP
      3.5.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.5.4. End to End Recovery (GMPLS Layer)
        3.5.4.1. Unprotected gLSP
        3.5.4.2. Full LSP Rerouting
        3.5.4.3. 1: N Protection
        3.5.4.4. Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  4. PCEP
    4.1. In This Chapter
    4.2. Introduction to the Path Computation Element Protocol (PCEP)
      4.2.1. PCC and PCE Configuration
      4.2.2. Base Implementation of Path Computation Elements (PCE)
      4.2.3. PCEP Session Establishment and Maintenance
      4.2.4. PCEP Parameters
        4.2.4.1. Stateful PCE
        4.2.4.2. PCEP Extensions in Support of SR-TE LSPs
        4.2.4.3. LSP Initiation
          4.2.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          4.2.4.3.2. LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
  5.  Label Distribution Protocol
    5.1. In This Chapter
    5.2. Label Distribution Protocol
      5.2.1. LDP and MPLS
      5.2.2. LDP Architecture
      5.2.3. Subsystem Interrelationships
        5.2.3.1. Memory Manager and LDP
        5.2.3.2. Label Manager
        5.2.3.3. LDP Configuration
        5.2.3.4. Logger
        5.2.3.5. Service Manager
      5.2.4. Execution Flow
        5.2.4.1. Initialization
        5.2.4.2. Session Lifetime
          5.2.4.2.1. Adjacency Establishment
          5.2.4.2.2. Session Establishment
      5.2.5. Label Exchange
        5.2.5.1. Other Reasons for Label Actions
        5.2.5.2. Cleanup
        5.2.5.3. Configuring Implicit Null Label
      5.2.6. Global LDP Filters
        5.2.6.1. Per LDP Peer FEC Import and Export Policies
      5.2.7. Configuring Multiple LDP LSR ID
      5.2.8. T-LDP hello reduction
      5.2.9. Tracking a T-LDP Peer with BFD
      5.2.10. Link LDP Hello Adjacency Tracking with BFD
      5.2.11. LDP LSP Statistics
      5.2.12. MPLS Entropy Label
    5.3. TTL Security for BGP and LDP
    5.4. ECMP Support for LDP
      5.4.1. Label Operations
    5.5. Unnumbered Interface Support in LDP
      5.5.1. Feature Configuration
      5.5.2. Operation of LDP over an Unnumbered IP Interface
        5.5.2.1. Link LDP
        5.5.2.2. Targeted LDP
        5.5.2.3. FEC Resolution
    5.6. LDP over RSVP Tunnels
      5.6.1. Signaling and Operation
        5.6.1.1. LDP Label Distribution and FEC Resolution
        5.6.1.2. Default FEC Resolution Procedure
        5.6.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      5.6.2. Rerouting Around Failures
        5.6.2.1. LDP-over-RSVP Tunnel Protection
        5.6.2.2. ABR Protection
    5.7. LDP over RSVP Without Area Boundary
      5.7.1. LDP over RSVP and ECMP
    5.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      5.8.1. Configuration and Operation
    5.9. LDP ECMP Uniform Failover
    5.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      5.10.1. LDP FRR Configuration
        5.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      5.10.2. LDP FRR Procedures
        5.10.2.1. ECMP Considerations
        5.10.2.2. LDP FRR and LDP Shortcut
        5.10.2.3. LDP FRR and LDP-over-RSVP
        5.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      5.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        5.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        5.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        5.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    5.11. mLDP Fast Upstream Switchover
    5.12. LDP FEC to BGP Label Route Stitching
      5.12.1. Configuration
      5.12.2. Detailed LDP FEC Resolution
      5.12.3. Detailed BGP Labeled Route Resolution
      5.12.4. Data Plane Forwarding
    5.13. LDP-SR Stitching for IPv4 prefixes (IS-IS)
      5.13.1. LDP-SR Stitching Configuration
      5.13.2. Stitching in the LDP-to-SR Direction
      5.13.3. Stitching in the SR-to-LDP Direction
    5.14. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    5.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      5.15.1. Feature Configuration
      5.15.2. Feature Behavior
    5.16. Multicast P2MP LDP for GRT
    5.17. LDP P2MP Support
      5.17.1. LDP P2MP Configuration
      5.17.2. LDP P2MP Protocol
      5.17.3. Make Before Break (MBB)
      5.17.4. ECMP Support
      5.17.5. Inter-AS Non-segmented mLDP
        5.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        5.17.5.2. LDP Recursive FEC Process
        5.17.5.3. Supported Recursive Opaque Values
        5.17.5.4. Redundancy and Resiliency
        5.17.5.5. ASBR Physical Connection
        5.17.5.6. OAM
        5.17.5.7. ECMP Support
          5.17.5.7.1. ECMP Hash Algorithm
        5.17.5.8. Dynamic mLDP and Static mLDP Co-existing on the Same Node
    5.18. Multicast LDP Fast Upstream Switchover
      5.18.1. Feature Configuration
      5.18.2. Feature Behavior
      5.18.3. Uniform Failover from Primary to Backup ILM
    5.19. Multi-Area and Multi-Instance Extensions to LDP
      5.19.1. LDP Shortcut for BGP Next-Hop Resolution
      5.19.2. LDP Shortcut for IGP Routes
        5.19.2.1. LDP Shortcut Configuration
        5.19.2.2. IGP Route Resolution
        5.19.2.3. LDP Shortcut Forwarding Plane
      5.19.3. ECMP Considerations
      5.19.4. Disabling TTL Propagation in an LSP Shortcut
    5.20. LDP Graceful Handling of Resource Exhaustion
      5.20.1. LDP Base Graceful Handling of Resources
    5.21. LDP Enhanced Graceful Handling of Resources
      5.21.1. LSR Overload Notification
      5.21.2. LSR Overload Protection Capability
      5.21.3. Procedures for LSR overload protection
    5.22. User Guidelines and Troubleshooting Procedures
      5.22.1. Common Procedures
      5.22.2. Base Resource Handling Procedures
      5.22.3. Enhanced Resource Handling Procedures
    5.23. LDP IPv6 Control and Data Planes
      5.23.1. LDP Operation in an IPv6 Network
      5.23.2. Link LDP
      5.23.3. Targeted LDP
      5.23.4. FEC Resolution
      5.23.5. LDP Session Capabilities
      5.23.6. LDP Adjacency Capabilities
      5.23.7. Address and FEC Distribution
      5.23.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      5.23.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      5.23.10. IGP and Static Route Synchronization with LDP
      5.23.11. BFD Operation
      5.23.12. Services Using SDP with an LDP IPv6 FEC
      5.23.13. Mirror Services and Lawful Intercept
        5.23.13.1. Configuration at mirror source node
        5.23.13.2. Configuration at mirror destination node
      5.23.14. Static Route Resolution to a LDP IPv6 FEC
      5.23.15. IGP Route Resolution to a LDP IPv6 FEC
      5.23.16. OAM Support with LDP IPv6
      5.23.17. LDP IPv6 Interoperability Considerations
        5.23.17.1. Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        5.23.17.2. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    5.24. LDP Process Overview
    5.25. LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  6. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia Router Configuration Process
  2.  MPLS and RSVP
    2.1. In This Chapter
    2.2. MPLS
      2.2.1. MPLS Label Stack
        2.2.1.1. Label Values
      2.2.2. MPLS Entropy Label and Hash Label
        2.2.2.1. Inserting and Processing the Entropy Label
          2.2.2.1.1. Ingress LER
          2.2.2.1.2. LSR
        2.2.2.2. Egress LER
        2.2.2.3. Mapping Entropy Label and Entropy Label Capability at LSP Stitching Points
        2.2.2.4. Entropy Label on OAM Packets
      2.2.3. Label Switching Routers
        2.2.3.1. LSP Types
      2.2.4. Bidirectional Forwarding Detection for MPLS LSPs
        2.2.4.1. Bootstrapping the BFD Session
        2.2.4.2. LSP BFD Configuration
        2.2.4.3. Enabling and Implementing Limits for LSP BFD on a Node
        2.2.4.4. BFD Configuration on RSVP-TE LSPs
        2.2.4.5. MPLS Facility Bypass Method of MPLS Fast Re-Route (FRR)
        2.2.4.6. Manual Bypass LSP
          2.2.4.6.1. PLR Bypass LSP Selection Rules
          2.2.4.6.2. FRR Node-Protection (Facility)
        2.2.4.7. Uniform FRR Failover Time
        2.2.4.8. MPLS/RSVP on Broadcast Interface
        2.2.4.9. Automatic Bandwidth Allocation for RSVP LSPs
          2.2.4.9.1. Enabling and Disabling Auto-Bandwidth Allocation on an LSP
          2.2.4.9.2. Autobandwidth on LSPs with Secondary or Secondary Standby Paths
          2.2.4.9.3. Measurement of LSP Bandwidth
          2.2.4.9.4. Passive Monitoring of LSP Bandwidth
          2.2.4.9.5. Periodic Automatic Bandwidth Adjustment
          2.2.4.9.6. Overflow-Triggered Auto-Bandwidth Adjustment
          2.2.4.9.7. Manually-Triggered Auto-Bandwidth Adjustment
    2.3. RSVP
      2.3.1. Using RSVP for MPLS
        2.3.1.1. RSVP Traffic Engineering Extensions for MPLS
        2.3.1.2. Hello Protocol
        2.3.1.3. MD5 Authentication of RSVP Interface
        2.3.1.4. Configuring Authentication using Keychains
      2.3.2. Reservation Styles
        2.3.2.1. RSVP Message Pacing
      2.3.3. RSVP Overhead Refresh Reduction
      2.3.4. RSVP Graceful Restart Helper
      2.3.5. Enhancements to RSVP Control Plane Congestion Control
      2.3.6. RSVP LSP Statistics
      2.3.7. P2MP RSVP-TE LSP Statistics
        2.3.7.1. Configuring RSVP P2MP LSP Egress Statistics
        2.3.7.2. Configuring RSVP P2MP LSP Ingress Statistics
        2.3.7.3. Configuring Implicit Null
      2.3.8. Using Unnumbered Point-to-Point Interface in RSVP
        2.3.8.1. Operation of RSVP FRR Facility Backup over Unnumbered Interface
    2.4. MPLS Transport Profile
      2.4.1. MPLS-TP Model
      2.4.2. MPLS-TP Provider Edge and Gateway
        2.4.2.1. VLL Services
        2.4.2.2. Spoke-SDP Termination
      2.4.3. MPLS-TP LSR
      2.4.4. Detailed Descriptions of MPLS-TP
        2.4.4.1. MPLS-TP LSPs
        2.4.4.2. MPLS-TP on Pseudowires
      2.4.5. MPLS-TP Maintenance Identifiers
        2.4.5.1. Generic Associated Channel
        2.4.5.2. MPLS-TP Operations, Administration and Maintenance (OAM)
          2.4.5.2.1. On-Demand Connectivity Verification (CV) using LSP-Ping
          2.4.5.2.2. Proactive CC, CV and RDI
          2.4.5.2.3. BFD-based RDI
        2.4.5.3. PW Control Channel Status Notifications (Static Pseudowire Status Signaling)
        2.4.5.4. PW Control Channel Status Request Mechanism
        2.4.5.5. Pseudowire Redundancy and Active / Standby Dual Homing
        2.4.5.6. Lock Instruct and Loopback for MPLS-TP Pseudowires
        2.4.5.7. MPLS-TP LSP Protection
      2.4.6. Switching Static MPLS-TP to Dynamic T-LDP Signaled PWs
      2.4.7. Alarm Indication Signal (AIS)
      2.4.8. Configuring MPLS-TP
        2.4.8.1. Configuration Overview
        2.4.8.2. Node-Wide MPLS-TP Parameter Configuration
        2.4.8.3. Node-Wide MPLS-TP Identifier Configuration
        2.4.8.4. Static LSP and Pseudowire (VC) Label and Tunnel Ranges
        2.4.8.5. Interface Configuration for MPLS-TP
        2.4.8.6. LER Configuration for MPLS-TP
          2.4.8.6.1. LSP and Path Configuration
          2.4.8.6.2. Support for Downstream Mapping Information
          2.4.8.6.3. Proactive CC/CV (using BFD) Configuration
          2.4.8.6.4. Protection templates and Linear Protection Configuration
        2.4.8.7. Intermediate LSR Configuration for MPLS-TP LSPs
      2.4.9. MPLS-TP Show Commands
        2.4.9.1. Static MPLS Labels
        2.4.9.2. MPLS-TP Tunnel Configuration
        2.4.9.3. MPLS-TP Path configuration
        2.4.9.4. MPLS-TP Protection
        2.4.9.5. MPLS TP Node Configuration
        2.4.9.6. MPLS-TP Interfaces
      2.4.10. MPLS-TP Debug Commands
    2.5. Traffic Engineering
      2.5.1. TE Metric (IS-IS and OSPF)
      2.5.2. Admin Group Support on Facility Bypass Backup LSP
        2.5.2.1. Procedures at Head-End Node
        2.5.2.2. Procedures at PLR Node
      2.5.3. Diff-Serv Traffic Engineering
        2.5.3.1. Mapping of Traffic to a Diff-Serv LSP
        2.5.3.2. Admission Control of Classes
          2.5.3.2.1. Maximum Allocation Model
          2.5.3.2.2. Russian Doll Model
        2.5.3.3. RSVP Control Plane Extensions
        2.5.3.4. IGP Extensions
        2.5.3.5. Diff-Serv TE Configuration and Operation
          2.5.3.5.1. RSVP Protocol Level
          2.5.3.5.2. RSVP Interface Level
          2.5.3.5.3. LSP and LSP Path Levels
      2.5.4. Diff-Serv TE LSP Class Type Change under Failure
        2.5.4.1. LSP Primary Path Retry Procedures
        2.5.4.2. Bandwidth Sharing Across Class Types
        2.5.4.3. Downgrading the CT of Bandwidth Sharing LSP Paths
        2.5.4.4. Upgrading the CT of Bandwidth Sharing LSP Paths
    2.6. Advanced MPLS/RSVP Features
      2.6.1. Extending RSVP LSP to use Loopback Interfaces Other than Router-id
      2.6.2. LSP Path Change
      2.6.3. Manual LSP Path Switch
      2.6.4. Make-Before-Break (MBB) Procedures for LSP/Path Parameter Configuration Change
      2.6.5. Automatic Creation of RSVP-TE LSP Mesh
      2.6.6. RSVP-TE LSP Shortcut for IGP Resolution
        2.6.6.1. Using LSP Relative Metric with IGP Shortcut
        2.6.6.2. ECMP Considerations
        2.6.6.3. Handling of Control Packets
        2.6.6.4. Forwarding Adjacency
        2.6.6.5. LDP Forwarding over IGP Shortcut
        2.6.6.6. Handling of Multicast Packets
          2.6.6.6.1. Disabling TTL Propagation in an LSP Shortcut
      2.6.7. RSVP-TE LSP Signaling using LSP Template
      2.6.8. Shared Risk Link Groups
        2.6.8.1. Enabling Disjoint Backup Paths
        2.6.8.2. SRLG Penalty Weights for Detour and Bypass LSPs
        2.6.8.3. Static Configurations of SRLG Memberships
      2.6.9. TE Graceful Shutdown
      2.6.10. Soft Preemption of Diff-Serv RSVP LSP
      2.6.11. Least-Fill Bandwidth Rule in CSPF ECMP Selection
      2.6.12. Inter-Area TE LSP (ERO Expansion Method)
        2.6.12.1. Area Border Node FRR Protection for Inter-Area LSP
          2.6.12.1.1. Rerouting of Inter-Area LSP
          2.6.12.1.2. Behavior of MPLS Options in Inter-Area LSP
        2.6.12.2. Inter-Area LSP support of OSPF Virtual Links
        2.6.12.3. Area Border Node FRR Protection for Inter-Area LSP
      2.6.13. Automatic Creation of a RSVP Mesh LSP
        2.6.13.1. Feature Configuration
        2.6.13.2. Feature Behavior
        2.6.13.3. Multi-Area and Multi-Instance Support
        2.6.13.4. Mesh LSP Name Encoding and Statistics
      2.6.14. Timer-based Reversion for RSVP-TE LSPs
      2.6.15. Automatic Creation of an RSVP One-Hop LSP
        2.6.15.1. Feature Configuration
        2.6.15.2. Feature Behavior
      2.6.16. MPLS Entropy Label
    2.7. Point-to-Multipoint (P2MP) RSVP LSP
      2.7.1. Application in Video Broadcast
      2.7.2. P2MP LSP Data Plane
        2.7.2.1. Procedures at Ingress LER Node
        2.7.2.2. Procedures at LSR Node
        2.7.2.3. Procedures at Branch LSR Node
        2.7.2.4. Procedures at Egress LER Node
        2.7.2.5. Procedures at BUD LSR Node
      2.7.3. Ingress Path Management for P2MP LSP Packets
        2.7.3.1. Ingress P2MP Path Management on XCM/IOM-3/IMMs
        2.7.3.2. Ingress P2MP Path Management on IOM-2
      2.7.4. RSVP Control Plane in a P2MP LSP
      2.7.5. Forwarding Multicast Packets over RSVP P2MP LSP in the Base Router
        2.7.5.1. Procedures at Ingress LER Node
        2.7.5.2. Procedures at Egress LER Node
          2.7.5.2.1. Procedures with a Primary Tunnel Interface
    2.8. Segment Routing With Traffic Engineering (SR-TE)
      2.8.1. SR-TE Support
      2.8.2. SR-TE LSP Instantiation
        2.8.2.1. PCC-Initiated and PCC-Controlled LSP
          2.8.2.1.1. Guidelines for Using PCC-Initiated and PCC-Controlled LSPs
        2.8.2.2. PCC-Initiated and PCE-Computed/Controlled LSP
      2.8.3. SR-TE LSP Path Computation
        2.8.3.1. Service and Shortcut Application SR-TE Label Stack Check
      2.8.4. SR-TE LSP Protection
      2.8.5. Static Route Resolution using SR-TE LSP
      2.8.6. BGP Shortcuts Using SR-TE LSP
      2.8.7. BGP Label Route Resolution Using SR-TE LSP
      2.8.8. Service Packet Forwarding using SR-TE LSP
      2.8.9. Data Path Support
        2.8.9.1. SR-TE LSP Metric and MTU Settings
        2.8.9.2. Hash Label and Entropy Label Support
    2.9. MPLS Service Usage
      2.9.1. Service Distribution Paths
    2.10. MPLS/RSVP Configuration Process Overview
    2.11. Configuration Notes
     Configuring MPLS and RSVP with CLI
    MPLS Configuration Overview
      LSPs
      Paths
      Router Interface
      Choosing the Signaling Protocol
    Basic MPLS Configuration
    Common Configuration Tasks
      Configuring MPLS Components
      Configuring Global MPLS Parameters
      Configuring an MPLS Interface
      Configuring MPLS Paths
      Configuring an MPLS LSP
        Configuring a Static LSP
      Configuring Manual Bypass Tunnels
    Configuring and Operating SR-TE
      SR-TE Configuration Prerequisites
      SR-TE LSP Configuration Overview
      Configuring Path Computation and Control for SR-TE LSP
        Configuring Path Profile and Group for PCC-Initiated and PCE-Computed/Controlled LSP
      Configuring SR-TE LSP Label Stack Size
      Configuring Adjacency SID Parameters
      Configuring PCC-controlled, PCE-computed, and PCE-controlled SR-TE LSPs
    Configuring RSVP Parameters
      Configuring RSVP Message Pacing Parameters
      Configuring Graceful Shutdown
    MPLS Configuration Management Tasks
      Deleting MPLS
      Modifying MPLS Parameters
      Modifying an MPLS LSP
      Modifying MPLS Path Parameters
      Modifying MPLS Static LSP Parameters
      Deleting an MPLS Interface
    RSVP Configuration Management Tasks
      Modifying RSVP Parameters
      Modifying RSVP Message Pacing Parameters
      Deleting an Interface from RSVP
     MPLS/RSVP Configuration Command Reference
      Command Hierarchies
        MPLS Commands
        MPLS-TP Commands
        LSP Commands
        lsp-bfd Commands
        MPLS Path Commands
        RSVP Commands
      Command Descriptions
         MPLS Commands
          Generic Commands
          MPLS Commands
          Point-to-Multipoint MPLS (P2MP) Commands
        RSVP Commands
          Generic Commands
          RSVP Commands
          Interface Commands
     MPLS/RSVP Show, Tools, Router, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Router Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Show Router BFD session Commands
        Show RSVP Commands
        Tools Commands
        Clear Commands
        Debug Commands
  3.  GMPLS
    3.1. In This Chapter
    3.2. GMPLS
      3.2.1. Example Applications
        3.2.1.1. Use Case 1: Dynamic Connection Setup with Constraints
        3.2.1.2. Use Case 2: Multi-Layer Resiliency
    3.3. GMPLS UNI Architecture
      3.3.1. Addressing and End-to-End gLSP Architecture
    3.4. 1830 PSS Identifiers
    3.5. Recovery Reference Models
      3.5.1. End to End Recovery (IP-layer)
      3.5.2. End to End ECMP
      3.5.3. End to End Load Sharing Using a Load Sharing GMPLS Tunnel Group
      3.5.4. End to End Recovery (GMPLS Layer)
        3.5.4.1. Unprotected gLSP
        3.5.4.2. Full LSP Rerouting
        3.5.4.3. 1: N Protection
        3.5.4.4. Optical Segment Recovery
     Configuring GMPLS with CLI
    GMPLS Configuration Overview
    LMP and IPCC Configuration
      Configuration of IP Communication Channels for LMP and RSVP
      Configuring LMP
      Configuring Traffic Engineering Links and Data Bearers
    Configuring MPLS Paths for GMPLS
    Configuring RSVP in GMPLS
    Configuring a GMPLS LSP on the UNI
      gLSP Constraints
    Bandwidth
    Shared Risk Link Groups
    Optical Network Segment Recovery
    Configuration of End-to-End GMPLS Recovery
    GMPLS Tunnel Groups
    Configuring IP and MPLS in an Overlay Network to Use a GMPLS LSP
    Configuration Notes
     GMPLS Configuration Command Reference
      Command Hierarchies
        LMP Commands
        GMPLS Commands
        GMPLS Tunnel Group Commands
      Command Descriptions
        LMP Commands
        GMPLS Commands
          GMPLS Tunnel Group Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  4. PCEP
    4.1. In This Chapter
    4.2. Introduction to the Path Computation Element Protocol (PCEP)
      4.2.1. PCC and PCE Configuration
      4.2.2. Base Implementation of Path Computation Elements (PCE)
      4.2.3. PCEP Session Establishment and Maintenance
      4.2.4. PCEP Parameters
        4.2.4.1. Stateful PCE
        4.2.4.2. PCEP Extensions in Support of SR-TE LSPs
        4.2.4.3. LSP Initiation
          4.2.4.3.1. PCC-Initiated and PCE-Computed/Controlled LSPs
          4.2.4.3.2. LSP Path Diversity and Bi-Directionality Constraints
    PCEP Configuration Command Reference
      Command Hierarchies
        PCEP Commands
      Command Descriptions
        PCEP Commands
  5.  Label Distribution Protocol
    5.1. In This Chapter
    5.2. Label Distribution Protocol
      5.2.1. LDP and MPLS
      5.2.2. LDP Architecture
      5.2.3. Subsystem Interrelationships
        5.2.3.1. Memory Manager and LDP
        5.2.3.2. Label Manager
        5.2.3.3. LDP Configuration
        5.2.3.4. Logger
        5.2.3.5. Service Manager
      5.2.4. Execution Flow
        5.2.4.1. Initialization
        5.2.4.2. Session Lifetime
          5.2.4.2.1. Adjacency Establishment
          5.2.4.2.2. Session Establishment
      5.2.5. Label Exchange
        5.2.5.1. Other Reasons for Label Actions
        5.2.5.2. Cleanup
        5.2.5.3. Configuring Implicit Null Label
      5.2.6. Global LDP Filters
        5.2.6.1. Per LDP Peer FEC Import and Export Policies
      5.2.7. Configuring Multiple LDP LSR ID
      5.2.8. T-LDP hello reduction
      5.2.9. Tracking a T-LDP Peer with BFD
      5.2.10. Link LDP Hello Adjacency Tracking with BFD
      5.2.11. LDP LSP Statistics
      5.2.12. MPLS Entropy Label
    5.3. TTL Security for BGP and LDP
    5.4. ECMP Support for LDP
      5.4.1. Label Operations
    5.5. Unnumbered Interface Support in LDP
      5.5.1. Feature Configuration
      5.5.2. Operation of LDP over an Unnumbered IP Interface
        5.5.2.1. Link LDP
        5.5.2.2. Targeted LDP
        5.5.2.3. FEC Resolution
    5.6. LDP over RSVP Tunnels
      5.6.1. Signaling and Operation
        5.6.1.1. LDP Label Distribution and FEC Resolution
        5.6.1.2. Default FEC Resolution Procedure
        5.6.1.3. FEC Resolution Procedure When prefer-tunnel-in-tunnel is Enabled
      5.6.2. Rerouting Around Failures
        5.6.2.1. LDP-over-RSVP Tunnel Protection
        5.6.2.2. ABR Protection
    5.7. LDP over RSVP Without Area Boundary
      5.7.1. LDP over RSVP and ECMP
    5.8. Class-Based Forwarding of LDP Prefix Packets over IGP Shortcuts
      5.8.1. Configuration and Operation
    5.9. LDP ECMP Uniform Failover
    5.10. LDP Fast-Reroute for IS-IS and OSPF Prefixes
      5.10.1. LDP FRR Configuration
        5.10.1.1. Reducing the Scope of the LFA Calculation by SPF
      5.10.2. LDP FRR Procedures
        5.10.2.1. ECMP Considerations
        5.10.2.2. LDP FRR and LDP Shortcut
        5.10.2.3. LDP FRR and LDP-over-RSVP
        5.10.2.4. LDP FRR and RSVP Shortcut (IGP Shortcut)
      5.10.3. IS-IS and OSPF Support for Loop-Free Alternate Calculation
        5.10.3.1. Loop-Free Alternate Calculation in the Presence of IGP shortcuts
        5.10.3.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
        5.10.3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
    5.11. mLDP Fast Upstream Switchover
    5.12. LDP FEC to BGP Label Route Stitching
      5.12.1. Configuration
      5.12.2. Detailed LDP FEC Resolution
      5.12.3. Detailed BGP Labeled Route Resolution
      5.12.4. Data Plane Forwarding
    5.13. LDP-SR Stitching for IPv4 prefixes (IS-IS)
      5.13.1. LDP-SR Stitching Configuration
      5.13.2. Stitching in the LDP-to-SR Direction
      5.13.3. Stitching in the SR-to-LDP Direction
    5.14. LDP FRR Remote LFA Backup using SR Tunnel for IPv4 Prefixes (IS-IS)
    5.15. Automatic Creation of a Targeted Hello Adjacency and LDP Session
      5.15.1. Feature Configuration
      5.15.2. Feature Behavior
    5.16. Multicast P2MP LDP for GRT
    5.17. LDP P2MP Support
      5.17.1. LDP P2MP Configuration
      5.17.2. LDP P2MP Protocol
      5.17.3. Make Before Break (MBB)
      5.17.4. ECMP Support
      5.17.5. Inter-AS Non-segmented mLDP
        5.17.5.1. In-band Signaling with Non-segmented mLDP Trees in GRT
        5.17.5.2. LDP Recursive FEC Process
        5.17.5.3. Supported Recursive Opaque Values
        5.17.5.4. Redundancy and Resiliency
        5.17.5.5. ASBR Physical Connection
        5.17.5.6. OAM
        5.17.5.7. ECMP Support
          5.17.5.7.1. ECMP Hash Algorithm
        5.17.5.8. Dynamic mLDP and Static mLDP Co-existing on the Same Node
    5.18. Multicast LDP Fast Upstream Switchover
      5.18.1. Feature Configuration
      5.18.2. Feature Behavior
      5.18.3. Uniform Failover from Primary to Backup ILM
    5.19. Multi-Area and Multi-Instance Extensions to LDP
      5.19.1. LDP Shortcut for BGP Next-Hop Resolution
      5.19.2. LDP Shortcut for IGP Routes
        5.19.2.1. LDP Shortcut Configuration
        5.19.2.2. IGP Route Resolution
        5.19.2.3. LDP Shortcut Forwarding Plane
      5.19.3. ECMP Considerations
      5.19.4. Disabling TTL Propagation in an LSP Shortcut
    5.20. LDP Graceful Handling of Resource Exhaustion
      5.20.1. LDP Base Graceful Handling of Resources
    5.21. LDP Enhanced Graceful Handling of Resources
      5.21.1. LSR Overload Notification
      5.21.2. LSR Overload Protection Capability
      5.21.3. Procedures for LSR overload protection
    5.22. User Guidelines and Troubleshooting Procedures
      5.22.1. Common Procedures
      5.22.2. Base Resource Handling Procedures
      5.22.3. Enhanced Resource Handling Procedures
    5.23. LDP IPv6 Control and Data Planes
      5.23.1. LDP Operation in an IPv6 Network
      5.23.2. Link LDP
      5.23.3. Targeted LDP
      5.23.4. FEC Resolution
      5.23.5. LDP Session Capabilities
      5.23.6. LDP Adjacency Capabilities
      5.23.7. Address and FEC Distribution
      5.23.8. Controlling IPv6 FEC Distribution During an Upgrade to SR OS Supporting LDP IPv6
      5.23.9. Handling of Duplicate Link-Local IPv6 Addresses in FEC Resolution
      5.23.10. IGP and Static Route Synchronization with LDP
      5.23.11. BFD Operation
      5.23.12. Services Using SDP with an LDP IPv6 FEC
      5.23.13. Mirror Services and Lawful Intercept
        5.23.13.1. Configuration at mirror source node
        5.23.13.2. Configuration at mirror destination node
      5.23.14. Static Route Resolution to a LDP IPv6 FEC
      5.23.15. IGP Route Resolution to a LDP IPv6 FEC
      5.23.16. OAM Support with LDP IPv6
      5.23.17. LDP IPv6 Interoperability Considerations
        5.23.17.1. Interoperability with Implementations Compliant with draft-ietf-mpls-ldp-ipv6
        5.23.17.2. Interoperability with Implementations Compliant with RFC 5036 for IPv4 LDP Control Plane Only
    5.24. LDP Process Overview
    5.25. LDP-IGP Synchronization
     Configuring LDP with CLI
    LDP Configuration Overview
    Basic LDP Configuration
    Common Configuration Tasks
      Enabling LDP
      Configuring FEC Originate Parameters
      Configuring Graceful-Restart Helper Parameters
      Applying Export and Import Policies
      Targeted Session Parameters
      Interface Parameters
      Session Parameters
      LDP Signaling and Services
    LDP Configuration Management Tasks
      Disabling LDP
      Modifying Targeted Session Parameters
      Modifying Interface Parameters
     LDP Command Reference
      Command Hierarchies
        LDP Commands
      Command Descriptions
        Generic Commands
        Interface Parameters Commands
        Session Parameters Commands
        Targeted Session Commands
        TCP Session Parameters Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show LDP Commands
        Clear Commands
        Debug Commands
        Tools Commands
  6. Standards and Protocol Support
  Customer Document and Product Support
Multicast Routing Protocols Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. In This Chapter
    2.2. Multicast Overview
    2.3. Multicast Models
      2.3.1. Any-Source Multicast (ASM)
      2.3.2. Source Specific Multicast (SSM)
      2.3.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. In This Chapter
    3.2. IGMP Overview
      3.2.1. IGMP Versions and Interoperability Requirements
      3.2.2. IGMP Version Transition
      3.2.3. Source-Specific Multicast Groups
      3.2.4. Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  4. MLD
    4.1. In This Chapter
    4.2. MLD Overview
      4.2.1. MLDv1
      4.2.2. MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  5. PIM
    5.1. In This Chapter
    5.2. PIM Overview
      5.2.1. PIM-SM Functions
        5.2.1.1. Phase One
        5.2.1.2. Phase Two
        5.2.1.3. Phase Three
      5.2.2. Encapsulating Data Packets in the Register Tunnel
      5.2.3. PIM Bootstrap Router Mechanism
      5.2.4. PIM-SM Routing Policies
      5.2.5. Reverse Path Forwarding Checks
      5.2.6. Anycast RP for PIM-SM
        5.2.6.1. Implementation
      5.2.7. Distributing PIM Joins over Multiple ECMP Paths
      5.2.8. PIM Interface on IES Subscriber Group Interfaces
      5.2.9. Multicast Only Fast Reroute (MoFRR)
      5.2.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    5.3. IPv6 PIM models
      5.3.1. PIM SSM
      5.3.2. PIM ASM
      5.3.3. Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  6. MSDP
    6.1. In This Chapter
    6.2. Multicast Source Discovery Protocol
      6.2.1. Anycast RP for MSDP
      6.2.2. MSDP Procedure
        6.2.2.1. MSDP Peering Scenarios
      6.2.3. MSDP Peer Groups
      6.2.4. MSDP Mesh Groups
      6.2.5. MSDP Routing Policies
      6.2.6. Multicast in Virtual Private Networks
        6.2.6.1. Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  7. MLDP
    7.1. In This Chapter
    7.2. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.3. Inter-AS Non-segmented MLDP
      7.3.1. d-MLDP Inter-AS Trees in GRT
        7.3.1.1. Routing
        7.3.1.2. Join Processing
      7.3.2. ASBR Support of PE Functionality
  8. Multicast Extensions to BGP
    8.1. In This Chapter
    8.2. Multicast Extensions to BGP
      8.2.1. MBGP Multicast Topology Support
        8.2.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. In This Chapter
    9.2. MCAC Overview
      9.2.1. MCAC Bundle Policy Overview
      9.2.2. MCAC Algorithm
        9.2.2.1. Interface-level MCAC details
          9.2.2.1.1. MCAC-interface-policy-level MCAC details
        9.2.2.2. Bundle-level MCAC details
      9.2.3. MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  10. Troubleshooting Tools
    10.1. In This Chapter
    10.2. Mtrace
      10.2.1. Finding the Last Hop Router
      10.2.2. Directing the Response
    10.3. Mstat
    10.4. Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Multicast Configuration Process
  2. Introduction to Multicast
    2.1. In This Chapter
    2.2. Multicast Overview
    2.3. Multicast Models
      2.3.1. Any-Source Multicast (ASM)
      2.3.2. Source Specific Multicast (SSM)
      2.3.3. Multicast in IP-VPN Networks
  3. IGMP
    3.1. In This Chapter
    3.2. IGMP Overview
      3.2.1. IGMP Versions and Interoperability Requirements
      3.2.2. IGMP Version Transition
      3.2.3. Source-Specific Multicast Groups
      3.2.4. Query Messages
     Configuring IGMP with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling IGMP
    IGMP Configuration Command Reference
      Command Hierarchies
        IGMP Configuration Commands
      Command Descriptions
        Router IGMP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  4. MLD
    4.1. In This Chapter
    4.2. MLD Overview
      4.2.1. MLDv1
      4.2.2. MLDv2
     Configuring MLD with CLI
      IGMP Configuration Overview
      Basic IGMP Configuration
      Configuring IGMP Parameters
        Enabling IGMP
        Configuring an IGMP Interface
        Configuring Static Parameters
        Configuring SSM Translation
      Disabling MLD
    MLD Configuration Command Reference
      Command Hierarchies
        MLD Configuration Commands
      Command Descriptions
        MLD Commands
        Generic Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Clear Commands
      Command Descriptions
        Clear Commands
  5. PIM
    5.1. In This Chapter
    5.2. PIM Overview
      5.2.1. PIM-SM Functions
        5.2.1.1. Phase One
        5.2.1.2. Phase Two
        5.2.1.3. Phase Three
      5.2.2. Encapsulating Data Packets in the Register Tunnel
      5.2.3. PIM Bootstrap Router Mechanism
      5.2.4. PIM-SM Routing Policies
      5.2.5. Reverse Path Forwarding Checks
      5.2.6. Anycast RP for PIM-SM
        5.2.6.1. Implementation
      5.2.7. Distributing PIM Joins over Multiple ECMP Paths
      5.2.8. PIM Interface on IES Subscriber Group Interfaces
      5.2.9. Multicast Only Fast Reroute (MoFRR)
      5.2.10. Automatic Discovery of Group-to-RP Mappings (Auto-RP)
    5.3. IPv6 PIM models
      5.3.1. PIM SSM
      5.3.2. PIM ASM
      5.3.3. Embedded RP
     Configuring PIM with CLI
      PIM Configuration Overview
      Basic PIM Configuration
      Configuring PIM Parameters
        Enabling PIM
        Configuring PIM Interface Parameters
        Importing PIM Join/Register Policies
      Disabling PIM
    PIM Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Router PIM Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  6. MSDP
    6.1. In This Chapter
    6.2. Multicast Source Discovery Protocol
      6.2.1. Anycast RP for MSDP
      6.2.2. MSDP Procedure
        6.2.2.1. MSDP Peering Scenarios
      6.2.3. MSDP Peer Groups
      6.2.4. MSDP Mesh Groups
      6.2.5. MSDP Routing Policies
      6.2.6. Multicast in Virtual Private Networks
        6.2.6.1. Draft Rosen
     Configuring MSDP with CLI
      Basic MSDP Configuration
      Configuring MSDP Parameters
      Disabling MSDP
    MSDP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        MSDP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  7. MLDP
    7.1. In This Chapter
    7.2. Dynamic Multicast Signaling over P2MP in GRT Instance
    7.3. Inter-AS Non-segmented MLDP
      7.3.1. d-MLDP Inter-AS Trees in GRT
        7.3.1.1. Routing
        7.3.1.2. Join Processing
      7.3.2. ASBR Support of PE Functionality
  8. Multicast Extensions to BGP
    8.1. In This Chapter
    8.2. Multicast Extensions to BGP
      8.2.1. MBGP Multicast Topology Support
        8.2.1.1. Recursive Lookup for BGP Next Hops
  9. MCAC
    9.1. In This Chapter
    9.2. MCAC Overview
      9.2.1. MCAC Bundle Policy Overview
      9.2.2. MCAC Algorithm
        9.2.2.1. Interface-level MCAC details
          9.2.2.1.1. MCAC-interface-policy-level MCAC details
        9.2.2.2. Bundle-level MCAC details
      9.2.3. MCAC on Link Aggregation Group Interfaces
     Configuring MCAC with CLI
      Basic MCAC Configuration
      Configuring MCAC Parameters
    MCAC Configuration Command Reference
      Command Hierarchies
        MCAC Configuration Commands
        MCAC Policy Commands
      Command Descriptions
        MCAC Configuration Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          Show MCAC Commands
  10. Troubleshooting Tools
    10.1. In This Chapter
    10.2. Mtrace
      10.2.1. Finding the Last Hop Router
      10.2.2. Directing the Response
    10.3. Mstat
    10.4. Mrinfo
    Troubleshooting Configuration Command Reference
      Command Hierarchies
        Operational Commands
      Command Descriptions
        Operational Commands
    Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
Multiservice Integrated Service Adapter Guide R14.0.R6
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2. ISA Hardware
    2.1. In This Section
    2.2. MS-ISA2 Overview
    2.3. MS-ISA Overview
    2.4. MS-ISM Overview
    2.5. Application Assurance Hardware Features
      2.5.1. AA System Support
      2.5.2. Host IOM Support for AA on ISAs
  3. Application Assurance
    3.1. In This Section
    3.2. Application Assurance (AA) Overview
      3.2.1. Application Assurance: Inline Policy Enforcement
      3.2.2. AA Integration in Subscriber Edge Gateways
      3.2.3. Fixed Residential Broadband Services
        3.2.3.1. Dual-Stack Lite – DS-Lite
        3.2.3.2. 6to4 /6RD
      3.2.4. Wireless LAN Gateway Broadband Services
      3.2.5. Application-Aware Business VPN Services
      3.2.6. Business Mobile Backhaul
      3.2.7. SeGW Firewall Service
    3.3. Application Assurance System Architecture
      3.3.1. AA ISA Resource Configuration
        3.3.1.1. AA ISA Groups
          3.3.1.1.1. AA ISA Groups
          3.3.1.1.2. AA Group Partitions
          3.3.1.1.3. Bypass Modes
        3.3.1.2. Redundancy
          3.3.1.2.1. No AA ISA Group Redundancy
          3.3.1.2.2. Failure to Fabric
          3.3.1.2.3. N+1 AA ISA Card Warm Redundancy
        3.3.1.3. ISA Load Balancing
        3.3.1.4. Asymmetry Removal
          3.3.1.4.1. Asymmetry Removal Overview
          3.3.1.4.2. Failure Modes
          3.3.1.4.3. AARP Peered Node/Instance Configuration
          3.3.1.4.4. Multi-Chassis Control Link (MC-CTL)
          3.3.1.4.5. Multi-Chassis Datapath Shunts
        3.3.1.5. ISA Overload Detection
      3.3.2. AA Packet Processing
        3.3.2.1. Divert of Traffic and Subscribers
          3.3.2.1.1. Services and AA Subscribers
          3.3.2.1.2. Spoke SDPs
          3.3.2.1.3. Transit AA Subs
          3.3.2.1.4. AA Subscriber Application Service Definition
        3.3.2.2. Application Identification
          3.3.2.2.1. Application Assurance Identification Components
          3.3.2.2.2. Protocol Signatures
          3.3.2.2.3. Custom Protocols
          3.3.2.2.4. Protocol Shutdown
          3.3.2.2.5. Supported Protocol Signatures
          3.3.2.2.6. Application Groups
          3.3.2.2.7. Charging Groups
          3.3.2.2.8. Applications
          3.3.2.2.9. Application Filters
          3.3.2.2.10. HTTP
          3.3.2.2.11. AA IP Prefix Lists
        3.3.2.3. Statistics and Accounting
          3.3.2.3.1. Per-AA-Subscriber Special Study
          3.3.2.3.2. System Aspects
          3.3.2.3.3. Application Assurance XML Volume Statistics and Accounting
          3.3.2.3.4. AA Partition Traffic Type Statistics
          3.3.2.3.5. Configurable AA-Subscriber Statistics Collection
          3.3.2.3.6. AA-Performance Record for ISA Load
          3.3.2.3.7. AA Partition Traffic Type Statistics
          3.3.2.3.8. AA Partition Admit–Deny Statistics
          3.3.2.3.9. RADIUS Accounting AA Records
          3.3.2.3.10. AA GX Based Usage Monitoring
          3.3.2.3.11. Supported AVPs
          3.3.2.3.12. Cflowd AA Records
        3.3.2.4. Application QoS Policy (AQP)
          3.3.2.4.1. AQP Match Criteria
          3.3.2.4.2. AQP Actions
          3.3.2.4.3. Application Assurance Policers
          3.3.2.4.4. Time of Day Policing Adjustments
          3.3.2.4.5. Application Assurance HTTP Redirect
          3.3.2.4.6. ICAP - Large Scale Category based URL Filtering
          3.3.2.4.7. Local URL-List Filtering
          3.3.2.4.8. HTTP Header Enrichment
          3.3.2.4.9. HTTP In Browser Notification
        3.3.2.5. Application Assurance Firewall
          3.3.2.5.1. Denial of Service (DoS) Protection
          3.3.2.5.2. TCP Validation
          3.3.2.5.3. Policy Partitioned AA FW
          3.3.2.5.4. Configuring AA FW
          3.3.2.5.5. AA FW Logging
          3.3.2.5.6. SeGW Firewall Protection
      3.3.3. Service Monitoring and Debugging
      3.3.4. CPU Utilization
      3.3.5. CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
      Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
      Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        AA Interface Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          TCP Validation Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  4. IP Tunnels
    4.1. In This Section
    4.2. IP Tunnels Overview
      4.2.1. Tunnel ISAs
        4.2.1.1. Public Tunnel SAPs
        4.2.1.2. Private Tunnel SAPs
        4.2.1.3. IP Interface Configuration
        4.2.1.4. GRE and IP-IP Tunnel Configuration
        4.2.1.5. IP Fragmentation and Reassembly for IP Tunnels
      4.2.2. Operational Conditions
      4.2.3. QoS Interactions
      4.2.4. OAM Interactions
      4.2.5. Redundancy
      4.2.6. Statistics Collection
      4.2.7. Security
        4.2.7.1. GRE Tunnel Multicast Support
        4.2.7.2. IPv6 over IPv4 GRE Tunnel
      4.2.8. IKEv2
        4.2.8.1. IKEv2 Traffic Selector and TS-List
        4.2.8.2. IKEv2 Fragmentation
      4.2.9. SHA2 Support
      4.2.10. IPsec Client Lockout
    4.3. X.509v3 Certificate Overview
      4.3.1. SROS X.509v3 Certificate Support
      4.3.2. Local Storage
      4.3.3. CA-Profile
      4.3.4. CA Chain Computation
      4.3.5. Certificate Enrollment
      4.3.6. Certificate Revocation Check
      4.3.7. Certificate/CRL Expiration Warning
      4.3.8. Certificate/CRL/Key Cache
      4.3.9. Auto CRL Update
      4.3.10. IPsec Client Database
    4.4. Using Certificates For IPsec Tunnel Authentication
    4.5. Trust-Anchor-Profile
    4.6. Cert-Profile
      4.6.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    4.7. Certificate Management Protocol Version 2 (CMPv2)
    4.8. OCSP
    4.9. Video Wholesale Example
    4.10. Multi-Chassis IPsec Redundancy Overview
      4.10.1. Architecture
      4.10.2. MC-IPsec Mastership Protocol (MIMP)
        4.10.2.1. MIMP Protocol States
        4.10.2.2. Election Logic
        4.10.2.3. Protection Status
        4.10.2.4. Other Details
      4.10.3. Routing
        4.10.3.1. Routing in Public Service
        4.10.3.2. Routing in Private Services
        4.10.3.3. Other Details About Shunting
      4.10.4. MC-IPsec Aware VRRP
      4.10.5. Synchronization
        4.10.5.1. Automatic CHILD_SA Rekey
      4.10.6. Responder Only
    4.11. IPsec Deployment Requirements
    4.12. IKEv2 Remote-Access Tunnel
      4.12.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        4.12.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
      4.12.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      4.12.3. IKEv2 Remote-Access Tunnel – Address Assignment
        4.12.3.1. DHCPv4 Address Assignment
        4.12.3.2. DHCPv6 Address Assignment
        4.12.3.3. DHCPv4/v6 Usage Notes
      4.12.4. IPv6 IPsec Support
        4.12.4.1. IPv6 as Payload
        4.12.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
        4.12.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        4.12.4.4. IPv6 as Payload: Remote-Access Tunnel
        4.12.4.5. IPv6 as Encapsulation
    Configuring IPsec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPsec
      Configuring IPsec Parameters
      Configuring IPsec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPsec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPsec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote — Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPsec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPsec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Client Database Commands
        Internet Key Exchange (IKE) Commands
        IPsec Transform Commands
        IPsec Static Security Association Commands
        Trust Anchor Profile/TS Commands
        Tunnel Template Commands
        Service Configuration Commands
        Interface SAP Tunnel Commands
          IPsec Gateway Commands
        RADIUS Policy Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        IPsec Mastership Election Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  5. L2TPV3 Tunnels
    5.1. In This Chapter
    5.2. L2TPv3 Overview
    5.3. Control Plane
    5.4. Public SAP
    5.5. Private SAP
  6. Video Services
    6.1. In This Section
    6.2. Video Services
      6.2.1. Video Groups
      6.2.2. Video SAP
      6.2.3. Video Interface
      6.2.4. Multicast Information Policies
      6.2.5. Duplicate Stream Protection
      6.2.6. Duplicate Stream Selection
        6.2.6.1. Stream Identification
        6.2.6.2. Initial Sequence Identification
        6.2.6.3. Packet Selection
        6.2.6.4. Clock Recovery
        6.2.6.5. Playout
        6.2.6.6. Loss of Transport
      6.2.7. Video Quality Monitoring
        6.2.7.1. VoIP/Video/Teleconferencing Performance Measurements
        6.2.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    6.3. Retransmission and Fast Channel Change
      6.3.1. RET and FCC Overview
        6.3.1.1. Retransmission
        6.3.1.2. Fast Channel Change (FCC)
          6.3.1.2.1. Retransmission Client
          6.3.1.2.2. Retransmission Server
          6.3.1.2.3. Fast Channel Change Server
          6.3.1.2.4. Logging and Accounting for RET and FCC
        6.3.1.3. RET and FCC Server Concurrency
          6.3.1.3.1. Prerequisites and Restrictions
      6.3.2. Multi-Service ISA Support in the IOM-3 for Video Services
        6.3.2.1. Prioritization Mechanism for RET vs. FCC
        6.3.2.2. RET Features
          6.3.2.2.1. Statistics ALU SQM MIB Additions
          6.3.2.2.2. RET Server Multicast Tuning Parameters
        6.3.2.3. FCC Features
          6.3.2.3.1. FCC Hybrid Mode Support
    6.4. Ad Insertion
      6.4.1. Local/Zoned Ad Insertion
        6.4.1.1. Transport Stream Ad Splicing
        6.4.1.2. Ad Zones
        6.4.1.3. Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  7. Network Address Translation
    7.1. In This Chapter
    7.2. Terminology
    7.3. Network Address Translation (NAT) Overview
      7.3.1. Principles of NAT
      7.3.2. Application Compatibility
    7.4. Large Scale NAT
      7.4.1. Port Range Blocks
        7.4.1.1. Reserved Ports and Priority Sessions
        7.4.1.2. Preventing Port Block Starvation
          7.4.1.2.1. Dynamic Port Block Starvation in LSN
          7.4.1.2.2. Dynamic Port Block Reservation
      7.4.2. Timeouts
      7.4.3. Watermarks
    7.5. L2-Aware NAT
    7.6. One-to-One (1:1) NAT
      7.6.1. Static 1:1 NAT
        7.6.1.1. Protocol Agnostic Behavior
        7.6.1.2. Modification of Parameters in Static 1:1 NAT
        7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
        7.6.1.4. NAT-Policy Selection
        7.6.1.5. Mapping Timeout
        7.6.1.6. Logging
        7.6.1.7. Restrictions
      7.6.2. ICMP
    7.7. Deterministic NAT
      7.7.1. Overview
      7.7.2. Supported Deterministic NAT Flavors
      7.7.3. Number of Subscribers per Outside IP and per Pool
      7.7.4. Referencing a Pool
      7.7.5. Outside Pool Configuration
      7.7.6. Mapping Rules and the map Command in Deterministic LSN44
      7.7.7. Hashing Considerations in Deterministic LSN44
        7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      7.7.8. Sharing of Deterministic NAT Pools
      7.7.9. Simultaneous support of dynamic and deterministic NAT
      7.7.10. Selecting Traffic for NAT
      7.7.11. Inverse Mappings
        7.7.11.1. MIB approach
        7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
      7.7.12. Logging
      7.7.13. Deterministic DS-Lite
        7.7.13.1. Hashing Considerations in DS-Lite
        7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
    7.8. Destination Based NAT (DNAT)
      7.8.1. Combination of SNAPT and DNAT
      7.8.2. Forwarding Model in DNAT
      7.8.3. DNAT Traffic Selection via NAT Classifier
      7.8.4. Configuring DNAT
        7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
        7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    7.9. LSN – Multiple NAT Policies per Inside Routing Context
      7.9.1. Restrictions
      7.9.2. Multiple NAT Policies Per Inside Routing Context
      7.9.3. Routing Approach for NAT Diversion
      7.9.4. Filter-Based Approach
      7.9.5. Multiple NAT Policies with DS-Lite and NAT64
      7.9.6. Default NAT Policy
      7.9.7. Scaling Considerations
      7.9.8. Multiple NAT Policies and SPF Configuration Considerations
        7.9.8.1. Multiple NAT Policies and Forwarding Considerations
      7.9.9. Logging
    7.10. L2-Aware NAT Destination-Based Multiple NAT Policies
      7.10.1. Logging
        7.10.1.1. RADIUS Logging and Nat-Policy Change via CoA
        7.10.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
      7.10.2. Static Port Forwards
      7.10.3. UPnP
    7.11. NAT and CoA
      7.11.1. CoA and NAT Policies
      7.11.2. CoA and DNAT
      7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
    7.12. Port Control Protocol (PCP)
    7.13. Universal Plug and Play Internet Gateway Device Service
      7.13.1. Configuring UPnP IGD Service
    7.14. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      7.14.1. PPTP Protocol
        7.14.1.1. Supported Control Messages
        7.14.1.2. GRE Tunnel
      7.14.2. PPTP ALG Operation
      7.14.3. Multiple Sessions Initiated From the Same PPTP Client Node
      7.14.4. Selection of Call IDs in NAT
    7.15. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
    7.16. NAT Logging
      7.16.1. Syslog/SNMP/Local-File Logging
        7.16.1.1. Filtering LSN Events to System Memory
        7.16.1.2. NAT Logging to a Local File
      7.16.2. SNMP Trap Logging
      7.16.3. NAT Syslog
      7.16.4. LSN RADIUS Logging
        7.16.4.1. Periodic RADIUS Logging
          7.16.4.1.1. Message Pacing
        7.16.4.2. RADIUS Logging and L2-Aware NAT
      7.16.5. LSN and L2-Aware NAT Flow Logging
        7.16.5.1. Large Scale NAT44 Flow Logging Configuration Example
    7.17. DS-Lite and NAT64 Fragmentation
      7.17.1. Overview
      7.17.2. IPv6 Fragmentation in DS-Lite
      7.17.3. NAT64
    7.18. Enhanced Statistics in NAT — Histogram
      7.18.1. Configuration
    7.19. NAT Stateless Dual-Homing
      7.19.1. Configuration Considerations
      7.19.2. Troubleshooting Commands
    7.20. NAT ISA (Intra-Chassis) Redundancy
      7.20.1. Active-Active ISA Redundancy Model
      7.20.2. Start-up Conditions
      7.20.3. Recovery
      7.20.4. Adding Additional ISAs in the ISA Group
    7.21. ISA Feature Interactions
      7.21.1. MS-ISA Use with Service Mirrors
      7.21.2. LNS, Application Assurance and NAT
      7.21.3. Subscriber Aware Large Scale NAT44
    7.22. Mapping of Address and Port Using Translation (MAP-T)
      7.22.1. MAP-T Rules
      7.22.2. A+P Mapping Algorithm
      7.22.3. Routing Considerations
      7.22.4. Forwarding Considerations in the BR
        7.22.4.1. IPv6 Addresses
        7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
        7.22.4.3. Hub-And-Spoke Topology
        7.22.4.4. Rule Prefix Overlap
      7.22.5. BMR Rules Implementation Example
      7.22.6. ICMP
      7.22.7. Fragmentation
        7.22.7.1. Fragmentation in the Downstream Direction
        7.22.7.2. Fragmentation in the Upstream Direction
        7.22.7.3. Fragmentation Statistics
      7.22.8. Maximum Segment Size (MSS) Adjust
      7.22.9. Statistics Collection
      7.22.10. Logging
      7.22.11. Licensing
      7.22.12. Configuration
        7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
      7.22.13. Inter-Chassis Redundancy
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Configuring VSR-NAT
      VSR-NAT Licensing
      Statistics Collection For LSN Bindings
      Statistics Collection For LSN Bandwidth
      Statistics Collection and HA
      VSR-NAT Show Command Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        NAT MAP Domain Configuration Commands
        TCP MSS Adjustment Commands
        NAT MAP-T Configuration Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT MAP-T Commands
        NAT Show Commands
        MAP-T Show Commands
        NAT Clear Commands
        MAP-T Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  8. TCP MSS Adjustment
    8.1. In This Section
    8.2. Overview
    8.3. TCP MSS Adjustment for ESM Hosts
    8.4. TCP MSS Adjustment for NAT Services
    8.5. TCC MSS Adjustment Commands
      8.5.1. Command Hierarchy
        8.5.1.1. TCC MSS Adjustment Command Descriptions
  9. L2TP Network Server
    9.1. In This Chapter
    9.2. Subscriber agg-rate-limit on LNS
    9.3. LNS Reassembly
      9.3.1. Overview
      9.3.2. Reassembly Function
      9.3.3. Load Sharing Between the ISAs
      9.3.4. Inter-chassis ISA Redundancy
    9.4. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      9.4.1. Terminology
      9.4.2. LNS MLPPPoX
      9.4.3. MLPPP Encapsulation
      9.4.4. MLPPPoX Negotiation
      9.4.5. Enabling MLPPPoX
      9.4.6. Link Fragmentation and Interleaving (LFI)
        9.4.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      9.4.7. LFI Functionality Implemented in LNS
        9.4.7.1. Last Mile QoS Awareness in the LNS
        9.4.7.2. BBB-ISA Processing
        9.4.7.3. LNS-LAC Link
        9.4.7.4. AN-RG Link
        9.4.7.5. Home Link
        9.4.7.6. Optimum Fragment Size Calculation by LNS
          9.4.7.6.1. Encapsulation Based Fragment Size
          9.4.7.6.2. Fragment Size Based on the Max Transmission Delay
          9.4.7.6.3. Selection of the Optimum Fragment Length
      9.4.8. Upstream Traffic Considerations
      9.4.9. Multiple Links MLPPPoX With No Interleaving
      9.4.10. MLPPPoX Session Support
      9.4.11. Session Load Balancing Across Multiple BB-ISAs
      9.4.12. BB-ISA Hashing Considerations
      9.4.13. Last Mile Rate and Encapsulation Parameters
      9.4.14. Link Failure Detection
      9.4.15. CoA Support
      9.4.16. Accounting
      9.4.17. Filters and Mirroring
      9.4.18. PTA Considerations
      9.4.19. QoS Considerations
        9.4.19.1. Dual-Pass
        9.4.19.2. Traffic Prioritization in LFI
        9.4.19.3. Shaping Based on the Last Mile Wire Rates
        9.4.19.4. Downstream Bandwidth Management on Egress Port
      9.4.20. Sub/Sla-Profile Considerations
      9.4.21. Example of MLPPPoX Session Setup Flow
      9.4.22. Other Considerations
    9.5. Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  10. Threat Management Service
    10.1. In This Section
    10.2. TMS Service Introduction
    10.3. Configuration Guidelines and Example
      10.3.1. TMS Image Location
      10.3.2. Configuration Example For TMS Interfaces on the SR OS
      10.3.3. Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2. ISA Hardware
    2.1. In This Section
    2.2. MS-ISA2 Overview
    2.3. MS-ISA Overview
    2.4. MS-ISM Overview
    2.5. Application Assurance Hardware Features
      2.5.1. AA System Support
      2.5.2. Host IOM Support for AA on ISAs
  3. Application Assurance
    3.1. In This Section
    3.2. Application Assurance (AA) Overview
      3.2.1. Application Assurance: Inline Policy Enforcement
      3.2.2. AA Integration in Subscriber Edge Gateways
      3.2.3. Fixed Residential Broadband Services
        3.2.3.1. Dual-Stack Lite – DS-Lite
        3.2.3.2. 6to4 /6RD
      3.2.4. Wireless LAN Gateway Broadband Services
      3.2.5. Application-Aware Business VPN Services
      3.2.6. Business Mobile Backhaul
      3.2.7. SeGW Firewall Service
    3.3. Application Assurance System Architecture
      3.3.1. AA ISA Resource Configuration
        3.3.1.1. AA ISA Groups
          3.3.1.1.1. AA ISA Groups
          3.3.1.1.2. AA Group Partitions
          3.3.1.1.3. Bypass Modes
        3.3.1.2. Redundancy
          3.3.1.2.1. No AA ISA Group Redundancy
          3.3.1.2.2. Failure to Fabric
          3.3.1.2.3. N+1 AA ISA Card Warm Redundancy
        3.3.1.3. ISA Load Balancing
        3.3.1.4. Asymmetry Removal
          3.3.1.4.1. Asymmetry Removal Overview
          3.3.1.4.2. Failure Modes
          3.3.1.4.3. AARP Peered Node/Instance Configuration
          3.3.1.4.4. Multi-Chassis Control Link (MC-CTL)
          3.3.1.4.5. Multi-Chassis Datapath Shunts
        3.3.1.5. ISA Overload Detection
      3.3.2. AA Packet Processing
        3.3.2.1. Divert of Traffic and Subscribers
          3.3.2.1.1. Services and AA Subscribers
          3.3.2.1.2. Spoke SDPs
          3.3.2.1.3. Transit AA Subs
          3.3.2.1.4. AA Subscriber Application Service Definition
        3.3.2.2. Application Identification
          3.3.2.2.1. Application Assurance Identification Components
          3.3.2.2.2. Protocol Signatures
          3.3.2.2.3. Custom Protocols
          3.3.2.2.4. Protocol Shutdown
          3.3.2.2.5. Supported Protocol Signatures
          3.3.2.2.6. Application Groups
          3.3.2.2.7. Charging Groups
          3.3.2.2.8. Applications
          3.3.2.2.9. Application Filters
          3.3.2.2.10. HTTP
          3.3.2.2.11. AA IP Prefix Lists
        3.3.2.3. Statistics and Accounting
          3.3.2.3.1. Per-AA-Subscriber Special Study
          3.3.2.3.2. System Aspects
          3.3.2.3.3. Application Assurance XML Volume Statistics and Accounting
          3.3.2.3.4. AA Partition Traffic Type Statistics
          3.3.2.3.5. Configurable AA-Subscriber Statistics Collection
          3.3.2.3.6. AA-Performance Record for ISA Load
          3.3.2.3.7. AA Partition Traffic Type Statistics
          3.3.2.3.8. AA Partition Admit–Deny Statistics
          3.3.2.3.9. RADIUS Accounting AA Records
          3.3.2.3.10. AA GX Based Usage Monitoring
          3.3.2.3.11. Supported AVPs
          3.3.2.3.12. Cflowd AA Records
        3.3.2.4. Application QoS Policy (AQP)
          3.3.2.4.1. AQP Match Criteria
          3.3.2.4.2. AQP Actions
          3.3.2.4.3. Application Assurance Policers
          3.3.2.4.4. Time of Day Policing Adjustments
          3.3.2.4.5. Application Assurance HTTP Redirect
          3.3.2.4.6. ICAP - Large Scale Category based URL Filtering
          3.3.2.4.7. Local URL-List Filtering
          3.3.2.4.8. HTTP Header Enrichment
          3.3.2.4.9. HTTP In Browser Notification
        3.3.2.5. Application Assurance Firewall
          3.3.2.5.1. Denial of Service (DoS) Protection
          3.3.2.5.2. TCP Validation
          3.3.2.5.3. Policy Partitioned AA FW
          3.3.2.5.4. Configuring AA FW
          3.3.2.5.5. AA FW Logging
          3.3.2.5.6. SeGW Firewall Protection
      3.3.3. Service Monitoring and Debugging
      3.3.4. CPU Utilization
      3.3.5. CLI Batch: Begin, Commit and Abort Commands
    Configuring Application Assurance with CLI
      Provisioning AA ISA MDA
      Configuring an AA ISA Group
        Configuring Watermark Parameters
      Configuring a Group Policy
        Beginning and Committing a Policy Configuration
        Aborting a Policy Configuration
        Configuring an IP Prefix List
        Configuring AA Session Filters
        Configuring an Application Group
        Configuring an Application
        Configuring an Application Filter
        Configuring an Application Profile
        Configuring Suppressible App-Profile with SRRP
        Configuring Application Service Options
        Configuring a Policer
        Configuring an Application QoS Policy
        Configuring an Application and DNS IP Cache for URL Content Charging Strengthening
        Configuring an HTTP Error Redirect
        Configuring HTTP Header Enrichment
        Configuring an HTTP Redirect Policy
        Configuring a Captive Redirect HTTP Redirect Policy
          Captive-Redirect and HTTPS Flows Redirection
        Configuring ICAP URL Filtering
        Configuring Local URL-List Filtering
        Configuring HTTP Notification
      Configuring AA Volume Accounting and Statistics
        Configuring Cflowd Collector
        Configuring AA Volume, TCP and RTP Performance Reporting
    Application Assurance Command Reference
      Application Assurance Command Reference
        Hardware Commands
        Admin Commands
        ISA Commands
        Application Assurance Commands
          AA Commands
          AA Group Commands
        AA Interface Commands
        Persistence Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
          Admin Commands
        Application Assurance Commands
        Group Commands
          Transit Subscriber Commands
          Policer Commands
          Policy Commands
          Statistics Commands
          TCP Validation Commands
          Policy Commands
          System Persistence Commands
        ISA Commands
          Application Assurance Group Commands
    Show, Tools, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  4. IP Tunnels
    4.1. In This Section
    4.2. IP Tunnels Overview
      4.2.1. Tunnel ISAs
        4.2.1.1. Public Tunnel SAPs
        4.2.1.2. Private Tunnel SAPs
        4.2.1.3. IP Interface Configuration
        4.2.1.4. GRE and IP-IP Tunnel Configuration
        4.2.1.5. IP Fragmentation and Reassembly for IP Tunnels
      4.2.2. Operational Conditions
      4.2.3. QoS Interactions
      4.2.4. OAM Interactions
      4.2.5. Redundancy
      4.2.6. Statistics Collection
      4.2.7. Security
        4.2.7.1. GRE Tunnel Multicast Support
        4.2.7.2. IPv6 over IPv4 GRE Tunnel
      4.2.8. IKEv2
        4.2.8.1. IKEv2 Traffic Selector and TS-List
        4.2.8.2. IKEv2 Fragmentation
      4.2.9. SHA2 Support
      4.2.10. IPsec Client Lockout
    4.3. X.509v3 Certificate Overview
      4.3.1. SROS X.509v3 Certificate Support
      4.3.2. Local Storage
      4.3.3. CA-Profile
      4.3.4. CA Chain Computation
      4.3.5. Certificate Enrollment
      4.3.6. Certificate Revocation Check
      4.3.7. Certificate/CRL Expiration Warning
      4.3.8. Certificate/CRL/Key Cache
      4.3.9. Auto CRL Update
      4.3.10. IPsec Client Database
    4.4. Using Certificates For IPsec Tunnel Authentication
    4.5. Trust-Anchor-Profile
    4.6. Cert-Profile
      4.6.1. Cert-Profile/trust-anchor-profile versus cert/trust-anchor
    4.7. Certificate Management Protocol Version 2 (CMPv2)
    4.8. OCSP
    4.9. Video Wholesale Example
    4.10. Multi-Chassis IPsec Redundancy Overview
      4.10.1. Architecture
      4.10.2. MC-IPsec Mastership Protocol (MIMP)
        4.10.2.1. MIMP Protocol States
        4.10.2.2. Election Logic
        4.10.2.3. Protection Status
        4.10.2.4. Other Details
      4.10.3. Routing
        4.10.3.1. Routing in Public Service
        4.10.3.2. Routing in Private Services
        4.10.3.3. Other Details About Shunting
      4.10.4. MC-IPsec Aware VRRP
      4.10.5. Synchronization
        4.10.5.1. Automatic CHILD_SA Rekey
      4.10.6. Responder Only
    4.11. IPsec Deployment Requirements
    4.12. IKEv2 Remote-Access Tunnel
      4.12.1. IKEv2 Remote Access Tunnel – RADIUS-Based PSK/Certificate Authentication
        4.12.1.1. IKEv2 Remote-Access Tunnel – EAP Authentication
      4.12.2. IKEv2 Remote-Access Tunnel – Authentication without RADIUS
      4.12.3. IKEv2 Remote-Access Tunnel – Address Assignment
        4.12.3.1. DHCPv4 Address Assignment
        4.12.3.2. DHCPv6 Address Assignment
        4.12.3.3. DHCPv4/v6 Usage Notes
      4.12.4. IPv6 IPsec Support
        4.12.4.1. IPv6 as Payload
        4.12.4.2. IPv6 as Payload: Static LAN-to-LAN Tunnel
        4.12.4.3. IPv6 as Payload: Dynamic LAN-to-LAN Tunnel
        4.12.4.4. IPv6 as Payload: Remote-Access Tunnel
        4.12.4.5. IPv6 as Encapsulation
    Configuring IPsec with CLI
      Provisioning a Tunnel ISA
      Configuring a Tunnel Group
      Configuring Router Interfaces for IPsec
      Configuring IPsec Parameters
      Configuring IPsec in Services
      Configuring X.509v3 Certificate Parameters
      Configuring MC-IPsec
        Configuring MIMP
        Configuring Multi-Chassis Synchronization
        Configuring Routing for MC-IPsec
      Configuring and Using CMPv2
      Configuring OCSP
      Configuring IKEv2 Remote — Access Tunnel
      Configuring IKEv2 Remote — Access Tunnel with Local Address Assignment
    IP Tunnel Command Reference
      Command Hierarchies
        Configuration Commands
          Hardware Commands
          ISA Commands
          IPsec Commands
        Service Configuration Commands
          IES Commands
          VPRN Commands
          IPsec Mastership Election Commands
          Related Commands
          CMPv2 Commands
          Auto-Update Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        ISA Commands
        Certificate Profile Commands
        Client Database Commands
        Internet Key Exchange (IKE) Commands
        IPsec Transform Commands
        IPsec Static Security Association Commands
        Trust Anchor Profile/TS Commands
        Tunnel Template Commands
        Service Configuration Commands
        Interface SAP Tunnel Commands
          IPsec Gateway Commands
        RADIUS Policy Commands
        CMPv2 Commands
        Auto-Update Command Descriptions
        IPsec Mastership Election Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
  5. L2TPV3 Tunnels
    5.1. In This Chapter
    5.2. L2TPv3 Overview
    5.3. Control Plane
    5.4. Public SAP
    5.5. Private SAP
  6. Video Services
    6.1. In This Section
    6.2. Video Services
      6.2.1. Video Groups
      6.2.2. Video SAP
      6.2.3. Video Interface
      6.2.4. Multicast Information Policies
      6.2.5. Duplicate Stream Protection
      6.2.6. Duplicate Stream Selection
        6.2.6.1. Stream Identification
        6.2.6.2. Initial Sequence Identification
        6.2.6.3. Packet Selection
        6.2.6.4. Clock Recovery
        6.2.6.5. Playout
        6.2.6.6. Loss of Transport
      6.2.7. Video Quality Monitoring
        6.2.7.1. VoIP/Video/Teleconferencing Performance Measurements
        6.2.7.2. Mean Opinion Score (MOS) Performance Measurements Solution Architecture
    6.3. Retransmission and Fast Channel Change
      6.3.1. RET and FCC Overview
        6.3.1.1. Retransmission
        6.3.1.2. Fast Channel Change (FCC)
          6.3.1.2.1. Retransmission Client
          6.3.1.2.2. Retransmission Server
          6.3.1.2.3. Fast Channel Change Server
          6.3.1.2.4. Logging and Accounting for RET and FCC
        6.3.1.3. RET and FCC Server Concurrency
          6.3.1.3.1. Prerequisites and Restrictions
      6.3.2. Multi-Service ISA Support in the IOM-3 for Video Services
        6.3.2.1. Prioritization Mechanism for RET vs. FCC
        6.3.2.2. RET Features
          6.3.2.2.1. Statistics ALU SQM MIB Additions
          6.3.2.2.2. RET Server Multicast Tuning Parameters
        6.3.2.3. FCC Features
          6.3.2.3.1. FCC Hybrid Mode Support
    6.4. Ad Insertion
      6.4.1. Local/Zoned Ad Insertion
        6.4.1.1. Transport Stream Ad Splicing
        6.4.1.2. Ad Zones
        6.4.1.3. Local/Zoned ADI Prerequisites and Restrictions
    Configuring Video Service Components with CLI
      Video Services Overview
        Configuring an ISA-MS Module
        Configuring a Video Group
        Configuring a Video SAP and Video Interface in a Service
        Basic Multicast Information Policy Configuration
      Sample Configurations
    Configuring RET/FCC Video Components with CLI
      Configuring RET/FCC Video Features in the CLI
        Configuring the RET Client
        Configuring the RET Server
        Configuring the FCC Server
        Logging and Accounting Collection for Video Statistics
    Configuring ADI Components with CLI
      Configuring ADI in CLI
        Configuring the RET Client
        Configuring a Video Group
        Configuring NTP
        Configuring Channel Parameters
        Configuring Service Entities
    Video Services Command Reference
      IP-TV Command Hierarchies
        Hardware Commands
        Video Group Commands
        Video Policy Video Commands
        Bundle and Channel Commands
        Service Video Interface Commands
          VPLS Commands
          IES Commands
          VPRN Commands
      Command Descriptions
        Generic Commands
        Hardware Commands
        LNS Group Commands
        Video Group Commands
        Multicast Info Policy Commands
        Video Policy Commands
        Bundle and Channel Commands
        Service Video Interface Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  7. Network Address Translation
    7.1. In This Chapter
    7.2. Terminology
    7.3. Network Address Translation (NAT) Overview
      7.3.1. Principles of NAT
      7.3.2. Application Compatibility
    7.4. Large Scale NAT
      7.4.1. Port Range Blocks
        7.4.1.1. Reserved Ports and Priority Sessions
        7.4.1.2. Preventing Port Block Starvation
          7.4.1.2.1. Dynamic Port Block Starvation in LSN
          7.4.1.2.2. Dynamic Port Block Reservation
      7.4.2. Timeouts
      7.4.3. Watermarks
    7.5. L2-Aware NAT
    7.6. One-to-One (1:1) NAT
      7.6.1. Static 1:1 NAT
        7.6.1.1. Protocol Agnostic Behavior
        7.6.1.2. Modification of Parameters in Static 1:1 NAT
        7.6.1.3. Load Distribution over ISAs in Static 1:1 NAT
        7.6.1.4. NAT-Policy Selection
        7.6.1.5. Mapping Timeout
        7.6.1.6. Logging
        7.6.1.7. Restrictions
      7.6.2. ICMP
    7.7. Deterministic NAT
      7.7.1. Overview
      7.7.2. Supported Deterministic NAT Flavors
      7.7.3. Number of Subscribers per Outside IP and per Pool
      7.7.4. Referencing a Pool
      7.7.5. Outside Pool Configuration
      7.7.6. Mapping Rules and the map Command in Deterministic LSN44
      7.7.7. Hashing Considerations in Deterministic LSN44
        7.7.7.1. Distribution of Outside IP Addresses Across MS-ISAs in an MS-ISA NA Group
      7.7.8. Sharing of Deterministic NAT Pools
      7.7.9. Simultaneous support of dynamic and deterministic NAT
      7.7.10. Selecting Traffic for NAT
      7.7.11. Inverse Mappings
        7.7.11.1. MIB approach
        7.7.11.2. Off-line Approach to Obtain Deterministic Mappings
      7.7.12. Logging
      7.7.13. Deterministic DS-Lite
        7.7.13.1. Hashing Considerations in DS-Lite
        7.7.13.2. Order of Configuration Steps in Deterministic DS-Lite
    7.8. Destination Based NAT (DNAT)
      7.8.1. Combination of SNAPT and DNAT
      7.8.2. Forwarding Model in DNAT
      7.8.3. DNAT Traffic Selection via NAT Classifier
      7.8.4. Configuring DNAT
        7.8.4.1. DNAT Traffic Selection and Destination IP Address Configuration
        7.8.4.2. Micro-Netting Original Source (Inside) IP Space in DNAT-Only Case
    7.9. LSN – Multiple NAT Policies per Inside Routing Context
      7.9.1. Restrictions
      7.9.2. Multiple NAT Policies Per Inside Routing Context
      7.9.3. Routing Approach for NAT Diversion
      7.9.4. Filter-Based Approach
      7.9.5. Multiple NAT Policies with DS-Lite and NAT64
      7.9.6. Default NAT Policy
      7.9.7. Scaling Considerations
      7.9.8. Multiple NAT Policies and SPF Configuration Considerations
        7.9.8.1. Multiple NAT Policies and Forwarding Considerations
      7.9.9. Logging
    7.10. L2-Aware NAT Destination-Based Multiple NAT Policies
      7.10.1. Logging
        7.10.1.1. RADIUS Logging and Nat-Policy Change via CoA
        7.10.1.2. Delay Between the NAT Resource Allocation and Logging During CoA
      7.10.2. Static Port Forwards
      7.10.3. UPnP
    7.11. NAT and CoA
      7.11.1. CoA and NAT Policies
      7.11.2. CoA and DNAT
      7.11.3. Modifying an Active NAT Prefix List or Nat Classifier via CLI
    7.12. Port Control Protocol (PCP)
    7.13. Universal Plug and Play Internet Gateway Device Service
      7.13.1. Configuring UPnP IGD Service
    7.14. NAT Point-to-Point Tunneling Protocol (PPTP) Application Layer Gateway (ALG)
      7.14.1. PPTP Protocol
        7.14.1.1. Supported Control Messages
        7.14.1.2. GRE Tunnel
      7.14.2. PPTP ALG Operation
      7.14.3. Multiple Sessions Initiated From the Same PPTP Client Node
      7.14.4. Selection of Call IDs in NAT
    7.15. Modifying Active Nat-Prefix-List or NAT Classifier via CLI
    7.16. NAT Logging
      7.16.1. Syslog/SNMP/Local-File Logging
        7.16.1.1. Filtering LSN Events to System Memory
        7.16.1.2. NAT Logging to a Local File
      7.16.2. SNMP Trap Logging
      7.16.3. NAT Syslog
      7.16.4. LSN RADIUS Logging
        7.16.4.1. Periodic RADIUS Logging
          7.16.4.1.1. Message Pacing
        7.16.4.2. RADIUS Logging and L2-Aware NAT
      7.16.5. LSN and L2-Aware NAT Flow Logging
        7.16.5.1. Large Scale NAT44 Flow Logging Configuration Example
    7.17. DS-Lite and NAT64 Fragmentation
      7.17.1. Overview
      7.17.2. IPv6 Fragmentation in DS-Lite
      7.17.3. NAT64
    7.18. Enhanced Statistics in NAT — Histogram
      7.18.1. Configuration
    7.19. NAT Stateless Dual-Homing
      7.19.1. Configuration Considerations
      7.19.2. Troubleshooting Commands
    7.20. NAT ISA (Intra-Chassis) Redundancy
      7.20.1. Active-Active ISA Redundancy Model
      7.20.2. Start-up Conditions
      7.20.3. Recovery
      7.20.4. Adding Additional ISAs in the ISA Group
    7.21. ISA Feature Interactions
      7.21.1. MS-ISA Use with Service Mirrors
      7.21.2. LNS, Application Assurance and NAT
      7.21.3. Subscriber Aware Large Scale NAT44
    7.22. Mapping of Address and Port Using Translation (MAP-T)
      7.22.1. MAP-T Rules
      7.22.2. A+P Mapping Algorithm
      7.22.3. Routing Considerations
      7.22.4. Forwarding Considerations in the BR
        7.22.4.1. IPv6 Addresses
        7.22.4.2. 1:1 Translations and IPv4 Prefix Translations
        7.22.4.3. Hub-And-Spoke Topology
        7.22.4.4. Rule Prefix Overlap
      7.22.5. BMR Rules Implementation Example
      7.22.6. ICMP
      7.22.7. Fragmentation
        7.22.7.1. Fragmentation in the Downstream Direction
        7.22.7.2. Fragmentation in the Upstream Direction
        7.22.7.3. Fragmentation Statistics
      7.22.8. Maximum Segment Size (MSS) Adjust
      7.22.9. Statistics Collection
      7.22.10. Logging
      7.22.11. Licensing
      7.22.12. Configuration
        7.22.12.1. Modifying MAP-T Parameters When the MAP-T Domain is Active
      7.22.13. Inter-Chassis Redundancy
    Configuring NAT
      ISA Redundancy
      NAT Layer 2-Aware Configurations
      Large Scale NAT Configuration
      NAT Configuration Examples
    Configuring VSR-NAT
      VSR-NAT Licensing
      Statistics Collection For LSN Bindings
      Statistics Collection For LSN Bandwidth
      Statistics Collection and HA
      VSR-NAT Show Command Examples
    Network Address Translation Command Reference
      Command Hierarchies
        ISA Configuration Commands
        NAT Service Configuration Commands
          IPFIX Commands
          UPnP Commands
          ISA RADIUS Policy Commands
          VPRN Commands
        NAT Subscriber Management Commands
          NAT Subscriber Management BRG Commands
        NAT Router Configuration Commands
        NAT DNAT Commands
        NAT Admin Configuration Commands
        NAT MAP Domain Configuration Commands
        TCP MSS Adjustment Commands
        NAT MAP-T Configuration Commands
        Tools Commands
        Show Commands
        Clear Commands
        Tools Commands
        Filter Commands
      Command Descriptions
        Generic Commands
        ISA Configuration Commands
        NAT Configuration Commands
        NAT Service Configuration Commands
        IPFlow Information Export Protocol Commands
        AAA Policy Commands
        NAT Subscriber Management Commands
        NAT Subscriber Management BRG Commands
        NAT DNAT Commands
        NAT MAP-T Commands
        NAT Show Commands
        MAP-T Show Commands
        NAT Clear Commands
        MAP-T Clear Commands
        NAT Tools Commands
        NAT Filter Commands
  8. TCP MSS Adjustment
    8.1. In This Section
    8.2. Overview
    8.3. TCP MSS Adjustment for ESM Hosts
    8.4. TCP MSS Adjustment for NAT Services
    8.5. TCC MSS Adjustment Commands
      8.5.1. Command Hierarchy
        8.5.1.1. TCC MSS Adjustment Command Descriptions
  9. L2TP Network Server
    9.1. In This Chapter
    9.2. Subscriber agg-rate-limit on LNS
    9.3. LNS Reassembly
      9.3.1. Overview
      9.3.2. Reassembly Function
      9.3.3. Load Sharing Between the ISAs
      9.3.4. Inter-chassis ISA Redundancy
    9.4. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      9.4.1. Terminology
      9.4.2. LNS MLPPPoX
      9.4.3. MLPPP Encapsulation
      9.4.4. MLPPPoX Negotiation
      9.4.5. Enabling MLPPPoX
      9.4.6. Link Fragmentation and Interleaving (LFI)
        9.4.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      9.4.7. LFI Functionality Implemented in LNS
        9.4.7.1. Last Mile QoS Awareness in the LNS
        9.4.7.2. BBB-ISA Processing
        9.4.7.3. LNS-LAC Link
        9.4.7.4. AN-RG Link
        9.4.7.5. Home Link
        9.4.7.6. Optimum Fragment Size Calculation by LNS
          9.4.7.6.1. Encapsulation Based Fragment Size
          9.4.7.6.2. Fragment Size Based on the Max Transmission Delay
          9.4.7.6.3. Selection of the Optimum Fragment Length
      9.4.8. Upstream Traffic Considerations
      9.4.9. Multiple Links MLPPPoX With No Interleaving
      9.4.10. MLPPPoX Session Support
      9.4.11. Session Load Balancing Across Multiple BB-ISAs
      9.4.12. BB-ISA Hashing Considerations
      9.4.13. Last Mile Rate and Encapsulation Parameters
      9.4.14. Link Failure Detection
      9.4.15. CoA Support
      9.4.16. Accounting
      9.4.17. Filters and Mirroring
      9.4.18. PTA Considerations
      9.4.19. QoS Considerations
        9.4.19.1. Dual-Pass
        9.4.19.2. Traffic Prioritization in LFI
        9.4.19.3. Shaping Based on the Last Mile Wire Rates
        9.4.19.4. Downstream Bandwidth Management on Egress Port
      9.4.20. Sub/Sla-Profile Considerations
      9.4.21. Example of MLPPPoX Session Setup Flow
      9.4.22. Other Considerations
    9.5. Configuration Notes
    L2TP Network Server Command Reference
      Command Hierarchies
        ISA Commands
        MLPPP on LNS Commands
      Command Descriptions
        Generic Commands
        LNS Commands
        Network Address Translation (NAT) Commands
        MLPPP on LNS Commands
  10. Threat Management Service
    10.1. In This Section
    10.2. TMS Service Introduction
    10.3. Configuration Guidelines and Example
      10.3.1. TMS Image Location
      10.3.2. Configuration Example For TMS Interfaces on the SR OS
      10.3.3. Dynamic Control of IP Filter Entries
    Threat Management Service Command Reference
      Command Hierarchies
        Card Commands
        MDA Commands
        TMS Commands
        Policy Commands
      Command Descriptions
        Generic Commands
        Card Commands
        MDA Commands
        Threat Management Service Interface Commands
        Policy Commands
    TMS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        TMS-Related Show Commands
        Clear Commands
        Debug Commands
  11. Standards and Protocol Support
  Customer Document and Product Support
OAM and Diagnostics Guide R14.0.R4
  1.  Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Mirror Services
    2.1. In This Chapter
    2.2. Service Mirroring
    2.3. Mirror Implementation
      2.3.1. Mirror Source and Destinations
        2.3.1.1. Local and Remote Mirroring
        2.3.1.2. Slicing
      2.3.2. Mirroring Performance
      2.3.3. Mirroring Configuration
      2.3.4. ATM Mirroring
      2.3.5. IP Mirroring
        2.3.5.1. Remote IP Mirroring
        2.3.5.2. Local IP Mirroring
        2.3.5.3. Port-ID Enabled PPP Mirroring
    2.4. Mirrored Traffic Transport using MPLS-TP SDPs
    2.5. Subscriber Mirroring
    2.6. Lawful Intercept
      2.6.1. LI Activation Through RADIUS
      2.6.2. Routable Lawful Intercept Encapsulation
    2.7. Pseudowire Redundant Mirror Services
      2.7.1. Redundant Mirror Source Notes
    2.8. Carrier Grade NAT – Lawful Intercept
    2.9. Configuration Process Overview
    2.10. Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
  3.  OAM, SAA, and OAM-PM
    3.1. In This Chapter
    3.2. OAM Overview
      3.2.1. LSP Diagnostics: LSP Ping and Trace
      3.2.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      3.2.3. ECMP Considerations
      3.2.4. lsp-ping and lsp-trace over Unnumbered IP Interface
      3.2.5. Downstream Detailed Mapping (DDMAP) TLV
      3.2.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        3.2.6.1. Responder Node Procedures
        3.2.6.2. Sender Node Procedures
      3.2.7. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      3.2.8. LDP ECMP Tree Building
      3.2.9. Periodic Path Exercising
      3.2.10. LSP Ping for RSVP P2MP LSP (P2MP)
      3.2.11. LSP Trace for RSVP P2MP LSP
        3.2.11.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      3.2.12. Tunneling of ICMP Reply Packets over MPLS LSP
      3.2.13. QoS Handling of Tunneled ICMP Reply Packets
      3.2.14. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      3.2.15. SDP Diagnostics
      3.2.16. SDP Ping
      3.2.17. SDP MTU Path Discovery
      3.2.18. Service Diagnostics
      3.2.19. VPLS MAC Diagnostics
      3.2.20. MAC Ping
      3.2.21. MAC Trace
      3.2.22. CPE Ping
      3.2.23. CPE Ping for PBB Epipe
        3.2.23.1. Hardware Support
      3.2.24. MAC Populate
      3.2.25. MAC Purge
      3.2.26. VLL Diagnostics
      3.2.27. VCCV Ping
        3.2.27.1. VCCV-Ping Application
        3.2.27.2. VCCV Ping in a Multi-Segment Pseudowire
      3.2.28. Automated VCCV-Trace Capability for MS-Pseudowire
        3.2.28.1. VCCV for Static Pseudowire Segments
        3.2.28.2. Detailed VCCV-Trace Operation
        3.2.28.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          3.2.28.3.1. Sending a VCCV Echo Request
          3.2.28.3.2. Receiving an VCCV Echo Request
          3.2.28.3.3. Receiving an VCCV Echo Reply
      3.2.29. IGMP Snooping Diagnostics
      3.2.30. MFIB Ping
      3.2.31. ATM Diagnostics
      3.2.32. MPLS-TP On-Demand OAM Commands
      3.2.33. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        3.2.33.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      3.2.34. MPLS-TP LSPs: LSP-Ping/LSP Trace
      3.2.35. VxLAN Ping Supporting EVPN for VxLAN
      3.2.36. Show Commands
      3.2.37. BFD
    3.3. IP Performance Monitoring (IP PM)
      3.3.1. Two-Way Active Measurement Protocol (TWAMP)
      3.3.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
    3.4. Ethernet Connectivity Fault Management (ETH-CFM)
      3.4.1. ETH-CFM Building Blocks
      3.4.2. Loopback
      3.4.3. Loopback Multicast
      3.4.4. Linktrace
      3.4.5. Continuity Check (CC)
      3.4.6. CC Remote Peer Auto-Discovery
      3.4.7. CCM Grace Period
      3.4.8. CCM Hold Timers
      3.4.9. Alarm Indication Signal (ETH-AIS Y.1731)
      3.4.10. Client Signal Fail (ETH-CSF Y.1731)
      3.4.11. Test (ETH-TST Y.1731)
      3.4.12. One-Way Delay Measurement (ETH-1DM Y.1731)
      3.4.13. Two-Way Delay Measurement (ETH-DMM Y.1731)
      3.4.14. Synthetic Loss Measurement (ETH-SLM Y.1731)
        3.4.14.1. Configuration Example
      3.4.15. Frame Loss Measurement (ETH-LMM Y.1731)
    3.5. ETH-CFM Statistics
    3.6. ETH-CFM Packet Debug
    3.7. ETH-CFM CoS Considerations
    3.8. OAM Mapping
      3.8.1. CFM Connectivity Fault Conditions
      3.8.2. CFM Fault Propagation Methods
      3.8.3. Epipe Services
      3.8.4. CFM Detected Fault
        3.8.4.1. SAP/SDP-Binding Failure (Including Pseudowire Status)
        3.8.4.2. Service Down
        3.8.4.3. Interaction with Pseudowire Redundancy
      3.8.5. Ipipe Services
        3.8.5.1. CFM Detected Fault
        3.8.5.2. SAP/SDP-binding Failure (Including Pseudowire Status)
        3.8.5.3. Service Administratively Shutdown
        3.8.5.4. Interaction with Pseudowire Redundancy
      3.8.6. VPLS Service
        3.8.6.1. CFM Detected Fault
        3.8.6.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
        3.8.6.3. Service Down
        3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
      3.8.7. IES and VPRN Services
      3.8.8. Pseudowire Switching
      3.8.9. LLF and CFM Fault Propagation
      3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
    3.9. Service Assurance Agent (SAA)
    3.10. OAM Performance Monitoring (OAM-PM)
      3.10.1. Session
      3.10.2. Standard PM Packets
      3.10.3. Detectable Transmit Errors
      3.10.4. Measurement Intervals
      3.10.5. Data Structures and Storage
      3.10.6. Bin Groups
      3.10.7. Relating the Components
      3.10.8. IP Performance Monitoring
        3.10.8.1. Accounting Policy Configuration
        3.10.8.2. Service Configuration
        3.10.8.3. OAM-PM Configuration
      3.10.9. Ethernet Performance Monitoring
        3.10.9.1. Accounting Policy Configuration
        3.10.9.2. ETH-CFM Configuration
        3.10.9.3. Service Configuration
        3.10.9.4. Ethernet OAM-PM Configuration
      3.10.10. OAM-PM Event Monitoring
    3.11. Traceroute with ICMP Tunneling In Common Applications
      3.11.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      3.11.2. VPRN Inter-AS Option B
      3.11.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1.  Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Mirror Services
    2.1. In This Chapter
    2.2. Service Mirroring
    2.3. Mirror Implementation
      2.3.1. Mirror Source and Destinations
        2.3.1.1. Local and Remote Mirroring
        2.3.1.2. Slicing
      2.3.2. Mirroring Performance
      2.3.3. Mirroring Configuration
      2.3.4. ATM Mirroring
      2.3.5. IP Mirroring
        2.3.5.1. Remote IP Mirroring
        2.3.5.2. Local IP Mirroring
        2.3.5.3. Port-ID Enabled PPP Mirroring
    2.4. Mirrored Traffic Transport using MPLS-TP SDPs
    2.5. Subscriber Mirroring
    2.6. Lawful Intercept
      2.6.1. LI Activation Through RADIUS
      2.6.2. Routable Lawful Intercept Encapsulation
    2.7. Pseudowire Redundant Mirror Services
      2.7.1. Redundant Mirror Source Notes
    2.8. Carrier Grade NAT – Lawful Intercept
    2.9. Configuration Process Overview
    2.10. Configuration Notes
    Configuring Service Mirroring with CLI
      Mirror Configuration Overview
        Defining Mirrored Traffic
      Lawful Intercept Configuration Overview
        Saving LI Data
        Regulating LI Access
          LI User Access
          LI Source Configuration
        Configurable Filter Lock for Lawful Intercept
        LI MAC Filter Configuration
        LI Logging
    Basic Mirroring Configuration
      Mirror Classification Rules
        Port
        SAP
        MAC filter
        IP filter
        Ingress label
        Subscriber
    Common Configuration Tasks
      Configuring a Local Mirror Service
      Configuring SDPs for Mirrors and LI
      Configuring a Remote Mirror Service
      Configuring an ATM Mirror Service
      Configuring Lawful Intercept Parameters
      Pseudowire Redundancy for Mirror Services Configuration Example
    Service Management Tasks
      Modifying a Local Mirrored Service
      Deleting a Local Mirrored Service
      Modifying a Remote Mirrored Service
      Deleting a Remote Mirrored Service
     Mirror Service Configuration Command Reference
      Command Hierarchies
        Mirror Configuration Commands
        Lawful Intercept Commands
      Command Descriptions
        Generic Commands
        Mirror Destination Configuration Commands
        Lawful Intercept Commands
          Other LI Configuration Commands
     Mirror Service Show and Debug Command Reference
      Command Hierarchies
        Show Commands
        Debug Commands
      Command Descriptions
         Show Commands
        Debug Commands
  3.  OAM, SAA, and OAM-PM
    3.1. In This Chapter
    3.2. OAM Overview
      3.2.1. LSP Diagnostics: LSP Ping and Trace
      3.2.2. LSP Ping/Trace for an LSP Using a BGP IPv4 Label Route
      3.2.3. ECMP Considerations
      3.2.4. lsp-ping and lsp-trace over Unnumbered IP Interface
      3.2.5. Downstream Detailed Mapping (DDMAP) TLV
      3.2.6. Using DDMAP TLV in LSP Stitching and LSP Hierarchy
        3.2.6.1. Responder Node Procedures
        3.2.6.2. Sender Node Procedures
      3.2.7. LDP Tree Trace: End-to-End Testing of Paths in an LDP ECMP Network
      3.2.8. LDP ECMP Tree Building
      3.2.9. Periodic Path Exercising
      3.2.10. LSP Ping for RSVP P2MP LSP (P2MP)
      3.2.11. LSP Trace for RSVP P2MP LSP
        3.2.11.1. LSP Trace Behavior When S2L Path Traverses a Re-Merge Node
      3.2.12. Tunneling of ICMP Reply Packets over MPLS LSP
      3.2.13. QoS Handling of Tunneled ICMP Reply Packets
      3.2.14. Summary of UDP Traceroute Behavior With and Without ICMP Tunneling
      3.2.15. SDP Diagnostics
      3.2.16. SDP Ping
      3.2.17. SDP MTU Path Discovery
      3.2.18. Service Diagnostics
      3.2.19. VPLS MAC Diagnostics
      3.2.20. MAC Ping
      3.2.21. MAC Trace
      3.2.22. CPE Ping
      3.2.23. CPE Ping for PBB Epipe
        3.2.23.1. Hardware Support
      3.2.24. MAC Populate
      3.2.25. MAC Purge
      3.2.26. VLL Diagnostics
      3.2.27. VCCV Ping
        3.2.27.1. VCCV-Ping Application
        3.2.27.2. VCCV Ping in a Multi-Segment Pseudowire
      3.2.28. Automated VCCV-Trace Capability for MS-Pseudowire
        3.2.28.1. VCCV for Static Pseudowire Segments
        3.2.28.2. Detailed VCCV-Trace Operation
        3.2.28.3. Control Plane Processing of a VCCV Echo Message in a MS-Pseudowire
          3.2.28.3.1. Sending a VCCV Echo Request
          3.2.28.3.2. Receiving an VCCV Echo Request
          3.2.28.3.3. Receiving an VCCV Echo Reply
      3.2.29. IGMP Snooping Diagnostics
      3.2.30. MFIB Ping
      3.2.31. ATM Diagnostics
      3.2.32. MPLS-TP On-Demand OAM Commands
      3.2.33. MPLS-TP Pseudowires: VCCV-Ping/VCCV-Trace
        3.2.33.1. VCCV Ping and VCCV Trace Between Static MPLS-TP and Dynamic PW Segments
      3.2.34. MPLS-TP LSPs: LSP-Ping/LSP Trace
      3.2.35. VxLAN Ping Supporting EVPN for VxLAN
      3.2.36. Show Commands
      3.2.37. BFD
    3.3. IP Performance Monitoring (IP PM)
      3.3.1. Two-Way Active Measurement Protocol (TWAMP)
      3.3.2. Two-Way Active Measurement Protocol Light (TWAMP Light)
    3.4. Ethernet Connectivity Fault Management (ETH-CFM)
      3.4.1. ETH-CFM Building Blocks
      3.4.2. Loopback
      3.4.3. Loopback Multicast
      3.4.4. Linktrace
      3.4.5. Continuity Check (CC)
      3.4.6. CC Remote Peer Auto-Discovery
      3.4.7. CCM Grace Period
      3.4.8. CCM Hold Timers
      3.4.9. Alarm Indication Signal (ETH-AIS Y.1731)
      3.4.10. Client Signal Fail (ETH-CSF Y.1731)
      3.4.11. Test (ETH-TST Y.1731)
      3.4.12. One-Way Delay Measurement (ETH-1DM Y.1731)
      3.4.13. Two-Way Delay Measurement (ETH-DMM Y.1731)
      3.4.14. Synthetic Loss Measurement (ETH-SLM Y.1731)
        3.4.14.1. Configuration Example
      3.4.15. Frame Loss Measurement (ETH-LMM Y.1731)
    3.5. ETH-CFM Statistics
    3.6. ETH-CFM Packet Debug
    3.7. ETH-CFM CoS Considerations
    3.8. OAM Mapping
      3.8.1. CFM Connectivity Fault Conditions
      3.8.2. CFM Fault Propagation Methods
      3.8.3. Epipe Services
      3.8.4. CFM Detected Fault
        3.8.4.1. SAP/SDP-Binding Failure (Including Pseudowire Status)
        3.8.4.2. Service Down
        3.8.4.3. Interaction with Pseudowire Redundancy
      3.8.5. Ipipe Services
        3.8.5.1. CFM Detected Fault
        3.8.5.2. SAP/SDP-binding Failure (Including Pseudowire Status)
        3.8.5.3. Service Administratively Shutdown
        3.8.5.4. Interaction with Pseudowire Redundancy
      3.8.6. VPLS Service
        3.8.6.1. CFM Detected Fault
        3.8.6.2. SAP/SDP-Binding Failure (Including Pseudowire Status)
        3.8.6.3. Service Down
        3.8.6.4. Pseudowire Redundancy and Spanning Tree Protocol
      3.8.7. IES and VPRN Services
      3.8.8. Pseudowire Switching
      3.8.9. LLF and CFM Fault Propagation
      3.8.10. 802.3ah EFM OAM Mapping and Interaction with Service Manager
    3.9. Service Assurance Agent (SAA)
    3.10. OAM Performance Monitoring (OAM-PM)
      3.10.1. Session
      3.10.2. Standard PM Packets
      3.10.3. Detectable Transmit Errors
      3.10.4. Measurement Intervals
      3.10.5. Data Structures and Storage
      3.10.6. Bin Groups
      3.10.7. Relating the Components
      3.10.8. IP Performance Monitoring
        3.10.8.1. Accounting Policy Configuration
        3.10.8.2. Service Configuration
        3.10.8.3. OAM-PM Configuration
      3.10.9. Ethernet Performance Monitoring
        3.10.9.1. Accounting Policy Configuration
        3.10.9.2. ETH-CFM Configuration
        3.10.9.3. Service Configuration
        3.10.9.4. Ethernet OAM-PM Configuration
      3.10.10. OAM-PM Event Monitoring
    3.11. Traceroute with ICMP Tunneling In Common Applications
      3.11.1. BGP-LDP Stitching and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
      3.11.2. VPRN Inter-AS Option B
      3.11.3. VPRN Inter-AS Option C and ASBR/ABR/Data Path RR for BGP IPv4 Label Route
    Diagnostics Command Reference
      Command Hierarchies
        OAM Commands
          Base Operational Commands
          ATM Diagnostics
          IGMP Snooping
          LDP Diagnostics
          LSP Diagnostics
          SDP Diagnostics
          Common Service Diagnostics
          VLL Diagnostics
          Ethernet in the First Mile (EFM) Commands
          ETH-CFM OAM Commands
        SAA Commands
        OAM Performance Monitoring and Binning Commands
        IP Performance Monitoring Commands
          TWAMP
          TWAMP Light
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         OAM and SAA Commands
          Generic Commands
          OAM Commands
          ATM Diagnostics
          Service Diagnostics
          VPLS MAC Diagnostics
          IGMP Snooping Diagnostics
          EFM Commands
          ETH-CFM OAM Commands
          Service Assurance Agent (SAA) Commands
          OAM SAA Commands
          OAM Performance Monitoring and Binning Commands
          LDP Treetrace Commands
          TWAMP Commands
          TWAMP Light Commands
        Show Commands
          OAM Performance Monitoring and Binning Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
Quality of Service Guide R14.0.R4
  1.  Getting Started
    1.1. About This Guide
    1.2. QoS Configuration Process
  2.  QoS Policies
    2.1. In This Section
    2.2. QoS Overview
    2.3. Forwarding Classes
      2.3.1. High-Priority Classes
      2.3.2. Assured Classes
      2.3.3. Best-Effort Classes
    2.4. Queue Parameters
      2.4.1. Queue ID
      2.4.2. Unicast or Multipoint Queue
      2.4.3. Queue Hardware Scheduler
      2.4.4. Committed Information Rate
      2.4.5. Peak Information Rate
      2.4.6. Adaptation Rule
      2.4.7. Committed Burst Size
      2.4.8. Maximum Burst Size
      2.4.9. High Priority Only Buffers
      2.4.10. Hi-Low Priority Only Buffers
      2.4.11. WRED Per Queue
        2.4.11.1. Native Queue Mode
        2.4.11.2. Pool Per Queue Mode
      2.4.12. Packet Markings
      2.4.13. Queue Counters
      2.4.14. Queue-Types
      2.4.15. Color Aware Profiling
    2.5. QoS Policies Overview
      2.5.1. Service versus Network QoS
      2.5.2. QoS Policy Entities
      2.5.3. Network QoS Policies
      2.5.4. Network Queue QoS Policies
      2.5.5. Service Ingress QoS Policies
        2.5.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
        2.5.5.2. Egress Forwarding Class Override
      2.5.6. Service Egress QoS Policies
      2.5.7. Named Pool Policies
      2.5.8. Slope Policies
        2.5.8.1. RED Slopes
        2.5.8.2. Tuning the SBAU Calculation
        2.5.8.3. Slope Policy Parameters
      2.5.9. Scheduler Policies
        2.5.9.1. Virtual Hierarchical Scheduling
        2.5.9.2. Single-Tier Scheduling
        2.5.9.3. Hierarchical Scheduler Policies
          2.5.9.3.1. Hierarchical Virtual Schedulers
        2.5.9.4. Tiers
        2.5.9.5. Scheduler Policies Applied to Applications
        2.5.9.6. Scheduler Policies Applied to SAPs
        2.5.9.7. Scheduler Policies Applied to Customer SLAs
        2.5.9.8. Scheduler Policies Applied to Multiservice Sites
      2.5.10. Shared-queue QoS Policies
      2.5.11. ATM Traffic Descriptor Profiles
      2.5.12. Configuration Notes
  3.  Network QoS Policies
    3.1. In This Section
    3.2. Network QoS Policies Overview
    3.3. Network Ingress Tunnel QoS Override
      3.3.1. Override For Tunnel Terminated IP Routing Decisions
        3.3.1.1. Normal QoS Operation
        3.3.1.2. Network Ingress IP Match Criteria
        3.3.1.3. Network Ingress IPv6 Match Criteria
        3.3.1.4. Tunnel Termination QoS Override Operation
        3.3.1.5. Enabling and Disabling Tunnel Termination QoS Override
      3.3.2. QoS for Self-Generated (CPU) Traffic on Network Interfaces
        3.3.2.1. Default DSCP Mapping Table
    3.4. Basic Configurations
      3.4.1. Creating a Network QoS Policy
      3.4.2. Applying Network QoS Policies
      3.4.3. Default Network QoS Policy Values
    3.5. Service Management Tasks
      3.5.1. Deleting QoS Policies
      3.5.2. Removing a Policy from the QoS Configuration
      3.5.3. Copying and Overwriting Network Policies
      3.5.4. Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame Relay Profile Commands
          Network QoS Policy Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Class Frame Relay Profile Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
  4.  Network Queue QoS Policies
    4.1. In This Section
    4.2. Overview
    4.3. Network Queue Parent Scheduler
    4.4. Basic Configurations
      4.4.1. Creating a Network Queue QoS Policy
      4.4.2. Applying Network Queue QoS Policies
        4.4.2.1. XMAs and MDAs
        4.4.2.2. Ethernet Ports
        4.4.2.3. SONET/SDH Ports
      4.4.3. Default Network Queue Policy Values
    4.5. Service Management Tasks
      4.5.1. Deleting QoS Policies
      4.5.2. Removing a Policy from the QoS Configuration
      4.5.3. Copying and Overwriting QoS Policies
      4.5.4. Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
  5.  Service Ingress and Egress QoS Policies
    5.1. In This Chapter
    5.2. Overview
    5.3. Basic Configurations
    5.4. Service Ingress QoS Policy
      5.4.1. Service Ingress QoS Queue
      5.4.2. Percent-Rate Support
      5.4.3. Ingress Forwarding Class (FC)
      5.4.4. Ingress IP Match Criteria
      5.4.5. Ingress IPv6 Match Criteria
      5.4.6. Ingress MAC Match Criteria
        5.4.6.1. VLAN ID Matching
      5.4.7. Ingress Criteria Classification Directly to Policer
      5.4.8. Virtual Network Identifier (VNI) Classification
      5.4.9. FC Mapping Based on EXP Bits
    5.5. Service Egress QoS Policy
      5.5.1. Service Egress QoS Queue
      5.5.2. Percent-Rate Support
      5.5.3. Dynamic MBS for Egress Queue Group Queues
        5.5.3.1. Queue Length as a Delay Value
      5.5.4. Egress SAP FC and FP Overrides
      5.5.5. Egress Criteria Classification Directly to Policer
      5.5.6. Dot1p Egress Remarking
        5.5.6.1. DEI Egress Remarking
          5.5.6.1.1. DEI in IEEE 802.1ad
          5.5.6.1.2. DEI in IEEE 802.1ah
          5.5.6.1.3. IEEE 802.1ad Use Case
          5.5.6.1.4. IEEE 802.1ah Use Case
      5.5.7. DSCP/Prec Egress Remarking
      5.5.8. Queue Depth Monitoring
    5.6. Service Management Tasks
      5.6.1. Applying Service Ingress and Egress Policies
        5.6.1.1. Epipe
        5.6.1.2. IES
        5.6.1.3. VPLS
        5.6.1.4. VPRN
      5.6.2. Editing QoS Policies
      5.6.3. Copying and Overwriting QoS Policies
      5.6.4. Deleting QoS Policies
      5.6.5. Removing a Policy from the QoS Configuration
     Service Ingress and Egress QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Egress QoS Policy Forwarding Class Commands
        Show Commands
  6.  Queue Sharing and Redirection
    6.1. In This Section
    6.2. Queue Sharing and Redirection
      6.2.1. Supported Platforms
      6.2.2. Queue Group Applications
      6.2.3. Access SAP Queue Group Applications
      6.2.4. Ingress Access Port Queue Group Hardware Queue Allocation
      6.2.5. Network Port Queue Groups for IP Interfaces
      6.2.6. Pseudowire Shaping for Layer 2 and Layer 3 Services
      6.2.7. QoS on Ingress Bindings
      6.2.8. Queue Group Templates and Port Queue Groups
        6.2.8.1. Queue Group Templates
        6.2.8.2. Port Queue Groups
          6.2.8.2.1. Percent-Rate Support
      6.2.9. Forwarding Plane Queue Groups
      6.2.10. Redirection Models
      6.2.11. Access SAP Forwarding Class Based Redirection
      6.2.12. Ingress and Egress SAP Forwarding Class Redirection Association Rules
        6.2.12.1. Policy Based Provisioning Model
        6.2.12.2. SAP-Based Provisioning Model
      6.2.13. Access Queue Group Statistics
        6.2.13.1. Port Queue Groups
        6.2.13.2. Forwarding Plane Queue Groups
      6.2.14. Network IP Interface Forwarding Class-Based Redirection
      6.2.15. Egress Network Forwarding Class Redirection Association Rules
      6.2.16. Egress Network IP Interface Statistics
      6.2.17. Separate Ingress IPv4 and IPv6 Statistics
      6.2.18. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        6.2.18.1. Feature Configuration
        6.2.18.2. Provisioning Model
        6.2.18.3. Ingress Packet Classification
      6.2.19. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        6.2.19.1. Feature Configuration
        6.2.19.2. Provisioning Model
        6.2.19.3. Egress Marking of PW Packet Header
        6.2.19.4. Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      6.2.20. Ingress Per SAP Statistics with Ingress Queue Groups
      6.2.21. Ingress and Egress PW Statistics
      6.2.22. Queue Group Behavior on LAG
        6.2.22.1. Queue Group Queue Instantiation Per Link
        6.2.22.2. Per-Link Queue Group Queue Parameters
        6.2.22.3. Adding a Queue Group to an Existing LAG
        6.2.22.4. Adding a Port to a LAG
        6.2.22.5. Removing a Queue Group from a LAG
    6.3. Basic Configurations
      6.3.1. Configuring an Ingress Queue Group Template
      6.3.2. Configuring Egress Queue Group Template
      6.3.3. Applying Ingress Queue Group to SAP Ingress Policy
      6.3.4. Applying Egress Queue Group to SAP Egress Policy
      6.3.5. Configuring SAP-based Egress Queue Redirection
      6.3.6. Configuring Queue Group on Ethernet Access Ingress Port
      6.3.7. Configuring Overrides
      6.3.8. Configuring Queue Group on Ethernet Access Egress Port
      6.3.9. Configuring Queue Group for Network Egress Traffic on Port
      6.3.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      6.3.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      6.3.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      6.3.13. Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Ingress Queue Group Templates
        Configuring Egress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
  7. Scheduler QoS Policies
    7.1. In This Section
    7.2. Scheduler Policies
      7.2.1. Egress Port-Based Schedulers
        7.2.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
        7.2.1.2. Service or Subscriber or Multiservice site Scheduler Child to Port Scheduler Parent
          7.2.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
        7.2.1.3. Frame and Packet-Based Bandwidth Allocation
        7.2.1.4. Parental Association Scope
        7.2.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
        7.2.1.6. Network Queue Parent Scheduler
        7.2.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
        7.2.1.8. Congestion Monitoring on Egress Port Scheduler
          7.2.1.8.1. Scalability, Performance, and Operation
          7.2.1.8.2. Restrictions
      7.2.2. Frame-Based Accounting
        7.2.2.1. Operational Modifications
        7.2.2.2. Existing Egress Port Based Virtual Scheduling
        7.2.2.3. Behavior Modifications for Frame-Based Accounting
        7.2.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      7.2.3. Virtual Scheduling Unused Bandwidth Distribution
        7.2.3.1. Default Unused Bandwidth Distribution
        7.2.3.2. Limit Unused Bandwidth
      7.2.4. Configuring Port Scheduler Policies
        7.2.4.1. Port Scheduler Structure
        7.2.4.2. Special Orphan Queue and Scheduler Behavior
        7.2.4.3. Packet to Frame Bandwidth Conversion
        7.2.4.4. Aggregate Rate Limits for Directly Attached Queues
        7.2.4.5. SAP Egress QoS Policy Queue Parenting
        7.2.4.6. Network Queue QoS Policy Queue Parenting
        7.2.4.7. Egress Port Scheduler Overrides
        7.2.4.8. Applying a Port Scheduler Policy to a Virtual Port
        7.2.4.9. Applying Aggregate Rate Limit to a VPORT
        7.2.4.10. Applying a Scheduler Policy to a VPORT
        7.2.4.11. Weighted Scheduler Group in a Port Scheduler Policy
    7.3. Basic Configurations
      7.3.1. Creating a QoS Scheduler Policy
      7.3.2. Applying Scheduler Policies
        7.3.2.1. Customer
        7.3.2.2. Epipe
        7.3.2.3. IES
        7.3.2.4. VPLS
        7.3.2.5. VPRN
      7.3.3. Creating a QoS Port Scheduler Policy
      7.3.4. Configuring Port Parent Parameters
        7.3.4.1. Within-CIR Priority Level Parameters
        7.3.4.2. Above-CIR Priority Level Parameters
      7.3.5. Configuring Distributed LAG Rate
    7.4. Service Management Tasks
      7.4.1. Deleting QoS Policies
        7.4.1.1. Removing a QoS Policy from a Customer Multiservice Site
        7.4.1.2. Removing a QoS Policy from SAP(s)
        7.4.1.3. Removing a Policy from the QoS Configuration
      7.4.2. Copying and Overwriting Scheduler Policies
      7.4.3. Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
  8.  Slope QoS Policies
    8.1. In This Section
    8.2. Overview
    8.3. Basic Configurations
      8.3.1. Creating a Slope QoS Policy
      8.3.2. Applying Slope Policies
        8.3.2.1. Ports
        8.3.2.2. MDA (FP1)
        8.3.2.3. FP (FP2 and higher based hardware)
      8.3.3. Default Slope Policy Values
    8.4. Service Management Tasks
      8.4.1. Deleting QoS Policies
        8.4.1.1. Ports
        8.4.1.2. MDA (FP1)
        8.4.1.3. FP (FP2 and higher based hardware)
        8.4.1.4. Removing a Policy from the QoS Configuration
      8.4.2. Copying and Overwriting QoS Policies
      8.4.3. Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  9. Shared-Queue QoS Policies
    9.1. In This Section
    9.2. Overview
    9.3. Multipoint Shared Queuing
      9.3.1. Ingress Queuing Modes of Operation
      9.3.2. Ingress Service Queuing
        9.3.2.1. Ingress Shared Queuing
        9.3.2.2. Ingress Multipoint Shared Queuing
    9.4. Basic Configurations
      9.4.1. Modifying the Default Shared-Queue Policy
        9.4.1.1. Applying Shared-Queue Policies
          9.4.1.1.1. Epipe Services
          9.4.1.1.2. IES Services
          9.4.1.1.3. VPLS Services
          9.4.1.1.4. VPRN Services
      9.4.2. Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  10. Advanced QoS Policies
    10.1. In This Section
    10.2. Overview
    10.3. Basic Configurations
      10.3.1. Creating an Advanced QoS Policy
      10.3.2. Applying Advanced Policies
        10.3.2.1. Queue Group
        10.3.2.2. SAP Ingress
        10.3.2.3. SAP Egress
      10.3.3. Default Advanced Policy Values
    10.4. Service Management
      10.4.1. Deleting QoS Policies
        10.4.1.1. Queue Group
        10.4.1.2. SAP Ingress
        10.4.1.3. SAP Egress
      10.4.2. Copying and Overwriting Advanced Policies
      10.4.3. Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
  11.  QoS ATM Traffic Descriptor Profiles
    11.1. In This Section
    11.2. Overview
      11.2.1. ATM Traffic Management
      11.2.2. QoS Model for ATM-Based Services
      11.2.3. ATM Service Categories
      11.2.4. ATM Traffic Descriptors and QoS Parameters
      11.2.5. Policing
      11.2.6. Shaping
      11.2.7. ATM Queuing and Scheduling
      11.2.8. Congestion Avoidance
    11.3. Basic Configurations
      11.3.1. Creating an ATM-TD-Profile QoS Policy
      11.3.2. Applying ATM-TD-Profile Policies
        11.3.2.1. ATM VLL (Apipe) SAPs
        11.3.2.2. Epipe SAPs
        11.3.2.3. IES SAPs
        11.3.2.4. Ipipe SAPs
        11.3.2.5. VPRN SAPs
        11.3.2.6. VPLS SAPs
      11.3.3. Default ATM-TD-Profile Policy Values
    11.4. Service Management Tasks
      11.4.1. Removing a Profile from the QoS Configuration
      11.4.2. Copying and Overwriting Profile
      11.4.3. Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
  12.  Named Pools
    12.1. In This Section
    12.2. Overview
    12.3. Named Pool Mode for IOM3-XP Card
    12.4. Basic Configurations
      12.4.1. Creating a Named Pool QoS Policy
        12.4.1.1. Named Pool Configuration Procedure
      12.4.2. Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
        Show Commands
          Named Pool Show Commands
  13.  High Scale Ethernet MDA Capabilities
    13.1. In This Section
    13.2. HSMDA QoS Model
      13.2.1. Queue Scaling
      13.2.2. Port-Based Scheduling
      13.2.3. Dual Pass Queuing
      13.2.4. Egress Intermediate Destination Secondary Shapers
      13.2.5. Packet and Octet Counting
      13.2.6. Above CIR Discard with PIR Bypass
        13.2.6.1. HSMDA Ingress Queue Policing Mode
      13.2.7. HSMDA Buffer Utilization Controls
        13.2.7.1. HSMDA Buffer Pools
        13.2.7.2. Identifying Queue Groups as Provisioned or System
        13.2.7.3. Provisioned and System Port Class Pools
        13.2.7.4. Aggregate Pools for Type and Class Separation
        13.2.7.5. Use of Aggregate Control Buffer Pools
        13.2.7.6. HSMDA Buffer Pool Policy
          13.2.7.6.1. Default HSMDA Buffer Pool Policy
        13.2.7.7. Port Class Pool Sizing
        13.2.7.8. HSMDA Available Buffer Register Operation
      13.2.8. HSMDA Queue Congestion and Buffer Utilization Controls
        13.2.8.1. Maximum HSMDA Queue Depth
        13.2.8.2. Control Plane HSMDA RED Slope Policy Management
        13.2.8.3. HSMDA Slope Policy MBS Parameter
        13.2.8.4. HSMDA Slope Policy Slope Parameters
        13.2.8.5. HSMDA Slope Shutdown Behavior
        13.2.8.6. Ingress Packet Mapping to HSMDA RED Slope
        13.2.8.7. Egress Packet Mapping to HSMDA RED Slope
        13.2.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
      13.2.9. Egress Queue CIR Based dot1p Remarking
    13.3. SAP Ingress and SAP Egress QoS Policies
      13.3.1. SAP Ingress QoS Policy
      13.3.2. SAP Egress QoS Policy
    13.4. Subscriber Queuing Differences
    13.5. Basic HSMDA Configurations
      13.5.1. HSMDA Pool Policies
      13.5.2. HSMDA Scheduler Policies
      13.5.3. HSMDA Slope Policies
      13.5.4. Egress Queue Group
      13.5.5. Configuring HSMDA Queue Group Overrides
    13.6. Applying HSMDA Policies
    13.7. HSMDA Features
      13.7.1. HSMDA LAG
      13.7.2. Billing
      13.7.3. Resource Management
      13.7.4. HSMDA Queue Groups
        13.7.4.1. Scheduling Classes
        13.7.4.2. Scheduling Class Weighted Groups
        13.7.4.3. Scheduler Strict Priority Levels
        13.7.4.4. Strict Priority Level PIR
        13.7.4.5. Scheduler Maximum Rate
        13.7.4.6. HSMDA Scheduler Policy Overrides
        13.7.4.7. Orphan Queues
        13.7.4.8. Default HSMDA Scheduling Policy
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
  14.  QoS in MC-MLPPP
    14.1. In This Section
    14.2. Overview
    14.3. Ingress MLPPP Class Reassembly
    14.4. Basic Configurations
      14.4.1. Configuring MC-MLPPP
      14.4.2. Configuring MC-MLPPP QoS Parameters
    14.5. QoS in MLFR and FRF.12 Fragmentation
      14.5.1. QoS in MLFR
      14.5.2. QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
  15.  Class Fair Hierarchical Policing (CFHP)
    15.1. In This Section
    15.2. Overview
    15.3. Parent Policer Priority and Unfair Sensitive Discard Thresholds
    15.4. CFHP Ingress and Egress Use Cases
    15.5. Post-CFHP Queuing and Scheduling
      15.5.1. Ingress CFHP Queuing
      15.5.2. Egress CFHP Queuing
        15.5.2.1. Policer to Local Queue Mapping
      15.5.3. Egress Subscriber CFHP Queuing
        15.5.3.1. Subscriber Destination String Queue Group Identification
      15.5.4. SAP Default Destination String
    15.6. CFHP Policer Control Policy
      15.6.1. Policer Control Policy Root Arbiter
      15.6.2. Tier 1 and Tier 2 Explicit Arbiters
      15.6.3. Explicit Arbiter Rate Limits
      15.6.4. CFHP with Child Policer Exceed PIR Enabled
    15.7. CFHP Child Policer Definition and Creation
    15.8. Policer Enabled SAP QoS Policy Applicability
    15.9. Child Policer Parent Association
    15.10. Profile-Capped Policers
    15.11. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
      15.11.1. Ingress ‘Undefined’ Initial Profile
      15.11.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      15.11.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      15.11.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      15.11.5. Egress Explicit Profile Reclassification
      15.11.6. Preserving Out of Profile State at Egress Policer
      15.11.7. Egress Policer CIR Packet Handling without Profile-capped Mode
      15.11.8. Egress Policer CIR Packet Handling with Profile-capped Mode
      15.11.9. Forwarding Traffic Exceeding PIR in Egress Policers
      15.11.10. Ingress Child Policer Stat-Mode
      15.11.11. Egress Child Policer Stat-Mode
    15.12. Profile-Preferred Mode Root Policers
    15.13. Child Policer Hierarchical QoS Parenting
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  16. Frequently Used QoS Terms
    16.1. In This Section
    16.2. Above CIR Distribution
    16.3. Available Bandwidth
    16.4. CBS
    16.5. CIR
    16.6. CIR Level
    16.7. CIR Weight
    16.8. Child
    16.9. Level
    16.10. MBS
    16.11. MCR
    16.12. Offered Load
    16.13. Orphan
    16.14. Parent
    16.15. Queue
    16.16. Rate
    16.17. Root (Scheduler)
    16.18. Scheduler Policy
    16.19. Tier
    16.20. Virtual Scheduler
    16.21. Weight
    16.22. Within CIR Distribution
  17. Standards and Protocol Support
  Customer Document and Product Support
  1.  Getting Started
    1.1. About This Guide
    1.2. QoS Configuration Process
  2.  QoS Policies
    2.1. In This Section
    2.2. QoS Overview
    2.3. Forwarding Classes
      2.3.1. High-Priority Classes
      2.3.2. Assured Classes
      2.3.3. Best-Effort Classes
    2.4. Queue Parameters
      2.4.1. Queue ID
      2.4.2. Unicast or Multipoint Queue
      2.4.3. Queue Hardware Scheduler
      2.4.4. Committed Information Rate
      2.4.5. Peak Information Rate
      2.4.6. Adaptation Rule
      2.4.7. Committed Burst Size
      2.4.8. Maximum Burst Size
      2.4.9. High Priority Only Buffers
      2.4.10. Hi-Low Priority Only Buffers
      2.4.11. WRED Per Queue
        2.4.11.1. Native Queue Mode
        2.4.11.2. Pool Per Queue Mode
      2.4.12. Packet Markings
      2.4.13. Queue Counters
      2.4.14. Queue-Types
      2.4.15. Color Aware Profiling
    2.5. QoS Policies Overview
      2.5.1. Service versus Network QoS
      2.5.2. QoS Policy Entities
      2.5.3. Network QoS Policies
      2.5.4. Network Queue QoS Policies
      2.5.5. Service Ingress QoS Policies
        2.5.5.1. FC Mapping Based on EXP Bits at VLL/VPLS SAP
        2.5.5.2. Egress Forwarding Class Override
      2.5.6. Service Egress QoS Policies
      2.5.7. Named Pool Policies
      2.5.8. Slope Policies
        2.5.8.1. RED Slopes
        2.5.8.2. Tuning the SBAU Calculation
        2.5.8.3. Slope Policy Parameters
      2.5.9. Scheduler Policies
        2.5.9.1. Virtual Hierarchical Scheduling
        2.5.9.2. Single-Tier Scheduling
        2.5.9.3. Hierarchical Scheduler Policies
          2.5.9.3.1. Hierarchical Virtual Schedulers
        2.5.9.4. Tiers
        2.5.9.5. Scheduler Policies Applied to Applications
        2.5.9.6. Scheduler Policies Applied to SAPs
        2.5.9.7. Scheduler Policies Applied to Customer SLAs
        2.5.9.8. Scheduler Policies Applied to Multiservice Sites
      2.5.10. Shared-queue QoS Policies
      2.5.11. ATM Traffic Descriptor Profiles
      2.5.12. Configuration Notes
  3.  Network QoS Policies
    3.1. In This Section
    3.2. Network QoS Policies Overview
    3.3. Network Ingress Tunnel QoS Override
      3.3.1. Override For Tunnel Terminated IP Routing Decisions
        3.3.1.1. Normal QoS Operation
        3.3.1.2. Network Ingress IP Match Criteria
        3.3.1.3. Network Ingress IPv6 Match Criteria
        3.3.1.4. Tunnel Termination QoS Override Operation
        3.3.1.5. Enabling and Disabling Tunnel Termination QoS Override
      3.3.2. QoS for Self-Generated (CPU) Traffic on Network Interfaces
        3.3.2.1. Default DSCP Mapping Table
    3.4. Basic Configurations
      3.4.1. Creating a Network QoS Policy
      3.4.2. Applying Network QoS Policies
      3.4.3. Default Network QoS Policy Values
    3.5. Service Management Tasks
      3.5.1. Deleting QoS Policies
      3.5.2. Removing a Policy from the QoS Configuration
      3.5.3. Copying and Overwriting Network Policies
      3.5.4. Editing QoS Policies
     Network QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
          Multi-Class Frame Relay Profile Commands
          Network QoS Policy Commands
        Self-Generated Traffic Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Multi-Class Frame Relay Profile Commands
          Network QoS Policy Commands
          Network Ingress QoS Policy Commands
          Network Egress QoS Policy Commands
          Network Egress QoS Policy Forwarding Class Commands
          Self-Generated Traffic Commands
        Show Commands
  4.  Network Queue QoS Policies
    4.1. In This Section
    4.2. Overview
    4.3. Network Queue Parent Scheduler
    4.4. Basic Configurations
      4.4.1. Creating a Network Queue QoS Policy
      4.4.2. Applying Network Queue QoS Policies
        4.4.2.1. XMAs and MDAs
        4.4.2.2. Ethernet Ports
        4.4.2.3. SONET/SDH Ports
      4.4.3. Default Network Queue Policy Values
    4.5. Service Management Tasks
      4.5.1. Deleting QoS Policies
      4.5.2. Removing a Policy from the QoS Configuration
      4.5.3. Copying and Overwriting QoS Policies
      4.5.4. Editing QoS Policies
    Network Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Network Queue QoS Policy Commands
        Show Commands
  5.  Service Ingress and Egress QoS Policies
    5.1. In This Chapter
    5.2. Overview
    5.3. Basic Configurations
    5.4. Service Ingress QoS Policy
      5.4.1. Service Ingress QoS Queue
      5.4.2. Percent-Rate Support
      5.4.3. Ingress Forwarding Class (FC)
      5.4.4. Ingress IP Match Criteria
      5.4.5. Ingress IPv6 Match Criteria
      5.4.6. Ingress MAC Match Criteria
        5.4.6.1. VLAN ID Matching
      5.4.7. Ingress Criteria Classification Directly to Policer
      5.4.8. Virtual Network Identifier (VNI) Classification
      5.4.9. FC Mapping Based on EXP Bits
    5.5. Service Egress QoS Policy
      5.5.1. Service Egress QoS Queue
      5.5.2. Percent-Rate Support
      5.5.3. Dynamic MBS for Egress Queue Group Queues
        5.5.3.1. Queue Length as a Delay Value
      5.5.4. Egress SAP FC and FP Overrides
      5.5.5. Egress Criteria Classification Directly to Policer
      5.5.6. Dot1p Egress Remarking
        5.5.6.1. DEI Egress Remarking
          5.5.6.1.1. DEI in IEEE 802.1ad
          5.5.6.1.2. DEI in IEEE 802.1ah
          5.5.6.1.3. IEEE 802.1ad Use Case
          5.5.6.1.4. IEEE 802.1ah Use Case
      5.5.7. DSCP/Prec Egress Remarking
      5.5.8. Queue Depth Monitoring
    5.6. Service Management Tasks
      5.6.1. Applying Service Ingress and Egress Policies
        5.6.1.1. Epipe
        5.6.1.2. IES
        5.6.1.3. VPLS
        5.6.1.4. VPRN
      5.6.2. Editing QoS Policies
      5.6.3. Copying and Overwriting QoS Policies
      5.6.4. Deleting QoS Policies
      5.6.5. Removing a Policy from the QoS Configuration
     Service Ingress and Egress QoS Policy Command Reference
      Command Hierarchies
        Service Ingress QoS Policy Commands
        Service Egress QoS Policy Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Service Ingress QoS Policy Commands
          Service Egress QoS Policy Forwarding Class Commands
        Show Commands
  6.  Queue Sharing and Redirection
    6.1. In This Section
    6.2. Queue Sharing and Redirection
      6.2.1. Supported Platforms
      6.2.2. Queue Group Applications
      6.2.3. Access SAP Queue Group Applications
      6.2.4. Ingress Access Port Queue Group Hardware Queue Allocation
      6.2.5. Network Port Queue Groups for IP Interfaces
      6.2.6. Pseudowire Shaping for Layer 2 and Layer 3 Services
      6.2.7. QoS on Ingress Bindings
      6.2.8. Queue Group Templates and Port Queue Groups
        6.2.8.1. Queue Group Templates
        6.2.8.2. Port Queue Groups
          6.2.8.2.1. Percent-Rate Support
      6.2.9. Forwarding Plane Queue Groups
      6.2.10. Redirection Models
      6.2.11. Access SAP Forwarding Class Based Redirection
      6.2.12. Ingress and Egress SAP Forwarding Class Redirection Association Rules
        6.2.12.1. Policy Based Provisioning Model
        6.2.12.2. SAP-Based Provisioning Model
      6.2.13. Access Queue Group Statistics
        6.2.13.1. Port Queue Groups
        6.2.13.2. Forwarding Plane Queue Groups
      6.2.14. Network IP Interface Forwarding Class-Based Redirection
      6.2.15. Egress Network Forwarding Class Redirection Association Rules
      6.2.16. Egress Network IP Interface Statistics
      6.2.17. Separate Ingress IPv4 and IPv6 Statistics
      6.2.18. Ingress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
        6.2.18.1. Feature Configuration
        6.2.18.2. Provisioning Model
        6.2.18.3. Ingress Packet Classification
      6.2.19. Egress PW Shaping using Spoke-SDP Forwarding Class-Based Redirection
        6.2.19.1. Feature Configuration
        6.2.19.2. Provisioning Model
        6.2.19.3. Egress Marking of PW Packet Header
        6.2.19.4. Egress Packet Re-Classification Based on IPv4/IPv6 Criteria
      6.2.20. Ingress Per SAP Statistics with Ingress Queue Groups
      6.2.21. Ingress and Egress PW Statistics
      6.2.22. Queue Group Behavior on LAG
        6.2.22.1. Queue Group Queue Instantiation Per Link
        6.2.22.2. Per-Link Queue Group Queue Parameters
        6.2.22.3. Adding a Queue Group to an Existing LAG
        6.2.22.4. Adding a Port to a LAG
        6.2.22.5. Removing a Queue Group from a LAG
    6.3. Basic Configurations
      6.3.1. Configuring an Ingress Queue Group Template
      6.3.2. Configuring Egress Queue Group Template
      6.3.3. Applying Ingress Queue Group to SAP Ingress Policy
      6.3.4. Applying Egress Queue Group to SAP Egress Policy
      6.3.5. Configuring SAP-based Egress Queue Redirection
      6.3.6. Configuring Queue Group on Ethernet Access Ingress Port
      6.3.7. Configuring Overrides
      6.3.8. Configuring Queue Group on Ethernet Access Egress Port
      6.3.9. Configuring Queue Group for Network Egress Traffic on Port
      6.3.10. Configuring Queue Group for Network Ingress Traffic on Forwarding Plane
      6.3.11. Using Queue Groups to Police Ingress/Egress Traffic on Network Interface
      6.3.12. Configuring Ingress/Egress PW Shaping Using Spoke-SDP Forwarding Class-Based Redirection
      6.3.13. Specifying QoS Policies on Service SAPs
    QoS Queue Group Template Command Reference
      Command Hierarchies
        Configuring Ingress Queue Group Templates
        Configuring Egress Queue Group Templates
        Show Commands
        Monitor Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Queue Group Commands
        Show Commands
        Monitor Commands
  7. Scheduler QoS Policies
    7.1. In This Section
    7.2. Scheduler Policies
      7.2.1. Egress Port-Based Schedulers
        7.2.1.1. Service/Subscriber or Multiservice Site Egress Port Bandwidth Allocation
        7.2.1.2. Service or Subscriber or Multiservice site Scheduler Child to Port Scheduler Parent
          7.2.1.2.1. Direct Service or Subscriber or Multiservice Site Queue Association to Port Scheduler Parents
        7.2.1.3. Frame and Packet-Based Bandwidth Allocation
        7.2.1.4. Parental Association Scope
        7.2.1.5. Service or Subscriber or Multiservice Site-Level Scheduler Parental Association Scope
        7.2.1.6. Network Queue Parent Scheduler
        7.2.1.7. Foster Parent Behavior for Orphaned Queues and Schedulers
        7.2.1.8. Congestion Monitoring on Egress Port Scheduler
          7.2.1.8.1. Scalability, Performance, and Operation
          7.2.1.8.2. Restrictions
      7.2.2. Frame-Based Accounting
        7.2.2.1. Operational Modifications
        7.2.2.2. Existing Egress Port Based Virtual Scheduling
        7.2.2.3. Behavior Modifications for Frame-Based Accounting
        7.2.2.4. Virtual Scheduler Rate and Queue Rate Parameter Interpretation
      7.2.3. Virtual Scheduling Unused Bandwidth Distribution
        7.2.3.1. Default Unused Bandwidth Distribution
        7.2.3.2. Limit Unused Bandwidth
      7.2.4. Configuring Port Scheduler Policies
        7.2.4.1. Port Scheduler Structure
        7.2.4.2. Special Orphan Queue and Scheduler Behavior
        7.2.4.3. Packet to Frame Bandwidth Conversion
        7.2.4.4. Aggregate Rate Limits for Directly Attached Queues
        7.2.4.5. SAP Egress QoS Policy Queue Parenting
        7.2.4.6. Network Queue QoS Policy Queue Parenting
        7.2.4.7. Egress Port Scheduler Overrides
        7.2.4.8. Applying a Port Scheduler Policy to a Virtual Port
        7.2.4.9. Applying Aggregate Rate Limit to a VPORT
        7.2.4.10. Applying a Scheduler Policy to a VPORT
        7.2.4.11. Weighted Scheduler Group in a Port Scheduler Policy
    7.3. Basic Configurations
      7.3.1. Creating a QoS Scheduler Policy
      7.3.2. Applying Scheduler Policies
        7.3.2.1. Customer
        7.3.2.2. Epipe
        7.3.2.3. IES
        7.3.2.4. VPLS
        7.3.2.5. VPRN
      7.3.3. Creating a QoS Port Scheduler Policy
      7.3.4. Configuring Port Parent Parameters
        7.3.4.1. Within-CIR Priority Level Parameters
        7.3.4.2. Above-CIR Priority Level Parameters
      7.3.5. Configuring Distributed LAG Rate
    7.4. Service Management Tasks
      7.4.1. Deleting QoS Policies
        7.4.1.1. Removing a QoS Policy from a Customer Multiservice Site
        7.4.1.2. Removing a QoS Policy from SAP(s)
        7.4.1.3. Removing a Policy from the QoS Configuration
      7.4.2. Copying and Overwriting Scheduler Policies
      7.4.3. Editing QoS Policies
     QoS Scheduler Policy Command Reference
      Command Hierarchies
        Scheduler Policy Configuration Commands
        Port Scheduler Policy Configuration Commands
        Operational Commands
        Show Commands
        Clear Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
        Scheduler Policy Commands
        Port Scheduler Policy Commands
        Show Commands
        Clear Commands
  8.  Slope QoS Policies
    8.1. In This Section
    8.2. Overview
    8.3. Basic Configurations
      8.3.1. Creating a Slope QoS Policy
      8.3.2. Applying Slope Policies
        8.3.2.1. Ports
        8.3.2.2. MDA (FP1)
        8.3.2.3. FP (FP2 and higher based hardware)
      8.3.3. Default Slope Policy Values
    8.4. Service Management Tasks
      8.4.1. Deleting QoS Policies
        8.4.1.1. Ports
        8.4.1.2. MDA (FP1)
        8.4.1.3. FP (FP2 and higher based hardware)
        8.4.1.4. Removing a Policy from the QoS Configuration
      8.4.2. Copying and Overwriting QoS Policies
      8.4.3. Editing QoS Policies
     Slope QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
        Operational Commands
          Slope Policy QoS Commands
          Slope Policy QoS Policy Commands
          RED Slope Commands
        Show Commands
  9. Shared-Queue QoS Policies
    9.1. In This Section
    9.2. Overview
    9.3. Multipoint Shared Queuing
      9.3.1. Ingress Queuing Modes of Operation
      9.3.2. Ingress Service Queuing
        9.3.2.1. Ingress Shared Queuing
        9.3.2.2. Ingress Multipoint Shared Queuing
    9.4. Basic Configurations
      9.4.1. Modifying the Default Shared-Queue Policy
        9.4.1.1. Applying Shared-Queue Policies
          9.4.1.1.1. Epipe Services
          9.4.1.1.2. IES Services
          9.4.1.1.3. VPLS Services
          9.4.1.1.4. VPRN Services
      9.4.2. Default Shared Queue Policy Values
     Shared-Queue QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Shared Queue QoS Commands
        Show Commands
  10. Advanced QoS Policies
    10.1. In This Section
    10.2. Overview
    10.3. Basic Configurations
      10.3.1. Creating an Advanced QoS Policy
      10.3.2. Applying Advanced Policies
        10.3.2.1. Queue Group
        10.3.2.2. SAP Ingress
        10.3.2.3. SAP Egress
      10.3.3. Default Advanced Policy Values
    10.4. Service Management
      10.4.1. Deleting QoS Policies
        10.4.1.1. Queue Group
        10.4.1.2. SAP Ingress
        10.4.1.3. SAP Egress
      10.4.2. Copying and Overwriting Advanced Policies
      10.4.3. Editing Advanced Policies
    Advanced QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Operational Commands
          Advanced Policy QoS Commands
        Show Commands
  11.  QoS ATM Traffic Descriptor Profiles
    11.1. In This Section
    11.2. Overview
      11.2.1. ATM Traffic Management
      11.2.2. QoS Model for ATM-Based Services
      11.2.3. ATM Service Categories
      11.2.4. ATM Traffic Descriptors and QoS Parameters
      11.2.5. Policing
      11.2.6. Shaping
      11.2.7. ATM Queuing and Scheduling
      11.2.8. Congestion Avoidance
    11.3. Basic Configurations
      11.3.1. Creating an ATM-TD-Profile QoS Policy
      11.3.2. Applying ATM-TD-Profile Policies
        11.3.2.1. ATM VLL (Apipe) SAPs
        11.3.2.2. Epipe SAPs
        11.3.2.3. IES SAPs
        11.3.2.4. Ipipe SAPs
        11.3.2.5. VPRN SAPs
        11.3.2.6. VPLS SAPs
      11.3.3. Default ATM-TD-Profile Policy Values
    11.4. Service Management Tasks
      11.4.1. Removing a Profile from the QoS Configuration
      11.4.2. Copying and Overwriting Profile
      11.4.3. Editing QoS Policies
    ATM QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Operational Commands
        Show Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
          Operational Commands
          ATM QoS Policy Commands
          Show Commands
  12.  Named Pools
    12.1. In This Section
    12.2. Overview
    12.3. Named Pool Mode for IOM3-XP Card
    12.4. Basic Configurations
      12.4.1. Creating a Named Pool QoS Policy
        12.4.1.1. Named Pool Configuration Procedure
      12.4.2. Allocation Steps
    Named Pools QoS Policy Command Reference
      Command Hierarchies
        Configuration Commands
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
        Named Pool Policy Creation
        Show Commands
          Named Pool Show Commands
  13.  High Scale Ethernet MDA Capabilities
    13.1. In This Section
    13.2. HSMDA QoS Model
      13.2.1. Queue Scaling
      13.2.2. Port-Based Scheduling
      13.2.3. Dual Pass Queuing
      13.2.4. Egress Intermediate Destination Secondary Shapers
      13.2.5. Packet and Octet Counting
      13.2.6. Above CIR Discard with PIR Bypass
        13.2.6.1. HSMDA Ingress Queue Policing Mode
      13.2.7. HSMDA Buffer Utilization Controls
        13.2.7.1. HSMDA Buffer Pools
        13.2.7.2. Identifying Queue Groups as Provisioned or System
        13.2.7.3. Provisioned and System Port Class Pools
        13.2.7.4. Aggregate Pools for Type and Class Separation
        13.2.7.5. Use of Aggregate Control Buffer Pools
        13.2.7.6. HSMDA Buffer Pool Policy
          13.2.7.6.1. Default HSMDA Buffer Pool Policy
        13.2.7.7. Port Class Pool Sizing
        13.2.7.8. HSMDA Available Buffer Register Operation
      13.2.8. HSMDA Queue Congestion and Buffer Utilization Controls
        13.2.8.1. Maximum HSMDA Queue Depth
        13.2.8.2. Control Plane HSMDA RED Slope Policy Management
        13.2.8.3. HSMDA Slope Policy MBS Parameter
        13.2.8.4. HSMDA Slope Policy Slope Parameters
        13.2.8.5. HSMDA Slope Shutdown Behavior
        13.2.8.6. Ingress Packet Mapping to HSMDA RED Slope
        13.2.8.7. Egress Packet Mapping to HSMDA RED Slope
        13.2.8.8. HSMDA Queue Congestion or Pool Congestion Discard Stats
      13.2.9. Egress Queue CIR Based dot1p Remarking
    13.3. SAP Ingress and SAP Egress QoS Policies
      13.3.1. SAP Ingress QoS Policy
      13.3.2. SAP Egress QoS Policy
    13.4. Subscriber Queuing Differences
    13.5. Basic HSMDA Configurations
      13.5.1. HSMDA Pool Policies
      13.5.2. HSMDA Scheduler Policies
      13.5.3. HSMDA Slope Policies
      13.5.4. Egress Queue Group
      13.5.5. Configuring HSMDA Queue Group Overrides
    13.6. Applying HSMDA Policies
    13.7. HSMDA Features
      13.7.1. HSMDA LAG
      13.7.2. Billing
      13.7.3. Resource Management
      13.7.4. HSMDA Queue Groups
        13.7.4.1. Scheduling Classes
        13.7.4.2. Scheduling Class Weighted Groups
        13.7.4.3. Scheduler Strict Priority Levels
        13.7.4.4. Strict Priority Level PIR
        13.7.4.5. Scheduler Maximum Rate
        13.7.4.6. HSMDA Scheduler Policy Overrides
        13.7.4.7. Orphan Queues
        13.7.4.8. Default HSMDA Scheduling Policy
     HSMDA Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Configuration Commands
          Generic Commands
          HSMDA Pool QoS Policy Commands
          HSMDA Scheduler QoS Policy Commands
          HSMDA Slope QoS Policy Commands
          HSMDA WRR QoS Policy Commands
          Show QoS HSMDA Commands
  14.  QoS in MC-MLPPP
    14.1. In This Section
    14.2. Overview
    14.3. Ingress MLPPP Class Reassembly
    14.4. Basic Configurations
      14.4.1. Configuring MC-MLPPP
      14.4.2. Configuring MC-MLPPP QoS Parameters
    14.5. QoS in MLFR and FRF.12 Fragmentation
      14.5.1. QoS in MLFR
      14.5.2. QoS in FRF.12 End-to-End Fragmentation
     MLPPP Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Configuration Commands
          MC-MLPPP Commands
  15.  Class Fair Hierarchical Policing (CFHP)
    15.1. In This Section
    15.2. Overview
    15.3. Parent Policer Priority and Unfair Sensitive Discard Thresholds
    15.4. CFHP Ingress and Egress Use Cases
    15.5. Post-CFHP Queuing and Scheduling
      15.5.1. Ingress CFHP Queuing
      15.5.2. Egress CFHP Queuing
        15.5.2.1. Policer to Local Queue Mapping
      15.5.3. Egress Subscriber CFHP Queuing
        15.5.3.1. Subscriber Destination String Queue Group Identification
      15.5.4. SAP Default Destination String
    15.6. CFHP Policer Control Policy
      15.6.1. Policer Control Policy Root Arbiter
      15.6.2. Tier 1 and Tier 2 Explicit Arbiters
      15.6.3. Explicit Arbiter Rate Limits
      15.6.4. CFHP with Child Policer Exceed PIR Enabled
    15.7. CFHP Child Policer Definition and Creation
    15.8. Policer Enabled SAP QoS Policy Applicability
    15.9. Child Policer Parent Association
    15.10. Profile-Capped Policers
    15.11. Policer Interaction with Profile, Discard Eligibility, and Ingress Priority
      15.11.1. Ingress ‘Undefined’ Initial Profile
      15.11.2. Ingress Explicitly ‘In-Profile’ State Packet Handling without Profile-Capped Mode
      15.11.3. Ingress Explicitly ‘In-Profile’ State Packet Handling with Profile-Capped Mode
      15.11.4. Ingress Explicit ‘Out-of-Profile’ State Packet Handling
      15.11.5. Egress Explicit Profile Reclassification
      15.11.6. Preserving Out of Profile State at Egress Policer
      15.11.7. Egress Policer CIR Packet Handling without Profile-capped Mode
      15.11.8. Egress Policer CIR Packet Handling with Profile-capped Mode
      15.11.9. Forwarding Traffic Exceeding PIR in Egress Policers
      15.11.10. Ingress Child Policer Stat-Mode
      15.11.11. Egress Child Policer Stat-Mode
    15.12. Profile-Preferred Mode Root Policers
    15.13. Child Policer Hierarchical QoS Parenting
    Class Fair Hierarchical Policing (CFHP) Policy Command Reference
      Command Hierarchies
        Class Fair Hierarchical Policing Commands
      Command Descriptions
         Configuration Commands
          Generic Commands
  16. Frequently Used QoS Terms
    16.1. In This Section
    16.2. Above CIR Distribution
    16.3. Available Bandwidth
    16.4. CBS
    16.5. CIR
    16.6. CIR Level
    16.7. CIR Weight
    16.8. Child
    16.9. Level
    16.10. MBS
    16.11. MCR
    16.12. Offered Load
    16.13. Orphan
    16.14. Parent
    16.15. Queue
    16.16. Rate
    16.17. Root (Scheduler)
    16.18. Scheduler Policy
    16.19. Tier
    16.20. Virtual Scheduler
    16.21. Weight
    16.22. Within CIR Distribution
  17. Standards and Protocol Support
  Customer Document and Product Support
RADIUS Attributes Reference Guide R14.0.R4
  1. RADIUS Attributes Reference
    1.1. About this Guide
      1.1.1. Audience
    1.2. RADIUS Authentication Attributes
      1.2.1. Subscriber Host Identification
      1.2.2. Wholesale-Retail — Local Access Mode
      1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
      1.2.4. Business Service Access
      1.2.5. Accounting On-Line Charging
      1.2.6. IP and IPv6 Filters
        1.2.6.1. IP Filter Attribute Details
      1.2.7. Subscriber Host Creation
      1.2.8. Subscriber Services
      1.2.9. GTP uplink
      1.2.10. WLAN Gateway
      1.2.11. Virtual Residential Gateway
      1.2.12. Dynamic Data Services
      1.2.13. Lawful Intercept
      1.2.14. IPSec
      1.2.15. Application Assurance
      1.2.16. CLI User Authentication and Authorization
      1.2.17. AAA Route Downloader
    1.3. RADIUS Accounting Attributes
      1.3.1. Enhanced Subscriber Management (ESM) Accounting
      1.3.2. Distributed Subscriber Management (DSM) Accounting
      1.3.3. Subscriber Service Accounting
      1.3.4. Large Scale NAT (LSN) Accounting
      1.3.5. L2TP Tunnel Accounting
      1.3.6. Application Assurance (AA) Accounting
      1.3.7. Dynamic Data Service accounting
      1.3.8. CLI User Access Accounting
      1.3.9. Accounting Terminate Causes
      1.3.10. Accounting Triggered Reason VSA Values
    1.4. RADIUS CoA and Disconnect Message Attributes
      1.4.1. Subscriber Host Identification Attributes
      1.4.2. WLAN-GW migrant users Identification Attributes
      1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
      1.4.4. IPSec Tunnel Identification Attributes
      1.4.5. Dynamic Data Services Identification Attributes
      1.4.6. Overview of CoA Attributes
      1.4.7. [101] Error-Cause Attribute Values
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. RADIUS Attributes Reference
    1.1. About this Guide
      1.1.1. Audience
    1.2. RADIUS Authentication Attributes
      1.2.1. Subscriber Host Identification
      1.2.2. Wholesale-Retail — Local Access Mode
      1.2.3. Wholesale-Retail — L2TP Tunneled Access Mode
      1.2.4. Business Service Access
      1.2.5. Accounting On-Line Charging
      1.2.6. IP and IPv6 Filters
        1.2.6.1. IP Filter Attribute Details
      1.2.7. Subscriber Host Creation
      1.2.8. Subscriber Services
      1.2.9. GTP uplink
      1.2.10. WLAN Gateway
      1.2.11. Virtual Residential Gateway
      1.2.12. Dynamic Data Services
      1.2.13. Lawful Intercept
      1.2.14. IPSec
      1.2.15. Application Assurance
      1.2.16. CLI User Authentication and Authorization
      1.2.17. AAA Route Downloader
    1.3. RADIUS Accounting Attributes
      1.3.1. Enhanced Subscriber Management (ESM) Accounting
      1.3.2. Distributed Subscriber Management (DSM) Accounting
      1.3.3. Subscriber Service Accounting
      1.3.4. Large Scale NAT (LSN) Accounting
      1.3.5. L2TP Tunnel Accounting
      1.3.6. Application Assurance (AA) Accounting
      1.3.7. Dynamic Data Service accounting
      1.3.8. CLI User Access Accounting
      1.3.9. Accounting Terminate Causes
      1.3.10. Accounting Triggered Reason VSA Values
    1.4. RADIUS CoA and Disconnect Message Attributes
      1.4.1. Subscriber Host Identification Attributes
      1.4.2. WLAN-GW migrant users Identification Attributes
      1.4.3. Distributed Subscriber Management (DSM) UE Identification Attributes
      1.4.4. IPSec Tunnel Identification Attributes
      1.4.5. Dynamic Data Services Identification Attributes
      1.4.6. Overview of CoA Attributes
      1.4.7. [101] Error-Cause Attribute Values
  2. Standards and Protocol Support
  Customer Document and Product Support
Router Configuration Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. In This Chapter
    1.3. Router Configuration Process
  2.  IP Router Configuration
    2.1. In This Chapter
    2.2. Configuring IP Router Parameters
      2.2.1. Interfaces
        2.2.1.1. Network Interface
        2.2.1.2. Network Domains
        2.2.1.3. System Interface
        2.2.1.4. Unicast Reverse Path Forwarding Check (uRPF)
        2.2.1.5. Creating an IP Address Range
        2.2.1.6. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.6.1. QPPB Applications
          2.2.1.6.2. Inter-AS Coordination of QoS Policies
          2.2.1.6.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.7. QPPB
          2.2.1.7.1. Associating an FC and Priority with a Route
          2.2.1.7.2. Displaying QoS Information Associated with Routes
          2.2.1.7.3. Enabling QPPB on an IP interface
          2.2.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.7.5. QPPB and Multiple Paths to a Destination
          2.2.1.7.6. QPPB and Policy-Based Routing
        2.2.1.8. QPPB and GRT Lookup
          2.2.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
      2.2.2. Router ID
      2.2.3. Autonomous Systems (AS)
      2.2.4. Confederations
      2.2.5. Proxy ARP
      2.2.6. Exporting an Inactive BGP Route from a VPRN
      2.2.7. DHCP Relay
      2.2.8. Internet Protocol Versions
        2.2.8.1. IPv6 Address Format
        2.2.8.2. IPv6 Applications
        2.2.8.3. DNS
        2.2.8.4. Secure Neighbor Discovery (SeND)
        2.2.8.5. SeND Persistent CGAs
          2.2.8.5.1. Persistent RSA Key Pair
          2.2.8.5.2. Persistent CGA Modifier
          2.2.8.5.3. Making non-persistent CGAs persistent
          2.2.8.5.4. Booting from a saved configuration file
        2.2.8.6. IPv6 Provider Edge Router over MPLS (6PE)
          2.2.8.6.1. 6PE Control Plane Support
          2.2.8.6.2. 6PE Data Plane Support
      2.2.9. Static Route Resolution Using Tunnels
        2.2.9.1. Static Route ECMP Support
    2.3. Weighted Load-Balancing over MPLS LSP
      2.3.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        2.3.1.1. Feature Configuration
        2.3.1.2. Feature Behavior
        2.3.1.3. ECMP Considerations
        2.3.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
          2.3.1.4.1. Feature Configuration
          2.3.1.4.2. Feature Behavior
      2.3.2. Bi-directional Forwarding Detection
        2.3.2.1. BFD Control Packet
        2.3.2.2. Control Packet Format
        2.3.2.3. BFD for RSVP-TE
        2.3.2.4. Echo Support
        2.3.2.5. BFD Support for BGP
        2.3.2.6. Centralized BFD
          2.3.2.6.1. IES Over Spoke SDP
          2.3.2.6.2. BFD Over LAG and VSM Interfaces
        2.3.2.7. Aggregate Next Hop
        2.3.2.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
          2.3.2.8.1. Invalidate Next-Hop Based on IPV4 ARP
          2.3.2.8.2. Invalidate Next-Hop Based on Neighbor Cache State
        2.3.2.9. LDP Shortcut for IGP Route Resolution
          2.3.2.9.1. IGP Route Resolution
          2.3.2.9.2. LDP-IGP Synchronization
          2.3.2.9.3. LDP Shortcut Forwarding Plane
          2.3.2.9.4. ECMP Considerations
          2.3.2.9.5. Handling of Control Packets
          2.3.2.9.6. Handling of Multicast Packets
          2.3.2.9.7. Interaction with BGP Route Resolution to an LDP FEC
          2.3.2.9.8. Interaction with Static Route Resolution to an LDP FEC
          2.3.2.9.9. LDP Control Plane
    2.4. Weighted Load-Balancing over Interface Next-hops
    2.5. GRE Tunnel Overview
      2.5.1. Sample GRE Tunnel Configurations
    2.6. Process Overview
    2.7. Configuration Notes
     Configuring an IP Router with CLI
    Router Configuration Overview
      System Interface
      Network Interface
    Basic Configuration
    Common Configuration Tasks
      Configuring a System Name
      Configuring Interfaces
        Configuring a System Interface
        Configuring a Network Interface
        Configuring IPv6 Parameters
        Configuring IPv6 Over IPv4 Parameters
        Tunnel Ingress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Tunnel Egress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Router Advertisement
        Configuring IPv6 Parameters
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Configuring Proxy ARP
        Creating an IP Address Range
      Deriving the Router ID
      Configuring a Confederation
      Configuring an Autonomous System
      Configuring Overload State on a Single SFM
    Service Management Tasks
      Changing the System Name
      Modifying Interface Parameters
      Deleting a Logical IP Interface
    IP Router Configuration Command Reference
      Command Hierarchies
        Router Commands
        Router BFD commands
        Router L2TP Commands
        Router Interface Commands
        Router Interface IPv6 Commands
        Router Advertisement Commands
      Command Descriptions
        Generic Commands
        Router Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router Interface Commands
          Router Interface Filter Commands
          Router Interface ICMP Commands
          Router Interface IPv6 Commands
          Router Interface DHCP Commands
        Router Advertisement Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
          L2TP Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  3.  VRRP
    3.1. In This Chapter
    3.2. VRRP Overview
    3.3. VRRP Components
      3.3.1. Virtual Router
      3.3.2. IP Address Owner
      3.3.3. Primary and Secondary IP Addresses
      3.3.4. Virtual Router Master
      3.3.5. Virtual Router Backup
      3.3.6. Owner and Non-Owner VRRP
      3.3.7. Configurable Parameters
        3.3.7.1. Virtual Router ID (VRID)
        3.3.7.2. Priority
        3.3.7.3. IP Addresses
        3.3.7.4. Message Interval and Master Inheritance
        3.3.7.5. Skew Time
        3.3.7.6. Master Down Interval
        3.3.7.7. Preempt Mode
        3.3.7.8. VRRP Message Authentication
          3.3.7.8.1. Authentication Type 0 – No Authentication
          3.3.7.8.2. Authentication Type 1 – Simple Text Password
          3.3.7.8.3. Authentication Failure
        3.3.7.9. Authentication Data
        3.3.7.10. Virtual MAC Address
        3.3.7.11. VRRP Advertisement Message IP Address List Verification
        3.3.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
        3.3.7.13. IPv6 Virtual Router Instance Operationally Up
        3.3.7.14. Policies
    3.4. VRRP Priority Control Policies
      3.4.1. VRRP Virtual Router Policy Constraints
      3.4.2. VRRP Virtual Router Instance Base Priority
      3.4.3. VRRP Priority Control Policy Delta In-Use Priority Limit
      3.4.4. VRRP Priority Control Policy Priority Events
        3.4.4.1. Priority Event Hold-Set Timers
        3.4.4.2. Port Down Priority Event
        3.4.4.3. LAG Degrade Priority Event
        3.4.4.4. Host Unreachable Priority Event
        3.4.4.5. Route Unknown Priority Event
    3.5. VRRP Non-Owner Accessibility
      3.5.1. Non-Owner Access Ping Reply
      3.5.2. Non-Owner Access Telnet
      3.5.3. Non-Owner Access SSH
    3.6. VRRP Configuration Process Overview
    3.7. Configuration Notes
      3.7.1. General
    Configuring VRRP with CLI
    VRRP Configuration Overview
      Preconfiguration Requirements
    Basic VRRP Configurations
      VRRP Policy
      VRRP IES Service Parameters
        Configure VRRP for IPv6
      VRRP Router Interface Parameters
    Common Configuration Tasks
      Creating Interface Parameters
    Configuring VRRP Policy Components
      Configuring Service VRRP Parameters
        Non-Owner VRRP Example
        Owner Service VRRP
      Configuring Router Interface VRRP Parameters
        Router Interface VRRP Non-Owner
        Router Interface VRRP Owner
    VRRP Configuration Management Tasks
      Modifying a VRRP Policy
        Deleting a VRRP Policy
      Modifying Service and Interface VRRP Parameters
        Modifying Non-Owner Parameters
        Modifying Owner Parameters
        Deleting VRRP on an Interface or Service
     VRRP Configuration Command Reference
      Command Hierarchies
        IPv4 Interface VRRP Commands
        Router Interface Commands
        IPv6 Interface VRRP Commands
        Priority Control Event Policy Commands
      Command Descriptions
        Interface Configuration Commands
        Priority Policy Commands
        Priority Policy Event Commands
        Priority Policy Port Down Event Commands
        Priority Policy LAG Events Commands
        Priority Policy Host Unreachable Event Commands
        Priority Policy Route Unknown Event Commands
     Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
  4.  Filter Policies
    4.1. In This Chapter
    4.2. ACL Filter Policy Overview
      4.2.1. Filter Policy Basics
        4.2.1.1. Filter Policy Packet Match Criteria
        4.2.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
        4.2.1.3. MAC Filter Policy Entry Match Criteria
        4.2.1.4. Filter Policy Actions
        4.2.1.5. Filter Policy Statistics
        4.2.1.6. Filter Policy Logging
        4.2.1.7. Filter Policy cflowd Sampling
        4.2.1.8. Filter Policy Management
          4.2.1.8.1. Modifying Existing Filter Policy
          4.2.1.8.2. Filter Policy Copy and Renumbering
      4.2.2. Filter Policy Advanced Topics
        4.2.2.1. Match-list for Filter Policies
          4.2.2.1.1. Auto-generation of Filter-policy Address Prefix Match Lists
        4.2.2.2. Embedded Filters
        4.2.2.3. System-level IPv4/IPv6 Line Card Filter Policy
        4.2.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
        4.2.2.5. Extended Action for Performing Two Actions at a Time
        4.2.2.6. Destination MAC Rewrite when Deploying Policy-Based Forwarding
        4.2.2.7. Network-port VPRN Filter Policy
        4.2.2.8. ISID MAC Filters
        4.2.2.9. VID MAC filters
          4.2.2.9.1. Arbitrary Bit Matching of VID Filters
          4.2.2.9.2. Port Group Configuration Example
        4.2.2.10. Redirect Policies
          4.2.2.10.1. Router Instance Support for Redirect Policies
        4.2.2.11. HTTP-redirect (Captive Portal)
          4.2.2.11.1. Traffic Flow
        4.2.2.12. Filter Policies and Dynamic Policy-Driven Interfaces
        4.2.2.13. Filter Policy-based ESM Service Chaining
        4.2.2.14. Policy-Based Forwarding for Deep Packet Inspection in VPLS
    Filter Configuration Command Reference
      Command Hierarchies
        IPv4 Filter Policy Commands
        IPv6 Filter Policy Commands
        MAC Filter Commands
        System Filter Policy Commands
        Redirect Policy Configuration Commands
        Match Filter List Commands
        Log Filter Commands
        Copy Filter Commands
      Command Descriptions
        Generic Commands
        Global Filter Commands
        Filter Log Commands
        ACL Filter Policy Commands
        General Filter Entry Commands
        IP (v4/v6) Filter Entry Commands
        Match List Configuration Commands
        MAC Filter Entry Commands
        MAC Filter Match Criteria
        Policy and Entry Maintenance Commands
        Redirect Policy Commands
    Configuring Filter Policies with CLI
    Common Configuration Tasks
      Creating an IPv4 Filter Policy
        IPv4 Filter Entry
          Configuring the HTTP-Redirect Option
          Cflowd Filter Sampling
      Creating an IPv6 Filter Policy
      Creating a MAC Filter Policy
        MAC Filter Policy
        MAC ISID Filter Policy
        MAC VID Filter Policy
        MAC Filter Entry
      Creating a Match List for Filter Policies
      Applying Filter Policies
        Apply IP (v4/v6) and MAC Filter Policies to a Service
        Applying (IPv4/v6) Filter Policies to a Network Port
      Creating a Redirect Policy
    Filter Management Tasks
      Renumbering Filter Policy Entries
      Modifying a Filter Policy
      Deleting a Filter Policy
      Modifying a Redirect Policy
      Deleting a Redirect Policy
      Copying Filter Policies
    Show, Clear, Monitor, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  5. Hybrid OpenFlow Switch
    5.1. In This Chapter
    5.2. Hybrid OpenFlow Switching
      5.2.1. Redundant Controllers and Multiple Switch Instances
      5.2.2. GRT-only and Multi-Service H-OFS Mode of Operations
        5.2.2.1. Port and VLAN ID Match in Flow Table Entries
      5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
      5.2.4. Hybrid OpenFlow Switch Statistics
      5.2.5. OpenFlow Switch Auxiliary Channels
      5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
        5.2.6.1. SR OS H-OFS Logical Port
        5.2.6.2. SR OS H-OFS Port and VLAN Encoding
        5.2.6.3. Redirect to IP next-hop
        5.2.6.4. Redirect to GRT Instance or VRF Instance
        5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
        5.2.6.6. Redirect to ESI (L2)
        5.2.6.7. Redirect to ESI (L3)
        5.2.6.8. Redirect to ESI IP VAS-Interface Router
        5.2.6.9. Redirect to LSP
        5.2.6.10. Redirect to NAT
        5.2.6.11. Redirect to SAP
        5.2.6.12. Redirect to SDP
        5.2.6.13. Forward action
        5.2.6.14. Drop action
        5.2.6.15. Default no-match Action
        5.2.6.16. Programming of DSCP Remark Action
    5.3. Configuration Notes
    OpenFlow Command Reference
      Command Hierarchies
        OpenFlow Commands
        Show Commands
        Tools Commands
      Command Descriptions
        Generic Commands
         Show Commands
        Debug Commands
  6.  Cflowd
    6.1. In This Chapter
    6.2. Cflowd Overview
      6.2.1. Operation
        6.2.1.1. Version 8
        6.2.1.2. Version 9
        6.2.1.3. Version 10
      6.2.2. Cflowd Filter Matching
    6.3. Cflowd Configuration Process Overview
    6.4. Configuration Notes
     Configuring Cflowd with CLI
    Cflowd Configuration Overview
      Traffic Sampling
      Collectors 
        Aggregation
    Basic Cflowd Configuration
    Common Configuration Tasks
      Global Cflowd Components
      Configuring Cflowd
      Enabling Cflowd
      Configuring Global Cflowd Parameters
      Configuring Cflowd Collectors
        Version 9 and Version 10 Templates
      Enabling Cflowd on Interfaces and Filters
      Specifying Cflowd Options on an IP Interface
        Interface Configurations
        Service Interfaces
      Specifying Sampling Options in Filter Entries
        Filter Configurations
        Dependencies
    Cflowd Configuration Management Tasks
      Modifying Global Cflowd Components
      Modifying Cflowd Collector Parameters
    Cflowd Configuration Command Reference
      Command Hierarchies
      Command Descriptions
        Global Commands
    Show, Tools, and Clear Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. In This Chapter
    1.3. Router Configuration Process
  2.  IP Router Configuration
    2.1. In This Chapter
    2.2. Configuring IP Router Parameters
      2.2.1. Interfaces
        2.2.1.1. Network Interface
        2.2.1.2. Network Domains
        2.2.1.3. System Interface
        2.2.1.4. Unicast Reverse Path Forwarding Check (uRPF)
        2.2.1.5. Creating an IP Address Range
        2.2.1.6. QoS Policy Propagation Using BGP (QPPB)
          2.2.1.6.1. QPPB Applications
          2.2.1.6.2. Inter-AS Coordination of QoS Policies
          2.2.1.6.3. Traffic Differentiation Based on Route Characteristics
        2.2.1.7. QPPB
          2.2.1.7.1. Associating an FC and Priority with a Route
          2.2.1.7.2. Displaying QoS Information Associated with Routes
          2.2.1.7.3. Enabling QPPB on an IP interface
          2.2.1.7.4. QPPB When Next-Hops are Resolved by QPPB Routes
          2.2.1.7.5. QPPB and Multiple Paths to a Destination
          2.2.1.7.6. QPPB and Policy-Based Routing
        2.2.1.8. QPPB and GRT Lookup
          2.2.1.8.1. QPPB Interaction with SAP Ingress QoS Policy
      2.2.2. Router ID
      2.2.3. Autonomous Systems (AS)
      2.2.4. Confederations
      2.2.5. Proxy ARP
      2.2.6. Exporting an Inactive BGP Route from a VPRN
      2.2.7. DHCP Relay
      2.2.8. Internet Protocol Versions
        2.2.8.1. IPv6 Address Format
        2.2.8.2. IPv6 Applications
        2.2.8.3. DNS
        2.2.8.4. Secure Neighbor Discovery (SeND)
        2.2.8.5. SeND Persistent CGAs
          2.2.8.5.1. Persistent RSA Key Pair
          2.2.8.5.2. Persistent CGA Modifier
          2.2.8.5.3. Making non-persistent CGAs persistent
          2.2.8.5.4. Booting from a saved configuration file
        2.2.8.6. IPv6 Provider Edge Router over MPLS (6PE)
          2.2.8.6.1. 6PE Control Plane Support
          2.2.8.6.2. 6PE Data Plane Support
      2.2.9. Static Route Resolution Using Tunnels
        2.2.9.1. Static Route ECMP Support
    2.3. Weighted Load-Balancing over MPLS LSP
      2.3.1. Weighted Load Balancing IGP, BGP, and Static Route Prefix Packets over IGP Shortcut
        2.3.1.1. Feature Configuration
        2.3.1.2. Feature Behavior
        2.3.1.3. ECMP Considerations
        2.3.1.4. Weighted Load Balancing Static Route Packets over MPLS LSP
          2.3.1.4.1. Feature Configuration
          2.3.1.4.2. Feature Behavior
      2.3.2. Bi-directional Forwarding Detection
        2.3.2.1. BFD Control Packet
        2.3.2.2. Control Packet Format
        2.3.2.3. BFD for RSVP-TE
        2.3.2.4. Echo Support
        2.3.2.5. BFD Support for BGP
        2.3.2.6. Centralized BFD
          2.3.2.6.1. IES Over Spoke SDP
          2.3.2.6.2. BFD Over LAG and VSM Interfaces
        2.3.2.7. Aggregate Next Hop
        2.3.2.8. Invalidate Next-Hop Based on ARP/Neighbor Cache State
          2.3.2.8.1. Invalidate Next-Hop Based on IPV4 ARP
          2.3.2.8.2. Invalidate Next-Hop Based on Neighbor Cache State
        2.3.2.9. LDP Shortcut for IGP Route Resolution
          2.3.2.9.1. IGP Route Resolution
          2.3.2.9.2. LDP-IGP Synchronization
          2.3.2.9.3. LDP Shortcut Forwarding Plane
          2.3.2.9.4. ECMP Considerations
          2.3.2.9.5. Handling of Control Packets
          2.3.2.9.6. Handling of Multicast Packets
          2.3.2.9.7. Interaction with BGP Route Resolution to an LDP FEC
          2.3.2.9.8. Interaction with Static Route Resolution to an LDP FEC
          2.3.2.9.9. LDP Control Plane
    2.4. Weighted Load-Balancing over Interface Next-hops
    2.5. GRE Tunnel Overview
      2.5.1. Sample GRE Tunnel Configurations
    2.6. Process Overview
    2.7. Configuration Notes
     Configuring an IP Router with CLI
    Router Configuration Overview
      System Interface
      Network Interface
    Basic Configuration
    Common Configuration Tasks
      Configuring a System Name
      Configuring Interfaces
        Configuring a System Interface
        Configuring a Network Interface
        Configuring IPv6 Parameters
        Configuring IPv6 Over IPv4 Parameters
        Tunnel Ingress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Tunnel Egress Node
          Learning the Tunnel Endpoint IPv4 System Address
          Configuring an IPv4 BGP Peer
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Router Advertisement
        Configuring IPv6 Parameters
          An Example of a IPv6 Over IPv4 Tunnel Configuration
        Configuring Proxy ARP
        Creating an IP Address Range
      Deriving the Router ID
      Configuring a Confederation
      Configuring an Autonomous System
      Configuring Overload State on a Single SFM
    Service Management Tasks
      Changing the System Name
      Modifying Interface Parameters
      Deleting a Logical IP Interface
    IP Router Configuration Command Reference
      Command Hierarchies
        Router Commands
        Router BFD commands
        Router L2TP Commands
        Router Interface Commands
        Router Interface IPv6 Commands
        Router Advertisement Commands
      Command Descriptions
        Generic Commands
        Router Global Commands
        Router L2TP Commands
          Router L2TP Tunnel Commands
        Router Interface Commands
          Router Interface Filter Commands
          Router Interface ICMP Commands
          Router Interface IPv6 Commands
          Router Interface DHCP Commands
        Router Advertisement Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
         Show Commands
          L2TP Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  3.  VRRP
    3.1. In This Chapter
    3.2. VRRP Overview
    3.3. VRRP Components
      3.3.1. Virtual Router
      3.3.2. IP Address Owner
      3.3.3. Primary and Secondary IP Addresses
      3.3.4. Virtual Router Master
      3.3.5. Virtual Router Backup
      3.3.6. Owner and Non-Owner VRRP
      3.3.7. Configurable Parameters
        3.3.7.1. Virtual Router ID (VRID)
        3.3.7.2. Priority
        3.3.7.3. IP Addresses
        3.3.7.4. Message Interval and Master Inheritance
        3.3.7.5. Skew Time
        3.3.7.6. Master Down Interval
        3.3.7.7. Preempt Mode
        3.3.7.8. VRRP Message Authentication
          3.3.7.8.1. Authentication Type 0 – No Authentication
          3.3.7.8.2. Authentication Type 1 – Simple Text Password
          3.3.7.8.3. Authentication Failure
        3.3.7.9. Authentication Data
        3.3.7.10. Virtual MAC Address
        3.3.7.11. VRRP Advertisement Message IP Address List Verification
        3.3.7.12. Inherit Master VRRP Router’s Advertisement Interval Timer
        3.3.7.13. IPv6 Virtual Router Instance Operationally Up
        3.3.7.14. Policies
    3.4. VRRP Priority Control Policies
      3.4.1. VRRP Virtual Router Policy Constraints
      3.4.2. VRRP Virtual Router Instance Base Priority
      3.4.3. VRRP Priority Control Policy Delta In-Use Priority Limit
      3.4.4. VRRP Priority Control Policy Priority Events
        3.4.4.1. Priority Event Hold-Set Timers
        3.4.4.2. Port Down Priority Event
        3.4.4.3. LAG Degrade Priority Event
        3.4.4.4. Host Unreachable Priority Event
        3.4.4.5. Route Unknown Priority Event
    3.5. VRRP Non-Owner Accessibility
      3.5.1. Non-Owner Access Ping Reply
      3.5.2. Non-Owner Access Telnet
      3.5.3. Non-Owner Access SSH
    3.6. VRRP Configuration Process Overview
    3.7. Configuration Notes
      3.7.1. General
    Configuring VRRP with CLI
    VRRP Configuration Overview
      Preconfiguration Requirements
    Basic VRRP Configurations
      VRRP Policy
      VRRP IES Service Parameters
        Configure VRRP for IPv6
      VRRP Router Interface Parameters
    Common Configuration Tasks
      Creating Interface Parameters
    Configuring VRRP Policy Components
      Configuring Service VRRP Parameters
        Non-Owner VRRP Example
        Owner Service VRRP
      Configuring Router Interface VRRP Parameters
        Router Interface VRRP Non-Owner
        Router Interface VRRP Owner
    VRRP Configuration Management Tasks
      Modifying a VRRP Policy
        Deleting a VRRP Policy
      Modifying Service and Interface VRRP Parameters
        Modifying Non-Owner Parameters
        Modifying Owner Parameters
        Deleting VRRP on an Interface or Service
     VRRP Configuration Command Reference
      Command Hierarchies
        IPv4 Interface VRRP Commands
        Router Interface Commands
        IPv6 Interface VRRP Commands
        Priority Control Event Policy Commands
      Command Descriptions
        Interface Configuration Commands
        Priority Policy Commands
        Priority Policy Event Commands
        Priority Policy Port Down Event Commands
        Priority Policy LAG Events Commands
        Priority Policy Host Unreachable Event Commands
        Priority Policy Route Unknown Event Commands
     Show, Monitor, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
  4.  Filter Policies
    4.1. In This Chapter
    4.2. ACL Filter Policy Overview
      4.2.1. Filter Policy Basics
        4.2.1.1. Filter Policy Packet Match Criteria
        4.2.1.2. IPv4/IPv6 Filter Policy Entry Match Criteria
        4.2.1.3. MAC Filter Policy Entry Match Criteria
        4.2.1.4. Filter Policy Actions
        4.2.1.5. Filter Policy Statistics
        4.2.1.6. Filter Policy Logging
        4.2.1.7. Filter Policy cflowd Sampling
        4.2.1.8. Filter Policy Management
          4.2.1.8.1. Modifying Existing Filter Policy
          4.2.1.8.2. Filter Policy Copy and Renumbering
      4.2.2. Filter Policy Advanced Topics
        4.2.2.1. Match-list for Filter Policies
          4.2.2.1.1. Auto-generation of Filter-policy Address Prefix Match Lists
        4.2.2.2. Embedded Filters
        4.2.2.3. System-level IPv4/IPv6 Line Card Filter Policy
        4.2.2.4. Primary and Secondary Filter Policy Action for PBR/PBF Redundancy
        4.2.2.5. Extended Action for Performing Two Actions at a Time
        4.2.2.6. Destination MAC Rewrite when Deploying Policy-Based Forwarding
        4.2.2.7. Network-port VPRN Filter Policy
        4.2.2.8. ISID MAC Filters
        4.2.2.9. VID MAC filters
          4.2.2.9.1. Arbitrary Bit Matching of VID Filters
          4.2.2.9.2. Port Group Configuration Example
        4.2.2.10. Redirect Policies
          4.2.2.10.1. Router Instance Support for Redirect Policies
        4.2.2.11. HTTP-redirect (Captive Portal)
          4.2.2.11.1. Traffic Flow
        4.2.2.12. Filter Policies and Dynamic Policy-Driven Interfaces
        4.2.2.13. Filter Policy-based ESM Service Chaining
        4.2.2.14. Policy-Based Forwarding for Deep Packet Inspection in VPLS
    Filter Configuration Command Reference
      Command Hierarchies
        IPv4 Filter Policy Commands
        IPv6 Filter Policy Commands
        MAC Filter Commands
        System Filter Policy Commands
        Redirect Policy Configuration Commands
        Match Filter List Commands
        Log Filter Commands
        Copy Filter Commands
      Command Descriptions
        Generic Commands
        Global Filter Commands
        Filter Log Commands
        ACL Filter Policy Commands
        General Filter Entry Commands
        IP (v4/v6) Filter Entry Commands
        Match List Configuration Commands
        MAC Filter Entry Commands
        MAC Filter Match Criteria
        Policy and Entry Maintenance Commands
        Redirect Policy Commands
    Configuring Filter Policies with CLI
    Common Configuration Tasks
      Creating an IPv4 Filter Policy
        IPv4 Filter Entry
          Configuring the HTTP-Redirect Option
          Cflowd Filter Sampling
      Creating an IPv6 Filter Policy
      Creating a MAC Filter Policy
        MAC Filter Policy
        MAC ISID Filter Policy
        MAC VID Filter Policy
        MAC Filter Entry
      Creating a Match List for Filter Policies
      Applying Filter Policies
        Apply IP (v4/v6) and MAC Filter Policies to a Service
        Applying (IPv4/v6) Filter Policies to a Network Port
      Creating a Redirect Policy
    Filter Management Tasks
      Renumbering Filter Policy Entries
      Modifying a Filter Policy
      Deleting a Filter Policy
      Modifying a Redirect Policy
      Deleting a Redirect Policy
      Copying Filter Policies
    Show, Clear, Monitor, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Monitor Commands
        Debug Commands
  5. Hybrid OpenFlow Switch
    5.1. In This Chapter
    5.2. Hybrid OpenFlow Switching
      5.2.1. Redundant Controllers and Multiple Switch Instances
      5.2.2. GRT-only and Multi-Service H-OFS Mode of Operations
        5.2.2.1. Port and VLAN ID Match in Flow Table Entries
      5.2.3. Hybrid OpenFlow Switch Steering using Filter Policies
      5.2.4. Hybrid OpenFlow Switch Statistics
      5.2.5. OpenFlow Switch Auxiliary Channels
      5.2.6. Hybrid OpenFlow Switch Traffic Steering Details
        5.2.6.1. SR OS H-OFS Logical Port
        5.2.6.2. SR OS H-OFS Port and VLAN Encoding
        5.2.6.3. Redirect to IP next-hop
        5.2.6.4. Redirect to GRT Instance or VRF Instance
        5.2.6.5. Redirect to Next-hop and VRF/GRT Instance
        5.2.6.6. Redirect to ESI (L2)
        5.2.6.7. Redirect to ESI (L3)
        5.2.6.8. Redirect to ESI IP VAS-Interface Router
        5.2.6.9. Redirect to LSP
        5.2.6.10. Redirect to NAT
        5.2.6.11. Redirect to SAP
        5.2.6.12. Redirect to SDP
        5.2.6.13. Forward action
        5.2.6.14. Drop action
        5.2.6.15. Default no-match Action
        5.2.6.16. Programming of DSCP Remark Action
    5.3. Configuration Notes
    OpenFlow Command Reference
      Command Hierarchies
        OpenFlow Commands
        Show Commands
        Tools Commands
      Command Descriptions
        Generic Commands
         Show Commands
        Debug Commands
  6.  Cflowd
    6.1. In This Chapter
    6.2. Cflowd Overview
      6.2.1. Operation
        6.2.1.1. Version 8
        6.2.1.2. Version 9
        6.2.1.3. Version 10
      6.2.2. Cflowd Filter Matching
    6.3. Cflowd Configuration Process Overview
    6.4. Configuration Notes
     Configuring Cflowd with CLI
    Cflowd Configuration Overview
      Traffic Sampling
      Collectors 
        Aggregation
    Basic Cflowd Configuration
    Common Configuration Tasks
      Global Cflowd Components
      Configuring Cflowd
      Enabling Cflowd
      Configuring Global Cflowd Parameters
      Configuring Cflowd Collectors
        Version 9 and Version 10 Templates
      Enabling Cflowd on Interfaces and Filters
      Specifying Cflowd Options on an IP Interface
        Interface Configurations
        Service Interfaces
      Specifying Sampling Options in Filter Entries
        Filter Configurations
        Dependencies
    Cflowd Configuration Management Tasks
      Modifying Global Cflowd Components
      Modifying Cflowd Collector Parameters
    Cflowd Configuration Command Reference
      Command Hierarchies
      Command Descriptions
        Global Commands
    Show, Tools, and Clear Command Reference
      Command Hierarchies
        Show Commands
        Tools Commands
        Clear Commands
      Command Descriptions
        Show Commands
        Tools Commands
        Clear Commands
  7. Standards and Protocol Support
  Customer Document and Product Support
Services Overview Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  Services Overview
    2.1. In This Chapter
    2.2. Introduction
      2.2.1. Service Types
      2.2.2. Service Policies
        2.2.2.1. Multipoint Shared Queuing
          2.2.2.1.1. Ingress Queuing Modes of Operation
          2.2.2.1.2. Ingress Service Queuing
          2.2.2.1.3. Ingress Shared Queuing
          2.2.2.1.4. Ingress Multipoint Shared Queuing
    2.3. Nokia Service Model
    2.4. Service Entities
      2.4.1. Customers
      2.4.2. Service Access Points (SAPs)
        2.4.2.1. SAP Encapsulation Types and Identifiers
        2.4.2.2. Ethernet Encapsulations
        2.4.2.3. Default SAP on a Dot1q Port
        2.4.2.4. QinQ SAPs
        2.4.2.5. Services and SAP Encapsulations
        2.4.2.6. SAP Configuration Considerations
        2.4.2.7. G.8032 Protected Ethernet Rings
        2.4.2.8. SAP Bandwidth CAC
          2.4.2.8.1. CAC Enforcement
      2.4.3. Connection Profile VLAN SAPs
        2.4.3.1. Using connection-profile-vlan in Dot1q Ports
        2.4.3.2. Using connection-profile-vlan in QinQ Ports
      2.4.4. Service Distribution Points
        2.4.4.1. SDP Binding
        2.4.4.2. Spoke and Mesh SDPs
        2.4.4.3. SDP Using BGP Route Tunnel
        2.4.4.4. SDP Keepalives
        2.4.4.5. SDP Administrative Groups
        2.4.4.6. SDP Selection Rules
        2.4.4.7. Class-Based Forwarding
          2.4.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
          2.4.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
      2.4.5. SAP & MPLS Binding Loopback with MAC Swap
    2.5. Multi-Service Sites
    2.6. G.8031 Protected Ethernet Tunnels
      2.6.1. OAM Considerations
      2.6.2. QoS Considerations
      2.6.3. Mirroring and Lawful Intercept Considerations
      2.6.4. Support Service and Solution Combinations
      2.6.5. LAG Emulation using Ethernet Tunnels
    2.7. G.8032 Ethernet Ring Protection Switching
      2.7.1. Overview of G.8032 Operation
      2.7.2. Ethernet Ring Sub-Rings
        2.7.2.1. Virtual and Non-Virtual Channel
        2.7.2.2. Lag Support
      2.7.3. OAM Considerations
      2.7.4. Support Service and Solution Combinations
    2.8. Internal Objects Created for L2TP and NAT
    2.9. Ethernet Unnumbered Interfaces
    2.10. Service Creation Process Overview
    2.11. Deploying and Provisioning Services
      2.11.1. Phase 1: Core Network Construction
      2.11.2. Phase 2: Service Administration
      2.11.3. Phase 3: Service Provisioning
    2.12. Configuration Notes
      2.12.1. General
     Configuring Global Service Entities with CLI
      Service Model Entities
    Basic Configuration
    Common Configuration Tasks
      Configuring Customers
        Customer Information
        Configuring Multi-Service-Sites
      Configuring an SDP
        SDP Configuration Tasks
        Configuring an SDP
        Configuring a Mixed-LSP SDP
    Ethernet Connectivity Fault Management (ETH-CFM)
      Facility MEPs
        Common Actionable Failures
        General Detection, Processing and Reaction
        Port-Based MEP
        LAG Based MEP
        Tunnel Based MEP
        Router Interface MEP
        Hardware Support
      ETH-CFM and MC-LAG
        ETH-CFM and MC-LAG Default Behavior
        Linking ETH-CFM to MC-LAG State
      ETH-CFM Features
        CCM Hold Timers
        CCM Interval
        MEP and MIP Support
      Configuring ETH-CFM Parameters
    Service Management Tasks
      Modifying Customer Accounts
      Deleting Customers
      Modifying SDPs
      Deleting SDPs
     Global Services Configuration Command Reference
      Command Hierarchies
        Customer Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire (PW) Commands
          PW Port Commands
        SDP Commands
        SAP Commands
        Ethernet Ring Commands
        ETH CFM Configuration Commands
        ETH Tunnel Commands
        Connection Profile VLAN Commands
      Command Descriptions
        Generic Commands
        Customer Management Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire Commands
        SDP Commands
        Ethernet Ring Commands
        ETH CFM Configuration Commands
        Port and LAG ETH CFM Commands
        ETH-Tunnel Commands
        Connection Profile VLAN Commands
        Tools Perform Commands
        Tools Dump Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Tools Perform Commands
        Tools Dump Commands
      Command Descriptions
        Service Commands
        Connection Profile VLAN Commands
        ETH-CFM Show Commands
  3.  Common CLI Command Descriptions
    3.1. In This Chapter
      3.1.1. Common Service Commands
        3.1.1.1. SAP Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
      1.1.1. Audience
  2.  Services Overview
    2.1. In This Chapter
    2.2. Introduction
      2.2.1. Service Types
      2.2.2. Service Policies
        2.2.2.1. Multipoint Shared Queuing
          2.2.2.1.1. Ingress Queuing Modes of Operation
          2.2.2.1.2. Ingress Service Queuing
          2.2.2.1.3. Ingress Shared Queuing
          2.2.2.1.4. Ingress Multipoint Shared Queuing
    2.3. Nokia Service Model
    2.4. Service Entities
      2.4.1. Customers
      2.4.2. Service Access Points (SAPs)
        2.4.2.1. SAP Encapsulation Types and Identifiers
        2.4.2.2. Ethernet Encapsulations
        2.4.2.3. Default SAP on a Dot1q Port
        2.4.2.4. QinQ SAPs
        2.4.2.5. Services and SAP Encapsulations
        2.4.2.6. SAP Configuration Considerations
        2.4.2.7. G.8032 Protected Ethernet Rings
        2.4.2.8. SAP Bandwidth CAC
          2.4.2.8.1. CAC Enforcement
      2.4.3. Connection Profile VLAN SAPs
        2.4.3.1. Using connection-profile-vlan in Dot1q Ports
        2.4.3.2. Using connection-profile-vlan in QinQ Ports
      2.4.4. Service Distribution Points
        2.4.4.1. SDP Binding
        2.4.4.2. Spoke and Mesh SDPs
        2.4.4.3. SDP Using BGP Route Tunnel
        2.4.4.4. SDP Keepalives
        2.4.4.5. SDP Administrative Groups
        2.4.4.6. SDP Selection Rules
        2.4.4.7. Class-Based Forwarding
          2.4.4.7.1. Application of Class-Based Forwarding over RSVP LSPs
          2.4.4.7.2. Operation of Class-Based Forwarding over RSVP LSPs
      2.4.5. SAP & MPLS Binding Loopback with MAC Swap
    2.5. Multi-Service Sites
    2.6. G.8031 Protected Ethernet Tunnels
      2.6.1. OAM Considerations
      2.6.2. QoS Considerations
      2.6.3. Mirroring and Lawful Intercept Considerations
      2.6.4. Support Service and Solution Combinations
      2.6.5. LAG Emulation using Ethernet Tunnels
    2.7. G.8032 Ethernet Ring Protection Switching
      2.7.1. Overview of G.8032 Operation
      2.7.2. Ethernet Ring Sub-Rings
        2.7.2.1. Virtual and Non-Virtual Channel
        2.7.2.2. Lag Support
      2.7.3. OAM Considerations
      2.7.4. Support Service and Solution Combinations
    2.8. Internal Objects Created for L2TP and NAT
    2.9. Ethernet Unnumbered Interfaces
    2.10. Service Creation Process Overview
    2.11. Deploying and Provisioning Services
      2.11.1. Phase 1: Core Network Construction
      2.11.2. Phase 2: Service Administration
      2.11.3. Phase 3: Service Provisioning
    2.12. Configuration Notes
      2.12.1. General
     Configuring Global Service Entities with CLI
      Service Model Entities
    Basic Configuration
    Common Configuration Tasks
      Configuring Customers
        Customer Information
        Configuring Multi-Service-Sites
      Configuring an SDP
        SDP Configuration Tasks
        Configuring an SDP
        Configuring a Mixed-LSP SDP
    Ethernet Connectivity Fault Management (ETH-CFM)
      Facility MEPs
        Common Actionable Failures
        General Detection, Processing and Reaction
        Port-Based MEP
        LAG Based MEP
        Tunnel Based MEP
        Router Interface MEP
        Hardware Support
      ETH-CFM and MC-LAG
        ETH-CFM and MC-LAG Default Behavior
        Linking ETH-CFM to MC-LAG State
      ETH-CFM Features
        CCM Hold Timers
        CCM Interval
        MEP and MIP Support
      Configuring ETH-CFM Parameters
    Service Management Tasks
      Modifying Customer Accounts
      Deleting Customers
      Modifying SDPs
      Deleting SDPs
     Global Services Configuration Command Reference
      Command Hierarchies
        Customer Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire (PW) Commands
          PW Port Commands
        SDP Commands
        SAP Commands
        Ethernet Ring Commands
        ETH CFM Configuration Commands
        ETH Tunnel Commands
        Connection Profile VLAN Commands
      Command Descriptions
        Generic Commands
        Customer Management Commands
        MRP Commands
        Service System Commands
        Oper Group Commands
        Pseudowire Commands
        SDP Commands
        Ethernet Ring Commands
        ETH CFM Configuration Commands
        Port and LAG ETH CFM Commands
        ETH-Tunnel Commands
        Connection Profile VLAN Commands
        Tools Perform Commands
        Tools Dump Commands
    Show, Clear, Debug, and Tools Command Reference
      Command Hierarchies
        Show Commands
        Tools Perform Commands
        Tools Dump Commands
      Command Descriptions
        Service Commands
        Connection Profile VLAN Commands
        ETH-CFM Show Commands
  3.  Common CLI Command Descriptions
    3.1. In This Chapter
      3.1.1. Common Service Commands
        3.1.1.1. SAP Commands
  4. Standards and Protocol Support
  Customer Document and Product Support
System Management Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Security
    2.1. In This Chapter
    2.2. Authentication, Authorization, and Accounting
      2.2.1. Authentication
        2.2.1.1. Local Authentication
        2.2.1.2. RADIUS Authentication
          2.2.1.2.1. RADIUS Server Selection
        2.2.1.3. TACACS+ Authentication
        2.2.1.4. LDAP Authentication
          2.2.1.4.1. LDAP Authentication Process
          2.2.1.4.2. Authentication Order
          2.2.1.4.3. LDAP Authentication via Password
          2.2.1.4.4. Timeout and Retry Configuration for the LDAP Server
          2.2.1.4.5. TLS Behavior and LDAP
          2.2.1.4.6. LDAP Health Check
          2.2.1.4.7. LDAP Redundancy and TLS
      2.2.2. Authorization
        2.2.2.1. Local Authorization
        2.2.2.2. RADIUS Authorization
        2.2.2.3. TACACS+ Authorization
          2.2.2.3.1. Examples
      2.2.3. Accounting
        2.2.3.1. RADIUS Accounting
        2.2.3.2. TACACS+ Accounting
    2.3. Security Controls
      2.3.1. When a Server Does Not Respond
      2.3.2. Access Request Flow
    2.4. Centralized CPU Protection
      2.4.1. CPU Protection Extensions for ETH-CFM
      2.4.2. ETH-CFM Ingress Squelching
    2.5. Distributed CPU Protection (DCP)
      2.5.1. Applicability of Distributed CPU Protection
      2.5.2. Log Events, Statistics, Status and SNMP support
      2.5.3. DCP Policer Resource Management
      2.5.4. Operational Guidelines and Tips
    2.6. Classification-Based Priority for Extracted Protocol Traffic
    2.7. Vendor-Specific Attributes (VSAs)
    2.8. Other Security Features
      2.8.1. Secure Shell (SSH)
      2.8.2. SSH PKI Authentication
        2.8.2.1. Key Generation
      2.8.3. Per Peer CPM Queuing
      2.8.4. CPM Filters and Traffic Management
      2.8.5. TTL Security for BGP and LDP
      2.8.6. Exponential Login Backoff
      2.8.7. User Lockout
      2.8.8. 802.1x Network Access Control
      2.8.9. TCP Enhanced Authentication Option
        2.8.9.1. Packet Formats
        2.8.9.2. Keychain
    2.9. Configuration Notes
      2.9.1. General
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Configuration Tasks
    Security Configuration Procedures
      Configuring Management Access Filters
      Configuring IP CPM Filters Policy
      Configuring MAC CPM Filters
      Configuring IPv6 CPM Filters
      Configuring CPM Queues
      IPSec Certificates Parameters
      Configuring Profiles
        Parameters
        Wildcards
        CLI Session Resource Management
      Configuring Users
      Configuring Keychains
      Copying and Overwriting Users and Profiles
        User
        Profile
    RADIUS Configurations
      Configuring RADIUS Authentication
      Configuring RADIUS Authorization
      Configuring RADIUS Accounting
    Configuring 802.1x RADIUS Policies
    TACACS+ Configurations
      Enabling TACACS+ Authentication
      Configuring TACACS+ Authorization
      Configuring TACACS+ Accounting
      Enabling SSH
    LDAP Configurations
      Configuring LDAP Authentication
      Configuring Redundant Servers
      Enabling SSH
    Configuring Login Controls
    Security Configuration Command Reference
      Command Hierarchies
        Security Commands
          LLDP Commands
          Management Access Filter Commands
          CLI Script Authorization Commands
          CPM Filter Commands
          CPM Queue Commands
          CPU Protection Commands
          Distributed CPU Protection Commands
          Extracted Protocol Traffic Priority Commands
          Security Password Commands
          Public Key Infrastructure (PKI) Commands
          Profile Commands
          CLI Session Commands
          RADIUS Commands
          SSH Commands
          TACPLUS Commands
          LDAP Commands
          User Commands
          User Template Commands
          Dot1x Commands
          Keychain Commands
          TTL Security Commands
        Login Control Commands
      Command Descriptions
        General Security Commands
        LLDP Commands
        Login, Telnet, SSH and FTP Commands
        Management Access Filter Commands
        Password Commands
        Public Key Infrastructure (PKI) Commands
        Profile Management Commands
        User Management Commands
        CLI Session Management Commands
        RADIUS Client Commands
        TACACS+ Client Commands
        LDAP Client Commands
        Generic 802.1x COMMANDS
        Keychain Authentication
        CLI Script Commands
        CPM Filter Commands
        CPM Queue Commands
        TTL Security Commands
        CPU Protection Commands
        Distributed CPU Protection Commands
        Extracted Protocol Traffic Priority Commands
    Security Show, Clear, Debug, Tools, and Admin Command Reference
      Command Hierarchies
        Show Commands
          Security
          Login Control
        Clear Commands
        Debug Commands
        Tools Commands
        Admin Commands
      Command Descriptions
        Show Commands
          Security Commands
          Login Control
        Clear Commands
          CPU Protection Commands
        Debug Commands
        Tools Commands
        Admin Commands
  3. SNMP
    3.1. In This Chapter
    3.2. SNMP Overview
      3.2.1. SNMP Architecture
      3.2.2. Management Information Base
      3.2.3. SNMP Protocol Operations
      3.2.4. SNMP Versions
      3.2.5. Management Information Access Control
      3.2.6. User-Based Security Model Community Strings
      3.2.7. Views
      3.2.8. Access Groups
      3.2.9. Users
      3.2.10. Per-VPRN Logs and SNMP Access
      3.2.11. Per-SNMP Community Source IP Address Validation
    3.3. Which SNMP Version to Use?
    3.4. Configuration Notes
      3.4.1. General
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Configuration Command Reference
      Command Hierarchies
         SNMP System Commands
        SNMP Security Commands
      Command Descriptions
        SNMP System Commands
        SNMP Security Commands
    SNMP Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  4. NETCONF
    4.1. In This Chapter
    4.2. NETCONF Overview
    4.3. NETCONF in the SR OS
      4.3.1. YANG Data Models
      4.3.2. Transport and Sessions
      4.3.3. Datastores and URLs
      4.3.4. NETCONF Operations and Capabilities
        4.3.4.1. <get>
        4.3.4.2. <get-config>
        4.3.4.3. <edit-config>
        4.3.4.4. <copy-config> and <delete-config>
        4.3.4.5. <lock>
        4.3.4.6. <unlock>
        4.3.4.7. <commit>
        4.3.4.8. <discard-changes>
        4.3.4.9. <validate>
      4.3.5. Data Model, Datastore and Operation Combinations
      4.3.6. General NETCONF Behavior
        4.3.6.1. System-Provisioned Configuration (SPC) Objects
    4.4. Establishing a NETCONF Session
    4.5. XML Content Layer
      4.5.1. <get> with XML Content Layer
      4.5.2. <edit-config> with XML Content Layer
      4.5.3. <get-config> with XML Content Layer
    4.6. XML Content Layer Examples
    4.7. CLI Content Layer
    4.8. CLI Content Layer Examples
    NETCONF Configuration Command Reference
      Command Hierarchies
        NETCONF System Commands
        NETCONF Security Commands
      Configuration Commands
        NETCONF System Commands
        NETCONF Security Commands
    NETCONF Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          NETCONF System Commands
    NETCONF Admin Command Reference
      Command Hierarchies
        Admin Commands
      Command Descriptions
        Admin Commands
  5. Event and Accounting Logs
    5.1. In This Chapter
    5.2. Logging Overview
    5.3. Log Destinations
      5.3.1. Console
      5.3.2. Session
      5.3.3. Memory Logs
      5.3.4. Log Files
      5.3.5. SNMP Trap Group
      5.3.6. Syslog
    5.4. Event Logs
      5.4.1. Event Sources
      5.4.2. Event Control
      5.4.3. Log Manager and Event Logs
      5.4.4. Event Filter Policies
      5.4.5. Event Log Entries
      5.4.6. Simple Logger Event Throttling
      5.4.7. Default System Log
      5.4.8. Event Handling System
    5.5. Accounting Logs
      5.5.1. Accounting Records
      5.5.2. Accounting Files
      5.5.3. Design Considerations
      5.5.4. Reporting and Time-Based Accounting
      5.5.5. Overhead Reduction in Accounting: Custom Record
        5.5.5.1. User Configurable Records
        5.5.5.2. Changed Statistics Only
        5.5.5.3. Configurable Accounting Records
          5.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
          5.5.5.3.2. RADIUS Accounting in Networks Using ESM
        5.5.5.4. Significant Change Only Reporting
      5.5.6. Immediate Completion of Records
        5.5.6.1. Record Completion for XML Accounting
      5.5.7. AA Accounting per Forwarding Class
    5.6. Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
      Log Types
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control
      Configuring a Log Filter
      Configuring an SNMP Trap Group
        Setting the Replay Parameter
        Shutdown In-Band Port
        No Shutdown Port
      Configuring a Syslog Target
        Configuring an Accounting Custom Record
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Modifying a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Configuration Command Reference
      Command Hierarchies
        Log Configuration Commands
        Accounting Policy Commands
        Custom Record Commands
        File ID Commands
        Event Filter Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Log ID Commands
        SNMP Trap Group Commands
        Syslog Commands
      Command Descriptions
        Generic Commands
        Log Configuration Commands
        File ID Commands
        Log Filter Commands
        Log Filter Entry Commands
        Log Filter Entry Match Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Syslog Commands
        SNMP Trap Groups
        Accounting Policy Commands
          Accounting Policy Custom Record Commands
    Log Command Reference
      Command Hierarchies
        Show Commands
        Clear Command
      Command Descriptions
        Show Commands
        Clear Commands
  6. sFlow
    6.1. In This Chapter
    6.2. sFlow Overview
    6.3. sFlow Features
      6.3.1. sFlow Counter Polling Architecture
      6.3.2. sFlow Support on Logical Ethernet Ports
      6.3.3. sFlow SAP Counter Map
      6.3.4. sFlow Record Formats
    sFlow Command Reference
      Command Hierarchies
        System Commands
        Show Commands
    sFlow Configuration Command Descriptions
      Command Descriptions
        System Commands
    sFlow Show Command Descriptions
      Command Descriptions
        Show Commands
  7. TLS
    7.1. In This Chapter
    7.2. TLS Overview
    7.3. Supported TLS Ciphers
    7.4. SR OS Certificate Management
    7.5. Operational Guidelines
      7.5.1. Server Authentication Behavior
      7.5.2. Client TLS Profile and Trust Anchor Behavior and Scale
    7.6. LDAP Redundancy and TLS
    Configuring TLS with CLI
    Basic TLS Configuration
    Common Configuration Tasks
      Configuring a Client TLS Profile
      Configuring a TLS Client Certificate
      Configuring a TLS Trust Anchor
    TLS Command Reference
      Command Hierarchies
        Security TLS Commands
        LDAP TLS Profile Commands
        Admin Commands
      Command Descriptions
        Security TLS Commands
        LDAP TLS Profile Commands
        Admin Commands
    TLS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  8. Facility Alarms
    8.1. In This Chapter
    8.2. Facility Alarms Overview
    8.3. Facility Alarms vs. Log Events
    8.4. Facility Alarm Severities and Alarm LED Behavior
    8.5. Facility Alarm Hierarchy
    8.6. Facility Alarm List
    Configuring Logging with CLI
    Basic Facility Alarm Configuration
    Common Configuration Tasks
      Configuring the Maximum Number of Alarms To Clear
    Facility Alarms Configuration Command Reference
      Command Hierarchies
        Facility Alarm Configuration Commands
      Command Descriptions
        Generic Commands
    Facility Alarms Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  9. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. Security
    2.1. In This Chapter
    2.2. Authentication, Authorization, and Accounting
      2.2.1. Authentication
        2.2.1.1. Local Authentication
        2.2.1.2. RADIUS Authentication
          2.2.1.2.1. RADIUS Server Selection
        2.2.1.3. TACACS+ Authentication
        2.2.1.4. LDAP Authentication
          2.2.1.4.1. LDAP Authentication Process
          2.2.1.4.2. Authentication Order
          2.2.1.4.3. LDAP Authentication via Password
          2.2.1.4.4. Timeout and Retry Configuration for the LDAP Server
          2.2.1.4.5. TLS Behavior and LDAP
          2.2.1.4.6. LDAP Health Check
          2.2.1.4.7. LDAP Redundancy and TLS
      2.2.2. Authorization
        2.2.2.1. Local Authorization
        2.2.2.2. RADIUS Authorization
        2.2.2.3. TACACS+ Authorization
          2.2.2.3.1. Examples
      2.2.3. Accounting
        2.2.3.1. RADIUS Accounting
        2.2.3.2. TACACS+ Accounting
    2.3. Security Controls
      2.3.1. When a Server Does Not Respond
      2.3.2. Access Request Flow
    2.4. Centralized CPU Protection
      2.4.1. CPU Protection Extensions for ETH-CFM
      2.4.2. ETH-CFM Ingress Squelching
    2.5. Distributed CPU Protection (DCP)
      2.5.1. Applicability of Distributed CPU Protection
      2.5.2. Log Events, Statistics, Status and SNMP support
      2.5.3. DCP Policer Resource Management
      2.5.4. Operational Guidelines and Tips
    2.6. Classification-Based Priority for Extracted Protocol Traffic
    2.7. Vendor-Specific Attributes (VSAs)
    2.8. Other Security Features
      2.8.1. Secure Shell (SSH)
      2.8.2. SSH PKI Authentication
        2.8.2.1. Key Generation
      2.8.3. Per Peer CPM Queuing
      2.8.4. CPM Filters and Traffic Management
      2.8.5. TTL Security for BGP and LDP
      2.8.6. Exponential Login Backoff
      2.8.7. User Lockout
      2.8.8. 802.1x Network Access Control
      2.8.9. TCP Enhanced Authentication Option
        2.8.9.1. Packet Formats
        2.8.9.2. Keychain
    2.9. Configuration Notes
      2.9.1. General
    Configuring Security with CLI
    Setting Up Security Attributes
      Configuring Authentication
      Configuring Authorization
      Configuring Accounting
    Security Configurations
    Configuration Tasks
    Security Configuration Procedures
      Configuring Management Access Filters
      Configuring IP CPM Filters Policy
      Configuring MAC CPM Filters
      Configuring IPv6 CPM Filters
      Configuring CPM Queues
      IPSec Certificates Parameters
      Configuring Profiles
        Parameters
        Wildcards
        CLI Session Resource Management
      Configuring Users
      Configuring Keychains
      Copying and Overwriting Users and Profiles
        User
        Profile
    RADIUS Configurations
      Configuring RADIUS Authentication
      Configuring RADIUS Authorization
      Configuring RADIUS Accounting
    Configuring 802.1x RADIUS Policies
    TACACS+ Configurations
      Enabling TACACS+ Authentication
      Configuring TACACS+ Authorization
      Configuring TACACS+ Accounting
      Enabling SSH
    LDAP Configurations
      Configuring LDAP Authentication
      Configuring Redundant Servers
      Enabling SSH
    Configuring Login Controls
    Security Configuration Command Reference
      Command Hierarchies
        Security Commands
          LLDP Commands
          Management Access Filter Commands
          CLI Script Authorization Commands
          CPM Filter Commands
          CPM Queue Commands
          CPU Protection Commands
          Distributed CPU Protection Commands
          Extracted Protocol Traffic Priority Commands
          Security Password Commands
          Public Key Infrastructure (PKI) Commands
          Profile Commands
          CLI Session Commands
          RADIUS Commands
          SSH Commands
          TACPLUS Commands
          LDAP Commands
          User Commands
          User Template Commands
          Dot1x Commands
          Keychain Commands
          TTL Security Commands
        Login Control Commands
      Command Descriptions
        General Security Commands
        LLDP Commands
        Login, Telnet, SSH and FTP Commands
        Management Access Filter Commands
        Password Commands
        Public Key Infrastructure (PKI) Commands
        Profile Management Commands
        User Management Commands
        CLI Session Management Commands
        RADIUS Client Commands
        TACACS+ Client Commands
        LDAP Client Commands
        Generic 802.1x COMMANDS
        Keychain Authentication
        CLI Script Commands
        CPM Filter Commands
        CPM Queue Commands
        TTL Security Commands
        CPU Protection Commands
        Distributed CPU Protection Commands
        Extracted Protocol Traffic Priority Commands
    Security Show, Clear, Debug, Tools, and Admin Command Reference
      Command Hierarchies
        Show Commands
          Security
          Login Control
        Clear Commands
        Debug Commands
        Tools Commands
        Admin Commands
      Command Descriptions
        Show Commands
          Security Commands
          Login Control
        Clear Commands
          CPU Protection Commands
        Debug Commands
        Tools Commands
        Admin Commands
  3. SNMP
    3.1. In This Chapter
    3.2. SNMP Overview
      3.2.1. SNMP Architecture
      3.2.2. Management Information Base
      3.2.3. SNMP Protocol Operations
      3.2.4. SNMP Versions
      3.2.5. Management Information Access Control
      3.2.6. User-Based Security Model Community Strings
      3.2.7. Views
      3.2.8. Access Groups
      3.2.9. Users
      3.2.10. Per-VPRN Logs and SNMP Access
      3.2.11. Per-SNMP Community Source IP Address Validation
    3.3. Which SNMP Version to Use?
    3.4. Configuration Notes
      3.4.1. General
    Configuring SNMP with CLI
    SNMP Configuration Overview
      Configuring SNMPv1 and SNMPv2c
      Configuring SNMPv3
    Basic SNMP Security Configuration
    Configuring SNMP Components
      Configuring a Community String
      Configuring View Options
      Configuring Access Options
      Configuring USM Community Options
      Configuring Other SNMP Parameters
    SNMP Configuration Command Reference
      Command Hierarchies
         SNMP System Commands
        SNMP Security Commands
      Command Descriptions
        SNMP System Commands
        SNMP Security Commands
    SNMP Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  4. NETCONF
    4.1. In This Chapter
    4.2. NETCONF Overview
    4.3. NETCONF in the SR OS
      4.3.1. YANG Data Models
      4.3.2. Transport and Sessions
      4.3.3. Datastores and URLs
      4.3.4. NETCONF Operations and Capabilities
        4.3.4.1. <get>
        4.3.4.2. <get-config>
        4.3.4.3. <edit-config>
        4.3.4.4. <copy-config> and <delete-config>
        4.3.4.5. <lock>
        4.3.4.6. <unlock>
        4.3.4.7. <commit>
        4.3.4.8. <discard-changes>
        4.3.4.9. <validate>
      4.3.5. Data Model, Datastore and Operation Combinations
      4.3.6. General NETCONF Behavior
        4.3.6.1. System-Provisioned Configuration (SPC) Objects
    4.4. Establishing a NETCONF Session
    4.5. XML Content Layer
      4.5.1. <get> with XML Content Layer
      4.5.2. <edit-config> with XML Content Layer
      4.5.3. <get-config> with XML Content Layer
    4.6. XML Content Layer Examples
    4.7. CLI Content Layer
    4.8. CLI Content Layer Examples
    NETCONF Configuration Command Reference
      Command Hierarchies
        NETCONF System Commands
        NETCONF Security Commands
      Configuration Commands
        NETCONF System Commands
        NETCONF Security Commands
    NETCONF Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
          NETCONF System Commands
    NETCONF Admin Command Reference
      Command Hierarchies
        Admin Commands
      Command Descriptions
        Admin Commands
  5. Event and Accounting Logs
    5.1. In This Chapter
    5.2. Logging Overview
    5.3. Log Destinations
      5.3.1. Console
      5.3.2. Session
      5.3.3. Memory Logs
      5.3.4. Log Files
      5.3.5. SNMP Trap Group
      5.3.6. Syslog
    5.4. Event Logs
      5.4.1. Event Sources
      5.4.2. Event Control
      5.4.3. Log Manager and Event Logs
      5.4.4. Event Filter Policies
      5.4.5. Event Log Entries
      5.4.6. Simple Logger Event Throttling
      5.4.7. Default System Log
      5.4.8. Event Handling System
    5.5. Accounting Logs
      5.5.1. Accounting Records
      5.5.2. Accounting Files
      5.5.3. Design Considerations
      5.5.4. Reporting and Time-Based Accounting
      5.5.5. Overhead Reduction in Accounting: Custom Record
        5.5.5.1. User Configurable Records
        5.5.5.2. Changed Statistics Only
        5.5.5.3. Configurable Accounting Records
          5.5.5.3.1. XML Accounting Files for Service and ESM-Based Accounting
          5.5.5.3.2. RADIUS Accounting in Networks Using ESM
        5.5.5.4. Significant Change Only Reporting
      5.5.6. Immediate Completion of Records
        5.5.6.1. Record Completion for XML Accounting
      5.5.7. AA Accounting per Forwarding Class
    5.6. Configuration Notes
    Configuring Logging with CLI
    Log Configuration Overview
      Log Types
    Basic Event Log Configuration
    Common Configuration Tasks
      Configuring an Event Log
      Configuring a File ID
      Configuring an Accounting Policy
      Configuring Event Control
      Configuring a Log Filter
      Configuring an SNMP Trap Group
        Setting the Replay Parameter
        Shutdown In-Band Port
        No Shutdown Port
      Configuring a Syslog Target
        Configuring an Accounting Custom Record
    Log Management Tasks
      Modifying a Log File
      Deleting a Log File
      Modifying a File ID
      Modifying a Syslog ID
      Modifying an SNMP Trap Group
      Deleting an SNMP Trap Group
      Modifying a Log Filter
      Modifying Event Control Parameters
      Returning to the Default Event Control Configuration
    Log Configuration Command Reference
      Command Hierarchies
        Log Configuration Commands
        Accounting Policy Commands
        Custom Record Commands
        File ID Commands
        Event Filter Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Log ID Commands
        SNMP Trap Group Commands
        Syslog Commands
      Command Descriptions
        Generic Commands
        Log Configuration Commands
        File ID Commands
        Log Filter Commands
        Log Filter Entry Commands
        Log Filter Entry Match Commands
        Event Handling System (EHS) Commands
        Event Trigger Commands
        Syslog Commands
        SNMP Trap Groups
        Accounting Policy Commands
          Accounting Policy Custom Record Commands
    Log Command Reference
      Command Hierarchies
        Show Commands
        Clear Command
      Command Descriptions
        Show Commands
        Clear Commands
  6. sFlow
    6.1. In This Chapter
    6.2. sFlow Overview
    6.3. sFlow Features
      6.3.1. sFlow Counter Polling Architecture
      6.3.2. sFlow Support on Logical Ethernet Ports
      6.3.3. sFlow SAP Counter Map
      6.3.4. sFlow Record Formats
    sFlow Command Reference
      Command Hierarchies
        System Commands
        Show Commands
    sFlow Configuration Command Descriptions
      Command Descriptions
        System Commands
    sFlow Show Command Descriptions
      Command Descriptions
        Show Commands
  7. TLS
    7.1. In This Chapter
    7.2. TLS Overview
    7.3. Supported TLS Ciphers
    7.4. SR OS Certificate Management
    7.5. Operational Guidelines
      7.5.1. Server Authentication Behavior
      7.5.2. Client TLS Profile and Trust Anchor Behavior and Scale
    7.6. LDAP Redundancy and TLS
    Configuring TLS with CLI
    Basic TLS Configuration
    Common Configuration Tasks
      Configuring a Client TLS Profile
      Configuring a TLS Client Certificate
      Configuring a TLS Trust Anchor
    TLS Command Reference
      Command Hierarchies
        Security TLS Commands
        LDAP TLS Profile Commands
        Admin Commands
      Command Descriptions
        Security TLS Commands
        LDAP TLS Profile Commands
        Admin Commands
    TLS Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  8. Facility Alarms
    8.1. In This Chapter
    8.2. Facility Alarms Overview
    8.3. Facility Alarms vs. Log Events
    8.4. Facility Alarm Severities and Alarm LED Behavior
    8.5. Facility Alarm Hierarchy
    8.6. Facility Alarm List
    Configuring Logging with CLI
    Basic Facility Alarm Configuration
    Common Configuration Tasks
      Configuring the Maximum Number of Alarms To Clear
    Facility Alarms Configuration Command Reference
      Command Hierarchies
        Facility Alarm Configuration Commands
      Command Descriptions
        Generic Commands
    Facility Alarms Show Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  9. Standards and Protocol Support
  Customer Document and Product Support
Triple Play Service Delivery Architecture R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia SR OS Services Configuration Process
  2.  Introduction to Triple Play
    2.1. In This Section
    2.2. Nokia’s Triple Play Service Delivery Architecture
      2.2.1. Introduction to Triple Play
      2.2.2. Blueprint for Optimizing Triple Play Service Infrastructures
      2.2.3. Architectural Foundations
      2.2.4. Optimizing Triple Play Service Infrastructures
        2.2.4.1. Distributed Service Edges
        2.2.4.2. Service Differentiation, QoS Enablement
        2.2.4.3. Virtual MAC Subnetting for VPLS
    2.3. Services
      2.3.1. Service Types
      2.3.2. Service Policies
    2.4. Nokia Service Model
      2.4.1. Introduction
      2.4.2. Service Entities
      2.4.3. Customers
      2.4.4. Service Access Points (SAPs)
        2.4.4.1. SAP Encapsulation Types and Identifiers
        2.4.4.2. Ethernet Encapsulations
        2.4.4.3. SAP Considerations
      2.4.5. Service Distribution Points (SDPs)
        2.4.5.1. SDP Binding
        2.4.5.2. Spoke and Mesh SDPs
        2.4.5.3. SDP Encapsulation Types
          2.4.5.3.1. GRE
          2.4.5.3.2. MPLS
        2.4.5.4. SDP Keepalives
    2.5. Epipe Service Overview
    2.6. VPLS Service Overview
      2.6.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        2.6.1.1. Residential Split Horizon Groups
    2.7. IES Service Overview
      2.7.1. IP Interface
    2.8. VPRN Service Overview
    2.9. Deploying and Provisioning Services
      2.9.1. Phase 1: Core Network Construction
      2.9.2. Phase 2: Service Administration
      2.9.3. Phase 3: Service Provisioning
    2.10. Configuration Notes
      2.10.1. General
     Configuring Triple Play Services with CLI
      Configuring VPLS Residential Split Horizon Groups
        Configuring Static Hosts
          BNG Learning IP-Only Static Host’s MAC Address
          Static Host Learning the IPv6 Default Gateway Address
          Configuring Static Hosts on an VPLS SAP
          Configuring Static Hosts on an IES SAP
          Configuring Static Hosts on an VPRN SAP
     Triple Play Services Command Reference
      Command Hierarchies
        IES Triple Play Commands
        VPLS Triple Play Commands
        Service DHCP and Anti-Spoof Filtering Commands
        Triple Play ARP Commands
        Triple Play Multicast Commands
        Show Commands
        Clear Commands
        Tools Commands
      Command Descriptions
        Global Commands
        Service Commands
          SAP Commands
          SAP Subscriber Management Commands
          Triple Play Multicast Commands
          VPLS SAP ATM Commands
          Service DHCP and Anti-Spoof Filtering Commands
          Filter and QoS Policy Commands
          SDP Commands
          DHCP Commands
          Egress Multicast Group Commands
          Interface Commands
          Interface IPv6 Commands
        Show Commands
          IGMP Snooping Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  3.  DHCP Management
    3.1. In This Chapter
    3.2. DHCP Principles
    3.3. DHCP Features
      3.3.1. DHCP Relay
      3.3.2. DHCPv4 Relay Proxy
      3.3.3. Subscriber Identification Using Option 82 Field
        3.3.3.1. Trusted and Untrusted
      3.3.4. DHCP Snooping
      3.3.5. DHCP Lease State Table
      3.3.6. DHCP and Layer 3 Aggregation
        3.3.6.1. DHCPv4 Snooping
        3.3.6.2. DHCPv6 Snooping
      3.3.7. Local DHCP Servers
        3.3.7.1. Overview
        3.3.7.2. Local DHCP Server Support
      3.3.8. DHCPv6
        3.3.8.1. DHCPv6 Relay Agent
        3.3.8.2. DHCPv6 Prefix Options
        3.3.8.3. Neighbor Resolution via DHCPv6 Relay
        3.3.8.4. DHCPv6 Lease Persistency
        3.3.8.5. Local Proxy Neighbor Discovery
        3.3.8.6. IPv6oE Hosts Behind Bridged CPEs
        3.3.8.7. IPv6 Link-Address Based Pool Selection
        3.3.8.8. IPv6 Address/Prefix Stickiness
        3.3.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        3.3.8.10. Host Connectivity Checks for IPv6
      3.3.9. Lease Query
      3.3.10. DHCPv6 to Server Option
      3.3.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      3.3.12. DHCP Caching
      3.3.13. Flexible Creation of DHCPv4/6 Host Parameters
      3.3.14. Python DTC Variables and API
        3.3.14.1. DTC Debugging Facility
      3.3.15. Virtual Subnet for DHCPv4 Hosts
      3.3.16. Address Reservation for Sticky Leases
    3.4. Proxy DHCP Server
      3.4.1. Local DHCP Servers
        3.4.1.1. Terminology
        3.4.1.2. Overview
        3.4.1.3. DHCP Lease Synchronization
        3.4.1.4. Intercommunication Link Failure Detection
        3.4.1.5. DHCP Server Failover States
        3.4.1.6. Lease Time Synchronization
        3.4.1.7. Maximum Client Lead Time (MCLT)
        3.4.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
        3.4.1.9. Fast-Switchover of IP Address/Prefix Delegation
          3.4.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
    3.5. Local Address Assignment
      3.5.1. Stateless Address Auto-configuration
     Configuring DHCP with CLI
    Common Configuration Tasks
      Enabling DHCP Snooping
      Configuring Option 82 Handling
      Enabling DHCP Relay
      Configuring Local User Database Parameters
     Triple Play DHCP Command Reference
      Command Hierarchies
        Global DHCP Commands
        Router DHCP Local User Database Commands
        Service Commands
          IES DHCP Commands
          VPLS DHCP Commands
          VPRN DHCP Commands
          VPRN DHCP Subscriber Interface Commands
          IES/VPRN IPv6-DHCP6 Commands
        Local User Database Commands
          IPoE Commands
          PPP Commands
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Triple Play DHCP Configuration Commands
          Global Commands
          Global DHCP Commands
          Router DHCP Commands
          Service Commands
          Local User Database Commands
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  4. SLAAC
    4.1. In This Chapter
    4.2. Stateless Address Auto-configuration (SLAAC) Management
    4.3. SLAAC Principles
    4.4. Configuration Overview
    4.5. Router-Solicit Trigger
    4.6. SLAAC Address Assignment
    4.7. Static SLAAC Prefix Assignment
    4.8. Dynamic SLAAC Prefix Assignment
  5.  Point-to-Point Protocol over Ethernet Management
    5.1. In This Chapter
    5.2. PPPoE
      5.2.1. PPPoE Authentication and Authorization
        5.2.1.1. General Flow
        5.2.1.2. RADIUS
        5.2.1.3. Local User Database Directly Assigned to PPPoE Node
        5.2.1.4. Subscriber per PPPoE Session Index
        5.2.1.5. Local DHCP Server with Local User Database
      5.2.2. Multiple Sessions Per MAC Address
      5.2.3. Private Retail Subnets
      5.2.4. IPCP Subnet Negotiation
        5.2.4.1. Numbered WAN Support for Layer 3 RGs
      5.2.5. IES as Retail Service for PPPoE Host
      5.2.6. Unnumbered PPPoX
    5.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      5.3.1. Terminology
      5.3.2. LNS MLPPPoX
      5.3.3. MLPPP Encapsulation
      5.3.4. MLPPPoX Negotiation
      5.3.5. Enabling MLPPPoX
      5.3.6. Link Fragmentation and Interleaving (LFI)
        5.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      5.3.7. LFI Functionality Implemented in LNS
        5.3.7.1. Last Mile QoS Awareness in the LNS
        5.3.7.2. BB-ISA Processing
        5.3.7.3. LNS-LAC Link
        5.3.7.4. AN-RG Link
        5.3.7.5. Home Link
        5.3.7.6. Optimum Fragment Size Calculation by LNS
          5.3.7.6.1. Encapsulation Based Fragment Size
          5.3.7.6.2. Fragment Size Based on the Max Transmission Delay
          5.3.7.6.3. Selection of the Optimum Fragment Length
      5.3.8. Upstream Traffic Considerations
      5.3.9. Multiple Links MLPPPoX With No Interleaving
      5.3.10. MLPPPoX Session Support
      5.3.11. Session Load Balancing Across Multiple BB-ISAs
      5.3.12. BB-ISA Hashing Considerations
      5.3.13. Last Mile Rate and Encapsulation Parameters
      5.3.14. Link Failure Detection
      5.3.15. CoA Support
      5.3.16. Accounting
      5.3.17. Filters and Mirroring
      5.3.18. PTA Considerations
      5.3.19. QoS Considerations
        5.3.19.1. Dual-Pass
        5.3.19.2. Traffic Prioritization in LFI
        5.3.19.3. Shaping Based on the Last Mile Wire Rates
        5.3.19.4. Downstream Bandwidth Management on Egress Port
      5.3.20. Sub/Sla-Profile Considerations
      5.3.21. Example of MLPPPoX Session Setup Flow
      5.3.22. Other Considerations
    5.4. Configuration Notes
     PPP Command Reference
      Command Hierarchies
        PPPoE Policy Configuration Commands
        PPPoE Service Commands
        PPPoE Local User Database Commands
        MLPPP on LNS Commands
        Show Commands
      Command Descriptions
         PPP Configuration Commands
          MLPPP on LNS Commands
          PPP/PPPoE Service Commands
          RADIUS Attribute Commands
        Show Commands
        Clear Commands
        Debug Commands
  6. L2TP
    6.1. In This Chapter
    6.2. L2TP
      6.2.1. Terminology
      6.2.2. LAC DF Bit
      6.2.3. Handling L2TP Tunnel/Session Initialization Failures
        6.2.3.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        6.2.3.2. Peer Blacklist
        6.2.3.3. Tunnel Blacklists
          6.2.3.3.1. Tunnel Timeout Due to the Peer IP Address Change
        6.2.3.4. Tunnel Selection Mechanism
        6.2.3.5. Tunnel Probing
        6.2.3.6. Controlling the Size of Blacklist
        6.2.3.7. Displaying the Content of a Blacklist
        6.2.3.8. Generating Trap when the Blacklist is Full
        6.2.3.9. Premature Removal of Blacklisted Entries
        6.2.3.10. Manual Purging of Entities within the Blacklist
      6.2.4. CDN Result Code Overwrite
      6.2.5. LNS Proxy
    6.3. L2TP LAC VPRN
      6.3.1. Per-ISP Egress L2TP DSCP Reclassification
    6.4. L2TP Tunnel RADIUS Accounting
      6.4.1. Accounting Packets List
    6.5. RADIUS Attributes Value Considerations
      6.5.1. Other Optional RADIUS Attributes
      6.5.2. RADIUS VSA to Enable L2TP Tunnel Accounting
      6.5.3. MLPPP on the LNS Side
      6.5.4. LNS Reassembly
    L2TP Command Reference
      Command Hierarchies
        L2TP Configuration Commands
        L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        L2TP Configuration Commands
          Global Commands
          L2TP Tunnel Account Commands
          L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Debug Commands
  7.  Triple Play Security
    7.1. In This Chapter
    7.2. Triple Play Security Features
      7.2.1. Anti-Spoofing Filters
        7.2.1.1. Anti-spoofing Filter Types
        7.2.1.2. Filtering Packets
      7.2.2. Layer 2 Triple Play Security Features
        7.2.2.1. MAC Pinning
        7.2.2.2. MAC Protection
        7.2.2.3. DoS Protection
          7.2.2.3.1. Subscriber Aggregation Network
          7.2.2.3.2. Network Control Filtering
        7.2.2.4. VPLS Redirect Policy
      7.2.3. ARP Handling
        7.2.3.1. ARP Reply Agent
        7.2.3.2. Dynamic ARP Table Population
        7.2.3.3. Local Proxy ARP
      7.2.4. Web Portal Redirect
     Configuring Triple Play Security with CLI
      Common Configuration Tasks
        Configuring Anti-Spoofing Filters
        Configuring Triple Play Security features
          Configuring MAC Pinning
          Configuring MAC Protection
          Configuring VPLS Redirect Policy
        Configuring ARP Handling
          Configuring Proxy ARP
          Configuring Local Proxy ARP
          Configuring ARP Reply Agent in a VPLS Service
          Configuring Remote Proxy ARP
          Configuring Automatic ARP Table Population in an IES or VPRN Interface
          Configuring CPU Protection
        Configuring Web Portal Redirect
     Triple Play Security Command Reference
      Command Hierarchies
        Anti-Spoofing Commands
        Layer 2 Security Commands
        ARP Handling Commands
        Tools Commands
      Command Descriptions
         Triple Play Security Configuration Commands
          Triple Play Anti-Spoofing Commands
          Triple Play Layer 2 Security Commands
          ARP Handling Commands
        Show Commands
        Tools Commands
  8.  Triple Play Multicast
    8.1. In This Chapter
    8.2. Introduction to Multicast
    8.3. Multicast in the Broadband Service Router
      8.3.1. Internet Group Management Protocol
        8.3.1.1. IGMP Versions and Interoperability Requirements
        8.3.1.2. IGMP Version Transition
      8.3.2. Multicast Listener Discovery
        8.3.2.1. MLD Versions and Interoperability Requirements
        8.3.2.2. Source Specific Multicast Groups
      8.3.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
      8.3.4. Ingress Multicast Path Management (IMPM) Enhancements
    8.4. Multicast in the BSA
      8.4.1. IGMP Snooping
        8.4.1.1. IGMP/MLD Message Processing
        8.4.1.2. IGMP Message Processing
        8.4.1.3. MLD Message Processing
        8.4.1.4. IGMP/MLD Filtering
      8.4.2. Multicast VPLS Registration (MVR)
      8.4.3. Layer 3 Multicast Load Balancing
      8.4.4. IGMP State Reporter
        8.4.4.1. IGMP Data Records
        8.4.4.2. Transport Mechanism
        8.4.4.3. HA Compliance
        8.4.4.4. QoS Awareness
        8.4.4.5. Hardware Support
        8.4.4.6. IGMP Reporting Caveats
    8.5. Multicast Support over Subscriber Interfaces in Routed CO Model
      8.5.1. Hardware Support
      8.5.2. Multicast Over IPoE
        8.5.2.1. Per SAP Replication Mode
          8.5.2.1.1. Per SAP Queue
          8.5.2.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.5.2.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          8.5.2.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        8.5.2.2. Per Subscriber Host Replication Mode
          8.5.2.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.5.2.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      8.5.3. Multicast Over PPPoE
      8.5.4. IGMP Flooding Containment
      8.5.5. IGMP/MLD Timers
      8.5.6. IGMP/MLD Query Intervals
      8.5.7. HQoS Adjustment
        8.5.7.1. Host Tracking (HT) Considerations
        8.5.7.2. HQoS Adjust Per Vport
          8.5.7.2.1. Multi-Chassis Redundancy
          8.5.7.2.2. Scalability Considerations
      8.5.8. Redirection
      8.5.9. Hierarchical Multicast CAC (H-MCAC)
        8.5.9.1. MCAC Bundle Bandwidth Limit Considerations
      8.5.10. Determining MCAC Policy in Effect
      8.5.11. Multicast Filtering
      8.5.12. Joining the Multicast Tree
      8.5.13. Wholesale/Retail Requirements
      8.5.14. QoS Considerations
      8.5.15. Redundancy Considerations
        8.5.15.1. Redirection Considerations
      8.5.16. Query Intervals for Multicast
        8.5.16.1. ESM Host-based Queries
        8.5.16.2. Group Interface-based Queries
    Configuring Triple Play Multicast Services with CLI
      Configuring IGMP Snooping in the BSA
        Enabling IGMP Snooping in a VPLS Service
        With IGMPv3 Multicast Routers
        With IGMPv1/2 Multicast Routers
        Modifying IGMP Snooping Parameters
        Modifying IGMP Snooping Parameters for a SAP or SDP
      Configuring Static Multicast Groups on a SAP or SDP
        Enabling IGMP Group Membership Report Filtering
          Enabling IGMP Traffic Filtering
      Configuring Multicast VPLS Registration (MVR)
      Configuring IGMP, MKD, and PIM in the BSR
        Enabling IGMP
        Configuring IGMP Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Enabling MLD
        Configuring MLD Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Configuring PIM
          Enabling PIM
          Configuring PIM Interface Parameters
          Importing PIM Join/Register Policies
          Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
     Triple Play Multicast Command Reference
      Command Hierarchies
        MCAST Management Commands
        Multicast Info Policy Bundle Commands
        Triple Play Multicast Service Commands
        Ingress Multicast Path Management Commands
        Multicast Redirection
        Multicast Query Timer Commands
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Multicast Management Configuration Commands
          Generic Commands
          Multicast Management Commands
          Bandwidth Policy Commands
          Multicast Info Policy Commands
          Chassis Level Commands
          Multicast Redirection Commands
          Multicast Query Timer Commands
          Forwarding Plane Commands
  9. Triple Play Enhanced Subscriber Management
    9.1. In This Section
    9.2. Uniform RADIUS Server Configuration
      9.2.1. RADIUS Server Configuration
        9.2.1.1. Uniform RADIUS Server Configuration (Preferred)
        9.2.1.2. Legacy RADIUS Server Configuration
    9.3. RADIUS Authentication of Subscriber Sessions
      9.3.1. RADIUS Authentication Extensions
        9.3.1.1. Triple Play Network with RADIUS Authentication
      9.3.2. RADIUS Authorization Extensions
        9.3.2.1. Calling-Station-ID
        9.3.2.2. Subscriber Session Timeout
          9.3.2.2.1. Domain Name in Authentication
        9.3.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
        9.3.2.4. SHCV Policy
      9.3.3. radius-server-policy Retry Attempt Overview
      9.3.4. AAA RADIUS Server Operation Status
      9.3.5. AAA RADIUS Accounting Server Stickiness
      9.3.6. AAA RADIUS Authentication Fallback Action
      9.3.7. AAA Test User Account
      9.3.8. Troubleshooting the RADIUS Server
      9.3.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
        9.3.9.1. Provisioning IP Configuration of the Host
        9.3.9.2. RADIUS Based Authentication in Wholesale Environment
        9.3.9.3. Change of Authorization and Disconnect-Request
        9.3.9.4. RADIUS-Based Accounting
        9.3.9.5. RADIUS Accounting Terminating Cause
        9.3.9.6. Accounting Modes Of Operation
        9.3.9.7. Per Session Accounting
          9.3.9.7.1. Caveats
        9.3.9.8. RADIUS Session Accounting with PD as a Managed Route
        9.3.9.9. No Host-Accounting
        9.3.9.10. Host-Accounting Enabled
        9.3.9.11. Reduction of Host Updates for Session Accounting Start and Stop
        9.3.9.12. Accounting Interim Update Message Interval
        9.3.9.13. CoA Triggered Accounting Interim Update
        9.3.9.14. Class Attribute
        9.3.9.15. User Name
        9.3.9.16. Accounting-On and Accounting Off
        9.3.9.17. RADIUS Accounting Message Buffering
        9.3.9.18. Multiple Accounting Policies
        9.3.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    9.4. Enhanced Subscriber Management Overview
      9.4.1. Enhanced Subscriber Management Basics
        9.4.1.1. Standard and Enhanced Subscriber Management
          9.4.1.1.1. Subscriber Management Definitions
          9.4.1.1.2. Subscriber Identification Policy
          9.4.1.1.3. Subscriber Identification String
          9.4.1.1.4. Subscriber Profile
          9.4.1.1.5. SLA Profile
          9.4.1.1.6. Explicit Subscriber Profile Mapping
      9.4.2. ESM for IPv6
        9.4.2.1. Models
          9.4.2.1.1. PPPoE Host
          9.4.2.1.2. PPPoE RG
          9.4.2.1.3. IPoE Host/RG
        9.4.2.2. Setup
        9.4.2.3. Behavior
          9.4.2.3.1. Dual Stack
          9.4.2.3.2. Router Advertisements (RA)
          9.4.2.3.3. CoA and Disconnect-Request
        9.4.2.4. Delegated-Prefix-Length
          9.4.2.4.1. Order of Preference for DPL
          9.4.2.4.2. DHCP Server Address Utilization and Delegated Prefix Length
        9.4.2.5. DHCPv6 Relay Agent
          9.4.2.5.1. Configuring a DHCPv6 Relay Agent
        9.4.2.6. DHCPv6 Relay to Third Party DHCPv6 External Server
        9.4.2.7. DHCPv6 Local Server
      9.4.3. Dynamic Subscriber Host Processing
        9.4.3.1. Dynamic Tables
          9.4.3.1.1. Active Subscriber Table
          9.4.3.1.2. SLA Profile Instance Table
          9.4.3.1.3. Subscriber Host Table
          9.4.3.1.4. DHCP Lease State Table
      9.4.4. Enhanced Subscriber Management Entities
        9.4.4.1. Instantiating a New Host
        9.4.4.2. Packet Processing for an Existing Host
      9.4.5. ESM Host Lockout
        9.4.5.1. Functionality
      9.4.6. ANCP and GSMP
        9.4.6.1. ANCP
          9.4.6.1.1. Static ANCP Management
          9.4.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
          9.4.6.1.3. ANCP String
          9.4.6.1.4. ANCP Persistency Support
        9.4.6.2. General Switch Management Protocol Version 3 (GSMPv3)
        9.4.6.3. DHCP Release Messages
          9.4.6.3.1. DHCP Release
        9.4.6.4. DHCP Client Mobility
        9.4.6.5. DHCP Lease Control
      9.4.7. Using Scripts for Dynamic Recognition of Subscribers
        9.4.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
        9.4.7.2. Determining the Subscriber Profile and SLA Profile of a Host
        9.4.7.3. Determining the Subscriber Profile
        9.4.7.4. Determining the SLA Profile
          9.4.7.4.1. SLA-Based Egress QoS Marking
      9.4.8. Auto-Sub ID
        9.4.8.1. Sub-id Identifiers
        9.4.8.2. Dual Stack Hosts
        9.4.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
        9.4.8.4. PPPoA/PPPoEoA Considerations
        9.4.8.5. Deployment Considerations
        9.4.8.6. Caveats
      9.4.9. Limiting Subscribers and Hosts on a SAP
      9.4.10. Static Subscriber Hosts
      9.4.11. QoS for Subscribers and Hosts
        9.4.11.1. QoS Parameters in Different Profiles
        9.4.11.2. QoS Policy Overrides
      9.4.12. ESM Subscriber Hierarchical Traffic Control
        9.4.12.1. Subscriber HQoS
        9.4.12.2. Subscriber CFHP
        9.4.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          9.4.12.3.1. Broadband Network Gateway Application
          9.4.12.3.2. Queue Determination and Scheduling
          9.4.12.3.3. Weighted Scheduler Group
          9.4.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
          9.4.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
          9.4.12.3.6. Vport Determination and Evaluation
          9.4.12.3.7. Applying Aggregate Rate Limit to a Vport
          9.4.12.3.8. Applying a Scheduler Policy to a Vport
          9.4.12.3.9. Signaling of Last Mile Encapsulation Type
          9.4.12.3.10. Configuration Example
      9.4.13. Subscriber Volume Statistics
        9.4.13.1. IP (Layer 3) Volume Accounting
        9.4.13.2. Separate IPv4 and IPv6 Counters
      9.4.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        9.4.14.1. IP Filter Attribute Format Details
        9.4.14.2. Checking Filter Policy Details
      9.4.15. ESM PPPoA/PPPoEoA
        9.4.15.1. PPPoA
        9.4.15.2. PPPoEoA
        9.4.15.3. Hardware Support
        9.4.15.4. Termination Points within 7450 ESS and 7750 SR
        9.4.15.5. PPPoA Encapsulation
          9.4.15.5.1. PPPoEoA Encapsulation
        9.4.15.6. Encapsulation Summary
        9.4.15.7. Concurrent Support for Different Service Types on the Same Port
        9.4.15.8. Restrictions in Scaled ATM MDA Mode
        9.4.15.9. QoS Implementation
        9.4.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
        9.4.15.11. Per VP Shaping
        9.4.15.12. ATM/IOM QoS Integration
          9.4.15.12.1. Intermediate Node Rate Limit/Shaper
          9.4.15.12.2. Provisioning Aspects
          9.4.15.12.3. HQoS Combinations
          9.4.15.12.4. ATM Rate Adjustment
        9.4.15.13. Subscriber Instantiation Use Cases
        9.4.15.14. Authentication
        9.4.15.15. LUDB Access via Capture SAP
        9.4.15.16. Encapsulation Autosensing
        9.4.15.17. SAP Autoprovisioning
        9.4.15.18. PPP Nodes and ppp-policy
        9.4.15.19. MTU Considerations
          9.4.15.19.1. PPP(oE) Session Antispoofing
      9.4.16. Multi-Chassis Synchronization
        9.4.16.1. Overview
          9.4.16.1.1. Loss of Synchronization and Reconciliation
      9.4.17. Subscriber Routed Redundancy Protocol (SRRP)
        9.4.17.1. SRRP Messaging
        9.4.17.2. SRRP and Multi-Chassis Synchronization
        9.4.17.3. SRRP Instance
          9.4.17.3.1. SRRP Instance MCS Key
          9.4.17.3.2. Containing Service Type and ID
          9.4.17.3.3. Containing Subscriber IP Interface Name
          9.4.17.3.4. Subscriber Subnet Information
          9.4.17.3.5. Containing Group IP Interface Information
          9.4.17.3.6. Remote Redundant IP Interface Mismatch
          9.4.17.3.7. Remote Sending Redundant IP Interface Unavailable
          9.4.17.3.8. Remote SRRP Advertisement SAP Non-existent
          9.4.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          9.4.17.3.10. Local and Remote Dual Master Detected
        9.4.17.4. Subscriber Subnet Owned IP Address Connectivity
        9.4.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        9.4.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
      9.4.18. PPPoE MC Redundancy
        9.4.18.1. Hardware Support
        9.4.18.2. SRRP Considerations for PPPoE
          9.4.18.2.1. SRRP Fact-Checks
        9.4.18.3. State Synchronization
          9.4.18.3.1. PPPoE Multi-chassis Synchronization (MCS) Model
        9.4.18.4. Traffic Control and Redundant Interface
          9.4.18.4.1. Subnet Assignment and Advertisement - Option ‘A’
          9.4.18.4.2. Subnet Assignment and Advertisement - Option ‘B’
        9.4.18.5. MSAP Considerations
        9.4.18.6. Unnumbered Interface Support
        9.4.18.7. Compatibility with MC-LAG
        9.4.18.8. IPv6 Support
        9.4.18.9. Considerations with Local DHCP Server
        9.4.18.10. Redundant Interface Considerations
      9.4.19. Routed Central Office (CO)
        9.4.19.1. Layer 3 Subscriber Interfaces
          9.4.19.1.1. DHCP Interactions
          9.4.19.1.2. Routed CO for IES Service
          9.4.19.1.3. Routed CO for VPRN Service
        9.4.19.2. Wholesale Retail Routed CO
          9.4.19.2.1. Wholesale Retail Model
          9.4.19.2.2. Configuration and Applicability
          9.4.19.2.3. Hub-and-Spoke Forwarding
        9.4.19.3. Routed Subscriber Hosts
          9.4.19.3.1. Static Configured IPv4 Managed Route
          9.4.19.3.2. Static Configured IPv6 Managed Route
          9.4.19.3.3. Dynamic BGP Peering
          9.4.19.3.4. RIP Listener
          9.4.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
          9.4.19.3.6. GRT Lookup and Routed CO in a VPRN
      9.4.20. Dual Homing
        9.4.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        9.4.20.2. Steady-State Operation of Dual-homed Ring
        9.4.20.3. Broken-Ring Operation and the Transition to this State
        9.4.20.4. Transition from Broken to Closed Ring State
        9.4.20.5. Provisioning Aspects and Error Cases
        9.4.20.6. Dual Homing to Two BSR Nodes
        9.4.20.7. MC Services
        9.4.20.8. Routed CO Dual Homing
          9.4.20.8.1. Redundant Interfaces
          9.4.20.8.2. SRRP in Dual Homing
          9.4.20.8.3. Synchronization
          9.4.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
        9.4.20.9. SRRP and Multi-Chassis Synchronization
        9.4.20.10. Dual Homing and ANCP
      9.4.21. SRRP Enhancement
        9.4.21.1. SRRP Fate Sharing
        9.4.21.2. Fate Sharing Algorithm
        9.4.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          9.4.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
          9.4.21.3.2. Managed Routes
          9.4.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          9.4.21.3.4. Activating SRRP State Tracking
        9.4.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
        9.4.21.5. Group Monitor
      9.4.22. Subscriber Override
      9.4.23. Dual Stack Lite
        9.4.23.1. IP-in-IP
        9.4.23.2. Configuring Dual Stack Lite
        9.4.23.3. L2TP over IPv6
    9.5. L2TP Tunnel RADIUS Accounting
      9.5.1. Accounting Packets List
      9.5.2. RADIUS Attributes Value Considerations
      9.5.3. Other Optional RADIUS Attributes
      9.5.4. RADIUS VSA to Enable L2TP Tunnel Accounting
      9.5.5. MLPPP on the LNS Side
    9.6. RADIUS Route Download
    9.7. Managed SAP (MSAP)
      9.7.1. Sticky MSAP
      9.7.2. ESM Identification Process
        9.7.2.1. SAP-ID ESM Identifier
        9.7.2.2. DSLAM-ID
      9.7.3. Default-Subscriber
      9.7.4. Multicast Management
      9.7.5. Subscriber Mirroring
    9.8. Volume and Time Based Accounting
      9.8.1. Metering
        9.8.1.1. Categories Map and Categories
        9.8.1.2. Quota Consumption
        9.8.1.3. Minimum Credit Control Quota Values
        9.8.1.4. RADIUS VSA Alc-Credit-Control-Quota
      9.8.2. Credit Negotiation Mechanisms
      9.8.3. Action on Credit Exhaustion
      9.8.4. Action on Error-Conditions
      9.8.5. Applicability of Volume and Time Based Accounting
    9.9. Subscriber Host Idle Timeout
    9.10. Web Authentication Protocol (WPP)
      9.10.1. WPP Configurations
      9.10.2. WPP Triggered Host Creation
        9.10.2.1. LUDB Support For WPP
      9.10.3. WPP Multi-Chassis Redundancy Support
    9.11. One-time HTTP Redirection Overview
    9.12. ESM over MPLS Pseudowires
      9.12.1. Encapsulation
      9.12.2. ESM and PW Ports
        9.12.2.1. ESM on PW-Port Bound to a Physical Port
          9.12.2.1.1. QoS Support
          9.12.2.1.2. BNG Redundancy with ESM over Pseudowire
        9.12.2.2. ESM on PXC-Based PW-Ports
    9.13. Logical Link Identifier (LLID)
    9.14. Open Authentication Model for DHCP and PPPoE Hosts
      9.14.1. Terminology
      9.14.2. LUDB and RADIUS Access Models
      9.14.3. No Authentication
      9.14.4. LUDB Only Access
      9.14.5. LUDB Access via DHCPv4 Server
      9.14.6. RADIUS Only Access
      9.14.7. Consecutive Access to LUDB and RADIUS
      9.14.8. RADIUS Fallback
    9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      9.15.1. Terminology
      9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
      9.15.3. Default Gateway in IPv4 Flexible Addressing
      9.15.4. IPv4 Subnet Sharing
      9.15.5. IPv4 Subnet Mask Auto-Generation
      9.15.6. Local-proxy-arp and arp-populate
      9.15.7. Gi-address Configuration Consideration
      9.15.8. PPPoE Considerations
      9.15.9. IPoEv6 Considerations
      9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
      9.15.11. Caveats
    9.16. uRPF for Subscriber Management
    9.17. IPoE Sessions
      9.17.1. Enabling IPoE Sessions
      9.17.2. IPoE Session Authentication
      9.17.3. IPoE Session Accounting
      9.17.4. IPoE Session Mid-Session Changes
      9.17.5. IPoE Session Termination
      9.17.6. Limiting the Number of IPoE sessions
      9.17.7. SAP Session Index
      9.17.8. Resiliency
      9.17.9. Notes
      9.17.10. Configuration Steps
      9.17.11. IPoE Session Migration
        9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    9.18. Data-triggered Subscriber Management
      9.18.1. Provisioning Data-triggered ESM
      9.18.2. Authentication and Host Creation
      9.18.3. DoS Protection
      9.18.4. DHCP Promotion
      9.18.5. Data-Triggered SLAAC Hosts
      9.18.6. Stateful Multi-Chassis Redundancy (MCS)
      9.18.7. Stateless Multi-Chassis Redundancy
        9.18.7.1. MSAP Support
    9.19. RADIUS Subscriber Services
      9.19.1. Subscriber Service Building Blocks
        9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        9.19.1.2. RADIUS Python Interface
        9.19.1.3. Python Script
          9.19.1.3.1. Python Script Example
        9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      9.19.2. Subscriber Services RADIUS VSAs
      9.19.3. Subscriber Service RADIUS Accounting
      9.19.4. Accounting-Only Subscriber Service
      9.19.5. QoS Override-based Subscriber Service
      9.19.6. PCC Rule-based Subscriber Services
        9.19.6.1. PCC Rule Actions
        9.19.6.2. PCC Rule Instantiation
        9.19.6.3. PCC Rules in a Subscriber Service
        9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
        9.19.6.5. PCC Rules on HSMDAv2�
          9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
        9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
      9.19.7. Combined Subscriber Services
      9.19.8. Subscriber Services Python API
        9.19.8.1. Common Subscriber Services Python API
        9.19.8.2. Subscriber Service QoS Override Python API
        9.19.8.3. Subscriber Service PCC Rules Python API
      9.19.9. Operational Commands
        9.19.9.1. Show Commands
        9.19.9.2. Debug Commands
        9.19.9.3. Resource Monitoring
    9.20. Residential Gateway Replacement
    9.21. ESM Troubleshooting Show Command
    9.22. Hybrid Access
     Configuring Enhanced Subscriber Management with CLI
      Configuring RADIUS Authentication of DHCP Sessions
      TCP MSS adjustment for ESM Hosts
      Configuring Enhanced Subscriber Management
        Basic Configurations
        Subscriber Interface Configuration
        Configuring Enhanced Subscriber Management Entities
          Configuring a Subscriber Identification Policy
          Configuring a Subscriber Profile
          Configuring an SLA Profile
          Configuring Explicit Mapping Entries
        Routed CO with Basic Subscriber Management Features
        Applying the Profiles and Policies
          SLA Profile
      Configuring Dual Homing
        SHCV Policies
        SHCV Policy
        Subscriber Identification Policy
        Subscriber Profile
     Subscriber Management Command Reference
      Command Hierarchies
        ANCP Commands
        GSMP Configuration Commands
        Authentication Policy Commands
        RADIUS Accounting Policy Commands
        RADIUS Route Download Commands
        Diameter Policy Commands
          AAA Diameter Peer Policy Commands
        Subscriber Management Diameter Application Policy Commands
        Category Map and Credit Control Policy Commands
        Filter Commands
        BGP Peering Policy Commands
        Explicit Subscriber Mapping Commands
        IGMP Policy Commands
        Host Lockout Commands
        Host Tracking Policy Commands
        PIM Policy Commands
        SLA Profile Commands
        Subscriber Identification Policy Commands
        Auto-Generated Subscriber Identification Key Commands
        Auto-Generated Subscriber Identification Key Service Commands
        Subscriber MCAC Policy Commands
        Subscriber Profile Commands
        IPoE Session Policy Commands
        Multi-Chassis Redundancy Commands
        SHCV Policy Commands
        Subscriber Management Service Commands
          VPLS Subscriber Management Configuration Commands
          Managed SAP Policy Commands
          VPRN Subscriber Interface Configuration Commands
          VPRN Subscriber Interface Group Interface Commands
          IES Subscriber Management Configuration Commands
          IES Subscriber Interface Commands
          IES Subscriber Interface Group Interface Commands
          Service Subscriber Interface, Group Interface IPoE Command
          RIP Commands
          VPort Commands
          Redundant Interface Commands
          Wireless Portal Protocol (WPP) Commands
          Multiple PPoE Session QoS Commands
          Multicast Listener Discovery (MLD) Commands
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
       Triple Play Subscriber Management Configuration Commands
         Triple Play Subscriber Management Configuration Commands
          Generic Commands
          ANCP and GSMP Commands
          RADIUS Policy Commands
          RADIUS Route Download Commands
          IGMP Policy Commands
          PIM Policy Commands
          Managed SAP Policy Commands
          Multi-Chassis Redundancy Commands
          SLA Profile Commands
          Subscriber Identification Policy Commands
          Subscriber Profile Commands
          Explicit Subscriber Mapping Commands
          Subscriber Management Service Commands
          Subscriber Management Service Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
          RIP Commands
          Vport Commands
          SHCV Policy Commands
        Show Commands
        Clear Commands
        Tools Commands
        Debug Commands
        Monitor Commands
  10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    10.1. In This Section
    10.2. Overview
      10.2.1. Terminology and Abbreviations
      10.2.2. Restrictions
    10.3. Deploying Oversubscribed Multi-Chassis Redundancy
      10.3.1. Resource Exhaustion Notification and Simultaneous Failures
      10.3.2. Resource Monitoring
      10.3.3. Warm-Standby Mode Of Operation
      10.3.4. IPoE vs PPPoE
      10.3.5. Persistency
      10.3.6. Routing and Redundant Interface in OMCR
      10.3.7. Revertive Behavior
      10.3.8. Service Restoration Times
      10.3.9. Processing of the SRRP Flaps
      10.3.10. Accounting
      10.3.11. Configuration Guidelines
      10.3.12. Troubleshooting Commands
    OMCR Command Reference
      Command Hierarchies
      OMCR Configuration Commands
        OMCR Configuration Commands
  11.  WIFI Aggregation and Offload
    11.1. In This Section
    11.2. WIFI Aggregation and Offload Overview
    11.3. Layer 2 over Soft-GRE Tunnels
      11.3.1. Encapsulation
      11.3.2. Data Path
    11.4. Tunnel Level Egress QoS
      11.4.1. QoS Overrides
      11.4.2. Operational Commands
    11.5. Authentication
      11.5.1. EAP-Based Authentication
        11.5.1.1. RADIUS Proxy
          11.5.1.1.1. RADIUS Proxy — Server Load-Balancing
          11.5.1.1.2. RADIUS Proxy — Cache Lookup
          11.5.1.1.3. RADIUS Proxy — Accounting
      11.5.2. Portal Authentication
    11.6. Address Assignment
    11.7. WIFI Mobility Anchor
    11.8. Wholesale
    11.9. CGN on WLAN-GW
    11.10. Lawful Intercept on WLAN-GW
    11.11. WLAN Location Enhancements
      11.11.1. Triggered Interim Accounting-Updates
      11.11.2. Operational Support
    11.12. 3G/4G Interworking
      11.12.1. Signaling Call Flow
        11.12.1.1. GTP Setup with EAP Authentication
      11.12.2. Location Notification in S2a
        11.12.2.1. WLAN Location over S2a
        11.12.2.2. Cellular Location over S2a
        11.12.2.3. Cellular Location over Gn Interface
        11.12.2.4. Operational Support
    11.13. Migrant User Support
      11.13.1. Migrant User Support with Portal-Authentication
        11.13.1.1. DHCP
        11.13.1.2. Authentication and Forwarding
      11.13.2. Migrant User Support with EAP Authentication
      11.13.3. Data Triggered Subscriber Creation
    11.14. Distributed Subscriber Management (DSM)
      11.14.1. DHCP
      11.14.2. Authentication and Accounting
        11.14.2.1. DSM Data-Plane
      11.14.3. IP Filtering
        11.14.3.1. Policing
        11.14.3.2. Lawful Intercept (LI)
        11.14.3.3. Data-Triggered UE Creation
      11.14.4. Idle-Timeout and Session-Timeout Management
      11.14.5. Operational Commands
      11.14.6. Pool Manager
      11.14.7. DHCPv6 and SLAAC
      11.14.8. Call Trace
    11.15. Distributed RADIUS Proxy
      11.15.1. Enhanced Subscriber Management
      11.15.2. Distributed Subscriber Management
      11.15.3. VLAN Awareness
      11.15.4. Operational Commands
    11.16. WLAN-GW 1:1 Active-Backup Redundancy
      11.16.1. DHCP Server Redundancy
      11.16.2. Subscriber Creation after Switchover
    11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
    11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
    11.19. IPv6-only Access
      11.19.1. IPv6 GRE Tunnels
      11.19.2. IPv6 Client-Side RADIUS Proxy
      11.19.3. Dual-Stack UEs over WLAN-GW
        11.19.3.1. SLAAC Prefix Assignment
        11.19.3.2. DHCPv6 IA_NA Assignment
        11.19.3.3. Migrant User Support
        11.19.3.4. Accounting
    11.20. Layer 2 Wholesale
    11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    11.22. Soft-L2TPv3 Tunnels
     WiFi Command Reference
      Command Hierarchies
        WLAN-GW Commands
          Subscriber Management BRG Commands
          DSM Call Trace Commands
        WLAN-GW Service Commands
        RADIUS Server and Proxy Commands
        LUDB Matching for RADIUS Proxy Cache
        Data Plane Related Commands
        Port Policy Commands
        WIFI Aggregation and Offload – Migrant User Support Commands
        Distributed Subscriber Management Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
      WIFI Aggregation and Offload Commands
        WIFI Aggregation and Offload Commands
          Generic Commands
          WLAN-GW Commands
          DSM Call Trace Commands
          RADIUS Server Policy Commands
        CLI Command Description for RADIUS Server
        CLI Command Description for RADIUS Proxy Server
        LUDB Matching of RADIUS Proxy Cache Commands
        WLAN-GW-Group Commands
        Port Policy Commands
        WLAN-GW Group Interface Commands
        Migrant User Support Commands
          Distributed Subscriber Management Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
  12. GTP
    12.1. In This Chapter
    12.2. GTP Uplink
      12.2.1. Identification Attributes
      12.2.2. P-GW/GGSN Selection
      12.2.3. Configuration
      12.2.4. QoS Support
      12.2.5. GTP Session Hold
      12.2.6. Selective Breakout
      12.2.7. IPoE Support
      12.2.8. PPPoE Support
    12.3. GTP Peering
    12.4. Operational Commands
      12.4.1. show router wlan-gw mobile-gateway
      12.4.2. show router 300 wlan-gw mgw-address-cache
      12.4.3. show subscriber-mgmt wlan-gw gtp-session detail
      12.4.4. show subscriber-mgmt wlan-gw mgw-profile "default"
      12.4.5. show subscriber-mgmt wlan-gw gtp-statistics
    GTP Command Reference
      Command Hierarchies
        GTP Commands
        GTP Service Commands
      GTP Command Descriptions
        GTP Commands
          Generic Commands
          GTP Commands
  13.  virtual Residential Gateway
    13.1. In This Section
    13.2. virtual Residential Gateway Overview
      13.2.1. Access Modes
      13.2.2. Home Context on the vRGW
        13.2.2.1. Implicit Home Authentication
        13.2.2.2. Explicit Home Authentication
        13.2.2.3. Change of Configuration
        13.2.2.4. Home Lifetime
      13.2.3. Device Context on the vRGW
      13.2.4. Dynamic Configuration Changes
      13.2.5. Per-Home Pool Management and L2-Aware NAT
        13.2.5.1. Sticky IP Addresses
        13.2.5.2. Managed Static IPv4 Addresses
        13.2.5.3. DMZ
      13.2.6. IPv6
      13.2.7. QoS and Filter Support
      13.2.8. Data-Triggered Authentication
      13.2.9. Per-Host NAT Port Ranges
      13.2.10. Inter-Chassis Redundancy
        13.2.10.1. Pool State Synchronization
        13.2.10.2. Regular Group Interfaces
        13.2.10.3. WLAN-GW Group Interfaces
      13.2.11. BRG and vRG Caveats
     vRGW Command Reference
      Command Hierarchies
         Subscriber Management BRG Profile Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Generic Commands
        vRGW Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
  14. Dynamic Data Services
    14.1. In This Section
    14.2. Introduction to Dynamic Data Services
    14.3. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    14.4. Data-Triggered Dynamic Data Services
      14.4.1. Data Trigger
      14.4.2. Dynamic Services Data Trigger Capture SAP
      14.4.3. RADIUS Authentication
      14.4.4. Local Authentication
      14.4.5. Data-Triggered Dynamic Service Provisioning
      14.4.6. Control Plane Protection
      14.4.7. Debugging
     RADIUS Triggered Dynamic Data Services Command Reference
      Command Hierarchies
        RADIUS Triggered Dynamic Data Services Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      RADIUS Triggered Dynamic Data Services Commands
        Configuration Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  15. Diameter and Diameter Applications
    15.1. In This Section
    15.2. Restrictions
    15.3. Terminology
    15.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
      15.4.1. Extended Failure Handling (EFH)
        15.4.1.1. Extended Failure Handling Example Call Flow
        15.4.1.2. Extended Failure Handling Triggers
        15.4.1.3. Assigning Interim Credit
        15.4.1.4. Enabling Extended Failure Handling
        15.4.1.5. Configuration Example 1 - Single Volume Interim Credit Value
        15.4.1.6. Configuration Example 2 - Interim Credit Values Per Rating Group
        15.4.1.7. Monitoring the Extended Failure Handling State
        15.4.1.8. Additional Call Flow Examples
          15.4.1.8.1. User Disconnects While EFH is Active
          15.4.1.8.2. The Maximum Number of Attempts is Reached
          15.4.1.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
    15.5. Policy Management via Gx Interface
      15.5.1. Gx Protocol
      15.5.2. Policy Assignment Models
      15.5.3. IP-CAN Session – Gx Session Identification
        15.5.3.1. User Identification in PCRF
        15.5.3.2. NAS-Port-Id as Subscription-Id
      15.5.4. Gx Interface and ESM Subscriber Instantiation
        15.5.4.1. Gx and Dual-Stack Hosts
        15.5.4.2. Gx and PPPoEv6-DHCP
      15.5.5. Gx Fallback Function
      15.5.6. Gx CCR-I Replays
      15.5.7. Gx CCR-t Replays
        15.5.7.1. RAR and CCR-t Replay
        15.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
        15.5.7.3. CCR-t Replay And High Availability
      15.5.8. Automatic Updates for IP Address Allocation/De-allocation
      15.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      15.5.10. Gx, ESM and AA
        15.5.10.1. ESM Subscriber-host vs AA Subscriber
        15.5.10.2. AA Subscriber State
      15.5.11. Policy Management via Gx
      15.5.12. Gx-Based Overrides
        15.5.12.1. Instantiation of Gx Overrides
        15.5.12.2. HTTP Redirect Override
        15.5.12.3. Removal of Overrides
        15.5.12.4. Examples of Gx Overrides
      15.5.13. PCC Rules
        15.5.13.1. PCC Rule Concept
        15.5.13.2. PCC Rule Instantiation
        15.5.13.3. Base QoS-Policy and Base Filter
        15.5.13.4. Generic Policy Sharing and Rule Sharing
        15.5.13.5. PCC Rule Name and PCC Rule Removal
        15.5.13.6. Gx Rule Ordering
        15.5.13.7. PCC Rule Override
        15.5.13.8. Aggregation of IP-Criterion
        15.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
        15.5.13.10. Gx Rules with Multiple Actions and Action Sharing
        15.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        15.5.13.12. RADIUS and Gx Interaction
        15.5.13.13. Bulk Changes via CLI while Gx Rules are Active
        15.5.13.14. PCC Rule Direction
        15.5.13.15. Action
        15.5.13.16. Rate-Limiting Action (Ingress, Egress)
          15.5.13.16.1. Dynamic Policers and Queue Mappings
          15.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
        15.5.13.17. Forwarding-Class Change (Ingress, Egress)
        15.5.13.18. QoS Forward (Ingress and Egress)
        15.5.13.19. Next-Hop Redirect (Ingress)
        15.5.13.20. HTTP Redirect (Ingress)
        15.5.13.21. Filter Forward/Drop (Ingress and Egress)
        15.5.13.22. Service Gating Function
        15.5.13.23. PCC Rule Provisioning Example
        15.5.13.24. Operational Aspects
        15.5.13.25. PCC Rules and Capacity Planning
        15.5.13.26. PCC Rule Scaling Example
      15.5.14. NAS Filter Inserts
        15.5.14.1. Examples of NAS Entry Inserts
      15.5.15. Error Handing and Rule Failure Reporting in ESM
        15.5.15.1. AVP Decoding Failure in Gx
        15.5.15.2. ESM Rule-Installation Failure
        15.5.15.3. Failure Reporting in AA
        15.5.15.4. Summary of Failure Reporting
      15.5.16. Usage-Monitoring and Reporting
        15.5.16.1. ESM Usage-Monitoring - What is Being Monitored
        15.5.16.2. AA Usage-Monitoring – What is Being Monitored
        15.5.16.3. Requesting Usage-Monitoring in ESM
        15.5.16.4. Reporting Accumulated Usage
        15.5.16.5. Disabling Usage-Monitoring
        15.5.16.6. Usage-Monitoring for PCC Rules
        15.5.16.7. Session Termination
        15.5.16.8. Usage-Monitoring Examples
      15.5.17. Event Triggers
      15.5.18. Subscriber Verification
      15.5.19. Subscriber Termination
      15.5.20. Mobility Support in WiFi
        15.5.20.1. Redundancy
      15.5.21. Persistency and Origin-State-ID AVP
      15.5.22. Overload Protection
    15.6. Diameter NASREQ Application
      15.6.1. Sample Configuration Steps
    15.7. Diameter Redundancy
      15.7.1. Diameter Peer Level Redundancy
      15.7.2. Diameter Multi-Chassis Redundancy
        15.7.2.1. Diameter Proxy Model General Operational Principles
        15.7.2.2. Diameter Proxy Activity Selection
        15.7.2.3. Synchronization and MCS
        15.7.2.4. Retransmissions
        15.7.2.5. Retransmissions and the T-bit
        15.7.2.6. Diameter Proxy Role
        15.7.2.7. Diameter Proxy and CC-Request-Number AVP
        15.7.2.8. Stateless Diameter Proxy
        15.7.2.9. Switchover Scenarios
        15.7.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
        15.7.2.11. Switchover Update Event (CCR-u)
        15.7.2.12. Isolated Chassis
        15.7.2.13. Diameter Identities
        15.7.2.14. High Availability
      15.7.3. Gx Specific Behavior
    15.8. Diameter Debugging
  16.  Python Script Support for ESM
    16.1. In This Chapter
    16.2. Python Script Support for ESM
    16.3. Python in SR OS Overview
      16.3.1. Python Policy – GTPv1-C API
      16.3.2. Python Policy – GTPv2-C API
      16.3.3. Python Changes
    16.4. Python Support in sub-ident-policy
      16.4.1. Configuration
      16.4.2. Operator Debugging
      16.4.3. Python Scripts
      16.4.4. Sample Python Scripts
        16.4.4.1. Example
        16.4.4.2. Example
        16.4.4.3. Example
      16.4.5. Limitations
    16.5. RADIUS Script Policy Overview
      16.5.1. Python RADIUS API
      16.5.2. Sample Script
    16.6. Python Policy Overview
      16.6.1. Python Policy – RADIUS API
      16.6.2. Python Policy – DHCPv4 API
      16.6.3. Python Policy – DHCPv6 API
      16.6.4. Python Policy – Diameter API
      16.6.5. Python Policy – DHCP Transaction Cache API
      16.6.6. Python for PPPoE API
      16.6.7. Python API for PPP Packet
      16.6.8. Python API for PPP PAP
      16.6.9. Python API for PPP CHAP
      16.6.10. Python ESM API
      16.6.11. Python Cache Support
      16.6.12. Applying a Python Policy
      16.6.13. Python Script Protection
    16.7. Tips and Tricks
    Python Command Reference
      Command Hierarchies
        Python Policy Commands
        Python Script Commands
        Services Commands
        Show Commands
        Tools Commands
        Debug Commands
        Clear Commands
      Command Descriptions
        Python Configuration Commands
          Global Commands
          Python Policy Commands
          Python Script Commands
          Services Commands
          Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
     Python RADIUS Command Reference
      Command Hierarchies
      Command Descriptions
        Generic Commands
        Script Commands
  17. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Nokia SR OS Services Configuration Process
  2.  Introduction to Triple Play
    2.1. In This Section
    2.2. Nokia’s Triple Play Service Delivery Architecture
      2.2.1. Introduction to Triple Play
      2.2.2. Blueprint for Optimizing Triple Play Service Infrastructures
      2.2.3. Architectural Foundations
      2.2.4. Optimizing Triple Play Service Infrastructures
        2.2.4.1. Distributed Service Edges
        2.2.4.2. Service Differentiation, QoS Enablement
        2.2.4.3. Virtual MAC Subnetting for VPLS
    2.3. Services
      2.3.1. Service Types
      2.3.2. Service Policies
    2.4. Nokia Service Model
      2.4.1. Introduction
      2.4.2. Service Entities
      2.4.3. Customers
      2.4.4. Service Access Points (SAPs)
        2.4.4.1. SAP Encapsulation Types and Identifiers
        2.4.4.2. Ethernet Encapsulations
        2.4.4.3. SAP Considerations
      2.4.5. Service Distribution Points (SDPs)
        2.4.5.1. SDP Binding
        2.4.5.2. Spoke and Mesh SDPs
        2.4.5.3. SDP Encapsulation Types
          2.4.5.3.1. GRE
          2.4.5.3.2. MPLS
        2.4.5.4. SDP Keepalives
    2.5. Epipe Service Overview
    2.6. VPLS Service Overview
      2.6.1. Split Horizon SAP Groups and Split Horizon Spoke SDP Groups
        2.6.1.1. Residential Split Horizon Groups
    2.7. IES Service Overview
      2.7.1. IP Interface
    2.8. VPRN Service Overview
    2.9. Deploying and Provisioning Services
      2.9.1. Phase 1: Core Network Construction
      2.9.2. Phase 2: Service Administration
      2.9.3. Phase 3: Service Provisioning
    2.10. Configuration Notes
      2.10.1. General
     Configuring Triple Play Services with CLI
      Configuring VPLS Residential Split Horizon Groups
        Configuring Static Hosts
          BNG Learning IP-Only Static Host’s MAC Address
          Static Host Learning the IPv6 Default Gateway Address
          Configuring Static Hosts on an VPLS SAP
          Configuring Static Hosts on an IES SAP
          Configuring Static Hosts on an VPRN SAP
     Triple Play Services Command Reference
      Command Hierarchies
        IES Triple Play Commands
        VPLS Triple Play Commands
        Service DHCP and Anti-Spoof Filtering Commands
        Triple Play ARP Commands
        Triple Play Multicast Commands
        Show Commands
        Clear Commands
        Tools Commands
      Command Descriptions
        Global Commands
        Service Commands
          SAP Commands
          SAP Subscriber Management Commands
          Triple Play Multicast Commands
          VPLS SAP ATM Commands
          Service DHCP and Anti-Spoof Filtering Commands
          Filter and QoS Policy Commands
          SDP Commands
          DHCP Commands
          Egress Multicast Group Commands
          Interface Commands
          Interface IPv6 Commands
        Show Commands
          IGMP Snooping Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  3.  DHCP Management
    3.1. In This Chapter
    3.2. DHCP Principles
    3.3. DHCP Features
      3.3.1. DHCP Relay
      3.3.2. DHCPv4 Relay Proxy
      3.3.3. Subscriber Identification Using Option 82 Field
        3.3.3.1. Trusted and Untrusted
      3.3.4. DHCP Snooping
      3.3.5. DHCP Lease State Table
      3.3.6. DHCP and Layer 3 Aggregation
        3.3.6.1. DHCPv4 Snooping
        3.3.6.2. DHCPv6 Snooping
      3.3.7. Local DHCP Servers
        3.3.7.1. Overview
        3.3.7.2. Local DHCP Server Support
      3.3.8. DHCPv6
        3.3.8.1. DHCPv6 Relay Agent
        3.3.8.2. DHCPv6 Prefix Options
        3.3.8.3. Neighbor Resolution via DHCPv6 Relay
        3.3.8.4. DHCPv6 Lease Persistency
        3.3.8.5. Local Proxy Neighbor Discovery
        3.3.8.6. IPv6oE Hosts Behind Bridged CPEs
        3.3.8.7. IPv6 Link-Address Based Pool Selection
        3.3.8.8. IPv6 Address/Prefix Stickiness
        3.3.8.9. IPv4/v6 Linkage for Dual-Stack Hosts or Layer 3 RGs
        3.3.8.10. Host Connectivity Checks for IPv6
      3.3.9. Lease Query
      3.3.10. DHCPv6 to Server Option
      3.3.11. Flexible Host Identification in LUDB Based on DHCPv4/v6 Options
      3.3.12. DHCP Caching
      3.3.13. Flexible Creation of DHCPv4/6 Host Parameters
      3.3.14. Python DTC Variables and API
        3.3.14.1. DTC Debugging Facility
      3.3.15. Virtual Subnet for DHCPv4 Hosts
      3.3.16. Address Reservation for Sticky Leases
    3.4. Proxy DHCP Server
      3.4.1. Local DHCP Servers
        3.4.1.1. Terminology
        3.4.1.2. Overview
        3.4.1.3. DHCP Lease Synchronization
        3.4.1.4. Intercommunication Link Failure Detection
        3.4.1.5. DHCP Server Failover States
        3.4.1.6. Lease Time Synchronization
        3.4.1.7. Maximum Client Lead Time (MCLT)
        3.4.1.8. Sharing IPv4 Address-Range or IPv6 Prefixes
        3.4.1.9. Fast-Switchover of IP Address/Prefix Delegation
          3.4.1.9.1. DHCP Server Synchronization and Local PPPoX Pools
    3.5. Local Address Assignment
      3.5.1. Stateless Address Auto-configuration
     Configuring DHCP with CLI
    Common Configuration Tasks
      Enabling DHCP Snooping
      Configuring Option 82 Handling
      Enabling DHCP Relay
      Configuring Local User Database Parameters
     Triple Play DHCP Command Reference
      Command Hierarchies
        Global DHCP Commands
        Router DHCP Local User Database Commands
        Service Commands
          IES DHCP Commands
          VPLS DHCP Commands
          VPRN DHCP Commands
          VPRN DHCP Subscriber Interface Commands
          IES/VPRN IPv6-DHCP6 Commands
        Local User Database Commands
          IPoE Commands
          PPP Commands
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Triple Play DHCP Configuration Commands
          Global Commands
          Global DHCP Commands
          Router DHCP Commands
          Service Commands
          Local User Database Commands
        Show Commands
        Tools Commands
        Clear Commands
        Debug Commands
  4. SLAAC
    4.1. In This Chapter
    4.2. Stateless Address Auto-configuration (SLAAC) Management
    4.3. SLAAC Principles
    4.4. Configuration Overview
    4.5. Router-Solicit Trigger
    4.6. SLAAC Address Assignment
    4.7. Static SLAAC Prefix Assignment
    4.8. Dynamic SLAAC Prefix Assignment
  5.  Point-to-Point Protocol over Ethernet Management
    5.1. In This Chapter
    5.2. PPPoE
      5.2.1. PPPoE Authentication and Authorization
        5.2.1.1. General Flow
        5.2.1.2. RADIUS
        5.2.1.3. Local User Database Directly Assigned to PPPoE Node
        5.2.1.4. Subscriber per PPPoE Session Index
        5.2.1.5. Local DHCP Server with Local User Database
      5.2.2. Multiple Sessions Per MAC Address
      5.2.3. Private Retail Subnets
      5.2.4. IPCP Subnet Negotiation
        5.2.4.1. Numbered WAN Support for Layer 3 RGs
      5.2.5. IES as Retail Service for PPPoE Host
      5.2.6. Unnumbered PPPoX
    5.3. MLPPPoE, MLPPP(oE)oA with LFI on LNS
      5.3.1. Terminology
      5.3.2. LNS MLPPPoX
      5.3.3. MLPPP Encapsulation
      5.3.4. MLPPPoX Negotiation
      5.3.5. Enabling MLPPPoX
      5.3.6. Link Fragmentation and Interleaving (LFI)
        5.3.6.1. MLPPPoX Fragmentation, MRRU and MRU Considerations
      5.3.7. LFI Functionality Implemented in LNS
        5.3.7.1. Last Mile QoS Awareness in the LNS
        5.3.7.2. BB-ISA Processing
        5.3.7.3. LNS-LAC Link
        5.3.7.4. AN-RG Link
        5.3.7.5. Home Link
        5.3.7.6. Optimum Fragment Size Calculation by LNS
          5.3.7.6.1. Encapsulation Based Fragment Size
          5.3.7.6.2. Fragment Size Based on the Max Transmission Delay
          5.3.7.6.3. Selection of the Optimum Fragment Length
      5.3.8. Upstream Traffic Considerations
      5.3.9. Multiple Links MLPPPoX With No Interleaving
      5.3.10. MLPPPoX Session Support
      5.3.11. Session Load Balancing Across Multiple BB-ISAs
      5.3.12. BB-ISA Hashing Considerations
      5.3.13. Last Mile Rate and Encapsulation Parameters
      5.3.14. Link Failure Detection
      5.3.15. CoA Support
      5.3.16. Accounting
      5.3.17. Filters and Mirroring
      5.3.18. PTA Considerations
      5.3.19. QoS Considerations
        5.3.19.1. Dual-Pass
        5.3.19.2. Traffic Prioritization in LFI
        5.3.19.3. Shaping Based on the Last Mile Wire Rates
        5.3.19.4. Downstream Bandwidth Management on Egress Port
      5.3.20. Sub/Sla-Profile Considerations
      5.3.21. Example of MLPPPoX Session Setup Flow
      5.3.22. Other Considerations
    5.4. Configuration Notes
     PPP Command Reference
      Command Hierarchies
        PPPoE Policy Configuration Commands
        PPPoE Service Commands
        PPPoE Local User Database Commands
        MLPPP on LNS Commands
        Show Commands
      Command Descriptions
         PPP Configuration Commands
          MLPPP on LNS Commands
          PPP/PPPoE Service Commands
          RADIUS Attribute Commands
        Show Commands
        Clear Commands
        Debug Commands
  6. L2TP
    6.1. In This Chapter
    6.2. L2TP
      6.2.1. Terminology
      6.2.2. LAC DF Bit
      6.2.3. Handling L2TP Tunnel/Session Initialization Failures
        6.2.3.1. L2TP Tunnel/Session Initialization Failover Mechanisms on LAC
        6.2.3.2. Peer Blacklist
        6.2.3.3. Tunnel Blacklists
          6.2.3.3.1. Tunnel Timeout Due to the Peer IP Address Change
        6.2.3.4. Tunnel Selection Mechanism
        6.2.3.5. Tunnel Probing
        6.2.3.6. Controlling the Size of Blacklist
        6.2.3.7. Displaying the Content of a Blacklist
        6.2.3.8. Generating Trap when the Blacklist is Full
        6.2.3.9. Premature Removal of Blacklisted Entries
        6.2.3.10. Manual Purging of Entities within the Blacklist
      6.2.4. CDN Result Code Overwrite
      6.2.5. LNS Proxy
    6.3. L2TP LAC VPRN
      6.3.1. Per-ISP Egress L2TP DSCP Reclassification
    6.4. L2TP Tunnel RADIUS Accounting
      6.4.1. Accounting Packets List
    6.5. RADIUS Attributes Value Considerations
      6.5.1. Other Optional RADIUS Attributes
      6.5.2. RADIUS VSA to Enable L2TP Tunnel Accounting
      6.5.3. MLPPP on the LNS Side
      6.5.4. LNS Reassembly
    L2TP Command Reference
      Command Hierarchies
        L2TP Configuration Commands
        L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      Command Descriptions
        L2TP Configuration Commands
          Global Commands
          L2TP Tunnel Account Commands
          L2TP Tunnel RADIUS Accounting Commands
        Show Commands
        Debug Commands
  7.  Triple Play Security
    7.1. In This Chapter
    7.2. Triple Play Security Features
      7.2.1. Anti-Spoofing Filters
        7.2.1.1. Anti-spoofing Filter Types
        7.2.1.2. Filtering Packets
      7.2.2. Layer 2 Triple Play Security Features
        7.2.2.1. MAC Pinning
        7.2.2.2. MAC Protection
        7.2.2.3. DoS Protection
          7.2.2.3.1. Subscriber Aggregation Network
          7.2.2.3.2. Network Control Filtering
        7.2.2.4. VPLS Redirect Policy
      7.2.3. ARP Handling
        7.2.3.1. ARP Reply Agent
        7.2.3.2. Dynamic ARP Table Population
        7.2.3.3. Local Proxy ARP
      7.2.4. Web Portal Redirect
     Configuring Triple Play Security with CLI
      Common Configuration Tasks
        Configuring Anti-Spoofing Filters
        Configuring Triple Play Security features
          Configuring MAC Pinning
          Configuring MAC Protection
          Configuring VPLS Redirect Policy
        Configuring ARP Handling
          Configuring Proxy ARP
          Configuring Local Proxy ARP
          Configuring ARP Reply Agent in a VPLS Service
          Configuring Remote Proxy ARP
          Configuring Automatic ARP Table Population in an IES or VPRN Interface
          Configuring CPU Protection
        Configuring Web Portal Redirect
     Triple Play Security Command Reference
      Command Hierarchies
        Anti-Spoofing Commands
        Layer 2 Security Commands
        ARP Handling Commands
        Tools Commands
      Command Descriptions
         Triple Play Security Configuration Commands
          Triple Play Anti-Spoofing Commands
          Triple Play Layer 2 Security Commands
          ARP Handling Commands
        Show Commands
        Tools Commands
  8.  Triple Play Multicast
    8.1. In This Chapter
    8.2. Introduction to Multicast
    8.3. Multicast in the Broadband Service Router
      8.3.1. Internet Group Management Protocol
        8.3.1.1. IGMP Versions and Interoperability Requirements
        8.3.1.2. IGMP Version Transition
      8.3.2. Multicast Listener Discovery
        8.3.2.1. MLD Versions and Interoperability Requirements
        8.3.2.2. Source Specific Multicast Groups
      8.3.3. Protocol Independent Multicast Sparse Mode (PIM-SM)
      8.3.4. Ingress Multicast Path Management (IMPM) Enhancements
    8.4. Multicast in the BSA
      8.4.1. IGMP Snooping
        8.4.1.1. IGMP/MLD Message Processing
        8.4.1.2. IGMP Message Processing
        8.4.1.3. MLD Message Processing
        8.4.1.4. IGMP/MLD Filtering
      8.4.2. Multicast VPLS Registration (MVR)
      8.4.3. Layer 3 Multicast Load Balancing
      8.4.4. IGMP State Reporter
        8.4.4.1. IGMP Data Records
        8.4.4.2. Transport Mechanism
        8.4.4.3. HA Compliance
        8.4.4.4. QoS Awareness
        8.4.4.5. Hardware Support
        8.4.4.6. IGMP Reporting Caveats
    8.5. Multicast Support over Subscriber Interfaces in Routed CO Model
      8.5.1. Hardware Support
      8.5.2. Multicast Over IPoE
        8.5.2.1. Per SAP Replication Mode
          8.5.2.1.1. Per SAP Queue
          8.5.2.1.2. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.5.2.1.3. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Snooping in the AN
          8.5.2.1.4. IPoE N:1 Model (Service per VLAN/SAP) — IGMP/MLD Proxy in the AN
        8.5.2.2. Per Subscriber Host Replication Mode
          8.5.2.2.1. IPoE 1:1 Model (Subscriber per VLAN/SAP) — No IGMP/MLD in AN
          8.5.2.2.2. IPoE N:1 Model (Service per VLAN/SAP) — No IGMP/MLD in the AN
      8.5.3. Multicast Over PPPoE
      8.5.4. IGMP Flooding Containment
      8.5.5. IGMP/MLD Timers
      8.5.6. IGMP/MLD Query Intervals
      8.5.7. HQoS Adjustment
        8.5.7.1. Host Tracking (HT) Considerations
        8.5.7.2. HQoS Adjust Per Vport
          8.5.7.2.1. Multi-Chassis Redundancy
          8.5.7.2.2. Scalability Considerations
      8.5.8. Redirection
      8.5.9. Hierarchical Multicast CAC (H-MCAC)
        8.5.9.1. MCAC Bundle Bandwidth Limit Considerations
      8.5.10. Determining MCAC Policy in Effect
      8.5.11. Multicast Filtering
      8.5.12. Joining the Multicast Tree
      8.5.13. Wholesale/Retail Requirements
      8.5.14. QoS Considerations
      8.5.15. Redundancy Considerations
        8.5.15.1. Redirection Considerations
      8.5.16. Query Intervals for Multicast
        8.5.16.1. ESM Host-based Queries
        8.5.16.2. Group Interface-based Queries
    Configuring Triple Play Multicast Services with CLI
      Configuring IGMP Snooping in the BSA
        Enabling IGMP Snooping in a VPLS Service
        With IGMPv3 Multicast Routers
        With IGMPv1/2 Multicast Routers
        Modifying IGMP Snooping Parameters
        Modifying IGMP Snooping Parameters for a SAP or SDP
      Configuring Static Multicast Groups on a SAP or SDP
        Enabling IGMP Group Membership Report Filtering
          Enabling IGMP Traffic Filtering
      Configuring Multicast VPLS Registration (MVR)
      Configuring IGMP, MKD, and PIM in the BSR
        Enabling IGMP
        Configuring IGMP Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Enabling MLD
        Configuring MLD Interface Parameters
        Configuring Static Parameters
        Configuring SSM Translation
        Configuring PIM
          Enabling PIM
          Configuring PIM Interface Parameters
          Importing PIM Join/Register Policies
          Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
     Triple Play Multicast Command Reference
      Command Hierarchies
        MCAST Management Commands
        Multicast Info Policy Bundle Commands
        Triple Play Multicast Service Commands
        Ingress Multicast Path Management Commands
        Multicast Redirection
        Multicast Query Timer Commands
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
         Multicast Management Configuration Commands
          Generic Commands
          Multicast Management Commands
          Bandwidth Policy Commands
          Multicast Info Policy Commands
          Chassis Level Commands
          Multicast Redirection Commands
          Multicast Query Timer Commands
          Forwarding Plane Commands
  9. Triple Play Enhanced Subscriber Management
    9.1. In This Section
    9.2. Uniform RADIUS Server Configuration
      9.2.1. RADIUS Server Configuration
        9.2.1.1. Uniform RADIUS Server Configuration (Preferred)
        9.2.1.2. Legacy RADIUS Server Configuration
    9.3. RADIUS Authentication of Subscriber Sessions
      9.3.1. RADIUS Authentication Extensions
        9.3.1.1. Triple Play Network with RADIUS Authentication
      9.3.2. RADIUS Authorization Extensions
        9.3.2.1. Calling-Station-ID
        9.3.2.2. Subscriber Session Timeout
          9.3.2.2.1. Domain Name in Authentication
        9.3.2.3. RADIUS Reply Message for PPPoE PAP/CHAP
        9.3.2.4. SHCV Policy
      9.3.3. radius-server-policy Retry Attempt Overview
      9.3.4. AAA RADIUS Server Operation Status
      9.3.5. AAA RADIUS Accounting Server Stickiness
      9.3.6. AAA RADIUS Authentication Fallback Action
      9.3.7. AAA Test User Account
      9.3.8. Troubleshooting the RADIUS Server
      9.3.9. Provisioning of Enhanced Subscriber Management (ESM) Objects
        9.3.9.1. Provisioning IP Configuration of the Host
        9.3.9.2. RADIUS Based Authentication in Wholesale Environment
        9.3.9.3. Change of Authorization and Disconnect-Request
        9.3.9.4. RADIUS-Based Accounting
        9.3.9.5. RADIUS Accounting Terminating Cause
        9.3.9.6. Accounting Modes Of Operation
        9.3.9.7. Per Session Accounting
          9.3.9.7.1. Caveats
        9.3.9.8. RADIUS Session Accounting with PD as a Managed Route
        9.3.9.9. No Host-Accounting
        9.3.9.10. Host-Accounting Enabled
        9.3.9.11. Reduction of Host Updates for Session Accounting Start and Stop
        9.3.9.12. Accounting Interim Update Message Interval
        9.3.9.13. CoA Triggered Accounting Interim Update
        9.3.9.14. Class Attribute
        9.3.9.15. User Name
        9.3.9.16. Accounting-On and Accounting Off
        9.3.9.17. RADIUS Accounting Message Buffering
        9.3.9.18. Multiple Accounting Policies
        9.3.9.19. Sending an Accounting Stop Message upon a RADIUS Authentication Failure of a PPPoE Session
    9.4. Enhanced Subscriber Management Overview
      9.4.1. Enhanced Subscriber Management Basics
        9.4.1.1. Standard and Enhanced Subscriber Management
          9.4.1.1.1. Subscriber Management Definitions
          9.4.1.1.2. Subscriber Identification Policy
          9.4.1.1.3. Subscriber Identification String
          9.4.1.1.4. Subscriber Profile
          9.4.1.1.5. SLA Profile
          9.4.1.1.6. Explicit Subscriber Profile Mapping
      9.4.2. ESM for IPv6
        9.4.2.1. Models
          9.4.2.1.1. PPPoE Host
          9.4.2.1.2. PPPoE RG
          9.4.2.1.3. IPoE Host/RG
        9.4.2.2. Setup
        9.4.2.3. Behavior
          9.4.2.3.1. Dual Stack
          9.4.2.3.2. Router Advertisements (RA)
          9.4.2.3.3. CoA and Disconnect-Request
        9.4.2.4. Delegated-Prefix-Length
          9.4.2.4.1. Order of Preference for DPL
          9.4.2.4.2. DHCP Server Address Utilization and Delegated Prefix Length
        9.4.2.5. DHCPv6 Relay Agent
          9.4.2.5.1. Configuring a DHCPv6 Relay Agent
        9.4.2.6. DHCPv6 Relay to Third Party DHCPv6 External Server
        9.4.2.7. DHCPv6 Local Server
      9.4.3. Dynamic Subscriber Host Processing
        9.4.3.1. Dynamic Tables
          9.4.3.1.1. Active Subscriber Table
          9.4.3.1.2. SLA Profile Instance Table
          9.4.3.1.3. Subscriber Host Table
          9.4.3.1.4. DHCP Lease State Table
      9.4.4. Enhanced Subscriber Management Entities
        9.4.4.1. Instantiating a New Host
        9.4.4.2. Packet Processing for an Existing Host
      9.4.5. ESM Host Lockout
        9.4.5.1. Functionality
      9.4.6. ANCP and GSMP
        9.4.6.1. ANCP
          9.4.6.1.1. Static ANCP Management
          9.4.6.1.2. Enhanced Subscriber Management (ESM) Dynamic ANCP
          9.4.6.1.3. ANCP String
          9.4.6.1.4. ANCP Persistency Support
        9.4.6.2. General Switch Management Protocol Version 3 (GSMPv3)
        9.4.6.3. DHCP Release Messages
          9.4.6.3.1. DHCP Release
        9.4.6.4. DHCP Client Mobility
        9.4.6.5. DHCP Lease Control
      9.4.7. Using Scripts for Dynamic Recognition of Subscribers
        9.4.7.1. Python Language and Programmable Subscriber Configuration Policy (PSCP)
        9.4.7.2. Determining the Subscriber Profile and SLA Profile of a Host
        9.4.7.3. Determining the Subscriber Profile
        9.4.7.4. Determining the SLA Profile
          9.4.7.4.1. SLA-Based Egress QoS Marking
      9.4.8. Auto-Sub ID
        9.4.8.1. Sub-id Identifiers
        9.4.8.2. Dual Stack Hosts
        9.4.8.3. Mixing Hosts with Auto-Generated IDs and non Auto-Generated IDs
        9.4.8.4. PPPoA/PPPoEoA Considerations
        9.4.8.5. Deployment Considerations
        9.4.8.6. Caveats
      9.4.9. Limiting Subscribers and Hosts on a SAP
      9.4.10. Static Subscriber Hosts
      9.4.11. QoS for Subscribers and Hosts
        9.4.11.1. QoS Parameters in Different Profiles
        9.4.11.2. QoS Policy Overrides
      9.4.12. ESM Subscriber Hierarchical Traffic Control
        9.4.12.1. Subscriber HQoS
        9.4.12.2. Subscriber CFHP
        9.4.12.3. ATM/Ethernet Last-Mile Aware QoS for Broadband Network Gateway
          9.4.12.3.1. Broadband Network Gateway Application
          9.4.12.3.2. Queue Determination and Scheduling
          9.4.12.3.3. Weighted Scheduler Group
          9.4.12.3.4. Queue and Subscriber Aggregate Rate Configuration and Adjustment
          9.4.12.3.5. Frame Size, Rates, and Running Average Frame Expansion Ratio
          9.4.12.3.6. Vport Determination and Evaluation
          9.4.12.3.7. Applying Aggregate Rate Limit to a Vport
          9.4.12.3.8. Applying a Scheduler Policy to a Vport
          9.4.12.3.9. Signaling of Last Mile Encapsulation Type
          9.4.12.3.10. Configuration Example
      9.4.13. Subscriber Volume Statistics
        9.4.13.1. IP (Layer 3) Volume Accounting
        9.4.13.2. Separate IPv4 and IPv6 Counters
      9.4.14. Configuring IP and IPv6 Filter Policies for Subscriber Hosts
        9.4.14.1. IP Filter Attribute Format Details
        9.4.14.2. Checking Filter Policy Details
      9.4.15. ESM PPPoA/PPPoEoA
        9.4.15.1. PPPoA
        9.4.15.2. PPPoEoA
        9.4.15.3. Hardware Support
        9.4.15.4. Termination Points within 7450 ESS and 7750 SR
        9.4.15.5. PPPoA Encapsulation
          9.4.15.5.1. PPPoEoA Encapsulation
        9.4.15.6. Encapsulation Summary
        9.4.15.7. Concurrent Support for Different Service Types on the Same Port
        9.4.15.8. Restrictions in Scaled ATM MDA Mode
        9.4.15.9. QoS Implementation
        9.4.15.10. Association Between the Subscriber and ATM VC Traffic Descriptor (QoS)
        9.4.15.11. Per VP Shaping
        9.4.15.12. ATM/IOM QoS Integration
          9.4.15.12.1. Intermediate Node Rate Limit/Shaper
          9.4.15.12.2. Provisioning Aspects
          9.4.15.12.3. HQoS Combinations
          9.4.15.12.4. ATM Rate Adjustment
        9.4.15.13. Subscriber Instantiation Use Cases
        9.4.15.14. Authentication
        9.4.15.15. LUDB Access via Capture SAP
        9.4.15.16. Encapsulation Autosensing
        9.4.15.17. SAP Autoprovisioning
        9.4.15.18. PPP Nodes and ppp-policy
        9.4.15.19. MTU Considerations
          9.4.15.19.1. PPP(oE) Session Antispoofing
      9.4.16. Multi-Chassis Synchronization
        9.4.16.1. Overview
          9.4.16.1.1. Loss of Synchronization and Reconciliation
      9.4.17. Subscriber Routed Redundancy Protocol (SRRP)
        9.4.17.1. SRRP Messaging
        9.4.17.2. SRRP and Multi-Chassis Synchronization
        9.4.17.3. SRRP Instance
          9.4.17.3.1. SRRP Instance MCS Key
          9.4.17.3.2. Containing Service Type and ID
          9.4.17.3.3. Containing Subscriber IP Interface Name
          9.4.17.3.4. Subscriber Subnet Information
          9.4.17.3.5. Containing Group IP Interface Information
          9.4.17.3.6. Remote Redundant IP Interface Mismatch
          9.4.17.3.7. Remote Sending Redundant IP Interface Unavailable
          9.4.17.3.8. Remote SRRP Advertisement SAP Non-existent
          9.4.17.3.9. Remote Sending Local Receive SRRP Advertisement SAP Unavailable
          9.4.17.3.10. Local and Remote Dual Master Detected
        9.4.17.4. Subscriber Subnet Owned IP Address Connectivity
        9.4.17.5. Subscriber Subnet SRRP Gateway IP Address Connectivity
        9.4.17.6. Receive SRRP Advertisement SAP and Anti-Spoof
      9.4.18. PPPoE MC Redundancy
        9.4.18.1. Hardware Support
        9.4.18.2. SRRP Considerations for PPPoE
          9.4.18.2.1. SRRP Fact-Checks
        9.4.18.3. State Synchronization
          9.4.18.3.1. PPPoE Multi-chassis Synchronization (MCS) Model
        9.4.18.4. Traffic Control and Redundant Interface
          9.4.18.4.1. Subnet Assignment and Advertisement - Option ‘A’
          9.4.18.4.2. Subnet Assignment and Advertisement - Option ‘B’
        9.4.18.5. MSAP Considerations
        9.4.18.6. Unnumbered Interface Support
        9.4.18.7. Compatibility with MC-LAG
        9.4.18.8. IPv6 Support
        9.4.18.9. Considerations with Local DHCP Server
        9.4.18.10. Redundant Interface Considerations
      9.4.19. Routed Central Office (CO)
        9.4.19.1. Layer 3 Subscriber Interfaces
          9.4.19.1.1. DHCP Interactions
          9.4.19.1.2. Routed CO for IES Service
          9.4.19.1.3. Routed CO for VPRN Service
        9.4.19.2. Wholesale Retail Routed CO
          9.4.19.2.1. Wholesale Retail Model
          9.4.19.2.2. Configuration and Applicability
          9.4.19.2.3. Hub-and-Spoke Forwarding
        9.4.19.3. Routed Subscriber Hosts
          9.4.19.3.1. Static Configured IPv4 Managed Route
          9.4.19.3.2. Static Configured IPv6 Managed Route
          9.4.19.3.3. Dynamic BGP Peering
          9.4.19.3.4. RIP Listener
          9.4.19.3.5. RADIUS: Framed-Route and Framed-IPv6-Route
          9.4.19.3.6. GRT Lookup and Routed CO in a VPRN
      9.4.20. Dual Homing
        9.4.20.1. Dual Homing to Two PEs (Redundant-Pair Nodes) in Triple Play Aggregation
        9.4.20.2. Steady-State Operation of Dual-homed Ring
        9.4.20.3. Broken-Ring Operation and the Transition to this State
        9.4.20.4. Transition from Broken to Closed Ring State
        9.4.20.5. Provisioning Aspects and Error Cases
        9.4.20.6. Dual Homing to Two BSR Nodes
        9.4.20.7. MC Services
        9.4.20.8. Routed CO Dual Homing
          9.4.20.8.1. Redundant Interfaces
          9.4.20.8.2. SRRP in Dual Homing
          9.4.20.8.3. Synchronization
          9.4.20.8.4. Wholesale-Retail Multi-Chassis Redundancy
        9.4.20.9. SRRP and Multi-Chassis Synchronization
        9.4.20.10. Dual Homing and ANCP
      9.4.21. SRRP Enhancement
        9.4.21.1. SRRP Fate Sharing
        9.4.21.2. Fate Sharing Algorithm
        9.4.21.3. SRRP Aware Routing - IPv4/IPv6 Route Advertisement Based on SRRP State
          9.4.21.3.1. Subscriber Interface Routes (IPv4 and IPv6)
          9.4.21.3.2. Managed Routes
          9.4.21.3.3. Subscriber Management Routes (/32 IPv4 Host Routes, IPv6 PD WAN-Host Routes)
          9.4.21.3.4. Activating SRRP State Tracking
        9.4.21.4. SRRP in Conjunction with a PW in ESM Environment – Use Case
        9.4.21.5. Group Monitor
      9.4.22. Subscriber Override
      9.4.23. Dual Stack Lite
        9.4.23.1. IP-in-IP
        9.4.23.2. Configuring Dual Stack Lite
        9.4.23.3. L2TP over IPv6
    9.5. L2TP Tunnel RADIUS Accounting
      9.5.1. Accounting Packets List
      9.5.2. RADIUS Attributes Value Considerations
      9.5.3. Other Optional RADIUS Attributes
      9.5.4. RADIUS VSA to Enable L2TP Tunnel Accounting
      9.5.5. MLPPP on the LNS Side
    9.6. RADIUS Route Download
    9.7. Managed SAP (MSAP)
      9.7.1. Sticky MSAP
      9.7.2. ESM Identification Process
        9.7.2.1. SAP-ID ESM Identifier
        9.7.2.2. DSLAM-ID
      9.7.3. Default-Subscriber
      9.7.4. Multicast Management
      9.7.5. Subscriber Mirroring
    9.8. Volume and Time Based Accounting
      9.8.1. Metering
        9.8.1.1. Categories Map and Categories
        9.8.1.2. Quota Consumption
        9.8.1.3. Minimum Credit Control Quota Values
        9.8.1.4. RADIUS VSA Alc-Credit-Control-Quota
      9.8.2. Credit Negotiation Mechanisms
      9.8.3. Action on Credit Exhaustion
      9.8.4. Action on Error-Conditions
      9.8.5. Applicability of Volume and Time Based Accounting
    9.9. Subscriber Host Idle Timeout
    9.10. Web Authentication Protocol (WPP)
      9.10.1. WPP Configurations
      9.10.2. WPP Triggered Host Creation
        9.10.2.1. LUDB Support For WPP
      9.10.3. WPP Multi-Chassis Redundancy Support
    9.11. One-time HTTP Redirection Overview
    9.12. ESM over MPLS Pseudowires
      9.12.1. Encapsulation
      9.12.2. ESM and PW Ports
        9.12.2.1. ESM on PW-Port Bound to a Physical Port
          9.12.2.1.1. QoS Support
          9.12.2.1.2. BNG Redundancy with ESM over Pseudowire
        9.12.2.2. ESM on PXC-Based PW-Ports
    9.13. Logical Link Identifier (LLID)
    9.14. Open Authentication Model for DHCP and PPPoE Hosts
      9.14.1. Terminology
      9.14.2. LUDB and RADIUS Access Models
      9.14.3. No Authentication
      9.14.4. LUDB Only Access
      9.14.5. LUDB Access via DHCPv4 Server
      9.14.6. RADIUS Only Access
      9.14.7. Consecutive Access to LUDB and RADIUS
      9.14.8. RADIUS Fallback
    9.15. Flexible Subscriber-Interface Addressing (Unnumbered Subscriber-Interfaces)
      9.15.1. Terminology
      9.15.2. Flexible Subscriber-Interface Addressing for IPOE/PPPOE v4/v6 Subscribers
      9.15.3. Default Gateway in IPv4 Flexible Addressing
      9.15.4. IPv4 Subnet Sharing
      9.15.5. IPv4 Subnet Mask Auto-Generation
      9.15.6. Local-proxy-arp and arp-populate
      9.15.7. Gi-address Configuration Consideration
      9.15.8. PPPoE Considerations
      9.15.9. IPoEv6 Considerations
      9.15.10. General Configuration Guidelines for Flexible IP Address Assignment
      9.15.11. Caveats
    9.16. uRPF for Subscriber Management
    9.17. IPoE Sessions
      9.17.1. Enabling IPoE Sessions
      9.17.2. IPoE Session Authentication
      9.17.3. IPoE Session Accounting
      9.17.4. IPoE Session Mid-Session Changes
      9.17.5. IPoE Session Termination
      9.17.6. Limiting the Number of IPoE sessions
      9.17.7. SAP Session Index
      9.17.8. Resiliency
      9.17.9. Notes
      9.17.10. Configuration Steps
      9.17.11. IPoE Session Migration
        9.17.11.1. Additional Notes for IPoE Session Migration of IPv4 Hosts as a Control Channel for Dynamic Data Services
    9.18. Data-triggered Subscriber Management
      9.18.1. Provisioning Data-triggered ESM
      9.18.2. Authentication and Host Creation
      9.18.3. DoS Protection
      9.18.4. DHCP Promotion
      9.18.5. Data-Triggered SLAAC Hosts
      9.18.6. Stateful Multi-Chassis Redundancy (MCS)
      9.18.7. Stateless Multi-Chassis Redundancy
        9.18.7.1. MSAP Support
    9.19. RADIUS Subscriber Services
      9.19.1. Subscriber Service Building Blocks
        9.19.1.1. RADIUS Access-Accept or CoA Message with Subscriber Service Activate or Deactivate VSAs
        9.19.1.2. RADIUS Python Interface
        9.19.1.3. Python Script
          9.19.1.3.1. Python Script Example
        9.19.1.4. Subscriber Service Instance Activation or Deactivation with Optional RADIUS Accounting
      9.19.2. Subscriber Services RADIUS VSAs
      9.19.3. Subscriber Service RADIUS Accounting
      9.19.4. Accounting-Only Subscriber Service
      9.19.5. QoS Override-based Subscriber Service
      9.19.6. PCC Rule-based Subscriber Services
        9.19.6.1. PCC Rule Actions
        9.19.6.2. PCC Rule Instantiation
        9.19.6.3. PCC Rules in a Subscriber Service
        9.19.6.4. Interaction of the PPPoE or IPoE Session QoS Model and PCC Rule-based Subscriber Services
        9.19.6.5. PCC Rules on HSMDAv2�
          9.19.6.5.1. Interaction between PCC Rule-Based Subscriber Services and RADIUS Queue-Instance, Host or Session Accounting Volume Counters
        9.19.6.6. PCC Rule-based Subscriber Service Activation Failures
      9.19.7. Combined Subscriber Services
      9.19.8. Subscriber Services Python API
        9.19.8.1. Common Subscriber Services Python API
        9.19.8.2. Subscriber Service QoS Override Python API
        9.19.8.3. Subscriber Service PCC Rules Python API
      9.19.9. Operational Commands
        9.19.9.1. Show Commands
        9.19.9.2. Debug Commands
        9.19.9.3. Resource Monitoring
    9.20. Residential Gateway Replacement
    9.21. ESM Troubleshooting Show Command
    9.22. Hybrid Access
     Configuring Enhanced Subscriber Management with CLI
      Configuring RADIUS Authentication of DHCP Sessions
      TCP MSS adjustment for ESM Hosts
      Configuring Enhanced Subscriber Management
        Basic Configurations
        Subscriber Interface Configuration
        Configuring Enhanced Subscriber Management Entities
          Configuring a Subscriber Identification Policy
          Configuring a Subscriber Profile
          Configuring an SLA Profile
          Configuring Explicit Mapping Entries
        Routed CO with Basic Subscriber Management Features
        Applying the Profiles and Policies
          SLA Profile
      Configuring Dual Homing
        SHCV Policies
        SHCV Policy
        Subscriber Identification Policy
        Subscriber Profile
     Subscriber Management Command Reference
      Command Hierarchies
        ANCP Commands
        GSMP Configuration Commands
        Authentication Policy Commands
        RADIUS Accounting Policy Commands
        RADIUS Route Download Commands
        Diameter Policy Commands
          AAA Diameter Peer Policy Commands
        Subscriber Management Diameter Application Policy Commands
        Category Map and Credit Control Policy Commands
        Filter Commands
        BGP Peering Policy Commands
        Explicit Subscriber Mapping Commands
        IGMP Policy Commands
        Host Lockout Commands
        Host Tracking Policy Commands
        PIM Policy Commands
        SLA Profile Commands
        Subscriber Identification Policy Commands
        Auto-Generated Subscriber Identification Key Commands
        Auto-Generated Subscriber Identification Key Service Commands
        Subscriber MCAC Policy Commands
        Subscriber Profile Commands
        IPoE Session Policy Commands
        Multi-Chassis Redundancy Commands
        SHCV Policy Commands
        Subscriber Management Service Commands
          VPLS Subscriber Management Configuration Commands
          Managed SAP Policy Commands
          VPRN Subscriber Interface Configuration Commands
          VPRN Subscriber Interface Group Interface Commands
          IES Subscriber Management Configuration Commands
          IES Subscriber Interface Commands
          IES Subscriber Interface Group Interface Commands
          Service Subscriber Interface, Group Interface IPoE Command
          RIP Commands
          VPort Commands
          Redundant Interface Commands
          Wireless Portal Protocol (WPP) Commands
          Multiple PPoE Session QoS Commands
          Multicast Listener Discovery (MLD) Commands
        Show Commands
        Monitor Commands
        Clear Commands
        Debug Commands
        Tools Commands
       Triple Play Subscriber Management Configuration Commands
         Triple Play Subscriber Management Configuration Commands
          Generic Commands
          ANCP and GSMP Commands
          RADIUS Policy Commands
          RADIUS Route Download Commands
          IGMP Policy Commands
          PIM Policy Commands
          Managed SAP Policy Commands
          Multi-Chassis Redundancy Commands
          SLA Profile Commands
          Subscriber Identification Policy Commands
          Subscriber Profile Commands
          Explicit Subscriber Mapping Commands
          Subscriber Management Service Commands
          Subscriber Management Service Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
            RIP Commands
            Vport Commands
            SHCV Policy Commands
            Show Commands
            Clear Commands
            Tools Commands
            Debug Commands
            Monitor Commands
          RIP Commands
          Vport Commands
          SHCV Policy Commands
        Show Commands
        Clear Commands
        Tools Commands
        Debug Commands
        Monitor Commands
  10. Oversubscribed Multi-Chassis Redundancy (OMCR) in ESM
    10.1. In This Section
    10.2. Overview
      10.2.1. Terminology and Abbreviations
      10.2.2. Restrictions
    10.3. Deploying Oversubscribed Multi-Chassis Redundancy
      10.3.1. Resource Exhaustion Notification and Simultaneous Failures
      10.3.2. Resource Monitoring
      10.3.3. Warm-Standby Mode Of Operation
      10.3.4. IPoE vs PPPoE
      10.3.5. Persistency
      10.3.6. Routing and Redundant Interface in OMCR
      10.3.7. Revertive Behavior
      10.3.8. Service Restoration Times
      10.3.9. Processing of the SRRP Flaps
      10.3.10. Accounting
      10.3.11. Configuration Guidelines
      10.3.12. Troubleshooting Commands
    OMCR Command Reference
      Command Hierarchies
      OMCR Configuration Commands
        OMCR Configuration Commands
  11.  WIFI Aggregation and Offload
    11.1. In This Section
    11.2. WIFI Aggregation and Offload Overview
    11.3. Layer 2 over Soft-GRE Tunnels
      11.3.1. Encapsulation
      11.3.2. Data Path
    11.4. Tunnel Level Egress QoS
      11.4.1. QoS Overrides
      11.4.2. Operational Commands
    11.5. Authentication
      11.5.1. EAP-Based Authentication
        11.5.1.1. RADIUS Proxy
          11.5.1.1.1. RADIUS Proxy — Server Load-Balancing
          11.5.1.1.2. RADIUS Proxy — Cache Lookup
          11.5.1.1.3. RADIUS Proxy — Accounting
      11.5.2. Portal Authentication
    11.6. Address Assignment
    11.7. WIFI Mobility Anchor
    11.8. Wholesale
    11.9. CGN on WLAN-GW
    11.10. Lawful Intercept on WLAN-GW
    11.11. WLAN Location Enhancements
      11.11.1. Triggered Interim Accounting-Updates
      11.11.2. Operational Support
    11.12. 3G/4G Interworking
      11.12.1. Signaling Call Flow
        11.12.1.1. GTP Setup with EAP Authentication
      11.12.2. Location Notification in S2a
        11.12.2.1. WLAN Location over S2a
        11.12.2.2. Cellular Location over S2a
        11.12.2.3. Cellular Location over Gn Interface
        11.12.2.4. Operational Support
    11.13. Migrant User Support
      11.13.1. Migrant User Support with Portal-Authentication
        11.13.1.1. DHCP
        11.13.1.2. Authentication and Forwarding
      11.13.2. Migrant User Support with EAP Authentication
      11.13.3. Data Triggered Subscriber Creation
    11.14. Distributed Subscriber Management (DSM)
      11.14.1. DHCP
      11.14.2. Authentication and Accounting
        11.14.2.1. DSM Data-Plane
      11.14.3. IP Filtering
        11.14.3.1. Policing
        11.14.3.2. Lawful Intercept (LI)
        11.14.3.3. Data-Triggered UE Creation
      11.14.4. Idle-Timeout and Session-Timeout Management
      11.14.5. Operational Commands
      11.14.6. Pool Manager
      11.14.7. DHCPv6 and SLAAC
      11.14.8. Call Trace
    11.15. Distributed RADIUS Proxy
      11.15.1. Enhanced Subscriber Management
      11.15.2. Distributed Subscriber Management
      11.15.3. VLAN Awareness
      11.15.4. Operational Commands
    11.16. WLAN-GW 1:1 Active-Backup Redundancy
      11.16.1. DHCP Server Redundancy
      11.16.2. Subscriber Creation after Switchover
    11.17. WLAN-GW Triggered Stateless Redundancy (N:1)
    11.18. AP Triggered Stateless WLAN-GW Redundancy (N:1)
    11.19. IPv6-only Access
      11.19.1. IPv6 GRE Tunnels
      11.19.2. IPv6 Client-Side RADIUS Proxy
      11.19.3. Dual-Stack UEs over WLAN-GW
        11.19.3.1. SLAAC Prefix Assignment
        11.19.3.2. DHCPv6 IA_NA Assignment
        11.19.3.3. Migrant User Support
        11.19.3.4. Accounting
    11.20. Layer 2 Wholesale
    11.21. VLAN to WLAN-GW IOM/IMM Steering via Internal Epipe
    11.22. Soft-L2TPv3 Tunnels
     WiFi Command Reference
      Command Hierarchies
        WLAN-GW Commands
          Subscriber Management BRG Commands
          DSM Call Trace Commands
        WLAN-GW Service Commands
        RADIUS Server and Proxy Commands
        LUDB Matching for RADIUS Proxy Cache
        Data Plane Related Commands
        Port Policy Commands
        WIFI Aggregation and Offload – Migrant User Support Commands
        Distributed Subscriber Management Commands
        Show Commands
        Debug Commands
        Tools Commands
        Clear Commands
      WIFI Aggregation and Offload Commands
        WIFI Aggregation and Offload Commands
          Generic Commands
          WLAN-GW Commands
          DSM Call Trace Commands
          RADIUS Server Policy Commands
        CLI Command Description for RADIUS Server
        CLI Command Description for RADIUS Proxy Server
        LUDB Matching of RADIUS Proxy Cache Commands
        WLAN-GW-Group Commands
        Port Policy Commands
        WLAN-GW Group Interface Commands
        Migrant User Support Commands
          Distributed Subscriber Management Commands
          Show Commands
          Debug Commands
          Tools Commands
          Clear Commands
  12. GTP
    12.1. In This Chapter
    12.2. GTP Uplink
      12.2.1. Identification Attributes
      12.2.2. P-GW/GGSN Selection
      12.2.3. Configuration
      12.2.4. QoS Support
      12.2.5. GTP Session Hold
      12.2.6. Selective Breakout
      12.2.7. IPoE Support
      12.2.8. PPPoE Support
    12.3. GTP Peering
    12.4. Operational Commands
      12.4.1. show router wlan-gw mobile-gateway
      12.4.2. show router 300 wlan-gw mgw-address-cache
      12.4.3. show subscriber-mgmt wlan-gw gtp-session detail
      12.4.4. show subscriber-mgmt wlan-gw mgw-profile "default"
      12.4.5. show subscriber-mgmt wlan-gw gtp-statistics
    GTP Command Reference
      Command Hierarchies
        GTP Commands
        GTP Service Commands
      GTP Command Descriptions
        GTP Commands
          Generic Commands
          GTP Commands
  13.  virtual Residential Gateway
    13.1. In This Section
    13.2. virtual Residential Gateway Overview
      13.2.1. Access Modes
      13.2.2. Home Context on the vRGW
        13.2.2.1. Implicit Home Authentication
        13.2.2.2. Explicit Home Authentication
        13.2.2.3. Change of Configuration
        13.2.2.4. Home Lifetime
      13.2.3. Device Context on the vRGW
      13.2.4. Dynamic Configuration Changes
      13.2.5. Per-Home Pool Management and L2-Aware NAT
        13.2.5.1. Sticky IP Addresses
        13.2.5.2. Managed Static IPv4 Addresses
        13.2.5.3. DMZ
      13.2.6. IPv6
      13.2.7. QoS and Filter Support
      13.2.8. Data-Triggered Authentication
      13.2.9. Per-Host NAT Port Ranges
      13.2.10. Inter-Chassis Redundancy
        13.2.10.1. Pool State Synchronization
        13.2.10.2. Regular Group Interfaces
        13.2.10.3. WLAN-GW Group Interfaces
      13.2.11. BRG and vRG Caveats
     vRGW Command Reference
      Command Hierarchies
         Subscriber Management BRG Profile Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
      Command Descriptions
        Generic Commands
        vRGW Commands
        Subscriber Management Commands
        Service Commands
        Show Commands
        Clear Commands
  14. Dynamic Data Services
    14.1. In This Section
    14.2. Introduction to Dynamic Data Services
    14.3. RADIUS-Triggered Dynamic Data Services Associated With a PPPoE or IPoE Session as Control Channel
    14.4. Data-Triggered Dynamic Data Services
      14.4.1. Data Trigger
      14.4.2. Dynamic Services Data Trigger Capture SAP
      14.4.3. RADIUS Authentication
      14.4.4. Local Authentication
      14.4.5. Data-Triggered Dynamic Service Provisioning
      14.4.6. Control Plane Protection
      14.4.7. Debugging
     RADIUS Triggered Dynamic Data Services Command Reference
      Command Hierarchies
        RADIUS Triggered Dynamic Data Services Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
      RADIUS Triggered Dynamic Data Services Commands
        Configuration Commands
        Basic System Command
        Show Commands
        Clear Commands
        Debug Commands
        Tools Commands
  15. Diameter and Diameter Applications
    15.1. In This Section
    15.2. Restrictions
    15.3. Terminology
    15.4. 3GPP-Based Diameter Credit Control Application (DCCA) - Online Charging
      15.4.1. Extended Failure Handling (EFH)
        15.4.1.1. Extended Failure Handling Example Call Flow
        15.4.1.2. Extended Failure Handling Triggers
        15.4.1.3. Assigning Interim Credit
        15.4.1.4. Enabling Extended Failure Handling
        15.4.1.5. Configuration Example 1 - Single Volume Interim Credit Value
        15.4.1.6. Configuration Example 2 - Interim Credit Values Per Rating Group
        15.4.1.7. Monitoring the Extended Failure Handling State
        15.4.1.8. Additional Call Flow Examples
          15.4.1.8.1. User Disconnects While EFH is Active
          15.4.1.8.2. The Maximum Number of Attempts is Reached
          15.4.1.8.3. EFH Activation Triggered During Final Unit Indication (FUI)
    15.5. Policy Management via Gx Interface
      15.5.1. Gx Protocol
      15.5.2. Policy Assignment Models
      15.5.3. IP-CAN Session – Gx Session Identification
        15.5.3.1. User Identification in PCRF
        15.5.3.2. NAS-Port-Id as Subscription-Id
      15.5.4. Gx Interface and ESM Subscriber Instantiation
        15.5.4.1. Gx and Dual-Stack Hosts
        15.5.4.2. Gx and PPPoEv6-DHCP
      15.5.5. Gx Fallback Function
      15.5.6. Gx CCR-I Replays
      15.5.7. Gx CCR-t Replays
        15.5.7.1. RAR and CCR-t Replay
        15.5.7.2. CCR-t Replay And Multi-Chassis Redundancy
        15.5.7.3. CCR-t Replay And High Availability
      15.5.8. Automatic Updates for IP Address Allocation/De-allocation
      15.5.9. DHCPv4/v6 Re-Authentication and RADIUS CoA Interactions With Gx
      15.5.10. Gx, ESM and AA
        15.5.10.1. ESM Subscriber-host vs AA Subscriber
        15.5.10.2. AA Subscriber State
      15.5.11. Policy Management via Gx
      15.5.12. Gx-Based Overrides
        15.5.12.1. Instantiation of Gx Overrides
        15.5.12.2. HTTP Redirect Override
        15.5.12.3. Removal of Overrides
        15.5.12.4. Examples of Gx Overrides
      15.5.13. PCC Rules
        15.5.13.1. PCC Rule Concept
        15.5.13.2. PCC Rule Instantiation
        15.5.13.3. Base QoS-Policy and Base Filter
        15.5.13.4. Generic Policy Sharing and Rule Sharing
        15.5.13.5. PCC Rule Name and PCC Rule Removal
        15.5.13.6. Gx Rule Ordering
        15.5.13.7. PCC Rule Override
        15.5.13.8. Aggregation of IP-Criterion
        15.5.13.9. Combining IPv4 and IPv6 Entries within the Rule
        15.5.13.10. Gx Rules with Multiple Actions and Action Sharing
        15.5.13.11. Alc-NAS-Filter-Rule-Shared AVP vs Flow-Information AVP
        15.5.13.12. RADIUS and Gx Interaction
        15.5.13.13. Bulk Changes via CLI while Gx Rules are Active
        15.5.13.14. PCC Rule Direction
        15.5.13.15. Action
        15.5.13.16. Rate-Limiting Action (Ingress, Egress)
          15.5.13.16.1. Dynamic Policers and Queue Mappings
          15.5.13.16.2. Dynamic Policer Rates and Accounting Statistics
        15.5.13.17. Forwarding-Class Change (Ingress, Egress)
        15.5.13.18. QoS Forward (Ingress and Egress)
        15.5.13.19. Next-Hop Redirect (Ingress)
        15.5.13.20. HTTP Redirect (Ingress)
        15.5.13.21. Filter Forward/Drop (Ingress and Egress)
        15.5.13.22. Service Gating Function
        15.5.13.23. PCC Rule Provisioning Example
        15.5.13.24. Operational Aspects
        15.5.13.25. PCC Rules and Capacity Planning
        15.5.13.26. PCC Rule Scaling Example
      15.5.14. NAS Filter Inserts
        15.5.14.1. Examples of NAS Entry Inserts
      15.5.15. Error Handing and Rule Failure Reporting in ESM
        15.5.15.1. AVP Decoding Failure in Gx
        15.5.15.2. ESM Rule-Installation Failure
        15.5.15.3. Failure Reporting in AA
        15.5.15.4. Summary of Failure Reporting
      15.5.16. Usage-Monitoring and Reporting
        15.5.16.1. ESM Usage-Monitoring - What is Being Monitored
        15.5.16.2. AA Usage-Monitoring – What is Being Monitored
        15.5.16.3. Requesting Usage-Monitoring in ESM
        15.5.16.4. Reporting Accumulated Usage
        15.5.16.5. Disabling Usage-Monitoring
        15.5.16.6. Usage-Monitoring for PCC Rules
        15.5.16.7. Session Termination
        15.5.16.8. Usage-Monitoring Examples
      15.5.17. Event Triggers
      15.5.18. Subscriber Verification
      15.5.19. Subscriber Termination
      15.5.20. Mobility Support in WiFi
        15.5.20.1. Redundancy
      15.5.21. Persistency and Origin-State-ID AVP
      15.5.22. Overload Protection
    15.6. Diameter NASREQ Application
      15.6.1. Sample Configuration Steps
    15.7. Diameter Redundancy
      15.7.1. Diameter Peer Level Redundancy
      15.7.2. Diameter Multi-Chassis Redundancy
        15.7.2.1. Diameter Proxy Model General Operational Principles
        15.7.2.2. Diameter Proxy Activity Selection
        15.7.2.3. Synchronization and MCS
        15.7.2.4. Retransmissions
        15.7.2.5. Retransmissions and the T-bit
        15.7.2.6. Diameter Proxy Role
        15.7.2.7. Diameter Proxy and CC-Request-Number AVP
        15.7.2.8. Stateless Diameter Proxy
        15.7.2.9. Switchover Scenarios
        15.7.2.10. Log/Trap Generation Caused by Diameter Proxy State Change
        15.7.2.11. Switchover Update Event (CCR-u)
        15.7.2.12. Isolated Chassis
        15.7.2.13. Diameter Identities
        15.7.2.14. High Availability
      15.7.3. Gx Specific Behavior
    15.8. Diameter Debugging
  16.  Python Script Support for ESM
    16.1. In This Chapter
    16.2. Python Script Support for ESM
    16.3. Python in SR OS Overview
      16.3.1. Python Policy – GTPv1-C API
      16.3.2. Python Policy – GTPv2-C API
      16.3.3. Python Changes
    16.4. Python Support in sub-ident-policy
      16.4.1. Configuration
      16.4.2. Operator Debugging
      16.4.3. Python Scripts
      16.4.4. Sample Python Scripts
        16.4.4.1. Example
        16.4.4.2. Example
        16.4.4.3. Example
      16.4.5. Limitations
    16.5. RADIUS Script Policy Overview
      16.5.1. Python RADIUS API
      16.5.2. Sample Script
    16.6. Python Policy Overview
      16.6.1. Python Policy – RADIUS API
      16.6.2. Python Policy – DHCPv4 API
      16.6.3. Python Policy – DHCPv6 API
      16.6.4. Python Policy – Diameter API
      16.6.5. Python Policy – DHCP Transaction Cache API
      16.6.6. Python for PPPoE API
      16.6.7. Python API for PPP Packet
      16.6.8. Python API for PPP PAP
      16.6.9. Python API for PPP CHAP
      16.6.10. Python ESM API
      16.6.11. Python Cache Support
      16.6.12. Applying a Python Policy
      16.6.13. Python Script Protection
    16.7. Tips and Tricks
    Python Command Reference
      Command Hierarchies
        Python Policy Commands
        Python Script Commands
        Services Commands
        Show Commands
        Tools Commands
        Debug Commands
        Clear Commands
      Command Descriptions
        Python Configuration Commands
          Global Commands
          Python Policy Commands
          Python Script Commands
          Services Commands
          Tools Commands
        Show Commands
        Debug Commands
        Clear Commands
     Python RADIUS Command Reference
      Command Hierarchies
      Command Descriptions
        Generic Commands
        Script Commands
  17. Standards and Protocol Support
  Customer Document and Product Support
Unicast Routing Protocols Guide R14.0.R4
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. RIP
    2.1. In This Chapter
    2.2. RIP Overview
      2.2.1. RIP Features
        2.2.1.1. RIP Version Types
        2.2.1.2. RIPv2 Authentication
        2.2.1.3. RIP Packet Format
          2.2.1.3.1. RIPv1 Format
          2.2.1.3.2. RIPv2 Format
    2.3. RIPng
      2.3.1. RIPng Protocol
    2.4. Common Attributes
      2.4.1. Metrics
      2.4.2. Timers
      2.4.3. Import and Export Policies
      2.4.4. Hierarchical Levels
    2.5. RIP Configuration Process Overview
    2.6. Configuration Notes
      2.6.1. General
    Configuring RIP with CLI
    RIP and RIPng Configuration Overview
      Preconfiguration Requirements
      RIP Hierarchy
    Basic RIP Configuration
    Common Configuration Tasks
      Configuring Interfaces
      Configuring a Route Policy
      Configuring RIP Parameters
      Configuring Global-Level Parameters
      Configuring Group-Level Parameters
      Configuring Neighbor-Level Parameters
    RIP Configuration Management Tasks
      Modifying RIP Parameters
      Deleting a Group
      Deleting a Neighbor
    RIP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
          Group Commands
          Neighbor Commands
        RIPng Configuration Commands
          Group Commands
          Neighbor Commands
      Command Descriptions
        Generic Commands
        RIP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show RIP Commands
        Clear RIP Commands
        Debug RIP Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug RIP Commands
  3. OSPF
    3.1. In This Chapter
    3.2. Configuring OSPF
      3.2.1. OSPF Areas
        3.2.1.1. Backbone Area
        3.2.1.2. Stub Area
        3.2.1.3. Not-So-Stubby Area
          3.2.1.3.1. OSPF Super Backbone
          3.2.1.3.2. Sham Links
          3.2.1.3.3. Implementing the OSPF Super Backbone
          3.2.1.3.4. Loop Avoidance
          3.2.1.3.5. DN-BIT
          3.2.1.3.6. Route Tag
          3.2.1.3.7. Sham Links
      3.2.2. OSPFv3 Authentication
        3.2.2.1. OSPFv3 Graceful Restart Helper
      3.2.3. Virtual Links
      3.2.4. Neighbors and Adjacencies
      3.2.5. Link-State Advertisements
      3.2.6. Metrics
      3.2.7. Authentication
      3.2.8. IP Subnets
      3.2.9. Preconfiguration Recommendations
      3.2.10. Multiple OSPF Instances
        3.2.10.1. Route Export Policies for OSPF
        3.2.10.2. Preventing Route Redistribution Loops
      3.2.11. Multi-Address Support for OSPFv3
      3.2.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        3.2.12.1. IP FRR Configuration
          3.2.12.1.1. Reducing the Scope of the LFA Calculation by SPF
        3.2.12.2. ECMP Considerations
        3.2.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
        3.2.12.4. IP FRR and BGP Next-Hop Resolution
        3.2.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
          3.2.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
          3.2.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      3.3.1. Configuring a Route Next-Hop Policy Template
        3.3.1.1. Configuring Affinity or Admin Group Constraints
        3.3.1.2. Configuring SRLG Group Constraints
        3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
        3.3.1.4. Configuring Protection Type and Next-Hop Type Preferences
      3.3.2. Application of Route Next-Hop Policy Template to an Interface
      3.3.3. Excluding Prefixes from LFA SPF
      3.3.4. Modification to LFA Next-Hop Selection Algorithm
    3.4. LFA Protection using Segment Routing Backup Node SID
      3.4.1. Configuring LFA using Backup Node SID
      3.4.2. Detailed Operation of LFA Protection using Backup Node SID
      3.4.3. Duplicate SID Handling
      3.4.4. OSPF Control Plane Extensions
    3.5. Segment Routing in Shortest Path Forwarding
    3.6. OSPF LSA Filtering
    3.7. FIB Prioritization
    3.8. OSPF Configuration Process Overview
    3.9. Configuration Notes
      3.9.1. General
        3.9.1.1. OSPF Defaults
     Configuring OSPF with CLI
    OSPF Configuration Guidelines
    Basic OSPF Configuration
      Configuring the Router ID
    Configuring OSPF Components
      Configuring OSPF Parameters
      Configuring OSPF3 Parameters
      Configuring an OSPF or OSPF3 Area
      Configuring a Stub Area
      Configuring a Not-So-Stubby Area
      Configuring a Virtual Link
      Configuring an Interface
      Configuring Authentication
        Overview
        Configuring Authentication Keys and Algorithms
        Configuring Authentication using Keychains
      Assigning a Designated Router
      Configuring Route Summaries
      Configuring Route Preferences
    OSPF Configuration Management Tasks
      Modifying a Router ID
      Deleting a Router ID
      Modifying OSPF Parameters
    OSPF Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        OSPF Global Commands
        OSPF Area Commands
        Interface/Virtual Link Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  4. IS-IS
    4.1. In This Chapter
    4.2. Configuring IS-IS
      4.2.1. Routing
      4.2.2. IS-IS Frequently Used Terms
      4.2.3. ISO Network Addressing
        4.2.3.1. IS-IS PDU Configuration
        4.2.3.2. IS-IS Operations
      4.2.4. IS-IS Route Summarization
        4.2.4.1. Partial SPF Calculation
      4.2.5. IS-IS MT-Topology Support
        4.2.5.1. Native IPv6 Support
      4.2.6. IS-IS Administrative Tags
        4.2.6.1. Setting Route Tags
        4.2.6.2. Using Route Tags
        4.2.6.3. Unnumbered Interface Support
      4.2.7. Segment Routing in Shortest Path Forwarding
        4.2.7.1. Configuring Segment Routing in Shortest Path
        4.2.7.2. Segment Routing Operational Procedures
          4.2.7.2.1. Prefix Advertisement and Resolution
          4.2.7.2.2. Error and Resource Exhaustion Handling
        4.2.7.3. Segment Routing Tunnel Management
          4.2.7.3.1. Tunnel MTU Determination
        4.2.7.4. Remote LFA with Segment Routing
        4.2.7.5. IPv6 Segment Routing using MPLS Encapsulation
          4.2.7.5.1. IS-IS MT=0 Extensions
          4.2.7.5.2. Service and Forwarding Contexts Supported
          4.2.7.5.3. Services Using SDP with a SR IPv6 Tunnel
        4.2.7.6. Data Path Support
          4.2.7.6.1. Hash Label and Entropy Label Support
        4.2.7.7. Control Protocol Changes
          4.2.7.7.1. IS-IS Control Protocol Changes
          4.2.7.7.2. OSPF Control Protocol Changes
        4.2.7.8. BGP Shortcut Using Segment Routing Tunnel
        4.2.7.9. BGP Label Route Resolution Using Segment Routing Tunnel
        4.2.7.10. Service Packet Forwarding with Segment Routing
        4.2.7.11. Mirror Services and Lawful Intercept
      4.2.8. Segment Routing Mapping Server Function for IPv4 Prefixes
        4.2.8.1. Segment Routing Mapping Server
        4.2.8.2. Segment Routing Mapping Server Prefix SID Resolution
    4.3. FIB Prioritization
    4.4. IS-IS Configuration Process Overview
    4.5. Configuration Notes
      4.5.1. General
     Configuring IS-IS with CLI
    IS-IS Configuration Overview
      Router Levels
      Area Address Attributes
      Interface Level Capability
      Route Leaking
    Basic IS-IS Configuration
    Common Configuration Tasks
    Configuring IS-IS Components
      Enabling IS-IS
      Modifying Router-Level Parameters
      Configuring ISO Area Addresses
      Configuring Global IS-IS Parameters
      Migration to IS-IS Multi-Topology
      Configuring Interface Parameters
        Example: Configuring a Level 1 Area
        Example: Modifying a Router’s Level Capability
      Configuring IS-IS Link Groups
    IS-IS Configuration Management Tasks
      Disabling IS-IS
      Removing IS-IS
      Modifying Global IS-IS Parameters
      Modifying IS-IS Interface Parameters
      Configuring Authentication using Keychains
      Configuring Leaking
      Redistributing External IS-IS Routers
      Specifying MAC Addresses for All IS-IS Routers
    IS-IS Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        IS-IS Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  5. BGP
    5.1. In This Chapter
    5.2. BGP Overview
    5.3. BGP Sessions
      5.3.1. BGP Session States
      5.3.2. Detecting BGP Session Failures
        5.3.2.1. Peer Tracking
        5.3.2.2. Bidirectional Forwarding Detection (BFD)
        5.3.2.3. Fast External Failover
      5.3.3. High Availability BGP Sessions
        5.3.3.1. BGP Graceful Restart
      5.3.4. BGP Session Security
        5.3.4.1. TCP MD5 Authentication
        5.3.4.2. TTL Security Mechanism
      5.3.5. BGP Groups
    5.4. BGP Design Concepts
      5.4.1. Route Reflection
      5.4.2. BGP Confederations
    5.5. BGP Messages
      5.5.1. Open Message
        5.5.1.1. Changing the Autonomous System Number
        5.5.1.2. Changing a Confederation Number
        5.5.1.3. BGP Advertisement
      5.5.2. Update Message
      5.5.3. Keepalive Message
      5.5.4. Notification Message
        5.5.4.1. UPDATE Message Error Handling
      5.5.5. Route Refresh Message
    5.6. BGP Path Attributes
      5.6.1. Origin
      5.6.2. AS Path
        5.6.2.1. AS Override
        5.6.2.2. Using Local AS for ASN Migration
        5.6.2.3. 4-Octet Autonomous System Numbers
      5.6.3. Next-Hop
        5.6.3.1. Next-Hop IPv4 Address Family over IPv6
        5.6.3.2. Next-Hop VPN-IPv4 Address Family over IPv6
        5.6.3.3. Next-Hop VPN-IPv6 Address Family over IPv6
        5.6.3.4. Next-Hop Resolution
        5.6.3.5. Next-Hop Tracking
        5.6.3.6. Next-Hop Indirection
        5.6.3.7. Using Multiple Address Families over IPv6 BGP Sessions
      5.6.4. MED
        5.6.4.1. Deterministic MED
      5.6.5. Local Preference
      5.6.6. Route Aggregation Path Attributes
      5.6.7. Community and Extended Community Attributes
      5.6.8. Route Reflection Attributes
      5.6.9. Multi-Protocol BGP Attributes
      5.6.10. 4-Octet AS Attributes
      5.6.11. AIGP Metric
    5.7. BGP Routing Information Base (RIB)
      5.7.1. RIB-IN Features
        5.7.1.1. BGP Import Policies
      5.7.2. LOC-RIB Features
        5.7.2.1. BGP Decision Process
          5.7.2.1.1. Always Compare MED
          5.7.2.1.2. Ignore Next-Hop Metric
        5.7.2.2. BGP Route Installation in the Route Table
        5.7.2.3. Weighted ECMP for BGP Routes
        5.7.2.4. BGP Route Installation in the Tunnel Table
        5.7.2.5. BGP Fast Reroute
          5.7.2.5.1. Calculating Backup Paths
          5.7.2.5.2. Failure Detection and Switchover to the Backup Path
        5.7.2.6. QoS Policy Propagation via BGP (QPPB)
        5.7.2.7. BGP Policy Accounting
        5.7.2.8. Route Flap Damping (RFD)
      5.7.3. RIB-OUT Features
        5.7.3.1. BGP Export Policies
        5.7.3.2. Outbound Route Filtering (ORF)
        5.7.3.3. RT Constrained Route Distribution
        5.7.3.4. Min Route Advertisement Interval (MRAI)
        5.7.3.5. Advertise-Inactive
        5.7.3.6. Best-External
        5.7.3.7. Add-Paths
          5.7.3.7.1. Path Selection with Add-Paths
        5.7.3.8. Split-Horizon
    5.8. BGP Applications
      5.8.1. Next-hop Resolution Using Tunnels
        5.8.1.1. BGP Routes
        5.8.1.2. BGP Labeled Routes
        5.8.1.3. VPN-IPv4 and VPN-IPv6 Routes
      5.8.2. BGP Flow-Spec
        5.8.2.1. Validating Received Flow Routes
        5.8.2.2. Using Flow Routes to Create Dynamic Filter Entries
      5.8.3. Configuration of TTL Propagation for BGP Label Routes
        5.8.3.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
        5.8.3.2. TTL Propagation for RFC 3107 Label Routes at LSR
      5.8.4. BGP Prefix Origin Validation
      5.8.5. BGP Route Leaking
    5.9. BGP Configuration Process Overview
    5.10. Configuration Notes
      5.10.1. General
        5.10.1.1. BGP Defaults
        5.10.1.2. BGP MIB Notes
    Configuring BGP with CLI
    BGP Configuration Overview
      Preconfiguration Requirements
      BGP Hierarchy
      Internal and External BGP Configurations
    Basic BGP Configuration
    Common Configuration Tasks
      Creating an Autonomous System
      Configuring a Router ID
      BGP Confederations
      BGP Route Reflectors
      BGP Components
      Configuring Group Attributes
      Configuring Neighbor Attributes
      Configuring Route Reflection
      Configuring a Confederation
      BGP Configuration Management Tasks
        Modifying an AS Number
        Modifying a Confederation Number
        Modifying the BGP Router ID
        Modifying the Router-Level Router ID
        Deleting a Neighbor
        Deleting Groups
    BGP Command Reference
      Command Hierarchies
        Global BGP Commands
        Group BGP Commands
        Neighbor BGP Commands
        Other BGP-Related Commands
      Command Descriptions
        Generic Commands
        BGP Commands
        Other BGP-Related Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  6. Route Policies
    6.1. In This Chapter
    6.2. Configuring Route Policies
      6.2.1. Policy Statements
        6.2.1.1. Policy Statement Chaining and Logical Expressions
        6.2.1.2. Routing Policy Subroutines
        6.2.1.3. Policy Evaluation Command
        6.2.1.4. Exclusive Editing for Policy Configuration
        6.2.1.5. Default Action Behavior
        6.2.1.6. Denied IP Unicast Prefixes
        6.2.1.7. Controlling Route Flapping
      6.2.2. Regular Expressions
      6.2.3. BGP and OSPF Route Policy Support
        6.2.3.1. BGP Route Policies
        6.2.3.2. Re-advertised Route Policies
        6.2.3.3. Triggered Policies
        6.2.3.4. Set MED to IGP Cost using Route Policies
        6.2.3.5. BGP Policy Subroutines
        6.2.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
      6.2.4. Routing Policy Parameterization
      6.2.5. When to Use Route Policies
    6.3. Route Policy Configuration Process Overview
    6.4. Configuration Notes
      6.4.1. General
     Configuring Route Policies with CLI
    Route Policy Configuration Overview
      When to Create Routing Policies
      Default Route Policy Actions
      Policy Evaluation
      Damping
    Basic Configurations
    Configuring Route Policy Components
      Beginning the Policy Statement
      Creating a Route Policy
      Configuring a Default Action
      Configuring an Entry
      Configuring a Community List
      Configuring Damping
        Configuring a Prefix List
        Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
    Route Policy Configuration Management Tasks
      Editing Policy Statements and Parameters
      Deleting an Entry
      Deleting a Policy Statement
    Route Policy Command Reference
      Command Hierarchies
        Route Policy Configuration Commands
      Command Descriptions
        Generic Commands
        Route Policy Options
        Route Policy Damping Commands
        Route Policy Prefix Commands
        Route Policy Entry Match Commands
        Route Policy Action Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  7. Standards and Protocol Support
  Customer Document and Product Support
  1. Getting Started
    1.1. About This Guide
    1.2. Router Configuration Process
  2. RIP
    2.1. In This Chapter
    2.2. RIP Overview
      2.2.1. RIP Features
        2.2.1.1. RIP Version Types
        2.2.1.2. RIPv2 Authentication
        2.2.1.3. RIP Packet Format
          2.2.1.3.1. RIPv1 Format
          2.2.1.3.2. RIPv2 Format
    2.3. RIPng
      2.3.1. RIPng Protocol
    2.4. Common Attributes
      2.4.1. Metrics
      2.4.2. Timers
      2.4.3. Import and Export Policies
      2.4.4. Hierarchical Levels
    2.5. RIP Configuration Process Overview
    2.6. Configuration Notes
      2.6.1. General
    Configuring RIP with CLI
    RIP and RIPng Configuration Overview
      Preconfiguration Requirements
      RIP Hierarchy
    Basic RIP Configuration
    Common Configuration Tasks
      Configuring Interfaces
      Configuring a Route Policy
      Configuring RIP Parameters
      Configuring Global-Level Parameters
      Configuring Group-Level Parameters
      Configuring Neighbor-Level Parameters
    RIP Configuration Management Tasks
      Modifying RIP Parameters
      Deleting a Group
      Deleting a Neighbor
    RIP Configuration Command Reference
      Command Hierarchies
        Configuration Commands
          Group Commands
          Neighbor Commands
        RIPng Configuration Commands
          Group Commands
          Neighbor Commands
      Command Descriptions
        Generic Commands
        RIP Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show RIP Commands
        Clear RIP Commands
        Debug RIP Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug RIP Commands
  3. OSPF
    3.1. In This Chapter
    3.2. Configuring OSPF
      3.2.1. OSPF Areas
        3.2.1.1. Backbone Area
        3.2.1.2. Stub Area
        3.2.1.3. Not-So-Stubby Area
          3.2.1.3.1. OSPF Super Backbone
          3.2.1.3.2. Sham Links
          3.2.1.3.3. Implementing the OSPF Super Backbone
          3.2.1.3.4. Loop Avoidance
          3.2.1.3.5. DN-BIT
          3.2.1.3.6. Route Tag
          3.2.1.3.7. Sham Links
      3.2.2. OSPFv3 Authentication
        3.2.2.1. OSPFv3 Graceful Restart Helper
      3.2.3. Virtual Links
      3.2.4. Neighbors and Adjacencies
      3.2.5. Link-State Advertisements
      3.2.6. Metrics
      3.2.7. Authentication
      3.2.8. IP Subnets
      3.2.9. Preconfiguration Recommendations
      3.2.10. Multiple OSPF Instances
        3.2.10.1. Route Export Policies for OSPF
        3.2.10.2. Preventing Route Redistribution Loops
      3.2.11. Multi-Address Support for OSPFv3
      3.2.12. IP Fast-reroute (IP FRR) For OSPF and IS-IS Prefixes
        3.2.12.1. IP FRR Configuration
          3.2.12.1.1. Reducing the Scope of the LFA Calculation by SPF
        3.2.12.2. ECMP Considerations
        3.2.12.3. IP FRR and RSVP Shortcut (IGP Shortcut)
        3.2.12.4. IP FRR and BGP Next-Hop Resolution
        3.2.12.5. OSPF and IS-IS Support for Loop-Free Alternate Calculation
          3.2.12.5.1. Loop-Free Alternate Calculation in the Presence of IGP Shortcuts
          3.2.12.5.2. Loop-Free Alternate Calculation for Inter-Area/inter-Level Prefixes
    3.3. Loop-Free Alternate Shortest Path First (LFA SPF) Policies
      3.3.1. Configuring a Route Next-Hop Policy Template
        3.3.1.1. Configuring Affinity or Admin Group Constraints
        3.3.1.2. Configuring SRLG Group Constraints
        3.3.1.3. Interaction of IP and MPLS Admin Group and SRLG
        3.3.1.4. Configuring Protection Type and Next-Hop Type Preferences
      3.3.2. Application of Route Next-Hop Policy Template to an Interface
      3.3.3. Excluding Prefixes from LFA SPF
      3.3.4. Modification to LFA Next-Hop Selection Algorithm
    3.4. LFA Protection using Segment Routing Backup Node SID
      3.4.1. Configuring LFA using Backup Node SID
      3.4.2. Detailed Operation of LFA Protection using Backup Node SID
      3.4.3. Duplicate SID Handling
      3.4.4. OSPF Control Plane Extensions
    3.5. Segment Routing in Shortest Path Forwarding
    3.6. OSPF LSA Filtering
    3.7. FIB Prioritization
    3.8. OSPF Configuration Process Overview
    3.9. Configuration Notes
      3.9.1. General
        3.9.1.1. OSPF Defaults
     Configuring OSPF with CLI
    OSPF Configuration Guidelines
    Basic OSPF Configuration
      Configuring the Router ID
    Configuring OSPF Components
      Configuring OSPF Parameters
      Configuring OSPF3 Parameters
      Configuring an OSPF or OSPF3 Area
      Configuring a Stub Area
      Configuring a Not-So-Stubby Area
      Configuring a Virtual Link
      Configuring an Interface
      Configuring Authentication
        Overview
        Configuring Authentication Keys and Algorithms
        Configuring Authentication using Keychains
      Assigning a Designated Router
      Configuring Route Summaries
      Configuring Route Preferences
    OSPF Configuration Management Tasks
      Modifying a Router ID
      Deleting a Router ID
      Modifying OSPF Parameters
    OSPF Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        OSPF Global Commands
        OSPF Area Commands
        Interface/Virtual Link Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  4. IS-IS
    4.1. In This Chapter
    4.2. Configuring IS-IS
      4.2.1. Routing
      4.2.2. IS-IS Frequently Used Terms
      4.2.3. ISO Network Addressing
        4.2.3.1. IS-IS PDU Configuration
        4.2.3.2. IS-IS Operations
      4.2.4. IS-IS Route Summarization
        4.2.4.1. Partial SPF Calculation
      4.2.5. IS-IS MT-Topology Support
        4.2.5.1. Native IPv6 Support
      4.2.6. IS-IS Administrative Tags
        4.2.6.1. Setting Route Tags
        4.2.6.2. Using Route Tags
        4.2.6.3. Unnumbered Interface Support
      4.2.7. Segment Routing in Shortest Path Forwarding
        4.2.7.1. Configuring Segment Routing in Shortest Path
        4.2.7.2. Segment Routing Operational Procedures
          4.2.7.2.1. Prefix Advertisement and Resolution
          4.2.7.2.2. Error and Resource Exhaustion Handling
        4.2.7.3. Segment Routing Tunnel Management
          4.2.7.3.1. Tunnel MTU Determination
        4.2.7.4. Remote LFA with Segment Routing
        4.2.7.5. IPv6 Segment Routing using MPLS Encapsulation
          4.2.7.5.1. IS-IS MT=0 Extensions
          4.2.7.5.2. Service and Forwarding Contexts Supported
          4.2.7.5.3. Services Using SDP with a SR IPv6 Tunnel
        4.2.7.6. Data Path Support
          4.2.7.6.1. Hash Label and Entropy Label Support
        4.2.7.7. Control Protocol Changes
          4.2.7.7.1. IS-IS Control Protocol Changes
          4.2.7.7.2. OSPF Control Protocol Changes
        4.2.7.8. BGP Shortcut Using Segment Routing Tunnel
        4.2.7.9. BGP Label Route Resolution Using Segment Routing Tunnel
        4.2.7.10. Service Packet Forwarding with Segment Routing
        4.2.7.11. Mirror Services and Lawful Intercept
      4.2.8. Segment Routing Mapping Server Function for IPv4 Prefixes
        4.2.8.1. Segment Routing Mapping Server
        4.2.8.2. Segment Routing Mapping Server Prefix SID Resolution
    4.3. FIB Prioritization
    4.4. IS-IS Configuration Process Overview
    4.5. Configuration Notes
      4.5.1. General
     Configuring IS-IS with CLI
    IS-IS Configuration Overview
      Router Levels
      Area Address Attributes
      Interface Level Capability
      Route Leaking
    Basic IS-IS Configuration
    Common Configuration Tasks
    Configuring IS-IS Components
      Enabling IS-IS
      Modifying Router-Level Parameters
      Configuring ISO Area Addresses
      Configuring Global IS-IS Parameters
      Migration to IS-IS Multi-Topology
      Configuring Interface Parameters
        Example: Configuring a Level 1 Area
        Example: Modifying a Router’s Level Capability
      Configuring IS-IS Link Groups
    IS-IS Configuration Management Tasks
      Disabling IS-IS
      Removing IS-IS
      Modifying Global IS-IS Parameters
      Modifying IS-IS Interface Parameters
      Configuring Authentication using Keychains
      Configuring Leaking
      Redistributing External IS-IS Routers
      Specifying MAC Addresses for All IS-IS Routers
    IS-IS Configuration Command Reference
      Command Hierarchies
        Configuration Commands
      Command Descriptions
        Generic Commands
        IS-IS Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  5. BGP
    5.1. In This Chapter
    5.2. BGP Overview
    5.3. BGP Sessions
      5.3.1. BGP Session States
      5.3.2. Detecting BGP Session Failures
        5.3.2.1. Peer Tracking
        5.3.2.2. Bidirectional Forwarding Detection (BFD)
        5.3.2.3. Fast External Failover
      5.3.3. High Availability BGP Sessions
        5.3.3.1. BGP Graceful Restart
      5.3.4. BGP Session Security
        5.3.4.1. TCP MD5 Authentication
        5.3.4.2. TTL Security Mechanism
      5.3.5. BGP Groups
    5.4. BGP Design Concepts
      5.4.1. Route Reflection
      5.4.2. BGP Confederations
    5.5. BGP Messages
      5.5.1. Open Message
        5.5.1.1. Changing the Autonomous System Number
        5.5.1.2. Changing a Confederation Number
        5.5.1.3. BGP Advertisement
      5.5.2. Update Message
      5.5.3. Keepalive Message
      5.5.4. Notification Message
        5.5.4.1. UPDATE Message Error Handling
      5.5.5. Route Refresh Message
    5.6. BGP Path Attributes
      5.6.1. Origin
      5.6.2. AS Path
        5.6.2.1. AS Override
        5.6.2.2. Using Local AS for ASN Migration
        5.6.2.3. 4-Octet Autonomous System Numbers
      5.6.3. Next-Hop
        5.6.3.1. Next-Hop IPv4 Address Family over IPv6
        5.6.3.2. Next-Hop VPN-IPv4 Address Family over IPv6
        5.6.3.3. Next-Hop VPN-IPv6 Address Family over IPv6
        5.6.3.4. Next-Hop Resolution
        5.6.3.5. Next-Hop Tracking
        5.6.3.6. Next-Hop Indirection
        5.6.3.7. Using Multiple Address Families over IPv6 BGP Sessions
      5.6.4. MED
        5.6.4.1. Deterministic MED
      5.6.5. Local Preference
      5.6.6. Route Aggregation Path Attributes
      5.6.7. Community and Extended Community Attributes
      5.6.8. Route Reflection Attributes
      5.6.9. Multi-Protocol BGP Attributes
      5.6.10. 4-Octet AS Attributes
      5.6.11. AIGP Metric
    5.7. BGP Routing Information Base (RIB)
      5.7.1. RIB-IN Features
        5.7.1.1. BGP Import Policies
      5.7.2. LOC-RIB Features
        5.7.2.1. BGP Decision Process
          5.7.2.1.1. Always Compare MED
          5.7.2.1.2. Ignore Next-Hop Metric
        5.7.2.2. BGP Route Installation in the Route Table
        5.7.2.3. Weighted ECMP for BGP Routes
        5.7.2.4. BGP Route Installation in the Tunnel Table
        5.7.2.5. BGP Fast Reroute
          5.7.2.5.1. Calculating Backup Paths
          5.7.2.5.2. Failure Detection and Switchover to the Backup Path
        5.7.2.6. QoS Policy Propagation via BGP (QPPB)
        5.7.2.7. BGP Policy Accounting
        5.7.2.8. Route Flap Damping (RFD)
      5.7.3. RIB-OUT Features
        5.7.3.1. BGP Export Policies
        5.7.3.2. Outbound Route Filtering (ORF)
        5.7.3.3. RT Constrained Route Distribution
        5.7.3.4. Min Route Advertisement Interval (MRAI)
        5.7.3.5. Advertise-Inactive
        5.7.3.6. Best-External
        5.7.3.7. Add-Paths
          5.7.3.7.1. Path Selection with Add-Paths
        5.7.3.8. Split-Horizon
    5.8. BGP Applications
      5.8.1. Next-hop Resolution Using Tunnels
        5.8.1.1. BGP Routes
        5.8.1.2. BGP Labeled Routes
        5.8.1.3. VPN-IPv4 and VPN-IPv6 Routes
      5.8.2. BGP Flow-Spec
        5.8.2.1. Validating Received Flow Routes
        5.8.2.2. Using Flow Routes to Create Dynamic Filter Entries
      5.8.3. Configuration of TTL Propagation for BGP Label Routes
        5.8.3.1. TTL Propagation for RFC 3107 Label Route at Ingress LER
        5.8.3.2. TTL Propagation for RFC 3107 Label Routes at LSR
      5.8.4. BGP Prefix Origin Validation
      5.8.5. BGP Route Leaking
    5.9. BGP Configuration Process Overview
    5.10. Configuration Notes
      5.10.1. General
        5.10.1.1. BGP Defaults
        5.10.1.2. BGP MIB Notes
    Configuring BGP with CLI
    BGP Configuration Overview
      Preconfiguration Requirements
      BGP Hierarchy
      Internal and External BGP Configurations
    Basic BGP Configuration
    Common Configuration Tasks
      Creating an Autonomous System
      Configuring a Router ID
      BGP Confederations
      BGP Route Reflectors
      BGP Components
      Configuring Group Attributes
      Configuring Neighbor Attributes
      Configuring Route Reflection
      Configuring a Confederation
      BGP Configuration Management Tasks
        Modifying an AS Number
        Modifying a Confederation Number
        Modifying the BGP Router ID
        Modifying the Router-Level Router ID
        Deleting a Neighbor
        Deleting Groups
    BGP Command Reference
      Command Hierarchies
        Global BGP Commands
        Group BGP Commands
        Neighbor BGP Commands
        Other BGP-Related Commands
      Command Descriptions
        Generic Commands
        BGP Commands
        Other BGP-Related Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
        Clear Commands
        Debug Commands
      Command Descriptions
        Show Commands
        Clear Commands
        Debug Commands
  6. Route Policies
    6.1. In This Chapter
    6.2. Configuring Route Policies
      6.2.1. Policy Statements
        6.2.1.1. Policy Statement Chaining and Logical Expressions
        6.2.1.2. Routing Policy Subroutines
        6.2.1.3. Policy Evaluation Command
        6.2.1.4. Exclusive Editing for Policy Configuration
        6.2.1.5. Default Action Behavior
        6.2.1.6. Denied IP Unicast Prefixes
        6.2.1.7. Controlling Route Flapping
      6.2.2. Regular Expressions
      6.2.3. BGP and OSPF Route Policy Support
        6.2.3.1. BGP Route Policies
        6.2.3.2. Re-advertised Route Policies
        6.2.3.3. Triggered Policies
        6.2.3.4. Set MED to IGP Cost using Route Policies
        6.2.3.5. BGP Policy Subroutines
        6.2.3.6. Route Policies for BGP Next-Hop Resolution and Peer Tracking
      6.2.4. Routing Policy Parameterization
      6.2.5. When to Use Route Policies
    6.3. Route Policy Configuration Process Overview
    6.4. Configuration Notes
      6.4.1. General
     Configuring Route Policies with CLI
    Route Policy Configuration Overview
      When to Create Routing Policies
      Default Route Policy Actions
      Policy Evaluation
      Damping
    Basic Configurations
    Configuring Route Policy Components
      Beginning the Policy Statement
      Creating a Route Policy
      Configuring a Default Action
      Configuring an Entry
      Configuring a Community List
      Configuring Damping
        Configuring a Prefix List
        Configuring PIM Join/Register Policies
        Configuring Bootstrap Message Import and Export Policies
    Route Policy Configuration Management Tasks
      Editing Policy Statements and Parameters
      Deleting an Entry
      Deleting a Policy Statement
    Route Policy Command Reference
      Command Hierarchies
        Route Policy Configuration Commands
      Command Descriptions
        Generic Commands
        Route Policy Options
        Route Policy Damping Commands
        Route Policy Prefix Commands
        Route Policy Entry Match Commands
        Route Policy Action Commands
    Show, Clear, and Debug Command Reference
      Command Hierarchies
        Show Commands
      Command Descriptions
        Show Commands
  7. Standards and Protocol Support
  Customer Document and Product Support
Versatile Service Module Guide R14.0.R4
  1. Versatile Service Module
    1.1. In This Guide
      1.1.1. In This Chapter
    1.2. VSM Overview
      1.2.1. Multiple System Solution
      1.2.2. Hybrid Service Solution
      1.2.3. Single System Multiple Interface Solution
      1.2.4. Full Feature Internal Service Cross Connect Solution
    1.3. Functional Components
      1.3.1. Service Cross Connect Adapter (CCA)
      1.3.2. Internal Service CCAG
      1.3.3. Internal Service Cross Connect Identifier (CCID)
    1.4. CCAG Bandwidth and Resiliency
      1.4.1. CCAG LAG Attributes
      1.4.2. CCAG Traffic Distribution
      1.4.3. CCAG SAP QoS
        1.4.3.1. Link Level CCAG SAP QoS Adaptation
        1.4.3.2. Distributed CCAG SAP QoS Adaptation
      1.4.4. VSM-CCA-XP
    1.5. Configuration Process Overview
    1.6. Configuration Notes
    Configuring VSM and CCAG with CLI
    Basic Configuration
    Common Configuration Tasks
      Configure VSM CCAG Components
        Provision VSM on an MDA
        Provision CCAG Parameters
        Configure Path Components
        Cross Connecting Network IP Interfaces
        Cross Connecting Services
        Epipe
        VPLS
        IES
        VPRN
    Service Management Tasks
      Modifying or Deleting a VSM MDA
      Modifying CCAG Parameters on a Network IP Interface
      Modifying CCAG Parameters
      Modifying Path Parameters
      Modifying Service Parameters
        Epipe
        VPLS
        IES
        VPRN
    VSM Command Reference
      Command Hierarchies
        VSM Configuration Commands
        Related Commands
      VSM Configuration Command Descriptions
        Generic Commands
        VSM CLI Tree Node Commands
        VSM Path Commands
        Related Commands
        Services Commands
          Service CCAG SAP Provisioning
  2. Standards and Protocol Support
  Customer Document and Product Support
  1. Versatile Service Module
    1.1. In This Guide
      1.1.1. In This Chapter
    1.2. VSM Overview
      1.2.1. Multiple System Solution
      1.2.2. Hybrid Service Solution
      1.2.3. Single System Multiple Interface Solution
      1.2.4. Full Feature Internal Service Cross Connect Solution
    1.3. Functional Components
      1.3.1. Service Cross Connect Adapter (CCA)
      1.3.2. Internal Service CCAG
      1.3.3. Internal Service Cross Connect Identifier (CCID)
    1.4. CCAG Bandwidth and Resiliency
      1.4.1. CCAG LAG Attributes
      1.4.2. CCAG Traffic Distribution
      1.4.3. CCAG SAP QoS
        1.4.3.1. Link Level CCAG SAP QoS Adaptation
        1.4.3.2. Distributed CCAG SAP QoS Adaptation
      1.4.4. VSM-CCA-XP
    1.5. Configuration Process Overview
    1.6. Configuration Notes
    Configuring VSM and CCAG with CLI
    Basic Configuration
    Common Configuration Tasks
      Configure VSM CCAG Components
        Provision VSM on an MDA
        Provision CCAG Parameters
        Configure Path Components
        Cross Connecting Network IP Interfaces
        Cross Connecting Services
        Epipe
        VPLS
        IES
        VPRN
    Service Management Tasks
      Modifying or Deleting a VSM MDA
      Modifying CCAG Parameters on a Network IP Interface
      Modifying CCAG Parameters
      Modifying Path Parameters
      Modifying Service Parameters
        Epipe
        VPLS
        IES
        VPRN
    VSM Command Reference
      Command Hierarchies
        VSM Configuration Commands
        Related Commands
      VSM Configuration Command Descriptions
        Generic Commands
        VSM CLI Tree Node Commands
        VSM Path Commands
        Related Commands
        Services Commands
          Service CCAG SAP Provisioning
  2. Standards and Protocol Support
  Customer Document and Product Support